Router and Vetting G-Cloud Service Definition

Size: px
Start display at page:

Download "Email Router and Vetting G-Cloud Service Definition"

Transcription

1 Router and Vetting G-Cloud Service Definition 2013 General Dynamics Information Technology. All rights reserved

2 1 In partnership with Government and industry-leading technology partners, General Dynamics Information Technology (GDIT) has selected a next-generation, cloud-based Router and Vetting Service solution tailored to accommodate specific requirements of the Public Sector. The solution enables organisations to route and provide gateway and relay services for multiple disparate systems and domains. The solution keeps malicious content out of a customers environment, prevents theft or inadvertent loss of sensitive data, ensure regulatory data protection mandates by ensuring that Personal and Sensitive Personal Data are handled properly without end user interaction; and securely communicate and collaborate with customers, partners and suppliers. Service Includes Router/Gateway/Relay Service provides the capability to route traffic to, from, and amongst multiple disparate systems. The ability to manage multiple domains and addresses enforcing the use of address display name policies as defined by the organisation. Anti-virus/Anti-spam solution (ProofPoint Enterprise Protection) provides a comprehensive security threat classification and security management solution against phishing, virus, spam s, and other borne malware. Powerful sender reputation management service combines a global sender IP reputation with local sender IP reputation data, analysed by powerful machine learning algorithms to block connections from malicious IP addresses. The patented MLX Threat Classification Engine ensures s are classified based on the level of threat posed and are managed accordingly, whether it s valid , nuisance spam, or malicious, low-volume phishing attacks. security threat protection solution uses real-time message tracing and other security techniques to triage security threats - backed by expert technical support staff focused on supporting the customer s mission-critical communications. Enterprise data security solution, ProofPoint Enterprise Privacy, provides policy-based (as opposed to user-driven) encryption, to enable the enforcement of enterprise rules for consistent and transparent Data Loss Prevention (DLP) between senders and recipients. Customised DLP rules to accommodate the varying needs of any Government agency. Support for administrator-driven workflows and policies enable any identified s to contain sensitive content to be quarantined for investigation, passed through without action, or automatically encrypted and sent to the recipient. Real-time message tracing, dashboards, and audit capabilities provide the necessary tools to triage data loss incidents or warnings. For More information g-cloud@gdit.com +44 (0)

3 2 Features and Benefits Router Supports numerous addressing formats and domains enhancing the capability to support multiple enterprise environments simultaneously. relay and Transport Layer Security (TLS) encryption can be configured in a variety of ways to serve each organisation s specific needs. Security Performs contextual, lexical, and image-based analysis to examine messages content/context to detect and stop spam, phishing, and viruses from entering the customer s environment, effectively blocking the majority of inbound SMTP connections with a very low false positive rate. Data Loss Prevention, Encryption, and Policy Enforcement Enables encryption and decryption across desktops, laptops, and mobile devices with a seamless user experience that encourages usage and discourages circumvention of security controls. Messages can be released, encrypted, blocked, or quarantined depending on the organisation s policies. Privacy Workflow Incident Manager Provides tracking against each data loss incident. The solution removes complexity associated with key management, workflows, and data loss prevention over to a increase incident response team s focus and efficiency. Pricing The solution is priced at 1.84 per month per mailbox Pricing may vary subject to initial order volume and the buying organisation s required security and service levels. The above prices assume: GDIT s Government Community Cloud Security Impact Level 2 Service Availability of 99.9%. Pricing is subject to VAT General Dynamics is a 20 Billion/year, publicly listed corporation with almost 100,000 employees. We have been nominated by Forbes in their List of Best Managed Companies every year since the list s inception in General Dynamics is a leader in cloud computing, virtualisation, migration, and systems support for government agencies worldwide. We develop highly secure cloud solutions integrating industry leading technologies innovating, improving and delivering meaningful results.

