Embrace the G-Cloud. Ultra Secure Colocation Services for the Public Sector. thebunker.net Phone: Fax:

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Embrace the G-Cloud. Ultra Secure Colocation Services for the Public Sector. thebunker.net Phone: 01304 814800 Fax: 01304 814899 info@thebunker."

Transcription

1 Embrace the G-Cloud Ultra Secure Colocation Services for the Public Sector 1 Phone: Fax:

2 Contents Introduction What is G-Cloud? Types of accreditation: Business Impact Levels Who will be using G-Cloud? The barriers to G-Cloud G-Cloud Colocation services Why Ultra Secure G-Cloud? The Bunker accreditation Delivering public sector services Partnering with The Bunker Next steps/contact details Phone: Fax:

3 Introduction Cloud computing has brought about a step change in the economics and sustainability of Information and Communication Technology (ICT). The UK Government has recognised this and has therefore committed to make central government savings by encouraging a major shift to Cloud computing commodity services. As you are probably aware, it has introduced a Public Cloud First Policy mandate to strengthen and accelerate the government-wide adoption of Cloud computing services. Known as the G-Cloud, the initiative focuses on cloud computing s capability for economic growth, capitalising on Cloud cost savings and flexibility to create a more efficient, accessible means of delivering public sector services. The G-Cloud will deliver fundamental changes in the way the public sector procures and operates ICT and is designed to help public sector organisations: Achieve large, cross government economies of scale Deliver ICT systems that are flexible and responsive to demand in order to support government policies and strategies Take advantage of new technologies in order to deliver faster business benefits and reduce cost Meet environmental and sustainability targets Allow government to procure in a way that encourages a dynamic and responsive supplier marketplace and supports emerging suppliers. Central government departments are now mandated to consider public Cloud first in any IT procurement and the wider public sector is strongly recommended to take the same approach. In practice, this means that when considering procurement of new or existing services, public organisations must have considered and fully evaluated potential Cloud solutions before they consider any other option. Central government departments have a target to achieve 50% of new IT spend on Cloud and 25% use of SMEs by value, by These figures effectively illustrate that the UK Government has acknowledged the potential benefits of enabling the public sector to engage directly with small, diverse and innovative companies and bring a range of agile new solutions to address existing and new issues. This move away from predominantly large suppliers to SMEs providing services on a pay-asyou-go basis is changing the ICT procurement landscape for public sector organisations. Rather than typically relying on several large suppliers, G-Cloud now opens the way for smaller firms to provide a range of Cloud-based ICT services to government organisations. Subsequently, public sector agencies will no longer need to negotiate complex and expensive contracts with large IT vendors. Opening the SME market to the government agencies is a groundbreaking prospect for the Public Sector. For the first time, government agencies will be able to take advantage of the agility of SMEs knowing that there is no need to go through a lengthy accreditation and approval process as each SME has been vetted prior to joining the G-Cloud. 3 Phone: Fax:

4 However, the movement away from large players to SMEs represents a whole new ball game a ball game which many government organisations will not have played before. Teamwork needs to be established, trust needs to be built and a process of unlearning and relearning needs to happen between government and SMEs to make the relationship and services truly work. What is G-Cloud? Government Cloud Computing, called G-Cloud, is a UK Government programme to encourage the adoption of Cloud services across the whole of the public sector. It aims to simplify how public sector agencies buy and deliver services by creating a marketplace of pay-as-you-go commodity services that can be easily scaled up or down, based on the changing needs of a business and its users. At the time of writing, the third G-Cloud procurement framework, G-Cloud iii, has just been launched. G-Cloud iii is the only framework dedicated to public sector Cloud services, and with approximately 75% of suppliers categorised as SMEs, it is designed to be a quick and easy route for public sector organisations to buy what they want, when they need it. The G-Cloud framework includes: CloudStore - launched in February 2012, CloudStore is the online marketplace for the whole of the UK public sector to buy Cloud computing commodity and support services. It lists the details of all of the G-Cloud suppliers and their Cloud service models including public, private and hybrid, with offerings under four lots: Infrastructure as a Service (IaaS); Platform as a Service (PaaS); Software as a Service (SaaS) and Specialist Cloud Services (SCS). Today, CloudStore offers more than 800 suppliers and more than 7,000 services. All the services listed on the store are part of the G-Cloud framework so are immediately available for the public sector to procure and use by following the guidance on the G-Cloud website. Government agencies may purchase cloud services from CloudStore on a pay-as-you-go or yearly contract basis. G-Cloud Authority - oversees and enforces standards and certifications for commodity services. It also provides support for the public sector and resolves any cross-organisational issues. Data centre consolidation - an ongoing effort to close unused or underused data centres across UK Government agencies to reach an optimal number of data centres. This part of the G-Cloud initiative seeks to move government services to common Cloud architecture, constructed of public Cloud, private Cloud and hybrid Cloud environments. The UK Government states that a public sector organisation s first port of call for its IT needs should always be the CloudStore. 4 Phone: Fax:

5 Types of accreditation: Business Impact Levels Working with public sector systems can be a new concept for some companies, and often misunderstood by many more. When working with government systems and ultimately public sector information, there is always a need to make sure that information stored in them is appropriately protected. This is central to the effective and safe management of public sector data. A comprehensive understanding of its workings is an essential prerequisite for any company wishing to take advantage of the G-Cloud opportunity, to get its services accredited and available on the G-Cloud CloudStore and ultimately sell direct to UK Government agencies. Any Government information held, which could range from local council information available to the public, to patient records, right up to highly secret national security information, undergoes a Technical Risk Assessment. This assessment evaluates whether the IT system satisfies the technical and security protocols required for the adequate protection of the information to be held or processed by it, and ultimately to identify which level of protection is required.these protection levels are currently grouped into six Business Impact Levels (BIL), which are often written simply as IL. Managed under the CESG Government Framework, the Business Impact Levels classification protects the vital interests of the UK by providing a common set of standards that lead to a consistent approach to assessment and adoption of services, as well as providing policy and assistance on the security of public sector communications and electronic data. The Business Impact Levels are currently defined as: IL0 Unclassified (no impact) IL2 Protected IL3 Restricted IL4 Confidential IL5 Secret IL6 Top Secret (severe impact). Business Impact Level classification and associated government accreditations are not merely confined to the IT systems and services being supplied or the data centre services on which they reside. Every aspect of the life of the information asset has to be considered and must also include the users, their locations, the endpoint devices via which they access information and the communication channels used to access and transfer these assets between systems and partners. It also covers any individuals with privileged access to the systems including systems administrators, third party application providers and support organisations such as The Bunker. Key considerations when selecting your colocation provider from the CloudStore will be the selection of a Cloud hosting solution to manage your IT systems who has already achieved IL3/IL4 accreditation at their facilities as Infrastructure as a Service platform (Lot 1)* with experience of working in partnership with a number of clients who provide services directly at IL restricted levels. * The G-Cloud framework covers infrastructure, platform, software and specialist Cloud services, which are arranged into four Lots: Lot 1: Infrastructure as a Service (IaaS) Lot 2: Platforms as a Service (PaaS) Lot 3: Software as a Service (SaaS) Lot 4: Specialist Cloud Services 5 Phone: Fax:

