WYNYARD GROUP ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE. CONNECTING THE DOTS.

Size: px
Start display at page:

Download "WYNYARD GROUP ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE. CONNECTING THE DOTS."

Transcription

1 WYNYARD GROUP ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE. CONNECTING THE DOTS.

2

3 Wynyard Group Advanced Crime Analytics 1 POWERFUL SOFTWARE. CONNECTING THE DOTS. Government and financial institutions face challenges that continue to grow in scale, complexity and impact. These challenges include: Growth in the volume and sophistication of crime which includes violent offences, cybercrime, internal and external fraud, as well as money laundering, drug trafficking and other serious crimes. Managing exponential increases in data volumes that may be stored in disparate, siloed systems and the challenge of creating value from that information in order to address the threats of crime. Time and resource pressures, and highly organised criminal networks. At Wynyard Group, we understand these challenges and have been helping government and financial institutions globally to solve them. Wynyard s software enables its clients to gain a better understanding of the criminal environment as well as overcome issues of data silos, duplicate or conflicting data and share information securely for more effective outcomes. ADVANCED CRIME ANALYTICS RISK MANAGEMENT INVESTIGATIVE CASE MANAGEMENT Wynyard Group is a market leader in advanced crime analytics, risk management and investigative case management software. Built on a highly configurable platform, Wynyard s software can be deployed to meet a range of needs. Our team works with clients to design and configure solutions for their individual requirements. Wynyard s offerings include: DIGITAL FORENSICS Digital evidence investigator ADVANCED CRIME ANALYTICS Fraud analytics Anti-money laundering/counter-terrorism financing (AML/CTF) Serious and organised crime analytics Mobile device analytics Person of interest analytics Gun crime analytics INVESTIGATIVE CASE MANAGEMENT Financial crime investigations Breach and incident management Covert operations

4 2 Wynyard Group Advanced Crime Analytics ADVANCED CRIME ANALYTICS Wynyard s advanced crime analytics is a powerful software platform enabling the automatic identification of threats, vulnerabilities and connections within the ever-increasing amount of information available. Configured to meet specific needs and challenges of government and financial services agencies, Wynyard s advanced crime analytics software is used around the world to help in the fight against serious and organised crime, human trafficking, gun running, drug smuggling, fraud, anti-money laundering and counter terrorist financing. Advanced crime analytics helps by: Utilising operational and specialist resources more effectively Addressing the exponential increase in data Connecting complex and disparate data sets for a comprehensive view and better analysis Enhancing inter-agency co-operation Increasing efficiency by getting users to the answers faster Visualise and discover the relationships between entities in order to identify suspicious activities and determine causes Key features: Flexible rules management and transaction monitoring Rules can be created or modified at any time as information becomes clearer, business models evolve, new processes are introduced or regulations change. Context aware visualisation Uncover, visualise and analyse data and relationships or patterns that may otherwise remain hidden. Text mining Text mining aims to obtain valuable insights from large amounts of unstructured text. The software can automatically extract and classify entities and then connect and link these to other known entities to provide a comprehensive view of the data. Open source intelligence ingestion Open source intelligence (OSINT) including social media and news feeds can be used throughout Wynyard s solutions as a data source for intelligence gathering and network analysis purposes.

5 Wynyard Group Advanced Crime Analytics 3 Watchlists and screening Wynyard s system is fully integrated with world-leading watchlists from Dow Jones Risk and Compliance to provide complete and up-to-date data when screening people to identify politically exposed persons (PEPs) and their relatives or close associates (RCAs), special interest persons or entities (SIPs/SIEs) government sanctioned entities, and high-profile criminals. Powerful search and queries The Wynyard platform contains a high-performance, full-featured text search engine. It delivers ranked search results and supports many powerful query types including phrase queries, wildcard queries, fuzzy queries, proximity queries, and range queries. Highly configurable solutions Wynyard s advanced crime analytics platform is scalable both in terms of users and data volume and can be deployed agency wide and configured to address all analysis requirements. Alternatively it can be installed within a department or team to address a specific operational challenge. Wynyard advanced crime analytics for government provides capabilities such as: Mobile device analytics Gun crime analytics Serious and organised crime analytics Person of interest analytics Mobile device analytics Gun crime analytics Serious and organised crime analytics Wynyard advanced crime analytics for financial services provides capabilities such as: Fraud analytics to detect cross-channel or internal fraud, or anomalous fraudulent behaviours. It is designed specifically for insurers, banks and credit unions to aid in the rapid detection and prevention of fraud, to reduce the risk of loss and to increase the effective management of fraud across the organisation. Allowing organisations to build on traditional anti-money laundering/counter-terrorism financing detection, alerts and reporting, adding rules, analytics and visualisation capabilities. It allows risk mitigation by rapidly delivering enhanced due diligence integrated with industry-leading watchlists. ANALYSE DATA Identify: Linked incidents, entities, crime networks and locations PRODUCE EVIDENCE Prepare: Case graphics/timelines, link charts, evidence report INVESTIGATION APPLY ADVANCED CRIME ANALYTICS INTELLIGENCE-LED INVESTIGATIONS CASE REPORT PROSECUTE INCIDENT CASE

6 4 Wynyard Group Advanced Crime Analytics INVESTIGATIVE CASE MANAGEMENT Wynyard investigative case management is a comprehensive, highly configurable, secure, solution for managing investigations. Wynyard s software incorporates intelligence-led case management techniques and provides the tools for investigators to identify and act on critical information faster. Investigation teams and specialist departments face rising pressure to efficiently and effectively manage investigations and cases supporting at-risk individuals. Providing a 360 degree view of the case Wynyard s solution integrates reports, charts, evidence packs and data analysis capability streamlining investigations and enabling investigators to identify opportunities for both independent overt and covert activity, whilst simultaneously building the case file using standardised categories. Investigative Case Management helps by: Enhancing analysis and providing access to data in real time Enabling more effective and efficient case management Delivery of a granular security model designed to meet the highest security and privacy standards Integrating case management data with wider intelligence holdings Providing a complete view of the case Tracking of user s access and activity with comprehensive audit functionality Key features Complete Configurability Meet your specific requirements without incurring extra costs by configuring the solution in house. Intuitive Visualisation See a complete picture of the case by visualising all the key entities, relationships and events involved. Full Auditability Keep track of every user s access and activity with comprehensive audit functionality. Connect Intelligence and Investigations data together Combine case data with wider intelligence holdings by importing and exporting data into advanced crime analytics for more in depth analysis.