4 3 Information Assurance GDIT s Router and Vetting Service solution is provided as an IL2 service to deliver the optimum balance of comprehensive security and cost-efficiency for a customer s specific needs. Reporting Customer reports/notifications include system capacity and performance reports, anti-spam and anti-virus reports, incident and SLA reports, outage/problem notifications, growth projections, and outage status reporting. Detailed reports are provided to allow compliance officers to quickly analyse details such as specific end users that frequently trigger policies, and the number of encrypted messages that have been sent and the type of content that triggered the encryption. Additional reporting requirements can be finalised and agreed either pre or post contract. On-boarding Process GDIT leverages a proven approach to ensure seamless transition. Our methodology ensures shared stakeholder understanding, increased business value, and low development risk. It consists of five phases, Kickoff, Assessment, Implementation, Pilot Migration, and Enterprise Migration. The phases encompass activities such as requirements identification, communications planning, risk identification, technical evaluation and planning, training, testing, and finally, production migration to the service. An ITIL change management process is established early on and followed throughout. Onboarding and migration to GDIT s Router and Vetting Services does not involve a data migration but implementations can range widely in complexity depending upon the level of rule customisation desired. Consequently, on-boarding times vary on an organisational basis depending on the complexity of the effort. Off-boarding Process GDIT understands the importance of a smooth and managed exit strategy. We cooperate with customers and incoming contractors to coordinate schedules to meet transition goals and mitigate service disruption. Knowledge and procedures are shared to ensure transition of on-going efforts in a logical fashion according to plans agreed between all parties, while maintaining continuity of operations during transition. GDIT provides a phased approach to accomplish transitions, considering service levels, virtualisation architecture, network integration/operation with the receiving infrastructure/site, and security concerns during site evacuation and transition.

5 4 Data Extraction The only data stored on the platforms would be messages contained in quarantine folders, however, GDIT will purge and destroy (as defined in security accreditation for different ILs) consumer data from any computers, storage devices and storage media that are to be retained after the end of the subscription period and the subsequent extraction of consumer data (if requested by the consumer). Service Management, Service Levels, and Customer Service The GDIT solution ensures greater than 99.9% service availability, as measured over a rolling 1-month (720-hour) period. GDIT s helpdesk and engineering staff support our system from client connectivity to the edge where the message enters/leaves the service. Supporting the solution is GDIT s customer service/help desk located at our, 24x7 call centre in the UK, which already handles more than 2 million annual customer enquiries for UK government agencies. The standard service provides for a Tier 3 help desk and technical support of the infrastructure to the Government administrators. Tier 1 and Tier 2 are typically handled by customers or their contractors. GDIT can support additional levels of support to the ordering agency. These services can be priced once additional requirements are known. The help desk and technical support is available 24x365 and will be accessible by phone and through electronic submission via . Action will be initiated based on severity level and Government administrators can elect to receive alerts directly if an event is detected. GDIT uses an industry-leading, best-of-breed service management toolset, which combines ITIL based process driven incident management, customer support, ticket assignment, service levels, escalation and notification. The toolset also includes mature change and problem management workflows which dovetail seamlessly into the security advice and help line management process. Training GDIT offers comprehensive training support for all of our system integration programmes. This helps ensure that users are able to gain the full potential of our products and services, with the minimum delay and disruption to normal business. GDIT can provide training for administrators prior to service initiation, and also for end-users, where applicable. The standard offering provides training material to users in the form of online brochures and FAQs. Webinars, forums, and classroom/instructor led training models can be tailored for any specific needs. One-on-one executive level training for desktop and mobile device access can be provided with follow-on support and incident response. Ordering and Invoice Process GDIT will require an authorised Call-Off Agreement or work order from the customer covering the full value of the services required. GDIT will invoice as agreed in the Call-Off Agreement, this may be based on volume consumed, the achievement of key deliverables, at regular intervals or stages in the service or upon completion of the service to be determined with the customer on a service by service basis. All invoices will be issued in electronic or paper format to the address designated by the customer. Payment of invoices must be made within 30 days of issue and by BACS.

6 Cottons Centre Cottons Lane London, SE1 2QG Tel. +44 (0)

Email as a Service - Microsoft Exchange G-Cloud Service Definition

Email as a Service - Microsoft Exchange G-Cloud Service Definition Email as a Service - Microsoft Exchange G-Cloud Service Definition 2013 General Dynamics Information Technology. All rights reserved In partnership with Government, General Dynamics Information Technology

More information

Digital Forensics G-Cloud Service Definition

Digital Forensics G-Cloud Service Definition Digital Forensics G-Cloud Service Definition 2013 General Dynamics Information Technology Limited. All rights 1 GDIT Team Clients Metropolitan Police Service The General Dynamics Information Technology

More information

European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules

European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution

More information

Lot 1 Service Specification MANAGED SECURITY SERVICES

Lot 1 Service Specification MANAGED SECURITY SERVICES Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services

More information

Deploying Layered Email Security. What is Layered Email Security?