6 Who will be using G-Cloud? In line with Government policy, where a public sector organisation s first port of call for its IT needs should be the CloudStore, all UK public sector organisations will have access to purchase services via the CloudStore, including: Here at The Bunker, we have teams of experienced and knowledgeable consultants, solution architects and project managers who can ensur that at every stage you are secure in the knowledge that you are making the right decisions for your business. Central government departments and agencies The Armed Forces National Health Service Law enforcement and other blue light services Local authorities UK s Critical National Infrastructure, including power and water. In terms of SMEs using the G-Cloud, at the time of writing, there are currently 800 SMEs and 7,000 services available on the CloudStore, who are allowed to offer services such as hosting, storage, , document management systems, collaboration tools and virtual desktops as well as other Cloud services including accessibility tools, anti-spam and captcha, gamification and learning management. We understand that the move to Cloud Computing as mandated by the UK government can be daunting for Public Sector organisations. We also appreciate that the CloudStore is a minefield of service providers and presents a potentially challenging prospect for any business, public or private sector, to wade through the myriad of companies, in order to select the one most appropriate for your operations. The barriers to G-Cloud In general, G-Cloud solutions can be deployed through one of four standard Cloud service models: private; public; hybrid and community. Standard Cloud models: Private Cloud : Infrastructure is managed and operated solely for an organisation Public Cloud: Infrastructure is owned by a Cloud provider and accessible to the general public or a large industry group Community Cloud: Infrastructure is shared by several organisations. However, the government s chosen direction is to use public and community Clouds, which will rely on multi-tenancy to reduce costs. However, this shared infrastructure, multi-tenancy option will naturally raise major security concerns, unless the required security levels have been accounted for within the service providers Cloud architecture. 6 Phone: Fax:

7 Any business signed up to provide services to G-Cloud or in fact any government, police, emergency service must guarantee that: All IT equipment is operated at IL standards All IT equipment is located in a IL rated facility An IL applicable Risk Management & Accreditation Document set (RMADS) is completed All services are signed off by a CESG Listed Advisor Scheme (CLAS) auditor as certified. These requirements are set out by the Cabinet Office s Security Policy Framework (SPF), with guidance on satisfying them supplied by CESG, the national technical authority for Information Assurance. They are in place for a very simple reason: the G-Cloud procurement framework is intended to provide public sector organisations with a catalogue of accredited suppliers offering certified and complete solutions, negating the need for any additional effort or spend, and in turn substantially reduce the time and costs involved in making a purchase. G-Cloud Colocation services We have already highlighted that the UK Government s chosen direction for G-Cloud is to use public and community Clouds, which will rely on multi-tenancy, Colocation and shared infrastructure services, in order to reduce costs. However, this G-Cloud approach will naturally raise major security concerns, unless the required security levels have been accounted for within the service providers cloud architecture. And to secure public sector business in the G-Cloud, Colocation providers must be able to offer reliable Colocation with 100% availability at a secure, IL certified data centre facility. Working with The Bunker, as the UK s most secure Colocation provider, government agencies can rest assured we provide of the above combined with 24/7/365 support with expert on-site technical and security staff. Reasons to Colocate with The Bunker 1. Our data centres are housed in ex-military nuclear bunkers to provide the ultimate in physical security. 2. Our data centres have been independently CLAS assessed to provide Colocation data centre services to clients hosting HMG Protectively Marked information assets up to RESTRICTED (IL3) for confidentiality and integrity and up to IL4 for availability. 3. Our facilities are ISO accredited. 4. We are the only UK provider to offer true, 12-point, PCI DSS compliance. 5. Move the Cloud swiftly, safely and securely. 6. We re based within easy reach of London but away from the power shortages, natural disaster or terrorism risks ever present in central London. 7. Housing IT equipment in an Ultra Secure off-site environment makes your business less vulnerable to physical loss or damage to critical business systems. 8. Give your business ultra availability whilst you focus on your core operations. 9. Our data centres are carrier neutral and are staffed 24/7/365 by skilled network, technical and security experts. 7 Phone: Fax:

8 We believe having a multi-pronged approach to security that covers physical, digital and human factors is essential if any one of the elements is missing, security is compromised. To this, we ve added The Bunker Protocol, ingraining security into our culture. It includes: Data floor access policies Staff background checking An ITIL v3 based service desk The highest standards of data security designed by world renowned experts, we call it The Bunker Protocol. In essence, Colocating with The Bunker can save costs, improve security, mitigate risk, improve reliability whilst you enjoy better connectivity, but most importantly meet all the strict Government regulations and helps you embrace Cloud computing simply and securely. Why Ultra Secure G Cloud? Here at The Bunker, we have always regarded security as the number one consideration and G-Cloud is no different. That is why we have very carefully examined all the technologies available and the processes and procedures necessary to remain Ultra Secure, to ensure that you can safely benefit from the rewards that cloud services can offer. Our experienced and knowledgeable teams of consultants, solution architects and project managers will walk you through your journey ensuring that at every stage you are secure in the knowledge that you are making the right decisions for your business. Cloud Computing: the checklist The model for Cloud computing is still maturing, which is why our experts will always discuss your needs and advise on the most appropriate way for you to get the best balance of business advantage and data security. As a major G-Cloud computing partner, we recommend you consider the following security issues: Privileged user access: Sensitive data processed outside the enterprise brings with it an inherent level of risk, because outsourced service providers are not all subject to the same access security controls that internal IT departments are. We believe it is important to always understand who manages your data, who has access to your data and how your data is protected. Regulatory compliance: Clients are ultimately responsible for the security and integrity of their own data, even when it is held by a service provider. Traditional service providers are subjected to external audits, security certifications and government accreditations. Data location: If you use a public Cloud, you may be unaware exactly where your data is hosted. In fact, you might not even know what country it will be stored in and what local privacy regulations apply. You should always ask your potential G-Cloud provider to commit to storing and processing data in specific jurisdictions and to make a contractual commitment to obey local privacy requirements on behalf of their clients. With The Bunker, all your data stays in the UK. You always know where it is and which laws apply. Data segregation: Data in a public Cloud, as the route proposed by G-Cloud, is typically stored in a totally shared environment alongside data from other customers. You may be sharing firewalls, storage and processing leaving yourself exposed to 8 Phone: Fax:

9 risks. As a G-Cloud provider, we employ segregation policies for all customers in a way that reduces risk to the low levels as low of a private Cloud. With us, no server contention disrupts your quality of service. You have a dedicated blade server, backed by a meaningful SLA and 24/7/365 support, monitoring and alerts. Best practice summary: Know where your data will reside and how it is protected Check on adherence to data protection laws in the relevant jurisdictions Ask prospective suppliers about their physical security and staff vetting controls Check which third parties the supplier deals with and whether they can access your data Ask about exception monitoring systems and processes Check the supplier provides a 24/7/365 ITIL based support and service desk Ask about service level availability guarantees and penalties Check whether the Cloud provider will accommodate your own security policies Seek an independent security audit Talk only to potential G-Cloud providers with recognised security certifications. The Bunker s Ultra Secure Cloud services can help you realise all of the benefits of the G-Cloud without the risk. You can rest assured in the knowledge that your applications are being hosted in an Ultra Secure environment that makes them ultra available. Partnering with The Bunker gives you solid guarantees on location, security and availability of your data along with contract flexibility and additional resources available when you have temporary or unexpected surges in demand. With us, you know that all your data stays in the UK. You always know where it is and which laws apply. And as we are already accredited by the Government to host IT systems that will be communicating, storing and / or processing HMG Protectively Marked information assets up to RESTRICTED (IL3) for confidentiality and integrity and up to IL4 for availability, as well as our Cloud data centre being ISO accredited and PCI DSS certified, you can rest assured your data remains Ultra Secure and ultra available. 9 Phone: Fax:

10 The Bunker was the only data centre provider who could adhere to our physical security requirements, including the segregation of rack areas, escorted access, CCTV and SC Cleared staff as well as providing multi-layer highly secure facilities and 24/7/365 support to manage our IL3 network providing, secure voice and data solutions to UK police forces and other government agencies - Golden Orb Networks The Bunker accreditation The Bunker is already fully accredited as a provider of Specialist Cloud Services under the UK Government Procurement Service G-Cloud framework. Under lots 1 & 4, The Bunker is able to offer specialist services across Infrastructure, Software & Cloud Consulting. The physical and environmental characteristics of The Bunker s data centres in Ash, Kent and Newbury, Berkshire, have both been independently CLAS assessed to provide Colocation data centre services to clients wishing to host IT systems that will be communicating, storing and / or processing HMG Protectively Marked information assets up to RESTRICTED (IL3) for confidentiality and integrity and up to IL4 for availability. To allow simplified deployment and accreditation, Risk Management and Accreditation Document Sets (RMADs) have been previously drafted and Independently CLAS audited for the physical and environmental characteristics of both of data centres. The Bunker is ISO Information Security Management certified and is the only provider in the UK delivering true, 12-point, PCI DSS compliance. Delivering public sector services The Bunker is already working in partnership with a number of suppliers who currently provide services directly at IL restricted levels, which include: Local/regional government Police and emergency services Health (NHS) Education. Partnering with The Bunker Our data centres are former military command centres, built by the MOD, to withstand physical attack to nuclear level and have been upgraded with millions of pounds of investment in extra power and cooling. They re not just secure; they re Ultra Secure, making your operations ultra resilient and your information ultra available. As the UK s most secure colocation provider, The Bunker has already been selected as a provider of Specialist Services under the UK Government Procurement Service G-Cloud framework. Under lots 1 & 4. The Bunker is able to offer specialist services across infrastructure, software & Cloud consulting to a range of government departments, including: the NHS; local authorities; emergency services and other public bodies. 10 Phone: Fax:

11 Our Ultra Secure Colocation services with its accreditation already in place and our IL3/4 rated facilities, means Colocating with us gives you ultimate security, combined with maximum availability, for all your data, no matter how sensitive and restricted. So what are you waiting for? It s time to Cloud compute. Take advantage of our Ultra Secure Colocation services and move simply and safely to the Cloud today with The Bunker. Next steps/contact details To discover more on G-Cloud, The Bunker and our accredited Colocation services: Book a tour of our military bunkers Call us today to discuss how we can help you grow your business: Visit 11 Phone: Fax: The Bunker Ash Radar Station Marshborough Road Sandwich Kent CT13 0PL

12 The Bunker Protocol is an all-encompassing methodology that secures against risk and ensures the most secure IT delivery in the UK. The Bunker Protocol incorporates Physical, Human and Digital security capability and processes and wraps them with a governance and standards layer that ensures that client data and client systems are continually secure against threats to confidentiality, integrity and availability. This is Ultra Secure Physical - Military Grade data centres Human - All employees are fully background checked and our culture starts and ends with security Digital - We build and integrate systems in-house, Ultra Secure from the source code up. 12 Phone: Fax:

Can security conscious businesses really adopt the Cloud safely?