7 Wynyard Group Advanced Crime Analytics 5 Highly configurable solutions Wynyard s Investigative Case Management enables you to tailor the software to meet specific operational requirements for managing investigations, witness protection programmes, the protection of other at-risk individuals and any other type of operation. The solution can be deployed organisation wide to support all of your investigation and case management requirements or alternatively it can be deployed within a department or team to address a specific operational challenge. Wynyard s serious and organised crime case management software is purpose built to manage tasks, evidence and cases. Wynyard s software is highly secure and can be configured to support business processes to reduce manual processes and the duplication of effort. This enables investigative teams to work more efficiently. The integration of crime analytics enables intelligenceled operations so users can identify patterns, anomalies and relationships. Information is rapidly made available to frontline agents to solve serious crimes faster and disrupt organised criminal networks. The granular security model is a core component of the system and limits access to information based upon the case and the user s permissions. Witness protection case management is a secure, robust and configurable solution for managing the protection of victims, witnesses and associated people. This solution is purpose built for law enforcement agencies and designed to protect the integrity of investigations through effective action plan management and secure communication and collaboration. Wynyard s software has a comprehensive security model that is designed to isolate information with layered mechanisms in place to counter unauthorised access. Covert operations case management is a scalable, highly configurable, secure and comprehensive solution for covert operations. Wynyard s software is purpose built to protect all details of covert operations: the software has a proven and granular security model that is designed to isolate information; a series of layered defences limits the ability for users to access data; and an alert and audit system provides an additional layer to counter attempted or unauthorised access. All data, information, evidence and exhibits may be loaded into a single repository so that investigators and analysts can rapidly understand complex relationships and extract more value out of their information, which in turn reduces the time required to achieve operational benefits. EMPLOYEE INTERVIEWS BANKING RECORDS OPEN SOURCE INTELLIGENCE CCTV EMPLOYEE RECORDS S INCIDENT FILE OPENED INVESTIGATIVE CASE MANAGMENT REPORT AUTHORITIES NOTIFIED SUBSIDIARY COMPANIES ADVANCED CRIME ANALYTICS OTHER DEPARTMENTS OTHER INCIDENTS

8 6 Wynyard Group Advanced Crime Analytics DIGITAL EVIDENCE INVESTIGATOR Wynyard s digital evidence investigator software is a proven, purpose-built tool for investigators enabling rapid access and examination of digital evidence. The exponential growth in the number of devices seized as part of an investigation including CCTV footage, laptops, servers, mobile phones, game consoles and GPS units means that law enforcement agencies need to interrogate and analyse the content more efficiently. Wynyard s software enables frontline personnel to quickly identify which device or piece of information is relevant to the case. This reduces the need for extended custody periods and speeds up the judicial process. By allowing rapid access to digital content for investigative teams, Wynyard s solution allows evidence from the device to be introduced into the investigation at an early stage in the process and while the suspect is still in custody. Digital evidence investigator helps by: Providing rapid access to digital evidence for detectives and investigators Improving speed through the justice system Reducing forensic backlogs by managing the exponential growth in digital devices Delivering savings in financial and human resource by removing the reliance on specialist staff Key features: Analyse internet activity Utilising internet evidence finder inside the software enables a quick drill-down to analyse internet activity like Skype, Google searches, WhatsApp messages and many other communication methods. Automatic processing The processing engine can identify objectionable material such as images, videos and s and then connect to external databases including INTERPOL, C4All, CETS and ANVIL for victim identification and rescue. Designed for investigators and detectives Keeps the investigation moving by enabling investigators familiar with the case to quickly produce actionable intelligence and evidential reports for prosecution. Integrate with advanced analytics Discover the relationships between acquired digital evidence and wider intelligence holdings by analysing the data and intuitively visualising the connections and networks.

9 Wynyard Group Advanced Crime Analytics 7 Design principles Reduce complexity Sequential processing model Simplified platform solution with commodity hardware Hardware-agnostic Increased performance Distributed and multi-threaded processing model enabling decreased time-to-completion of a single exhibit, or total processing throughput across all exhibits, or a combination of both Faster file I/O Enhanced operational impact Apple Mac O/S support C4ALL and local Image Hash database integration Enhance bookmarking and evidence tagging XRY and Cellebrite support Internet Evidence Finder (IEF) integration Increased forensic container support Terminology DEI implements the concepts of Cases, Exhibits and Media. A Case is a logical grouping of Exhibits and is identified using a case number. Another reference number (Operation name or other) can be attributed to a Case. An Exhibit is a logical grouping of Media and is identified using an exhibit number and a description. An exhibit is generally a computer, or other container that contains media. In the case of a piece of media that doesn t have a container object (e.g.; a hard drive, or USB stick found on a desk), then the exhibit and media are the same item. Media is a device or object that can contain electronic data. It typically represents hard disks, optical or other removable media. DEI functional areas Digital Evidence Investigator has a modern, adaptable and scalable architecture. The main functional areas are: The back-end (application tier), which contains the file processing agents. A front-end (client tier) browser based application used by investigators to serach, examine and bookmark the digital evidence. The third functional area is administration and security. These components provide full auditing and authorisation including the ability to manage users, cases, exhibits and security policy requirements. The software has removed an month backlog. Our digital forensic specialists can now focus on more complex and high profile cases. Maarten Kleintjes MNZM, Manager National e-crime Group (Ret.) - NZ Police DEI SERVER NETWORK USER NETWORK DISTRIBUTED PROCESSING Web services SQL DATABASE STORAGE

