GOVERNMENT HOSTING. Cloud Service Security Principles Memset Statement.
|
|
|
- Eleanor Simmons
- 10 years ago
- Views:
Transcription
1 GOVERNMENT HOSTING Cloud Service Security Principles Memset Statement
2 Summary - March 2014 The Cabinet Office has produced a set of fourteen Cloud Service Security Principles to be considered when purchasers are evaluating the security features of cloud services ( Memset s GCloud services conform to all of the Cloud Service Security Principles. Our services all fall within the scope of our ISO27001 Certification, and additionally our IL2 and IL3 accredited services have CESG Pan Government Accreditation (PGA) to IL2 or IL3 as appropriate. ISO Certification is granted by an independent external assurer, and PGA accreditation is external and supported by IT Health Checks undertaken by independent CHECK consultants. Hence the security of our services has been rigorously assured by independent external bodies and consumers can be confident that we conform to the Principles. As we conform to the Cloud Service Security Principles, our services are suitable for use with OFFICIAL data. IL3 accredited services are suitable for all OFFICIAL data, IL2 accredited services are suitable for OFFICIAL data which is moderately sensitive and our IL0 services can be used for OFFICIAL data not requiring particular protection. Data owners will need to decide on the most suitable services based on the particular nature of their data. The following additional information on each of the Security Principles is intended to help consumers to decide which service is most suitable for their circumstances. Memset is happy to discuss the services or provide additional information as required to enable consumers to be sure they are selecting the most appropriate service for their needs. 2
3 Memset s GCloud services conform to all of the fourteen Cloud Service Security Principles as follows: 1. Data in transit protection IL3 services are only available via PSN which provides assured protection between our locations and the consumer s locations. Our systems provide the protection required to achieve their level of certification. Consumers can add endto-end encryption over our IL0 and IL2 services if they wish. Customers are responsible for the management of data in transit protection required for the accreditation of their solution. 2. Asset protection and resilience Appropriate physical security measures are in place with access control to office and data centre environments. For our IL3 services, we have protective measures in place which provide for aggregation of IL3 data. We are a UK company with our data centres and office being UK-based. Our data centres and service management facilities are subject to ISO 27001, IL2 and IL3 assurance as appropriate to the service, covering confidentiality, integrity and availability aspects. 3. Separation between consumers Appropriate separation and segregation has been designed into our systems from the outset and has been assured through the ISO27001 and PGA accreditation processes, including our IT Health Checks. Each consumer has dedicated server resources, and infrastructure and network resources have separation suitable for the type of service (ie public or private cloud). 4. Governance Our security governance framework is well established and conforms to ISO27001 and CESG requirements. We have a named Senior Information Risk Owner (SIRO) and Security Manager, and they and other appropriate roles have defined responsibilities for the security of our cloud services. 5. Operational security We have assured processes, procedures and tools in place covering all aspects of operational security including the management of change, configuration, vulnerabilities, incidents and protective monitoring. 6. Personnel security All Memset staff are checked to the Baseline Personnel Security Standard (BPSS) and staff who potentially have access to data in the IL3 domain also have Security Check (SC) clearance. A role-based approach is taken to ensure that staff are appropriately cleared and only have access to the systems and data they require for their role. 7. Secure development All aspects of the development of our services are protected and security is regularly reviewed, evolved and maintained to meet new threats. 3
4 8. Supply chain security Our supply chain is covered by the scope of our certifications and accreditation so is externally assured as being suitably protected to support our services. Our supply chain is simple, thus making it easier to ensure that it is suitable for our services. 9. Secure consumer management We provide consumers with the tools they need to securely manage their use of our services through management and support channels and make clear their responsibilities for the protection of their own data. 10. Secure on-boarding and off-boarding Our services are provisioned in a known good state and make clear the customers responsibility for further hardening to their specific requirements. We handle the deletion of data when they leave the service, and the destruction of physical media, in an approved and assured manner. 11. Service interface protection All interfaces and connections are protected by means appropriate to the level of the service, such as firewalls and access controls, and have been assured through our certification and accreditation processes. 