Deploying Layered Email Security. What is Layered Email Security? Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review

More information

Log and Refer Service Desk IL0. September 2013

Log and Refer Service Desk IL0. September 2013 Log and Refer Service Desk IL0 September 2013 TABLE OF CONTENTS 1 Service Overview... 3 2 Why Capgemini?... 5 3 The Capgemini Proposition... 6 3.1 Approach... 7 4 Benefits... 9 4.1 Summary of Proposition...

More information

Service Definition Document

Service Definition Document Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)

More information

Cisco Cloud Email Security Interoperability with Microsoft Office 365

Cisco Cloud Email Security Interoperability with Microsoft Office 365 White Paper Cisco Cloud Email Security Interoperability with Microsoft Office 365 We ve all been witness to the cloud evolution and the technologies that have been driven by moving operations and resources

More information

Open Source Sales Force Automation (SFA) in the Cloud SaaS

Open Source Sales Force Automation (SFA) in the Cloud SaaS Open Source Sales Force Automation (SFA) in the Cloud SaaS Service Overview Our open source Sales Force Automation (SFA) in the cloud service allows customers to perform marketing automation through multi

More information

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109 K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete

More information

Customer Relationship Management Software Package G-Cloud Service Definition

Customer Relationship Management Software Package G-Cloud Service Definition Customer Relationship Management Software Package G-Cloud Service Definition 2014 General Dynamics Information Technology. All rights reserved 1 Delivering consistent multi-channel (telephony, e-mail,

More information

EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST

EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST Enabling user efficiency with a cloud-based email platform With productivity, revenues and reputation at stake, an

More information

Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control

Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control Award-winning messaging security for inbound protection and outbound control Overview The delivers inbound and outbound messaging security for email and IM, with effective and accurate antispam and antivirus

More information

Services Description IBM Managed Security Services (Cloud Computing) - hosted e-mail and Web security - express managed e-mail security

Services Description IBM Managed Security Services (Cloud Computing) - hosted e-mail and Web security - express managed e-mail security IBM United Kingdom Limited Registered in England: 741598 Registered Office: PO Box 41, North Harbour, Portsmouth, PO6 3AU (hereinafter IBM ) Services Description IBM Managed Security Services (Cloud Computing)

More information

anomaly, thus reported to our central servers.

anomaly, thus reported to our central servers. Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution

More information

Panda Cloud Email Protection

Panda Cloud Email Protection Panda Cloud Email Protection 1. Introduction a) What is spam? Spam is the term used to describe unsolicited messages or messages sent from unknown senders. They are usually sent in large (even massive)

More information

Mailwall Remote Features Tour Datasheet

Mailwall Remote Features Tour Datasheet Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for

More information

Trend Micro Hosted Email Security Stop Spam. Save Time.

Trend Micro Hosted Email Security Stop Spam. Save Time. Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading

More information

AlwaysMail. Sector 5. Cloud E-Mail

AlwaysMail. Sector 5. Cloud E-Mail AlwaysMail Sector 5 Cloud E-Mail INDEX INDEX 2 SECTOR 5 COMPANY PROFILE 3 Background Company Name & Address 3 1. SECTOR 5 HOSTED E-MAIL OFFERING 4 2. MICROSOFT HOSTED EXCHANGE 5 3. HOW WE MIGRATE COMPANIES?

More information

Business Intelligence as a Service for the G-Cloud

Business Intelligence as a Service for the G-Cloud Service Definition The name of the Service is: Business Intelligence as a Service An overview of Business Intelligence (BI) as a Service The BI service supports intelligent decisions by business users

More information

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8 WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8 Overview Global organizations are constantly battling with advanced persistent threats (APTs) and targeted attacks focused on extracting intellectual property

More information

G-Cloud Managed Exchange SaaS. Service Description

G-Cloud Managed Exchange SaaS. Service Description G-Cloud Managed Exchange SaaS Service Description G-Cloud Managed Exchange SaaS Service Description 2 INDEX TO SUNGARD MANAGED EXCHANGE SAAS SUNGARD CLOUD SERVICES... 3 Managed Exchange SaaS Overview...