10 8 Wynyard Group Advanced Crime Analytics TECHNICAL OVERVIEW On-boarding and off-boarding Wynyard provides a structured and managed process to support the efficient on-boarding of new customers ensuring that the operational benefit is rapidly achieved. This process is supported by an agile requirements capture process to ensure that Advanced Crime Analytics (ACA) is deployed in a configuration to maximise the achievement of key operational drivers as defined by the customer. The off-boarding processes are equally structured to ensure that the customer has a responsive and efficient mechanism to securely terminate utilisation of ACA or transition to an alternative solution. Data backup Wynyard provides a range of standard and bespoke data backup options (including Disaster Recovery services where required) to provide a proven solution to protect the integrity and security of the data within ACA. Database backup services incorporate encryption services to ensure that the security model is maintained when data backups are undertaken. If required, additional CESG approved infrastructure solutions can provide disk level encryption services to supplement the ACA database security model. Real-time database replication can be used to facilitate low impact online backups and, optionally, as a method to provide geographic disaster recovery of the intelligence database. Data restoration / service migration Wynyard provides a range of data restoration and service migration services that can be bespoke to a customer s specific requirements based upon the scope and complexity of the project. Data restoration services will be scoped as part of the overall service definition, either as a standard service or bespoke for specific customer requirements for business continuity and disaster recovery. Wynyard offers a range of service migration services that can be bespoke to meet both on boarding and off boarding activities. These services include: Service Design; Requirements capture and analysis; Development; Project Management; Transition Management. Connectivity The ACA application architecture utilises industry standard network protocols and services to provide a secure but flexible deployment model. HTTP and HTTPS protocols are utilised providing a simple to deploy but secure model to support the required level of accreditation. The ACA client is browser based and utilises only the HTTP/HTTPS protocols, simplifying customer network access requirements. Data integration The ACA solution provides a flexible data integration model to support the integration and ingestion of a wide range of data sources and structures as outlined below. ACA utilises an XML/XSD based framework for the ingest process, simplifying the source data mapping activities. The ACA solution supports a broad range of data integration capabilities, including: Structured data. E.g. CSV, Excel, JSON, XML; Unstructured data. Raw textual data. E.g. MS Word, PDFs, web articles, , web blogs, reports etc; Semi-structured data. Raw textual data combined with structured data. E.g. , interview transcripts, case notes, government forms containing free text fields. Where infrastructure and security factors permit, Extract, Transform and Load (ETL) and Enterprise Service Bus (ESB) integrations can also be supported. Wynyard would welcome discussions for bespoke integration of such services. User interface ACA supports a range of commercial browser solutions to provide the client presentation layer, which includes Microsoft Internet Explorer, Google Chrome, Firefox, etc. The browser can be configured to both utilise the default HTTP configuration as well as fully supporting HTTPS connectivity to the business logic tier of ACA. Secure Socket Layers (SSL) can be configured to the required levels of encryption to provide transport layer security. The ACA client therefore only requires HTTP/HTTPS protocols to be supported within the transport layer of the network it is installed in which simplifies firewall configuration requirements and provides a robust and secure architecture. Scalability ACA provides an extensible and open architecture which allows for the scaling of the solution to meet customer requirements as their operational utilisation grows. The ACA architecture utilises COTS products which provides a value for money solution to support step changes in the scaling of the solution. Information assurance ACA can be deployed at IL2 and above to meet customer specific requirements.

11 Wynyard Group Advanced Crime Analytics 9 UNSTRUCTURED DATA STRUCTURED DATA DATA MAPPING EXTRACT TRANSFORM RESULTS LOADED XEREM MODEL

12 10 Wynyard Group Advanced Crime Analytics WORKING WITH US Led by our professional services team and built over 20 years working in tandem with our clients in government and financial services, Wynyard s robust and proven solution implementation process brings together leading industry experts, data scientists and software engineers to design, configure and deploy advanced software solutions. Our team is made up of professionals with real world experience of our customers environments. Many of our team members come from the financial services, consulting and law enforcement sectors with experience in investigations, analytics, operational risks and financial crime applications. Throughout the design and delivery phase Wynyard ensure our clients work with a team who have a deep domain understanding of their challenges. SOLUTION DESIGN Requirements gathering and security analysis Solution design, data mapping and integration SOLUTION CONFIGURATION Define scope Workflow, alerts and security Dashboards WYNYARD PLATFORM THREAT ASSESSMENT ADVANCED CRIME ANALYTICS INVESTIGATIVE CASE MANAGEMENT Solution pilot Soft data models Visualisation CHANGE MANAGEMENT PROJECT MANAGEMENT Infrastructure and operation Support IMPLEMENTATION, OPERATION & SUPPORT Install Migrate Test Train users Go live

13 JIM OAKES Director Financial Crime Wynyard Group Jim Oakes has been with Wynyard Group since 2013 as the Director of Financial Crime. A former Fraud Squad Detective, Jim is a Certified Fraud Examiner and Certified Financial Crimes Investigator. He is an invaluable industry expert and advisor for Wynyard and brings over 30 years experience in Fraud, Security and Anti-Money Laundering. Jim has deep operational experience having operated as Financial Crime Director with some of the world s largest banks in countries across Europe, the Middle East, Africa, North America, and Asia. As organised crime continues to take advantage of new technologies and develops ever increasingly complex techniques to commit financial crime, the need for advanced crime analytics has never been greater.