12. Secure service administration Networks, connections, devices and processes used for service administration have been designed and implemented to be secure and have been externally assured. 13. Audit information provision to tenants Consumers can be provided with the information they require to monitor the access to the services they have obtained from us. Services are self-managed by the consumers who as such have freedom to implement the monitoring framework most suited to their needs. Responsibilities for the monitoring of access and use of the customer s services are clearly defined. 14. Secure use of the service by the consumer Our agreements set out the requirements on the consumer to ensure that they are using our services in an appropriate manner to deliver a secure overall solution incorporating our services. Consumers of our IL3 services must have signed up to a PSN Code of Connection. Further Information For further information on the way Memset meets the principles or a more general discussion on the security of our services, please contact a Memset sales person, your account manager or submit a support ticket. 4
5 Get in touch: (Freephone) +44 (0) (International) Registered company No VAT number: GB
Thales Service Definition for IL3 Encrypted Overlay for Cloud Services
Thales Service Definition for UK IL3 Encrypted Overlay Thales Service Definition for IL3 Encrypted Overlay for Cloud Services April 2014 Page 1 of 11 Thales Service Definition for UK IL3 Encrypted Overlay
Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 2.1, Issue Date: 05/02/201405/02/2014. Classification: Open
Protective Monitoring as a Service Version: 2.1, Issue Date: 05/02/201405/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 201416/12/2014. Other than for the sole purpose of evaluating
GPG13 Protective Monitoring. Service Definition
GPG13 Protective Monitoring Service Definition Issue Number V1.3 Document Date 27 November 2014 Author: D.M.Woodcock Classification UNCLASSIFIED Version G-Cloud 6 2014 Copyright Assuria Limited. All rights
Thales Service Definition for NOC Services for Cloud
Thales Service Definition for UK NOC Services Thales Service Definition for NOC Services for Cloud April 2014 Page 1 of 13 Thales Service Definition for UK NOC Services CONTENT Page No. Introduction...
PSN Protective Monitoring. Service Definition
PSN Protective Monitoring Service Definition Issue Number V3.0 Document Date 29 September 2015 Author: R.N. Connor Classification UNCLASSIFIED Version G-Cloud 7 2015 Copyright Tenian Limited. All rights
How To Secure Cloud Compute At Eduserv
Implementing the CESG Cloud Security Principles February 2015 Eduserv Public www.eduserv.org.uk Contents Introduction... 4 The principles... 4 About our claims... 5 1 Data in transit protection... 6 2
Big Data Analytics Service Definition G-Cloud 7
Big Data Analytics Service Definition G-Cloud 7 Big Data Analytics Service Service Overview ThinkingSafe s Big Data Analytics Service allows information to be collected from multiple locations, consolidated
Connecting to the Cloud. Lot 4 - Specialist Cloud Services. Version: 3.0, Issue Date: 01/12/2014. Classification: Open
Connecting to the Cloud Version: 3.0, Issue Date: 01/12/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 201415/12/2014. Other than for the sole purpose of evaluating this Response,
Service description RFL Virtual Data Centre
Service description RFL Virtual Data Centre IaaS G-Cloud 6 1 Contents Overview... 3 Highlights... 3 Description... 3 Use cases... 3 Use cases... 5 Use cases... 5 Pricing... 5 Information assurance... 5
A. Reference information. A0. G-Cloud Programme unique ID number for the service and version number of this scoping template
G-Cloud Service Pan Government Security Accreditation Scope This form is intended for Suppliers of services on the G-Cloud to complete. Upon receipt, the G-Cloud Programme will check Section A, Reference
Committees Date: Subject: Public Report of: For Information Summary
Committees Audit & Risk Management Committee Finance Committee Subject: Cyber Security Risks Report of: Chamberlain Date: 17 September 2015 22 September 2015 Public For Information Summary Cyber security
Service Definition Document
Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)
G-Cloud Service Definition. Atos Infrastructure as a Service (IL3) for Cloud IaaS
G-Cloud Service Definition Atos Infrastructure as a Service (IL3) for Cloud IaaS Atos Accredited Secure Cloud Infrastructure as a Service (IL3) Robust, secure, scalable Cloud computing and consumption-based
Vodafone Total Managed Mobility
Vodafone Total Managed Mobility More productivity, less complexity Vodafone Power to you What s inside? What you get see how your business benefits 4 In detail find out how it all works 5 Service lifecycle
Dedicated Compute Cloud. Lot 1 - Infrastructure as a Service. Version: 1.0, Issue Date: 09/12/2014. Classification: Open
Dedicated Compute Cloud Version: 1.0, Issue Date: 09/12/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 201416/12/2014. Other than for the sole purpose of evaluating this Response,
Thales Service Definition for PSN Secure Email Gateway Service for Cloud Services
Thales Definition for PSN Secure Email Gateway Thales Definition for PSN Secure Email Gateway for Cloud s April 2014 Page 1 of 12 Thales Definition for PSN Secure Email Gateway CONTENT Page No. Introduction...