Can security conscious businesses really adopt the Cloud safely? Can security conscious businesses really adopt the Cloud safely? January 2014 1 Phone: 01304 814800 Fax: 01304 814899 info@ Contents Executive overview The varied Cloud security landscape How risk assessment

More information

SCC Information Assurance Practice, CLAS Consulting, Check Testing and Accreditation Services

SCC Information Assurance Practice, CLAS Consulting, Check Testing and Accreditation Services SCC Information Assurance Practice, CLAS Consulting, Check Testing and Accreditation Services Contents 1 Introduction...2 2 IA, CLAS Consulting and CHECK Testing...3 3 Information Assurance...4 4 Accreditation...5

More information

HSCIC IT Hosting Strategy

HSCIC IT Hosting Strategy HSCIC IT Strategy Author: Paul A. Rawson Version: 1.7 Date: 30 April 2014 Purpose 1. The purpose of this paper is to seek approval of the HSCIC IT Strategy. The Strategy and Policy sections set out and

More information

Information Security: Cloud Computing

Information Security: Cloud Computing Information Security: Cloud Computing Simon Taylor MSc CLAS CISSP CISMP PCIRM Director & Principal Consultant All Rights Reserved. Taylor Baines Limited is a Registered Company in England & Wales. Registration

More information

Buyer s Guide. Buyer s Guide to Secure Cloud. thebunker.net Phone: 01304 814800 Fax: 01304 814899 info@thebunker.net

Buyer s Guide. Buyer s Guide to Secure Cloud. thebunker.net Phone: 01304 814800 Fax: 01304 814899 info@thebunker.net Buyer s Guide to Secure Cloud Buyer s Guide to Secure Cloud An executive guide to outsourcing IT infrastructure and data storage using Private Cloud as the foundation. Executives derive much confidence

More information

Service Definition Document

Service Definition Document Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)

More information

Data Protection Act 1998. Guidance on the use of cloud computing

Data Protection Act 1998. Guidance on the use of cloud computing Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered

More information

Thales Service Definition for PSN Secure Email Gateway Service for Cloud Services

Thales Service Definition for PSN Secure Email Gateway Service for Cloud Services Thales Definition for PSN Secure Email Gateway Thales Definition for PSN Secure Email Gateway for Cloud s April 2014 Page 1 of 12 Thales Definition for PSN Secure Email Gateway CONTENT Page No. Introduction...

More information

Cloud Computing in a Regulated Environment

Cloud Computing in a Regulated Environment Computing in a Regulated Environment White Paper by David Stephenson CTG Regulatory Compliance Subject Matter Expert February 2014 CTG (UK) Limited, 11 Beacontree Plaza, Gillette Way, READING, Berks RG2

More information

Assurance in the Cloud: Outsourcing Risk in a Shifting Landscape

Assurance in the Cloud: Outsourcing Risk in a Shifting Landscape by SCC We make IT work Assurance in the Cloud: Outsourcing Risk in a Shifting Landscape 02 CONTENTS You hold sensitive public sector data Sentinel protects it. Sentinel by SCC not only provides faster

More information

The Cadence Partnership Service Definition

The Cadence Partnership Service Definition The Cadence Partnership Service Definition About Cadence The Cadence Partnership is an independent management consultancy, specialising in working with a wide range of organisations, solving complex issues

More information

Mule Enterprise Service Bus (ESB) Hosting

Mule Enterprise Service Bus (ESB) Hosting Enterprise web solutions G7 Service Definition Mule Enterprise Service Bus (ESB) Hosting t: 0845 519 5465 e: info@axistwelve.com w: www.axistwelve.com Page 1 of 7 Table of contents Overview... 3 Service...

More information

Leveraging the Private Cloud for Competitive Advantage

Leveraging the Private Cloud for Competitive Advantage Leveraging the Private Cloud for Competitive Advantage Introduction While it is universally accepted that organisations will leverage cloud solutions to service their IT needs, there is a lack of clarity

More information

CPNI VIEWPOINT 01/2010 CLOUD COMPUTING

CPNI VIEWPOINT 01/2010 CLOUD COMPUTING CPNI VIEWPOINT 01/2010 CLOUD COMPUTING MARCH 2010 Acknowledgements This viewpoint is based upon a research document compiled on behalf of CPNI by Deloitte. The findings presented here have been subjected

More information

G-Cloud IV Services Service Definition Accenture Cloud Security Services

G-Cloud IV Services Service Definition Accenture Cloud Security Services G-Cloud IV Services Service Definition Accenture Cloud Security Services 1 Table of contents 1. Scope of our services... 3 2. Approach... 3 3. Assets and tools... 4 4. Capabilities... 5 5. Expected Outcomes...

More information

Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services

Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services Page 1 1 Contents 1 Contents... 2 2 Transcend360 Introduction... 3 3 Service overview... 4 3.1 Service introduction... 4 3.2 Service description...

More information

SECURE CLOUD SOLUTIONS FOR YOUR BUSINESS.

SECURE CLOUD SOLUTIONS FOR YOUR BUSINESS. SECURE CLOUD SOLUTIONS FOR YOUR BUSINESS. 2015 Learning Possibilities Ltd, 506 Centennial Park, Centennial Avenue, Elstree, Herts, WD6 3FG Email: info@cloudpossibilities.com Telephone: +44 (0) 20 8236

More information

Lot 1 Service Specification MANAGED SECURITY SERVICES

Lot 1 Service Specification MANAGED SECURITY SERVICES Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services

More information

Vodafone Cloud & Hosting Services. Gary Goodenough 13 th November 2015

Vodafone Cloud & Hosting Services. Gary Goodenough 13 th November 2015 Vodafone Cloud & Hosting Services Gary Goodenough 13 th November 2015 1 So, you ll all know Vodafone for these 2 But, we also do this and this 3 4 Market trends and customer challenges Your World/ Our

More information

Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services

Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services Page 1 1 Contents 1 Contents... 2 2 Transcend360 Introduction... 3 3 Service overview... 4 3.1 Service introduction... 4

More information

Thales Service Definition for PSN Secure Web Gateway Service for Cloud Services

Thales Service Definition for PSN Secure Web Gateway Service for Cloud Services Thales Service Definition for PSN Secure Web Gateway Service for Cloud Services April 2014 Page 1 of 12 CONTENT Page No. Introduction... 3 Overview of Service... 3 Key Features... 4 The Thales SaaS Cloud

More information

Delivering Government Cloud in 2012 Andy Tait VMware UK. VMware Copyright 2009 VMware, Inc. All rights reserved.

Delivering Government Cloud in 2012 Andy Tait VMware UK. VMware Copyright 2009 VMware, Inc. All rights reserved. Delivering Government Cloud in 2012 Andy Tait VMware UK VMware Copyright 2009 VMware, Inc. All rights reserved. Agenda A Brief History The UK Commitment to Cloud Latest Progress Update The CloudStore The

More information

How to ensure control and security when moving to SaaS/cloud applications

How to ensure control and security when moving to SaaS/cloud applications How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk

More information

Expert. Trusted. Effective. IT managed services tailored to you. From Modern Networks.