14 12 Wynyard Group Advanced Crime Analytics TRAINING Wynyard adopts a train-the-trainer approach with its customers and offers the following training packages for all products. These can be modified and tailored to suit individual customer requirements. Application Admin Training: Includes user setup and day-today administration of the software. Super User Training: Includes training in advanced product functionality aimed at frequent users of the software. Business User Training: This includes training for normal usage of the software. IT Training: This includes training around operational maintenance, backups, recovery, installation etc.

15 Wynyard Group Advanced Crime Analytics 13 TEAM COMPOSTITION Wynyard provides expert maintenance and support services throughout the lifecycle of engagement with the customer. Our Professional and Technical Services teams are spread across the globe and come from a range of backgrounds that equip them with in-depth industry knowledge and expertise. Some members of Wynyard s global professional services and support team: SOLUTIONS ARCHITECTS: Architectural design for Wynyard solutions to meet unique client specifications. Support regional Wynyard sales and services teams in pre-sales, solution design and solution implementation. Configuration of the Wynyard platform based on customer goals and preferences. Provides expertise to identify and translate system requirements into software design documentation. SOLUTIONS CONSULTANTS: Analysis and definition of customer requirements by conducting client requirements workshops, functional design documents and configuration of software solutions. Designing, testing and implementing Wynyard solutions tailored to the specific needs of clients. Overall solution delivery of Wynyard solutions. TECHNICAL SERVICES AND SUPPORT CONSULTANTS: Implementation of Wynyard products at client site and post-implementation support. Providing application configuration and maintenance of Wynyard systems. On-site customer interaction and product training. Administering and diagnosing technical issues. WYNYARD SUPPORT SERVICES HELP DESK Wynyard Technical Services & Support (TSS) team provides application support to our global client base. Wynyard s experienced TSS consultants are supported by mature process and tools to provide improved support service levels. Customers can subscribe for 2nd line or 3rd line support to improve response and resolution time for user issues. Users can raise issues directly on a web based portal as well access Wynyard TSS consultants on our manned service desk number during normal business hours. The service is subject to maintenance windows and planned downtimes. Wynyard will provide monthly report on SLA performance and conduct periodic performance review of the support engagement.

16 SERVICE COVERAGE The Maintenance and Support Services provided by Wynyard comprise of the following: Services Description Corrective Maintenance Software Updates Documentation Updates Help Desk Service Site Attendance Monthly Fault Report Critical Support Hours Fixes to specific software faults which may include new versions of a program, patches or fixes, remedial software or workarounds, Wynyard reserving the right at all times to determine what is included and excluded in any corrective maintenance release. Interim updates to the software that may contain enhancements and bug fixes. Periodic or interim updates to software documentation. Help desk services are operated through the 24/7 customer portal or via if the customer portal is unavailable; and is used for problem reporting, progressing resolution and general help. The attendance on site by a support consultant (at the client s cost) to assist in the provision of the maintenance and support services should it be deemed necessary by Wynyard. A monthly fault status report. 24 x 364 (excludes 25th of December). NORMAL SUPPORT HOURS All times based on the selected time zone: 08:00 18:00 Note: Category 1 faults are supported outside of normal support hours We also set categories of software faults, response times and action timetable for each category. The service levels relating to each category will be reviewed on an annual basis.

17 Wynyard Group Advanced Crime Analytics 15 ABOUT WYNYARD GROUP Know the threats, connect the dots & uncover the truth. Wynyard Group is a market leader in risk management and crime fighting software used in investigations and intelligence operations by government agencies and financial organisations. Wynyard solutions help solve and prevent crime, defend against advanced persistent cyber threats and counter terrorism. Wynyard s powerful software platform combines big data, advanced crime analytics and tradecraft to identify persons of interest, stop offenders and protect victims. Wynyard has more than 100,000 users of its solutions and offices in the United States, United Kingdom, Canada, United Arab Emirates, Australia and New Zealand. For more information visit Toronto Arlington, VA London Dubai Sydney Auckland Wellington Christchurch FEMALE TRAFFICKING Wynyard Group Trans-national organised PIRACY crime movements Office locations DRUGS Female trafficking Piracy MIGRANT SMUGGLING Drugs FIREARMS Migrant smuggling COUNTERFEIT GOODS Firearms Counterfeit goods CYBER CRIME Cyber crime Contact us wynyardgroup.com advisor@wynyardgroup.com

18 16 Wynyard Group Advanced Crime Analytics Wynyard Group Advanced Crime Analytics

WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME

WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME HELPING LAW ENFORCEMENT AGENCIES SOLVE CRIMES FASTER, WITH LOWER COSTS AND FEWER RESOURCES. 1 Wynyard Group Advanced Crime

More information

WYNYARD RISK MANAGEMENT POWERFUL SOFTWARE. CONNECTING THE DOTS.

WYNYARD RISK MANAGEMENT POWERFUL SOFTWARE. CONNECTING THE DOTS. WYNYARD RISK MANAGEMENT POWERFUL SOFTWARE. CONNECTING THE DOTS. 2 Wynyard Group Solutions for Financial Services Wynyard Group Solutions for Financial Services 3 KNOW THE THREATS CONNECT THE DOTS UNCOVER

More information

POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. KEY SOLUTION HIGHLIGHTS

POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. KEY SOLUTION HIGHLIGHTS ADVANCED CYBER THREAT ANALYTICS POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. Wynyard Advanced Cyber Threat Analytics (ACTA) is a Pro-active Cyber Forensics solution that helps protect organisations

More information

Audit Management. service definition document

Audit Management. service definition document Audit Management service definition document Contents Introduction... 3 Service Description... 3 Features and Benefits... 4 Architecture... 5 Service Delivery... 6 Service Provisioning Time... 7 Service

More information

Service Definition Document

Service Definition Document Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)

More information

WebFOCUS Cloud Express. The WebFOCUS Cloud Express service is delivered as a managed G-Cloud service by Amtex Solutions Ltd.