Remote Access Service (RAS)
Remote Access Service (RAS) Contents 1 Introduction to Remote Access Service...2 2 Service Definition...3 2.1 Functionality & Features... 3 2.2 Access Methods... 3 3 Differentiators...4 4 Commercials...5
service description Document Management in the Cloud Software as a Service
easy to adopt, easy to use, easy to leave service description Document Management in the Cloud Software as a Service version 4.0 Contents Overview... 3 Example use cases... 3 Pricing... 4 Trial service...
Managed Backup. Lot 4 - Specialist Cloud Services. Version: 3.0, Issue Date: 05/02/2014. Classification: Open
Managed Backup Version: 3.0, Issue Date: 05/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 201415/12/2014. Other than for the sole purpose of evaluating this Response, no part
IBM G-Cloud Microsoft Windows Active Directory as a Service
IBM G-Cloud Microsoft Windows Active Directory as a Service Service Definition IBM G-Cloud Windows AD as a Service 1 1. Summary 1.1 Service Description This offering is provided by IBM Global Business
Vodafone Private Cloud
Vodafone Private Cloud Overview Vodafone Private Cloud is our dedicated public sector cloud service that connects you to your own private IL2/IL3 network and / or core government networks, including the
How to gain accreditation for a G-Cloud Service
www.ascentor.co.uk How to gain accreditation for a G-Cloud Service Demystify the process As a registered supplier of G-Cloud services you will be keenly aware that getting onto the G-Cloud framework does
Application Management. Lot 4 - Specialist Cloud Services. Version: 3.0, Issue Date: 05/02/2014. Classification: Open
Application Management Version: 3.0, Issue Date: 05/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 2014. Other than for the sole purpose of evaluating this Response, no part
WebFOCUS Cloud Express. The WebFOCUS Cloud Express service is delivered as a managed G-Cloud service by Amtex Solutions Ltd.
Service Definition The name of the Service is: WebFOCUS Cloud Express An overview of WebFOCUS Cloud Express The WebFOCUS Cloud Express service is delivered as a managed G-Cloud service by Amtex Solutions
Cloud Infrastructure Security Management
www.netconsulting.co.uk Cloud Infrastructure Security Management Visualise your cloud network, identify security gaps and reduce the risks of cyber attacks. Being able to see, understand and control your
G-Cloud 6 brightsolid Secure Cloud Servers. Service Definition Document
G-Cloud 6 brightsolid Service Definition Document December 2014 Contents 1 Introduction... 3 2 An overview of the G-Cloud Service... 3 3 Information assurance... 3 4 Backup and Disaster Recovery... 3 5
white paper CLOUD SERVICES AND THE GOVERNMENT SECURITY CLASSIFICATIONS POLICY
white paper CLOUD SERVICES AND THE GOVERNMENT SECURITY CLASSIFICATIONS POLICY SECURITY EXECUTIVE SUMMARY The UK government has increasingly been encouraging the use of cloud services instead of traditional
service description Email, SharePoint and File Archive in the Cloud Software as a Service
easy to adopt, easy to use, easy to leave service description Email, SharePoint and File Archive in the Cloud Software as a Service version 4.0 Contents Overview... 3 Example use cases... 3 Pricing...