More information

MXSweep Hosted Email Protection

MXSweep Hosted Email Protection ANTI SPAM SOLUTIONS TECHNOLOGY REPORT MXSweep Hosted Email Protection JANUARY 2007 www.westcoastlabs.org 2 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT CONTENTS MXSweep www.mxsweep.com Tel: +44 (0)870 389 2740

More information

Sample Data Security Policies

Sample Data Security Policies This document provides three example data security policies that cover key areas of concern. They should not be considered an exhaustive list but rather each organization should identify any additional

More information

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future. Web Filtering Email Filtering Mail Archiving Cloud Backup Disaster Recovery Virtual Machines Private Cloud itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your

More information

SonicWALL Email Security Quick Start Guide. Version 4.6

SonicWALL Email Security Quick Start Guide. Version 4.6 SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more

More information

DIGITAL MARKETPLACE (G-CLOUD 7) OFFERING. Sopra Steria OneMobile SaaS Service. Introduction. Service Definition. Sopra Steria in the public sector

DIGITAL MARKETPLACE (G-CLOUD 7) OFFERING. Sopra Steria OneMobile SaaS Service. Introduction. Service Definition. Sopra Steria in the public sector DIGITAL MARKETPLACE (G-CLOUD 7) OFFERING Sopra Steria OneMobile SaaS Service Sopra Steria in the public sector Organisations across the public sector choose Sopra Steria to deliver transformation programmes

More information

WebFOCUS Cloud Express. The WebFOCUS Cloud Express service is delivered as a managed G-Cloud service by Amtex Solutions Ltd.

WebFOCUS Cloud Express. The WebFOCUS Cloud Express service is delivered as a managed G-Cloud service by Amtex Solutions Ltd. Service Definition The name of the Service is: WebFOCUS Cloud Express An overview of WebFOCUS Cloud Express The WebFOCUS Cloud Express service is delivered as a managed G-Cloud service by Amtex Solutions

More information

Service Description Email Filtering

Service Description Email Filtering Service Description Email Filtering Table of Contents Overview iomart Email Filtering... 3 iomart Email Filtering Features... 3 Technical Features... 3 Anti-Spam... 3 Cost Reduction... 4 Anti-Virus...

More information

Global Support Services

Global Support Services Global Support Services Supporting your investment in Sophos Technical Support has the highest priority within Sophos. Our comprehensive support service delivers the full range of benefits you would expect

More information

WATCHGUARD IRONPORT KEY SALES PITCH TRUTH BEHIND THE PITCH

WATCHGUARD IRONPORT KEY SALES PITCH TRUTH BEHIND THE PITCH KEY SALES PITCH First and only true unified security provider for protection bidirectional threats and data loss prevention across email and web in a single solution. XCS leverages ReputationAuthority

More information

V1.4. Spambrella Email Continuity SaaS. August 2

V1.4. Spambrella Email Continuity SaaS. August 2 V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable

More information

Archiving Technical Overview. A Technical Overview Paper Describing Key Functions And Capabilities Of The Managed Archiving Service

Archiving Technical Overview. A Technical Overview Paper Describing Key Functions And Capabilities Of The Managed Archiving Service A Technical Overview Paper Describing Key Functions And Capabilities Of The Managed Archiving Service Contents Introduction....................................................................................

More information

Data Warehousing, Systems Integration and Data Migrations (Lot 3)

Data Warehousing, Systems Integration and Data Migrations (Lot 3) Data Warehousing, Systems Integration and Data Migrations (Lot 3) CONTENTS 1. WHY LEICESTERSHIRE HEALTH INFORMATICS SERVICE?... 2 2. SERVICE OVERVIEW... 3 3. SERVICE FEATURES... 4 4. ON-BOARDING AND SERVICE

More information

Selecting Your Essential Cloud Services

Selecting Your Essential Cloud Services DATASHEET Selecting Your Essential Cloud Services Mimecast s flexible and scalable suite of essential cloud services for Microsoft Exchange removes the risks and complexities of business email management

More information

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Facilitate policy-based expertise and

More information

Stop Spam. Save Time.

Stop Spam. Save Time. Stop Spam. Save Time. A Trend Micro White Paper I January 2015 Stop Spam. Save Time. Hosted Email Security: How It Works» A Trend Micro White Paper January 2015 TABLE OF CONTENTS Introduction 3 Solution

More information

AVG AntiVirus. How does this benefit you?

AVG AntiVirus. How does this benefit you? AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to

More information

Quick Heal Exchange Protection 4.0

Quick Heal Exchange Protection 4.0 Quick Heal Exchange Protection 4.0 Customizable Spam Filter. Uninterrupted Antivirus Security. Product Highlights Built-in defense keeps your business communications and sensitive information secure from

More information

IBM G-Cloud Microsoft Windows Active Directory as a Service

IBM G-Cloud Microsoft Windows Active Directory as a Service IBM G-Cloud Microsoft Windows Active Directory as a Service Service Definition IBM G-Cloud Windows AD as a Service 1 1. Summary 1.1 Service Description This offering is provided by IBM Global Business