WebFOCUS Cloud Express. The WebFOCUS Cloud Express service is delivered as a managed G-Cloud service by Amtex Solutions Ltd. Service Definition The name of the Service is: WebFOCUS Cloud Express An overview of WebFOCUS Cloud Express The WebFOCUS Cloud Express service is delivered as a managed G-Cloud service by Amtex Solutions

More information

CAPABILITY STATEMENT LEGAL TECHNOLOGIES AND COMPUTER FORENSICS. www.controlrisks.com DECEMBER 2013

CAPABILITY STATEMENT LEGAL TECHNOLOGIES AND COMPUTER FORENSICS. www.controlrisks.com DECEMBER 2013 LEGAL TECHNOLOGIES AND COMPUTER FORENSICS DECEMBER 2013 Copyright Control Risks. All rights reserved. This document cannot be reproduced without the express written permission of Control Risks. Any reproduction

More information

PAAS Public Sector Managed Services

PAAS Public Sector Managed Services Meritec Limited Meritec House, Acorn Business Park, Skipton, North Yorkshire, BD23 2UE 0845 3451155 servicepoint@meritec.co.uk www.meritec.co.uk Registered In England & Wales No. 3224622 Table of Contents

More information

OPERATIONAL RISK MANAGEMENT & MODELLING FROM WYNYARD GROUP & EVMTECH

OPERATIONAL RISK MANAGEMENT & MODELLING FROM WYNYARD GROUP & EVMTECH WYNYARDGROUP.COM OPERATIONAL RISK MANAGEMENT & MODELLING FROM WYNYARD GROUP & EVMTECH Wynyard Group and EVMTech s combined solution provides an end-to-end risk management process that enables organisations

More information

Physical Security Services

Physical Security Services Physical Security Services The ANVIL Group Physical Security Services The ANVIL Group is an internationally renowned and accredited security company specialising in Crisis Avoidance. Established in 1988,

More information

EmpLive Technical Overview

EmpLive Technical Overview Version 1.6 Updated 27/08/2015 Support: +61 2 8399 1688 Email: support@wfsaustralia.com Website: wfsaustralia.com Legal Notice Copyright WFS: A WorkForce Software Company. All Rights Reserved. By receiving

More information

Agilisys G-Cloud Service V

Agilisys G-Cloud Service V Agilisys G-Cloud Service V Service Definition Endpoint Management Lot 1 Infrastructure as a Service (IaaS) April 2014 At Agilisys we deliver success through innovation working with our clients to transform

More information

SERVICE DEFINITION G-CLOUD 7 SECURE FILE TRANSFER DIODE. Classification: Open

SERVICE DEFINITION G-CLOUD 7 SECURE FILE TRANSFER DIODE. Classification: Open SERVICE DEFINITION G-CLOUD 7 SECURE FILE TRANSFER DIODE Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this

More information

INTELLIGENCE. RISK MITIGATION. RESPONSE. CONSULTANCY.

INTELLIGENCE. RISK MITIGATION. RESPONSE. CONSULTANCY. INTELLIGENCE. RISK MITIGATION. RESPONSE. CONSULTANCY. 23 Grafton Street London W1S 4EY UK Main Tel: +44 (0) 207 887 2699 ABOUT PGI PGI is a privately owned UK business offering integrated, intelligence-led

More information

Caretower s SIEM Managed Security Services

Caretower s SIEM Managed Security Services Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During

More information

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with

More information

Informed Solutions InformedINSIGHT Big Data G-Cloud5 Service Definition

Informed Solutions InformedINSIGHT Big Data G-Cloud5 Service Definition Informed Solutions InformedINSIGHT Big Data V1.0.0 **PROTECT COMMERCIAL** London 11 Old Queen Street, Westminster, London, SW1H 9JA, UK Tel: +44(0)20 3042 2000 Fax: +44(0)20 3042 2015 www.informed.com

More information

G-Cloud Service Definition. Atos Accredited Oracle Business Intelligence Solutions SCS

G-Cloud Service Definition. Atos Accredited Oracle Business Intelligence Solutions SCS G-Cloud Service Definition Atos Accredited Oracle Business Intelligence Solutions SCS Atos Accredited Oracle Business Intelligence Solutions SCS Robust, scalable Cloud computing and consumption-based reporting

More information

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking

More information

Service Definition MMaaS Mobile Device Management. G- Cloud VII. Service Definition Nine23 MMaaS Mobile Device Management

Service Definition MMaaS Mobile Device Management. G- Cloud VII. Service Definition Nine23 MMaaS Mobile Device Management Service Definition MMaaS Mobile Device Management G- Cloud VII 1 Table of Contents 1 SERVICE MMAAS MOBILE DEVICE MANAGEMENT... 3 1.1 OVERVIEW NINE23... 3 1.2 SERVICE SUMMARY MMAAS MOBILE DEVICE MANAGEMENT...