Cloud Security. Peter Jopling [email protected] IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation
Cloud Security Peter Jopling [email protected] IBM UK Ltd Software Group Hursley Labs peterjopling 2011 IBM Corporation Cloud computing impacts the implementation of security in fundamentally new ways
Virtual Desktop Infrastructure Platform as a Service
www.steria.com/uk Virtual Desktop Infrastructure Platform as a Service creativity simplicity independence respect openness contents 1 Overview... 4 1.1 Benefits of Virtual Desktop Infrastructure... 5 2
easy to adopt, easy to use, easy to leave service description API accessible Cloud Storage IaaS version 5.1
easy to adopt, easy to use, easy to leave service description API accessible Cloud Storage IaaS version 5.1 Contents Highlights... 3 Overview... 3 Example use cases... 4 Trial service... 4 Information
HMG Security Policy Framework
HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of
An overview of Electronic Medical Records as a Service
Service Definition The name of the Service is: Electronic Medical Records as a Service An overview of Electronic Medical Records as a Service The Electronic Medical Records as a Service is developed by
Growth Through Excellence
Growth Through Excellence Public/Private Cloud Services Service Definition Document G- Cloud 5 REFERENCE NUMBER RM1557v Table of Contents Table of Contents... 3 Executive Summary... 4 About the Company...
SERVICE DEFINITION G-CLOUD 7 SECURE FILE TRANSFER DIODE. Classification: Open
SERVICE DEFINITION G-CLOUD 7 SECURE FILE TRANSFER DIODE Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this
CSC GOVCLOUD MULTI-TENANT IAAS
SERVICE DESCRIPTION CSC GOVCLOUD MULTI-TENANT IAAS Approved G-Cloud 5 Supplier PAN GOVERNMENT CLOUD PLATFORM CSC is pleased to introduce our GovCloud Service; a pan Government as-a-service Cloud platform,
G-CLOUD 7 - VIRTUAL ASSET MANAGER (VAM) SPECIALIST CLOUD SERVICES (SCS)
G-CLOUD 7 - VIRTUAL ASSET MANAGER (VAM) SPECIALIST CLOUD SERVICES (SCS) Service Definition 6th October 2015 TABLE OF CONTENTS VIRTUAL ASSET MANAGER (VAM) SPECIALIST CLOUD SERVICES (SCS) 3 SERVICE SUMMARY
With Great Power comes Great Responsibility: Managing Privileged Users
With Great Power comes Great Responsibility: Managing Privileged Users Darren Harmer Senior Systems Engineer Agenda What is a Privileged User Privileged User Why is it important? Security Intelligence
SQL Server Database as a Service (DBaaS)
SQL Server Database as a Service (DBaaS) Contents 1 SQL Server Database as a Service...2 2 Service Definition...3 2.1 Customer On-Boarding... 4 2.2 Event & Incident Management... 4 2.3 Request Fulfilment...
G-Cloud 7 Service Definition. Atos Oracle Cloud ERP Implementation Services
G-Cloud 7 Service Definition Atos Oracle Cloud ERP Implementation Services Atos Oracle Cloud ERP Implementation Services Customers need adaptive and agile Enterprise Resource Planning (ERP) systems to
Cloud Enablement. Lot 4 - Specialist Cloud Services. Version: 2.0, Issue Date: 05/02/2014. Classification: Open
Cloud Enablement Version: 2.0, Issue Date: 05/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 2014. Other than for the sole purpose of evaluating this Response, no part of this
Managed Server. Lot 2 - Platform as a Service. Version: 3.0, Issue Date: 05/02/2014. Classification: Open
Managed Server Version: 3.0, Issue Date: 05/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 201415/12/2014. Other than for the sole purpose of evaluating this Response, no part
Sungard Availability Services (UK) Service Description. for. Managed Cloud Services for UK Government Infrastructure-as-a-Service
MCSfUKG-IaaS Service Description Sungard Availability Services (UK) Service Description for Managed Cloud Services for UK Government Infrastructure-as-a-Service Version No: 1.1 Date: 01/05/2015 Sungard
Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.