More information

Top Ten Technology Risks Facing Colleges and Universities

Top Ten Technology Risks Facing Colleges and Universities Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services cwatson@schneiderdowns.com April 23, 2012 Overview Technology

More information

Ubertas Cloud Services: Service Definition

Ubertas Cloud Services: Service Definition Ubertas Cloud Services: Service Definition February 2013 Innovation. Power. Trust. Contents 1. About Ubertas... 2 Our Company... 2 Our Approach to Service Delivery... 2 Our Partner Network & the UK Cloud

More information

Service Schedule for Business Email Lite powered by Microsoft Office 365

Service Schedule for Business Email Lite powered by Microsoft Office 365 Service Schedule for Business Email Lite powered by Microsoft Office 365 1. SERVICE DESCRIPTION Service Overview 1.1 The Service is a hosted messaging service that delivers the capabilities of Microsoft

More information

What security and compliance challenges exist with the move to Microsoft Office 365?

What security and compliance challenges exist with the move to Microsoft Office 365? PROOFPOINT FOR OFFICE 365: ENABLES ADVANCED SECURITY AND COMPLIANCE FOR YOUR ENTERPRISE UNDERSTAND THE SOLUTION BY ROLE: IT & SECURITY What security and compliance challenges exist with the move to Microsoft

More information

G Cloud 6. Service Definition: Platform as a Service (PaaS)

G Cloud 6. Service Definition: Platform as a Service (PaaS) G Cloud 6 Service Definition: Platform as a Service (PaaS) Introduction to Centerprise International Limited Centerprise International Limited was established in 1983 as an engineering and manufacturing

More information

Service Schedule for BT Business Lite Web Hosting and Business Email Lite powered by Microsoft Office 365

Service Schedule for BT Business Lite Web Hosting and Business Email Lite powered by Microsoft Office 365 1. SERVICE DESCRIPTION 1.1 The Service enables the Customer to: set up a web site(s); create a sub-domain name associated with the web site; create email addresses. 1.2 The email element of the Service

More information

Whitelist Management

Whitelist Management Whitelist Management Overview The ExchangeDefender Admin Site is a powerful tool that gives you access to all of the benefits ExchangeDefender has to offer, from the safety and convenience of your web

More information

Email Migration Project Plan for Cisco Cloud Email Security

Email Migration Project Plan for Cisco Cloud Email Security Sales Tool Email Migration Project Plan for Cisco Cloud Email Security 2014 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Conf idential. For Channel Partner use only. Not f

More information

G-CLOUD FRAMEWORK RM1557-vi 5DRIVE PERSONAL CLOUD BACKUP

G-CLOUD FRAMEWORK RM1557-vi 5DRIVE PERSONAL CLOUD BACKUP Commercial in Confidence 1 G-CLOUD FRAMEWORK RM1557-vi SERVICE DEFINITION 5DRIVE PERSONAL CLOUD BACKUP 5NINES 5NINES Data Centres Services Service Offered 5DRIVE - CLOUD BACKUP SERVICE with remote access

More information

Mod 08: Exchange Online FOPE

Mod 08: Exchange Online FOPE Office 365 for SMB Jump Start Mod 08: Exchange Online FOPE Chris Oakman Managing Partner Infrastructure Team Eastridge Technology Stephen Hall Owner & IT Consultant District Computers 1 Jump Start Schedule

More information

email management solutions

email management solutions Safeguard business continuity and productivity with Mimecast email management solutions Computacenter and Mimecast in partnership Expert software solutions Computacenter and Mimecast help organisations

More information

IPL Service Definition - Data Quality

IPL Service Definition - Data Quality IPL Proposal V1 April 2014 Project: Date: 10 April 2014 Issue Number: V1 Customer: Crown Commercial Service Page 1 of 11 IPL Information Processing Limited 2014 Contents 1. Service - Data Quality 3 1.1.