Expert. Trusted. Effective. IT managed services tailored to you. From Modern Networks. Expert. Trusted. Effective. IT managed services tailored to you. From Modern Networks. A Complete End-to-End Portfolio Established in 1999, Modern Networks is a managed service provider helping clients

More information

HOW TO BUY FROM G-CLOUD AND CLOUDSTORE A GUIDE FOR BUYING ORGANISATIONS

HOW TO BUY FROM G-CLOUD AND CLOUDSTORE A GUIDE FOR BUYING ORGANISATIONS white paper HOW TO BUY FROM G-CLOUD AND CLOUDSTORE A GUIDE FOR BUYING ORGANISATIONS EXECUTIVE SUMMARY There has been much talk of cloud services, G-Cloud and Cloud First in recent months, but what does

More information

A Guide to the Cyber Essentials Scheme

A Guide to the Cyber Essentials Scheme A Guide to the Cyber Essentials Scheme Published by: CREST Tel: 0845 686-5542 Email: admin@crest-approved.org Web: http://www.crest-approved.org/ Principal Author Jane Frankland, Managing Director, Jane

More information

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations

More information

Cloud Enablement. Lot 4 - Specialist Cloud Services. Version: 2.0, Issue Date: 05/02/2014. Classification: Open

Cloud Enablement. Lot 4 - Specialist Cloud Services. Version: 2.0, Issue Date: 05/02/2014. Classification: Open Cloud Enablement Version: 2.0, Issue Date: 05/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 2014. Other than for the sole purpose of evaluating this Response, no part of this

More information

Cyber Security and Cloud Computing. Dr Daniel Prince Course Director MSc in Cyber Security d.prince@lancaster.ac.uk

Cyber Security and Cloud Computing. Dr Daniel Prince Course Director MSc in Cyber Security d.prince@lancaster.ac.uk Cyber Security and Cloud Computing Dr Daniel Prince Course Director MSc in Cyber Security d.prince@lancaster.ac.uk Scope of Today SME Attractors for Cloud Switching to the Cloud Public Private Hybrid Big

More information

Specialist Cloud Services. Acumin Cloud Security Resourcing

Specialist Cloud Services. Acumin Cloud Security Resourcing Specialist Cloud Services Acumin Cloud Security Resourcing DOCUMENT: FRAMEWORK: STATUS Cloud Security Resourcing Service Definition G-Cloud Released VERSION: 1.0 CLASSIFICATION: CloudStore Acumin Consulting

More information

Applications and Solutions Architecture Cloud Services

Applications and Solutions Architecture Cloud Services Applications and Solutions Architecture Cloud Services G-Cloud IV Service Definition Lot 4 - SCS Contact us: Danielle Pratt Email: G-Cloud@esynergy-solutions.co.uk About is a leading provider of IT Consultancy

More information

UK s G Cloud Project

UK s G Cloud Project UK s G Cloud Project 13 May 2013 Nicola Westmore, Deputy Programme Director UNCLASSIFIED 1 Challenges The UK Public Sector is facing hugely complex, inter-departmental challenges We need to deliver a 21

More information

Cloud Enablement. Lot 4 - Specialist Cloud Services. Version: 3.0, Issue Date: 05/02/2014. Classification: Open

Cloud Enablement. Lot 4 - Specialist Cloud Services. Version: 3.0, Issue Date: 05/02/2014. Classification: Open Cloud Enablement Version: 3.0, Issue Date: 05/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 201415/12/2014. Other than for the sole purpose of evaluating this Response, no part

More information

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. Table of contents 1 Introduction...3 2 Architecture Services...4 2.1 Enterprise Architecture Services...5 2.2 Solution Architecture Services...6 2.3 Service

More information

ISO 27001 Information Security Management Services (Lot 4)

ISO 27001 Information Security Management Services (Lot 4) ISO 27001 Information Security Management Services (Lot 4) CONTENTS 1. WHY LEICESTERSHIRE HEALTH INFORMATICS SERVICE?... 3 2. LHIS TECHNICAL ASSURANCE SERVICES... 3 3. SERVICE OVERVIEW... 4 4. EXPERIENCE...

More information

CYBER SECURITY Audit, Test & Compliance

CYBER SECURITY Audit, Test & Compliance www.thalescyberassurance.com CYBER SECURITY Audit, Test & Compliance 02 The Threat 03 About Thales 03 Our Approach 04 Cyber Consulting 05 Vulnerability Assessment 06 Penetration Testing 07 Holistic Audit

More information

White paper. How cloud computing can transform the fortunes of small and mid-sized businesses

White paper. How cloud computing can transform the fortunes of small and mid-sized businesses White paper How cloud computing can transform the fortunes of small and mid-sized businesses Small and mid-sized businesses are increasingly looking for new and innovative ways to cut costs while sharpening

More information

CROWN HOSTING DATA CENTRES AND THE CLEAREST ROUTE TO THE CLOUD. August 2015

CROWN HOSTING DATA CENTRES AND THE CLEAREST ROUTE TO THE CLOUD. August 2015 CROWN HOSTING DATA CENTRES AND THE CLEAREST ROUTE TO THE CLOUD August 2015 CONTENTS What is Crown Hosting Data Centres 4 Data centres of the future, today 5 Is my organisation eligible? 5 Crown Hosting

More information

ICT and Information Security Resources

ICT and Information Security Resources Methods GCloud Service Definition ICT and Information Security Resources HEAD OFFICE: 125 Shaftesbury Avenue, London WC2H 8AD Scottish Office: Exchange Place 2, 5 Semple Street, Edinburgh, EH3 8BL t: +44

More information

Infopaper. Demystifying Platform as a Service

Infopaper. Demystifying Platform as a Service Demystifying Platform as a Service The dividing lines between PaaS and IaaS may be blurring, but it s important for outsourcers of IT infrastructure to understand what sets Private PaaS apart from commodity

More information

WHY MANAGED CLOUD SERVICES ARE REALLY CLOUD ON THE USER S TERMS

WHY MANAGED CLOUD SERVICES ARE REALLY CLOUD ON THE USER S TERMS WHY MANAGED CLOUD SERVICES ARE REALLY CLOUD ON THE USER S TERMS Managed services provide an alternative to expensive on-premises infrastructure and applications, enabling organisations to move from a capital

More information

The NREN s core activities are in providing network and associated services to its user community that usually comprises:

The NREN s core activities are in providing network and associated services to its user community that usually comprises: 3 NREN and its Users The NREN s core activities are in providing network and associated services to its user community that usually comprises: Higher education institutions and possibly other levels of