More information

Amazon Relational Database Service (RDS)

Amazon Relational Database Service (RDS) Amazon Relational Database Service (RDS) G-Cloud Service 1 1.An overview of the G-Cloud Service Arcus Global are approved to sell to the UK Public Sector as official Amazon Web Services resellers. Amazon

More information

Service Definition Nine23 MDM

Service Definition Nine23 MDM Service Definition Nine23 MDM G-Cloud iv Contents 1 Service Nine23 Mobile Device Management System.....4 1.1 Overview Nine23 MDM...... 4 1.2 Open Standards. 5 1.3 User requirements.....5 1.3.1 Client Browser....5

More information

Digital Forensics G-Cloud Service Definition

Digital Forensics G-Cloud Service Definition Digital Forensics G-Cloud Service Definition 2013 General Dynamics Information Technology Limited. All rights 1 GDIT Team Clients Metropolitan Police Service The General Dynamics Information Technology

More information

How To Create An Insight Analysis For Cyber Security

How To Create An Insight Analysis For Cyber Security IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics

More information

Lot 1 Service Specification MANAGED SECURITY SERVICES

Lot 1 Service Specification MANAGED SECURITY SERVICES Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services

More information

AUSTRAC. supervision strategy 2012 14

AUSTRAC. supervision strategy 2012 14 AUSTRAC supervision strategy 2012 14 Commonwealth of Australia 2012 This work is copyright. You may download, display, print and reproduce this material in unaltered form only (retaining this notice) for

More information

G-CLOUD FRAMEWORK SERVICE DEFINITION. Kofax Model Office Bundle Proposal ISSUE 1

G-CLOUD FRAMEWORK SERVICE DEFINITION. Kofax Model Office Bundle Proposal ISSUE 1 G-CLOUD FRAMEWORK SERVICE DEFINITION Kofax Model Office Bundle Proposal ISSUE 1 Sept 2013 Table of Contents 1 SERVICE OVERVIEW & SOLUTION... 2 2 INFORMATION ASSURANCE... 3 3 BACKUP/RESTORE AND DISASTER

More information

Protecting Malaysia in the Connected world

Protecting Malaysia in the Connected world Protecting Malaysia in the Connected world cyber Security Company of the Year (Cybersecurity Malaysia, 2014) Most innovative information security company in Malaysia (Cybersecurity Malaysia, 2012) BAE

More information

<cloud> Secure Hosting Services

<cloud> Secure Hosting Services Global Resources... Local Knowledge Figtree offers the functionality of Figtree Systems Software without the upfront infrastructure investment. It is the preferred deployment solution for organisations

More information

IBM G-Cloud Microsoft Windows Active Directory as a Service

IBM G-Cloud Microsoft Windows Active Directory as a Service IBM G-Cloud Microsoft Windows Active Directory as a Service Service Definition IBM G-Cloud Windows AD as a Service 1 1. Summary 1.1 Service Description This offering is provided by IBM Global Business

More information

Making critical connections: predictive analytics in government

Making critical connections: predictive analytics in government Making critical connections: predictive analytics in government Improve strategic and tactical decision-making Highlights: Support data-driven decisions using IBM SPSS Modeler Reduce fraud, waste and abuse

More information

Virtual Server Hosting Service Definition. SD021 v1.8 Issue Date 20 December 10

Virtual Server Hosting Service Definition. SD021 v1.8 Issue Date 20 December 10 Virtual Server Hosting Service Definition SD021 v1.8 Issue Date 20 December 10 10 Service Overview Virtual Server Hosting is InTechnology s hosted managed service for virtual servers. Our virtualisation

More information

IBM QRadar as a Service

IBM QRadar as a Service Government Efficiency through Innovative Reform IBM QRadar as a Service Service Definition Copyright IBM Corporation 2014 Table of Contents IBM Cloud Overview... 2 IBM/Sentinel PaaS... 2 QRadar... 2 Major

More information

ACEYUS REPORTING. Aceyus Intelligence Executive Summary

ACEYUS REPORTING. Aceyus Intelligence Executive Summary ACEYUS REPORTING Aceyus Intelligence Executive Summary Aceyus, Inc. June 2015 1 ACEYUS REPORTING ACEYUS INTELLIGENCE EXECUTIVE SUMMARY Aceyus Intelligence is a suite of products for optimizing contact

More information

Cloud Vendor Evaluation

Cloud Vendor Evaluation Cloud Vendor Evaluation Checklist Life Sciences in the Cloud Cloud Vendor Evaluation Checklist What to evaluate when choosing a cloud vendor in Life Sciences Cloud computing is radically changing business

More information

HNOLOGY IN POLICING SECURITY & CYBERSPACE SITUATION

HNOLOGY IN POLICING SECURITY & CYBERSPACE SITUATION S e c u r i t y & D e f e n c e Bringing The Digital Edge To Your Operations ITY & CYBERSPACE SITUATIONAL AWARENESS CRITICAL COM S CRITICAL COMMUNICATIONS TECHNOLOGY IN POLICING SE ITUATIONAL AWARENESS

More information

CASSIDIAN CYBERSECURITY

CASSIDIAN CYBERSECURITY CASSIDIAN CYBERSECURITY ADVANCED PERSISTENT THREAT (APT) SERVICE In a world where cyber threats are emerging daily, often from unknown sources, information security is something no organisation can afford

More information

Piecing Digital Evidence Together. Service Information

Piecing Digital Evidence Together. Service Information Piecing Digital Evidence Together Service Information Services Overview Mobile and Tablet Forensics Mobile Phone Forensics is the legally tested and approved systematic examination of mobile phones, SIM

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

GPS G-Cloud Lot 4: Oracle Business Intelligence Cloud Consultancy Service Definition

GPS G-Cloud Lot 4: Oracle Business Intelligence Cloud Consultancy Service Definition GPS G-Cloud Lot 4: Contents 1 Introduction... 3 2 Service... 4 2.1 Cloud Consultancy Overview... 4 2.2 Information assurance... 5 2.3 Backup/Restore and Disaster Recovery... 6 2.4 On-boarding and Off-boarding...