More information

Remote Access Service (RAS)

Remote Access Service (RAS) Remote Access Service (RAS) Contents 1 Introduction to Remote Access Service...2 2 Service Definition...3 2.1 Functionality & Features... 3 2.2 Access Methods... 3 3 Differentiators...4 4 Commercials...5

More information

Documentum Document Management in the Cloud Service Definition

Documentum Document Management in the Cloud Service Definition Documentum Document Management in the Cloud Service Definition Service Overview Working together with its Cloud Services Partner, Skyscape, SynApps Solutions (SynApps) has developed its Documentum Document

More information

VODAFONE G-CLOUD SMS-SERVICE

VODAFONE G-CLOUD SMS-SERVICE VODAFONE G-CLOUD SMS-SERVICE Version Content Owner Date 1.1 Robert Hotchkiss 27 August 2013 Page 1 of 13 TABLE OF CONTENTS 1. The G-Cloud SMS-Service... 3 1.1 Overview of the G-Cloud SMS-Service... 3 1.2

More information

Features and benefits guide for partners and their customers

Features and benefits guide for partners and their customers and benefits guide for partners and their customers Version 3.0 and Guide for Partners and their customers Security Anti Virus Proofpoint s own threat detection technology enables our email Anti-Virus

More information

Securing enterprise collaboration through email and file sharing on a unified platform

Securing enterprise collaboration through email and file sharing on a unified platform Axway MailGate SC Securing enterprise collaboration through email and file sharing on a unified platform Email is the primary collaboration tool employees use to share information and send large files.

More information

Top 10 Features: Clearswift SECURE Email Gateway

Top 10 Features: Clearswift SECURE Email Gateway Top 10 Features: Clearswift SECURE Email Gateway Top 10 Features: Clearswift SECURE Email Gateway Modern business simply couldn t function without email. However, both incoming and outgoing messages can

More information

Securing enterprise collaboration through email and file sharing on a unified platform

Securing enterprise collaboration through email and file sharing on a unified platform Axway MailGate SC Securing enterprise collaboration through email and file sharing on a unified platform Email is the primary collaboration tool employees use to share information and send large files.

More information

Mail Hosting Services Terms and Conditions

Mail Hosting Services Terms and Conditions MAIL HOSTING SERVICES TERMS AND CONDITIONS In addition to the General, your use of the Mail Services is subject to the following additional terms and conditions: 1. ADDITIONAL DEFINED TERMS Some words

More information

Small Business Protection Guide. Don t Leave Your Business at Risk Protect it Completely

Small Business Protection Guide. Don t Leave Your Business at Risk Protect it Completely Small Business Protection Guide Don t Leave Your Business at Risk Protect it Completely Changing risks, rising costs Information is fundamental to your business: You and your employees constantly exchange,

More information

Vodafone Private Cloud

Vodafone Private Cloud Vodafone Private Cloud Overview Vodafone Private Cloud is our dedicated public sector cloud service that connects you to your own private IL2/IL3 network and / or core government networks, including the

More information

Platform as a Service

Platform as a Service Platform as a Service Service Definition Version: 1.0 Version date: October 2015 Classification: Public Backup-as-a-Service Systems Monitoring DR-as-a-Service Storage-as-a-Service Hosted Exchange Colocation

More information

Mimecast Unified Email Management

Mimecast Unified Email Management DATA SHEET Mimecast Unified Email Management An always-on, cloud-based email security solution that reduces the complexity of protecting your organization from malware, spam and data leakage. Mimecast

More information

Mimecast Email Security

Mimecast Email Security DATA SHEET Mimecast Email Security A fully integrated email security, continuity and archiving cloud based solution that delivers total end-to-end control of your email, mitigating email risks and reducing

More information

Selecting Your Essential Cloud Services

Selecting Your Essential Cloud Services DATASHEET Selecting Your Essential Cloud Services Mimecast s flexible and scalable suite of essential cloud services for Microsoft Exchange removes the risks and complexities of business email management

More information

IronPort C10 for Small and Medium Businesses

IronPort C10 for Small and Medium Businesses I r o n P o r t A p p l i a n c e s S I M P L E I N S TA L L AT I O N, E A S Y M A N A G E M E N T, A N D P O W E R F U L P R O T E C T I O N F O R Y O U R E M A I L I N F R A S T R U C T U R E. IronPort

More information

RTS Communications G-Cloud Service Definition Video Conferencing as a Service (VAAS)

RTS Communications G-Cloud Service Definition Video Conferencing as a Service (VAAS) RTS Communications G-Cloud Service Definition Video Conferencing as a Service (VAAS) Video Conferencing Endpoint Services September 2013 RTS G-Cloud Service Definition Page 1 CONTENTS 1. Executive Summary

More information

Audit Management. service definition document

Audit Management. service definition document Audit Management service definition document Contents Introduction... 3 Service Description... 3 Features and Benefits... 4 Architecture... 5 Service Delivery... 6 Service Provisioning Time... 7 Service

More information

dxw s WordPress Platform

dxw s WordPress Platform dxw s WordPress Platform G-Cloud lot 2 (PaaS) service definition Version 2 4th July 2012 Page 1 of 12 Overview dxw s WordPress Platform is a highly managed Platform as a Service for hosting WordPress websites.