More information

Windows Server 2003. Your data will be non-compliant & at risk on

Windows Server 2003. Your data will be non-compliant & at risk on Your data will be non-compliant & at risk on Windows Server 2003. On July 14 th 2015, Microsoft will cease its support (including automatic bug fixes, updates and online technical assistance) for Windows

More information

DIGITAL MARKETPLACE (G CLOUD 7) OFFERING. Sopra Steria Integration Platform Support as a Service. Service Overview. Sopra Steria in the public sector

DIGITAL MARKETPLACE (G CLOUD 7) OFFERING. Sopra Steria Integration Platform Support as a Service. Service Overview. Sopra Steria in the public sector DIGITAL MARKETPLACE (G CLOUD 7) OFFERING Sopra Steria Integration Platform Support as a Service Sopra Steria in the public sector Organisations across the public sector choose Sopra Steria to deliver transformation

More information

The trusted technology partner in the Public Sector

The trusted technology partner in the Public Sector The trusted technology partner in the Public Sector www.exponential-e.com/public-sector About Exponential-e Market Leaders in Technical Innovation GovConnect: The Exponential-e public sector service portfolio

More information

IT Enterprise Services

IT Enterprise Services IT Enterprise Services Capita Private Cloud Agile Infrastructure-as-a-Service (IaaS) Cloud potential unleashed Cloud computing at its best Cloud is now an integral part of every IT strategy. It reduces

More information

Module 1: Facilitated e-learning

Module 1: Facilitated e-learning Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1

More information

UK Government IA Recent Changes and Update

UK Government IA Recent Changes and Update UK Government IA Recent Changes and Update INTRODUCTION Agenda Part 1 Government IA and Cyber Security Background Quick Threat Update UK Government Cyber Security Initiative Government Asset Control in

More information

Interoute Virtual Data Centre. Hands on cloud control.

Interoute Virtual Data Centre. Hands on cloud control. Interoute Virtual Data Centre. Hands on cloud control. Scale your computing resource on demand Choose where in Europe you want your data Europe s most trusted and secure network www.interoute.com/vdc Interoute

More information

Cloud Computing Guidelines

Cloud Computing Guidelines 1 Cloud Computing Guidelines Contents Introduction... 3 What is cloud computing?... 3 Why use cloud computing?... 4 The building blocks of cloud computing... 8 Best practice guidelines... 12 The legal

More information

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions Managed Security Managed Security MANAGED SECURITY SOLUTIONS I would highly recommend for your company s network review... were by far the best company IT Manager, Credit Management Agency Presenting IT

More information

G-Cloud Service Definition. Atos Oracle Cloud ERP Implementation Services

G-Cloud Service Definition. Atos Oracle Cloud ERP Implementation Services G-Cloud Service Definition Atos Oracle Cloud ERP Implementation Services Atos Oracle Cloud ERP Implementation Services Customers need adaptive and agile Enterprise Resource Planning (ERP) systems to support

More information

Caretower s SIEM Managed Security Services

Caretower s SIEM Managed Security Services Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During

More information

G-Cloud Service Definition. Canopy Unmanaged Enterprise Private Cloud (IL3 Capable) IaaS

G-Cloud Service Definition. Canopy Unmanaged Enterprise Private Cloud (IL3 Capable) IaaS G-Cloud Service Definition Canopy Unmanaged Enterprise Private Cloud (IL3 Capable) IaaS Canopy Unmanaged Enterprise Private Cloud IaaS Canopy Unmanaged Enterprise Private Cloud delivers the efficiencies,

More information

Your complete guide to Cloud Computing

Your complete guide to Cloud Computing Your complete guide to Cloud Computing 1 Doc V1.0 Dec 2013 Table of Contents Hosted Desk- 3 The Cloud and Cloud Computing... 4 The benefits of Cloud Solutions 6 The Cloud is Growing - Rapidly 7 Resolving

More information

Recommendations and Considerations for Companies Migrating to the Cloud

Recommendations and Considerations for Companies Migrating to the Cloud Recommendations and Considerations for Companies Migrating to the Cloud White Paper May 2012 Colocation Connectivity Cloud Communications Introduction As organisations think about moving to the cloud,

More information

G-Cloud III Services Service Definition Accenture Cloud Security Services

G-Cloud III Services Service Definition Accenture Cloud Security Services G-Cloud III Services Service Definition Accenture Cloud Security Services 1 Table of contents 1. Scope of our services... 3 2. Approach... 3 3. Assets and tools... 4 4. Outcomes... 5 5. Pricing... 5 6.

More information

ICT. Suffolk Coastal District Council and Waveney District Council s ICT Strategy. Strategy

ICT. Suffolk Coastal District Council and Waveney District Council s ICT Strategy. Strategy ICT Suffolk Coastal District Council and Waveney District Council s Strategy 2 Introduction and Aims The aim of the ICT strategy is to provide a strategic vision and framework for the direction of East

More information

Cloud Computing in a Government Context

Cloud Computing in a Government Context Cloud Computing in a Government Context Introduction There has been a lot of hype around cloud computing to the point where, according to Gartner, 1 it has become 'deafening'. However, it is important

More information

REDCENTRIC HEALTHCARE SOLUTIONS

REDCENTRIC HEALTHCARE SOLUTIONS REDCENTRIC HEALTHCARE SOLUTIONS REDCENTRIC AT A GLANCE Redcentric is an accredited N3 service provider with over a decades experience of delivering NHS network services. DEDICATED N3 INFORMATION GOVERNANCE

More information

Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 1.0, Issue Date: 05/02/201405/02/2014. Classification: Open

Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 1.0, Issue Date: 05/02/201405/02/2014. Classification: Open Protective Monitoring as a Service Version: 1.0, Issue Date: 05/02/201405/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 2014. Other than for the sole purpose of evaluating this

More information

custom hosting for how you do business

custom hosting for how you do business custom hosting for how you do business 24775 League Island Boulevard Philadelphia PA 19112 gibraltarit.com 866.410.4427 Gibraltar s replicated cloud architecture and PCI/HIPAA compliant data centers provide

More information

SBL Integration, Capabilities, and Enablement in Defence Justice@softbox.co.uk. 01347 812148 www.softbox.co.uk

SBL Integration, Capabilities, and Enablement in Defence Justice@softbox.co.uk. 01347 812148 www.softbox.co.uk SBL Integration, Capabilities, and Enablement in Defence Justice@softbox.co.uk 01347 812148 www.softbox.co.uk Contents Page 3 SBL Company Overview 4 SBL in Justice 5 SBL Apple Authorised Reseller 5 SBL