FME Cloud Security Table of Contents FME Cloud Architecture Overview Secure Operations I. Backup II. Data Governance and Privacy III. Destruction of Data IV. Incident Reporting V. Development VI. Customer
L O C K H E E D M AR T I N API accessible Cloud Storage. Infrastructure as a Service. Commercial-in-Confidence
Commercial-in-Confidence L O C K H E E D M AR T I N API accessible Cloud Storage Infrastructure as a Service Lockheed Martin Business Technology Solutions Registered Address: India of Inchinnan, Greenock
Secure Remote Backup (IL3) G-Cloud Lot3 IaaS
Secure Remote Backup (IL3) G-Cloud Lot3 IaaS Contents Service Definition... 3 An overview of the Remote Backup as a Service... 3 Key Service Attributes... 4 Information assurance... 5 Details of the level
G-Cloud Service Definition. for. Xicon Cloud SCS - SQL Server Managed Services
G-Cloud Service Definition for Xicon Cloud SCS - SQL Server Managed Services XICON-CLOUD-SCS-SQL, 1.0 dated 15/12/2014 Page 1 of 5 CONTENTS 1 XICON CLOUD SCS - SQL SERVER MANAGED SERVICES 3 1.1 SERVICE
G Cloud III Framework Lot 4 (SCS) Project Management
G Cloud III Framework Lot 4 (SCS) Project Management Contents Executive Summary 3 Project Management 4 Why Deloitte? 6 SFIA Rate Card 7 Contact 8 Service Definition (a) to (p) 9 Executive Summary PROJECT
G-CLOUD IIII FRAMEWORK SERVICE DEFINITION: SCHOOLS HOSTED SERVICE FOR SIMS
G-CLOUD IIII FRAMEWORK SERVICE DEFINITION: SCHOOLS HOSTED SERVICE FOR SIMS Capita Division / Supplier: Service Name: Capita Business Services Ltd SIMS OVERVIEW OF THE SERVICE The hosted service for SIMS
Government Security Classifications FAQ Sheet 2: Managing Information Risk at OFFICIAL. v2.0 March 2014
Government Security Classifications FAQ Sheet 2: Managing Information Risk at OFFICIAL v2.0 March 2014 This FAQ describes how risk management activities should be conducted for the new OFFICIAL classification.
Infrastructure as a Service (IaaS) Compute with Secure Storage and Secure Backup
Infrastructure as a Service (IaaS) Compute with Secure Storage and Secure Backup Contents 1 Introduction to Infrastructure as a Service...2 2 Service Definition...3 2.1 Compute... 3 2.2 Secure Storage...
Vodafone secure mail services
Vodafone secure mail services Overview The G-Cloud Mail service is a business-class email system based on Microsoft Exchange. It provides a secure and robust email service, and includes an inbox, calendar,
IBM Web Server as a Service
IBM Web Server as a Service Service Definition IBM G-Cloud Web Server as a Service 1 1. Summary 1.1 Service Description This offering is provided by IBM Global Business Services and provides a Web Server
SERVICE DEFINITION RESTRICTED MANAGED HOSTING
Commercial in Confidence 1 G-CLOUD FRAMEWORK SERVICE DEFINITION RESTRICTED MANAGED HOSTING Capita Division / Supplier: Service Name: Capita Business Services Ltd (Capita) RESTRICTED Managed Hosting Commercial
Email and Collaboration as a Service. Lot 3 - Software as a Service. Version: 2.0, Issue Date: 05/02/2014. Classification: Open
Email and Collaboration as a Service Version: 2.0, Issue Date: 05/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 2014. Other than for the sole purpose of evaluating this Response,
Cloud Enablement. Lot 4 - Specialist Cloud Services. Version: 3.0, Issue Date: 05/02/2014. Classification: Open
Cloud Enablement Version: 3.0, Issue Date: 05/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 201415/12/2014. Other than for the sole purpose of evaluating this Response, no part
How To Get Atos Paas For Free
G-Cloud Pricing Atos PaaS Accredited Secure+ Contents 1. Introduction... 3 2. Pricing... 4 2.1 Standard Feature Pricing... 4 2.2 Atos PaaS Accredited Secure+ Virtual Machines... 4 2.3 Atos PaaS Accredited
G-Cloud Service Definition. Canopy Remote Backup for Cloud SaaS
G-Cloud Service Definition Canopy Remote Backup for Cloud SaaS Canopy Remote Backup for Cloud SaaS Canopy, an Atos company provides a highly secure, cloud backup and file management service for Internet-connected
Audit Management. service definition document
Audit Management service definition document Contents Introduction... 3 Service Description... 3 Features and Benefits... 4 Architecture... 5 Service Delivery... 6 Service Provisioning Time... 7 Service
1 ForestSafe SaaS Service details Service Description Functional Non Functional
1 ForestSafe SaaS Service details 1.1 Service Description ForestSafe is a privileged identity management system used today to manage the Administrator passwords of 65,000 computers by the UK largest bank.