More information

Security Consultants / Security Managed Services

Security Consultants / Security Managed Services Security Consultants / Security Managed Services Service Definition Document for G-Cloudv7 Services October 2015 Table of Contents Service Overview...3 Our Approach... 3 Features... 3 Benefits... 4 ON-BOARDING

More information

G-Cloud Service Definition. Canopy Remote Backup for Cloud SaaS

G-Cloud Service Definition. Canopy Remote Backup for Cloud SaaS G-Cloud Service Definition Canopy Remote Backup for Cloud SaaS Canopy Remote Backup for Cloud SaaS Canopy, an Atos company provides a highly secure, cloud backup and file management service for Internet-connected

More information

DOBUS And SBL Cloud Services Brochure

DOBUS And SBL Cloud Services Brochure 01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure enquiries@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted

More information

Exchange 2010 migration guide

Exchange 2010 migration guide HOW-TO GUIDE Exchange 2010 migration guide This guide details the best practices to follow when migrating from Microsoft Exchange 2003 to Microsoft Exchange 2010. The guidelines provided explain how to

More information

are some of the key drivers behind mandates from executives to move IT infrastructure from on-premises to the cloud.

are some of the key drivers behind mandates from executives to move IT infrastructure from on-premises to the cloud. W H I T E PA P E R Public Network External Application MTA Moving to the Cloud Important Things to Consider Before Migrating Your Messaging Infrastructure to the Cloud Fallback MTA External Corporate MTAs

More information

Technology Blueprint. Protect Your Email. Get strong security despite increasing email volumes, threats, and green requirements

Technology Blueprint. Protect Your Email. Get strong security despite increasing email volumes, threats, and green requirements Technology Blueprint Protect Your Email Get strong security despite increasing email volumes, threats, and green requirements LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security

More information

Unleash the Full Value of Identity Data with an Identity-Aware Business Service Management Approach

Unleash the Full Value of Identity Data with an Identity-Aware Business Service Management Approach Unleash the Full Value of Identity Data with an Identity-Aware Business Service Approach best practices WHITE PAPER Table of Contents Executive Summary...1 The Evolution of Identity...2 > From User Account...2

More information

Office 365 Exchange Online Protection Administration Guide

Office 365 Exchange Online Protection Administration Guide Chapter 10 Office 365 Exchange Online Protection Administration Guide Office 365 version 2013 is a suite of software products: Software as a Service (SaaS). Customers can purchase Office 365 in many ways,

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

Overview An Evolution. Improving Trust, Confidence & Safety working together to fight the e-mail beast. Microsoft's online safety strategy

Overview An Evolution. Improving Trust, Confidence & Safety working together to fight the e-mail beast. Microsoft's online safety strategy Overview An Evolution Improving Trust, Confidence & Safety working together to fight the e-mail beast Holistic strategy Prescriptive guidance and user education, collaboration & technology Evolution of

More information

RTS Communications G-Cloud Service Definition Video Conferencing as a Service (VAAS)

RTS Communications G-Cloud Service Definition Video Conferencing as a Service (VAAS) RTS Communications G-Cloud Service Definition Video Conferencing as a Service (VAAS) Video Conferencing Single Screen Service September 2013 RTS G-Cloud Service Definition Page 1 CONTENTS 1. Executive

More information

Symantec Messaging Gateway 10.5

Symantec Messaging Gateway 10.5 Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate

More information

Service Desk Triage for Cloud Support (Lot 4) Service: 5.G5.1414.001

Service Desk Triage for Cloud Support (Lot 4) Service: 5.G5.1414.001 Service Desk Triage for Cloud Support (Lot 4) Service: 5.G5.1414.001 CONTENTS 1. WHY LEICESTERSHIRE HEALTH INFORMATICS SERVICE?... 3 2. SERVICE OVERVIEW... 3 3. ON-BOARDING... 8 4. OFF-BOARDING SERVICES/TERMINATION...