More information

<workers> Online Claims and Injury Management

<workers> Online Claims and Injury Management Global Resources... Local Knowledge With over 30 years experience in workers compensation, our claims management systems have been adopted by Self-Insured Organisations, Third Party Administrators and

More information

Assuria from ZeroDayLab

Assuria from ZeroDayLab Passionate about Total Security Management Assuria from ZeroDayLab Forensic Log Management SIM/SIEM2 As one of Europe s leading IT Security Consulting companies, ZeroDayLab has been carrying out Security

More information

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle

More information

Market Data + Services. Advanced outsourcing solutions. IT Hosting and Managed Services

Market Data + Services. Advanced outsourcing solutions. IT Hosting and Managed Services Market Data + Services Advanced outsourcing solutions IT Hosting and Managed Services Table of Contents 3 Table of Contents Introduction Market Data + Services powers the financial community with a range

More information

Simplify Your Network Security with All-In-One Unified Threat Management

Simplify Your Network Security with All-In-One Unified Threat Management Singtel Business Product Factsheet Brochure Managed Defense Unified Services Management Simplify Your Network Security with All-In-One Unified Management Singtel Managed Unified Management (UTM) Services,

More information

Third Party Approval & Risk Management

Third Party Approval & Risk Management Third Party Approval & Risk Management Rivo Software Solution Layer enables organizations to manage the third party approval process, identify and assess third party risk across vendors, contractors and

More information

Cloud Technology Platform Enables Leading HR and Payroll Services Provider To Meet Solution Objectives

Cloud Technology Platform Enables Leading HR and Payroll Services Provider To Meet Solution Objectives Greytip Online Cloud based HR & Payroll software Cloud Technology Platform Enables Leading 16 Snapshot Client Profile A global HR & Payroll outsourcing company. The company is in the business of delivering

More information

Private Cloud. One solution managed by Applied

Private Cloud. One solution managed by Applied Private Cloud : : C L O U D S E R V I C E S : : One solution managed by Applied THE CLOUD IS NO LONGER AN IT CONSIDERATION ALONE IT IS FUNDAMENTALLY CHANGING THE WAY EXECUTIVES ACROSS DEPARTMENTS VIEW

More information

CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES

CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES PROTECTIVE MONITORING SERVICE In a world where cyber threats are emerging daily, often from unknown sources, information security is something

More information

Customer Guide Helpdesk & Product Support. [Customer Name] www.four.co.uk Page 1 of 13

Customer Guide Helpdesk & Product Support. [Customer Name] www.four.co.uk Page 1 of 13 Customer Guide Helpdesk & Product Support [Customer Name] www.four.co.uk Page 1 of 13 Table of Contents HELP DESK AND PRODUCT SUPPORT SUMMARY... 3 1 FOUR HELP DESK STRUCTURE AND CALL ESCALATION... 6 2

More information

EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST

EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST Enabling user efficiency with a cloud-based email platform With productivity, revenues and reputation at stake, an

More information

Meeting FFIEC Guidance and Cutting Costs with Automated Fraud Prevention. White Paper

Meeting FFIEC Guidance and Cutting Costs with Automated Fraud Prevention. White Paper Meeting FFIEC Guidance and Cutting Costs with Automated Fraud Prevention White Paper Table of Contents Executive Summary 3 Key Requirements for Effective and Sustainable Online Banking Fraud Prevention

More information

Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan

Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan The Truth about Data Loss Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan RSA Data Loss Prevention Data Breaches Overview RSA DLP Solution Five Critical Factors

More information

Platform as a Service

Platform as a Service Platform as a Service Service Definition Version: 1.0 Version date: October 2015 Classification: Public Backup-as-a-Service Systems Monitoring DR-as-a-Service Storage-as-a-Service Hosted Exchange Colocation

More information

www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse Finland Who are we? Bring a robust forensics team to the table to support your organisation Our practice can

More information

<risk> Enterprise Risk Management

<risk> Enterprise Risk Management Global Resources... Local Knowledge is vital in supporting business continuity across diverse and challenging environments and operating models. By consolidating risk management activities into a single,

More information

Making Critical Connections: Predictive Analytics in Government

Making Critical Connections: Predictive Analytics in Government Making Critical Connections: Predictive Analytics in Improve strategic and tactical decision-making Highlights: Support data-driven decisions. Reduce fraud, waste and abuse. Allocate resources more effectively.

More information

How To Protect Your Network From Attack From A Network Security Threat

How To Protect Your Network From Attack From A Network Security Threat Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your

More information

Unicenter Asset Intelligence r11

Unicenter Asset Intelligence r11 Unicenter Asset Intelligence r11 Key Features at a Glance Comprehensive Out of the Box Business Relevant Answers Complete and Accurate IT Asset Information Real-Time Analysis Risk Alerting Compliance Utilization

More information

The Six Critical Considerations of Social Media Threat Intelligence

The Six Critical Considerations of Social Media Threat Intelligence The Six Critical Considerations of Social Media Threat Intelligence Every day, angry rhetoric and hints of potential danger flow though streams of social media data. Some of these threats may affect your

More information

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Facilitate policy-based expertise and

More information

Xerox Workflow Automation Services Solutions Brochure. Xerox DocuShare 7.0. Enterprise content management for every organization.

Xerox Workflow Automation Services Solutions Brochure. Xerox DocuShare 7.0. Enterprise content management for every organization. Xerox Workflow Automation Services Solutions Brochure Xerox DocuShare 7.0 Enterprise content management for every organization. Office Work Can Work Better Despite huge advances in the technology and tools

More information

United Nations Office on Drugs and Crime

United Nations Office on Drugs and Crime UNODC contribution to combat Crime A UNODC contribution to combat CRIME A A product of the Information Technology Service Nations Office on Drugs and Crime United Nations Office on Drugs and Crime United

More information

SILOBREAKER ENTERPRISE SOFTWARE SUITE

SILOBREAKER ENTERPRISE SOFTWARE SUITE INSIGHT AS A SERVICE SILOBREAKER ENTERPRISE SOFTWARE SUITE Fully customizable behind your firewall! Silobreaker Enterprise Software Suite is Silobreaker s flagship product. It is ideal for organizations