Lot 1 Service Specification MANAGED SECURITY SERVICES
Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services
Ensuring security the last barrier to Cloud adoption
Ensuring security the last barrier to Cloud adoption Publication date: March 2011 Ensuring security the last barrier to Cloud adoption Cloud computing has powerful attractions for the organisation. It
ediscovery G-Cloud V Service Definition Lot 4 SCS Contact us: Danielle Pratt Tel: 0207 444 4080 Email: [email protected].
ediscovery G-Cloud V Service Definition Lot 4 SCS Tender Validity Period: 120 days from 10/04/14 Contact us: Danielle Pratt Email: [email protected] Contents About... 1 Specialist Cloud
Assured Public Cloud Foundry. Lot 2 - Platform as a Service. Version: 1.0, Issue Date: 05/02/2014. Classification: Open
Assured Public Cloud Foundry Version: 1.0, Issue Date: 05/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 201415/12/2014. Other than for the sole purpose of evaluating this Response,
THE BLUENOSE SECURITY FRAMEWORK
THE BLUENOSE SECURITY FRAMEWORK Bluenose Analytics, Inc. All rights reserved TABLE OF CONTENTS Bluenose Analytics, Inc. Security Whitepaper ISO 27001/27002 / 1 The Four Pillars of Our Security Program
Online Backup Service Definition
Online Backup Service Definition 2 Table of Contents Purpose of Document... 3 Online Backup Service... 3 Accreditations... 5 Target Service Levels for Online Backup... 5 Service Credits Rules and Claims...
G-CLOUD FRAMEWORK RM1557-vi 5DRIVE PERSONAL CLOUD BACKUP
Commercial in Confidence 1 G-CLOUD FRAMEWORK RM1557-vi SERVICE DEFINITION 5DRIVE PERSONAL CLOUD BACKUP 5NINES 5NINES Data Centres Services Service Offered 5DRIVE - CLOUD BACKUP SERVICE with remote access
Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture
Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture 2 Data Security and Privacy Principles for IBM SaaS Contents 2 Introduction
Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things
Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations
Cloud Storage. Lot 1 - Infrastructure as a Service. Version: 3.0, Issue Date: 03/12/2014. Classification: Open
Cloud Storage Version: 3.0, Issue Date: 03/12/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 201416/12/2014. Other than for the sole purpose of evaluating this Response, no part
How To Help Your Business Succeed
G Cloud III Framework Lot 4 (SCS) CHECK Accredited Penetration Testing Services Contents Executive Summary 3 CHECK Accredited Penetration Testing Services 4 Why Deloitte? 5 Package Cost 7 Contact 9 Service
Agilisys G-Cloud Service V
Agilisys G-Cloud Service V Service Definition Endpoint Management Lot 1 Infrastructure as a Service (IaaS) April 2014 At Agilisys we deliver success through innovation working with our clients to transform
Get Better Protected... Secure data sharing made possible with Updata s Encryption Overlay Service.
i Compliant Fully managed Encryption Overlay service enabling data sharing across secure networks. Provides operational efficiencies and cost savings through simplified procurement Get Better Protected...
Service Description for Hadoop in the Cloud
Why Acentria IT A tailored cloud solution that fits your business needs Full range of cloud hosting options from pure public cloud to hybrid cloud and physical solutions An assured cloud platform that
Service Description Archive Storage in the Cloud
Service Description Archive Storage in the Cloud Product Overview Archive Storage in the Cloud enables an organisation to migrate their valuable but seldom used data to a cost efficient, reliable and secure
Solution Overview. Our Solution employs two tiers of storage aligning costs of storage with the changing value of data over time.
Service Solution Overview Online Backup per TB model Databarracks fully managed online backup solution uses the Asigra software to back up and protect both physical and virtual environments. Housed in
Service Definition Nine23 MDM
Service Definition Nine23 MDM G-Cloud iv Contents 1 Service Nine23 Mobile Device Management System.....4 1.1 Overview Nine23 MDM...... 4 1.2 Open Standards. 5 1.3 User requirements.....5 1.3.1 Client Browser....5
Securing the Service Desk in the Cloud
TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,
Open Source Sales Force Automation (SFA) in the Cloud SaaS
Open Source Sales Force Automation (SFA) in the Cloud SaaS Service Overview Our open source Sales Force Automation (SFA) in the cloud service allows customers to perform marketing automation through multi