More information

How To Help Your Business Succeed

How To Help Your Business Succeed G Cloud III Framework Lot 4 (SCS) CHECK Accredited Penetration Testing Services Contents Executive Summary 3 CHECK Accredited Penetration Testing Services 4 Why Deloitte? 5 Package Cost 7 Contact 9 Service

More information

Cloud Enablement. Lot 4 - Specialist Cloud Services. Version: 3.0, Issue Date: 05/02/2014. Classification: Open

Cloud Enablement. Lot 4 - Specialist Cloud Services. Version: 3.0, Issue Date: 05/02/2014. Classification: Open Cloud Enablement Version: 3.0, Issue Date: 05/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 201415/12/2014. Other than for the sole purpose of evaluating this Response, no part

More information

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex

More information

Cisco Email Security Appliances

Cisco Email Security Appliances Data Sheet Cisco Email Security Appliances Product Overview Over the past 20 years, email has evolved from a tool used primarily by technical and research professionals to become the backbone of corporate

More information

Cyber Security Solutions

Cyber Security Solutions Cyber Security Solutions Defending the Enterprise General Dynamics Information Technology defends mission-critical systems including government, health, finance, defence, large-enterprise and national

More information

DIGITAL MARKETPLACE (G CLOUD 7) OFFERING. Sopra Steria Integration Platform Support as a Service. Service Overview. Sopra Steria in the public sector

DIGITAL MARKETPLACE (G CLOUD 7) OFFERING. Sopra Steria Integration Platform Support as a Service. Service Overview. Sopra Steria in the public sector DIGITAL MARKETPLACE (G CLOUD 7) OFFERING Sopra Steria Integration Platform Support as a Service Sopra Steria in the public sector Organisations across the public sector choose Sopra Steria to deliver transformation

More information

Service description RFL Virtual Data Centre

Service description RFL Virtual Data Centre Service description RFL Virtual Data Centre IaaS G-Cloud 6 1 Contents Overview... 3 Highlights... 3 Description... 3 Use cases... 3 Use cases... 5 Use cases... 5 Pricing... 5 Information assurance... 5

More information

VIGILANCE INTERCEPTION PROTECTION

VIGILANCE INTERCEPTION PROTECTION MINIMIZE CYBERTHREATS VIGILANCE INTERCEPTION PROTECTION CYBERSECURITY CDW FINANCIAL SERVICES 80 million identities were exposed by breaches in financial services in 2014. 1 1 symantec.com, Internet Security

More information

Kentucky IT Infrastructure Library (ITIL) Program

Kentucky IT Infrastructure Library (ITIL) Program 2006 NASCIO Recognition Awards Nomination Category: Enterprise IT Management Initiatives Kentucky IT Infrastructure Library (ITIL) Program Commonwealth Office of Technology. KentuckyUnbridledSpirit.com

More information

Trend Micro Hosted Email Security Stop Spam. Save Time.

Trend Micro Hosted Email Security Stop Spam. Save Time. Trend Micro Hosted Email Security Stop Spam. Save Time. How Hosted Email Security Inbound Filtering Adds Value to Your Existing Environment A Trend Micro White Paper l March 2010 1 Table of Contents Introduction...3

More information

RTS Communications G-Cloud Service Definition Video Conferencing as a Service (VAAS)

RTS Communications G-Cloud Service Definition Video Conferencing as a Service (VAAS) RTS Communications G-Cloud Service Definition Video Conferencing as a Service (VAAS) Video Conferencing VMR Service Virtual Meeting Rooms December 2014 RTS G-Cloud 6 Service Definition Page 1 CONTENTS

More information

DOBUS And SBL Cloud Services Brochure

DOBUS And SBL Cloud Services Brochure 01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure cloud@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted managed

More information

SERVICE DEFINITION DOCUMENT MANAGEMENT IN THE CLOUD

SERVICE DEFINITION DOCUMENT MANAGEMENT IN THE CLOUD Commercial in Confidence 1 G-CLOUD III FRAMEWORK SERVICE DEFINITION DOCUMENT MANAGEMENT IN THE CLOUD Capita Division / Supplier: Capita Business Services Ltd powered by SkyScape Service Name: Document

More information

Cloud-based Infrastructure and Application Support Service Definition

Cloud-based Infrastructure and Application Support Service Definition +44 (0) 20 3603 7830 hello@equalexperts.com www.equalexperts.com 30 Brock Street London, NW1 3FG Cloud-based Infrastructure and Application Support Service Definition Overview We provide 24/7 support to

More information

Websense Messaging Security Solutions. Websense Email Security Websense Hosted Email Security Websense Hybrid Email Security

Websense Messaging Security Solutions. Websense Email Security Websense Hosted Email Security Websense Hybrid Email Security Websense Email Security Websense Hosted Email Security Websense Hybrid Email Security Websense Messaging Security Solutions The Websense Approach to Messaging Security Websense enables organizations to

More information

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security

More information

Retention & Destruction

Retention & Destruction Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of

More information