More information

FUNDING APPROVAL FOR IMPLEMENTATION OF CLOUD-BASED PRODUCTIVITY AND COLLABORATION TOOLS (OFFICE 365)

FUNDING APPROVAL FOR IMPLEMENTATION OF CLOUD-BASED PRODUCTIVITY AND COLLABORATION TOOLS (OFFICE 365) London Borough of Hammersmith & Fulham CABINET 2 NOVEMBER 2015 FUNDING APPROVAL FOR IMPLEMENTATION OF CLOUD-BASED PRODUCTIVITY AND COLLABORATION TOOLS (OFFICE 365) Report of the Leader - Councillor Stephen

More information

D-G4-L4-126 Police contact management and demand reduction review Deloitte LLP Service for G-Cloud IV

D-G4-L4-126 Police contact management and demand reduction review Deloitte LLP Service for G-Cloud IV D-G4-L4-126 Police contact management and demand reduction review Deloitte LLP Service for G-Cloud IV September 2013 Contents 1 Service Overview 1 2 Detailed Service Description 2 3 Commercials 6 4 Our

More information

Cloud Computing: The atmospheric jeopardy. Unique Approach Unique Solutions. Salmon Ltd 2014 Commercial in Confidence Page 1 of 5

Cloud Computing: The atmospheric jeopardy. Unique Approach Unique Solutions. Salmon Ltd 2014 Commercial in Confidence Page 1 of 5 Cloud Computing: The atmospheric jeopardy Unique Approach Unique Solutions Salmon Ltd 2014 Commercial in Confidence Page 1 of 5 Background Cloud computing has its place in company computing strategies,

More information

Overview. Service Description: BCP & DR Strategy (L6)

Overview. Service Description: BCP & DR Strategy (L6) Service Description: BCP & DR Strategy (L6) Government Enterprise Architecture Specialists T: 07966 457 571 E: peter@vision-ist.net Overview Visionist will help your organisation develop a Business Continuity

More information

A guide to procuring Accredited Cloud Services

A guide to procuring Accredited Cloud Services A guide to procuring Accredited Cloud Services Contents 2 Introduction 3 Chapter 1: What are Accredited Cloud Services? 4 Chapter 2: Preparing to procure Accredited Cloud Services 6 Chapter 3: Comparing

More information

Mapping and Geographic Information Systems Professional Services

Mapping and Geographic Information Systems Professional Services Mapping and Geographic Information Systems Professional Services G-Cloud Services RM 1557 Service Definition Esri UK GCloud 5 Lot 4 Specialist Services Government Procurement Service Acknowledgement Esri

More information

Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 2.1, Issue Date: 05/02/201405/02/2014. Classification: Open

Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 2.1, Issue Date: 05/02/201405/02/2014. Classification: Open Protective Monitoring as a Service Version: 2.1, Issue Date: 05/02/201405/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 201416/12/2014. Other than for the sole purpose of evaluating

More information

GPG13 Protective Monitoring. Service Definition

GPG13 Protective Monitoring. Service Definition GPG13 Protective Monitoring Service Definition Issue Number V1.3 Document Date 27 November 2014 Author: D.M.Woodcock Classification UNCLASSIFIED Version G-Cloud 6 2014 Copyright Assuria Limited. All rights

More information

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Strategic Compliance & Securing the Cloud Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Complexity and Challenges 2 Complexity and Challenges Compliance Regulatory entities

More information

Defining the Enterprise Cloud

Defining the Enterprise Cloud Defining the Enterprise Cloud David Bartholomew Publication date: February 2012 Defining the Enterprise Cloud Cloud services promise to unlock the value of IT and start to deliver strategic business value.

More information

Big Data Analytics Service Definition G-Cloud 7

Big Data Analytics Service Definition G-Cloud 7 Big Data Analytics Service Definition G-Cloud 7 Big Data Analytics Service Service Overview ThinkingSafe s Big Data Analytics Service allows information to be collected from multiple locations, consolidated

More information

CLOUD AND CARRIER- NEUTRALITY IN A COLOCATION DATA CENTRE

CLOUD AND CARRIER- NEUTRALITY IN A COLOCATION DATA CENTRE CLOUD AND CARRIER- NEUTRALITY IN A COLOCATION DATA CENTRE What it is, why it matters, and what it means for the future By Kevin Dean CMO, Interxion INTRODUCTION IT consumerisation, mobility, social media,

More information

DOBUS And SBL Cloud Services Brochure

DOBUS And SBL Cloud Services Brochure 01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure enquiries@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted

More information

IT Services. We re the IT in OrganIsaTion. Large Organisations

IT Services. We re the IT in OrganIsaTion. Large Organisations IT Services. We re the IT in OrganIsaTion Large Organisations IT for Large Organisations. As the world of business technology has changed, so have we. From designing, building and optimising tailored

More information

Get Better Protected... Secure data sharing made possible with Updata s Encryption Overlay Service.

Get Better Protected... Secure data sharing made possible with Updata s Encryption Overlay Service. i Compliant Fully managed Encryption Overlay service enabling data sharing across secure networks. Provides operational efficiencies and cost savings through simplified procurement Get Better Protected...

More information

Cloud Computing and Records Management

Cloud Computing and Records Management GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 srsarecordsmanagement@sa.gov.au www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version

More information

PROGRAMME OVERVIEW: G-CLOUD APPLICATIONS STORE FOR GOVERNMENT DATA CENTRE CONSOLIDATION

PROGRAMME OVERVIEW: G-CLOUD APPLICATIONS STORE FOR GOVERNMENT DATA CENTRE CONSOLIDATION PROGRAMME OVERVIEW: G-CLOUD APPLICATIONS STORE FOR GOVERNMENT DATA CENTRE CONSOLIDATION 1. Introduction This document has been written for all those interested in the future approach for delivering ICT

More information

G-Cloud 7 Service Definition. Atos Oracle Cloud ERP Implementation Services

G-Cloud 7 Service Definition. Atos Oracle Cloud ERP Implementation Services G-Cloud 7 Service Definition Atos Oracle Cloud ERP Implementation Services Atos Oracle Cloud ERP Implementation Services Customers need adaptive and agile Enterprise Resource Planning (ERP) systems to

More information

Guardian365. Managed IT Support Services Suite

Guardian365. Managed IT Support Services Suite Guardian365 Managed IT Support Services Suite What will you get from us? Award Winning Team Deloitte Best Managed Company in 2015. Ranked in the Top 3 globally for Best Managed Service Desk by the Service

More information

G-CLOUD SPECIALIST CLOUD SERVICES

G-CLOUD SPECIALIST CLOUD SERVICES ITSUS CONSULTING G-CLOUD SPECIALIST CLOUD SERVICES Page 1 of 13 SPECIALIST CLOUD SERVICES ITSUS is a specialist network consultancy which delivers that crucial combination of security and efficiency, both

More information

NSW Government. Data Centre & Cloud Readiness Assessment Services Standard. v1.0. June 2015

NSW Government. Data Centre & Cloud Readiness Assessment Services Standard. v1.0. June 2015 NSW Government Data Centre & Cloud Readiness Assessment Services Standard v1.0 June 2015 ICT Services Office of Finance & Services McKell Building 2-24 Rawson Place SYDNEY NSW 2000 standards@finance.nsw.gov.au

More information

Cloud Computing. What does it really mean for your business?

Cloud Computing. What does it really mean for your business? Cloud Computing What does it really mean for your business? Technology transforming business The IDC survey, conducted with 696 IT executives and CIOs said that 41 percent are either evaluating cloud solutions

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

GETTING THE MOST FROM THE CLOUD. A White Paper presented by

GETTING THE MOST FROM THE CLOUD. A White Paper presented by GETTING THE MOST FROM THE CLOUD A White Paper presented by Why Move to the Cloud? CLOUD COMPUTING the latest evolution of IT services delivery is a scenario under which common business applications are

More information

Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document

Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document Microsoft Services - GCloud 7 Catalogue Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document 1 Overview of the Service 1.1 Service Objectives The 2

More information

Security in the Cloud: Visibility & Control of your Cloud Service Providers

Security in the Cloud: Visibility & Control of your Cloud Service Providers Whitepaper: Security in the Cloud Security in the Cloud: Visibility & Control of your Cloud Service Providers Date: 11 Apr 2012 Doc Ref: SOS-WP-CSP-0412A Author: Pierre Tagle Ph.D., Prashant Haldankar,

More information

Deploying the Enterprise Cloud

Deploying the Enterprise Cloud Deploying the Enterprise Cloud Tim Hancock Publication date: October 2012 Deploying the Enterprise Cloud Many enterprises now recognise that the benefits outweigh the risks in Cloud adoption. However,

More information

The Cloud as a Platform

The Cloud as a Platform The Cloud as a Platform A Guide for Small and Medium Business As the cloud evolves from basic online software tools to a full platform for business, it can provide ways for your business to do more, grow

More information

Cloud Security Panel: Real World GRC Experiences. ISACA Atlanta s 2013 Annual Geek Week

Cloud Security Panel: Real World GRC Experiences. ISACA Atlanta s 2013 Annual Geek Week Cloud Security Panel: Real World GRC Experiences ISACA Atlanta s 2013 Annual Geek Week Agenda Introductions Recap: Overview of Cloud Computing and Why Auditors Should Care Reference Materials Panel/Questions

More information

Securing Your Journey to the Cloud. Managing security across platforms today and for the future. Table of Contents

Securing Your Journey to the Cloud. Managing security across platforms today and for the future. Table of Contents P h y s i c a l V i r t u a l - C l o u d Securing Your Journey to the Cloud Managing security across platforms today and for the future Table of Contents Executive summary 1 Journey to the cloud varies,

More information

Data Center Consolidation: Lessons From The Field. John Tsiofas, Kraft Kennedy David Carlson, Kraft Kennedy

Data Center Consolidation: Lessons From The Field. John Tsiofas, Kraft Kennedy David Carlson, Kraft Kennedy Data Center Consolidation: Lessons From The Field John Tsiofas, Kraft Kennedy David Carlson, Kraft Kennedy Agenda Factors to consider Technology strategy Building a project team How to use vendors wisely

More information

Data centre strategies for business growth in a hybrid cloud world

Data centre strategies for business growth in a hybrid cloud world Data centre strategies for business growth in a hybrid cloud world A joint report from Pacnet and CIO Custom Solutions Group October 2014 Introduction The data centre has become an integral part of the

More information

FLEXIBLE COMPUTING LTD. Service Description & Pricing. Cloud RockStars. G-Cloud

FLEXIBLE COMPUTING LTD. Service Description & Pricing. Cloud RockStars. G-Cloud FLEXIBLE COMPUTING LTD Service Description & Pricing Cloud RockStars G-Cloud This document outlines the services and prices of Flexible Computing's Cloud Rockstars Cloud Services for Government and Public

More information

G-CLOUD 7 - VIRTUAL ASSET MANAGER (VAM) SPECIALIST CLOUD SERVICES (SCS)

G-CLOUD 7 - VIRTUAL ASSET MANAGER (VAM) SPECIALIST CLOUD SERVICES (SCS) G-CLOUD 7 - VIRTUAL ASSET MANAGER (VAM) SPECIALIST CLOUD SERVICES (SCS) Service Definition 6th October 2015 TABLE OF CONTENTS VIRTUAL ASSET MANAGER (VAM) SPECIALIST CLOUD SERVICES (SCS) 3 SERVICE SUMMARY

More information

VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud

VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud VALUE PROPOSITION FOR SERVICE PROVIDERS Helping Service Providers accelerate adoption of the cloud Partnership with Service Providers Enabling Your Cloud Services in Complex Environments Today s challenge

More information

Digital Forensics G-Cloud Service Definition

Digital Forensics G-Cloud Service Definition Digital Forensics G-Cloud Service Definition 2013 General Dynamics Information Technology Limited. All rights 1 GDIT Team Clients Metropolitan Police Service The General Dynamics Information Technology

More information

8. DIGITAL BY DESIGN - CUSTOMER RELATIONSHIP MANAGEMENT SYSTEM

8. DIGITAL BY DESIGN - CUSTOMER RELATIONSHIP MANAGEMENT SYSTEM 8. DIGITAL BY DESIGN - CUSTOMER RELATIONSHIP MANAGEMENT SYSTEM REPORT OF: Contact Officer: Wards Affected: Key Decision: Report to: HEAD OF DIGITAL AND CUSTOMER SERVICES Simon Hughes, Head of Digital and

More information