More information

Marval Software Limited. G Cloud iii Framework Service Definition

Marval Software Limited. G Cloud iii Framework Service Definition 1 Marval Software Limited G Cloud iii Framework Service Definition Page 1 of 9 2 Contents An overview of the Marval Service Management (MSM) Software Solution... 3 Information assurance Impact Level (IL)

More information

How To Use Concerto.Com

How To Use Concerto.Com ASSET AND FACILITIES integrated software solutions 01 EXECUTIVE SUMMARY SOLUTION OVERVIEW Concerto provides a secure, web based, property asset management suite of software incorporating comprehensive

More information

KNOW YOUR THIRD PARTY

KNOW YOUR THIRD PARTY Thomson Reuters KNOW YOUR THIRD PARTY EXECUTIVE SUMMARY The drive to improve profitability and streamline operations motivates many organizations to collaborate with other businesses, increase outsourcing

More information

Specific recommendations

Specific recommendations Background OpenSSL is an open source project which provides a Secure Socket Layer (SSL) V2/V3 and Transport Layer Security (TLS) V1 implementation along with a general purpose cryptographic library. It

More information

Impact Level HootSuite does not yet have an Impact Level accreditation, however if we were to apply we believe we would be at the IL3 level.

Impact Level HootSuite does not yet have an Impact Level accreditation, however if we were to apply we believe we would be at the IL3 level. Overview G Cloud 4: Service Definition HootSuite is a social media monitoring and listening platform for businesses and organisations to collaboratively execute social media strategies across multiple

More information

Symantec ediscovery Platform, powered by Clearwell

Symantec ediscovery Platform, powered by Clearwell Symantec ediscovery Platform, powered by Clearwell Data Sheet: Archiving and ediscovery The brings transparency and control to the electronic discovery process. From collection to production, our workflow

More information

Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...

Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)... CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...

More information

Company Overview. Enterprise Cloud Solutions

Company Overview. Enterprise Cloud Solutions 2016 Company Overview Enterprise Cloud Solutions ENTERPRISE CLOUD SOLUTIONS Unitas Global utilizes leading cloud technologies to optimize enterprise IT environments. By designing, deploying, and managing

More information

Microsoft IT Increases Security and Streamlines Antimalware Management by Using Microsoft Forefront Endpoint. Protection 2010.

Microsoft IT Increases Security and Streamlines Antimalware Management by Using Microsoft Forefront Endpoint. Protection 2010. Situation Microsoft IT had limited monitoring and reporting functionality with its existing antimalware system. Although the system could scan for malware, there was no reporting capability or configurable

More information

Firewall Administration and Management

Firewall Administration and Management Firewall Administration and Management Preventing unauthorised access and costly breaches G-Cloud 5 Service Definition CONTENTS Overview of Service... 2 Protects Systems and data... 2 Optimise firewall

More information

GPG13 Protective Monitoring. Service Definition

GPG13 Protective Monitoring. Service Definition GPG13 Protective Monitoring Service Definition Issue Number V1.3 Document Date 27 November 2014 Author: D.M.Woodcock Classification UNCLASSIFIED Version G-Cloud 6 2014 Copyright Assuria Limited. All rights

More information

Hosted SharePoint: Questions every provider should answer

Hosted SharePoint: Questions every provider should answer Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money

More information

The SIEM Evaluator s Guide

The SIEM Evaluator s Guide Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,

More information

Cloud Store Product Definition Web Server as a Service

Cloud Store Product Definition Web Server as a Service Cloud Store Product Definition Web Server as a Service March 2014 Contact Information Your primary point of contact in relation to this document is: Name Andy Dunn Head of New Business Address Broadgate

More information

AVANTGARD Hosting and Managed Services

AVANTGARD Hosting and Managed Services AVANTGARD Hosting and Managed Services AVANTGARD HOSTING AND MANAGED SERVICES SunGard meets its customers diverse set of requirements by not only bringing to market scalable, flexible, and industry leading

More information

The Education Fellowship Finance Centralisation IT Security Strategy

The Education Fellowship Finance Centralisation IT Security Strategy The Education Fellowship Finance Centralisation IT Security Strategy Introduction This strategy outlines the security systems in place to optimise, manage and protect The Education Fellowship data and

More information

Citrix XenApp Design & Implementation Service

Citrix XenApp Design & Implementation Service Citrix XenApp Design & Implementation Service G-Cloud 7 November 2015 Citrix XenApp Design and Implementation Service Service Overview RealServe IT s XenApp Design and Implementation Service aims to analyse

More information

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations

More information

Cyber Security Metrics Dashboards & Analytics

Cyber Security Metrics Dashboards & Analytics Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics

More information

Defending against modern cyber threats

Defending against modern cyber threats Defending against modern cyber threats Protecting Critical Assets October 2011 Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Agenda 1. The seriousness of today s situation

More information

First Line of Defense

First Line of Defense First Line of Defense SecureWatch ANALYTICS FIRST LINE OF DEFENSE OVERVIEW KEY BENEFITS Comprehensive Visibility Powerful web-based security analytics portal with easy-to-read security dashboards Proactive

More information

Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration

Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration Websense Data Security Suite and Cyber-Ark Inter-Business Vault The Power of Integration Websense Data Security Suite Websense Data Security Suite is a leading solution to prevent information leaks; be

More information

First Pacific Islands Capacity Building Workshop on Child Online Protection

First Pacific Islands Capacity Building Workshop on Child Online Protection First Pacific Islands Capacity Building Workshop on Child Online Protection Extracting Intelligence to Turn the Tables on Child Abuse Material Traffickers. Dr Allan Watt Centre for Policing, Intelligence

More information

Execview Corporate Performance Management

Execview Corporate Performance Management EXECVIEW for G-Cloud Framework Users Execview Corporate Performance Management Service Definition for G-Cloud iii G-Cloud ITT Service Definition overview (This section of our response is intended to provide

More information

REDCENTRIC MANAGED ARCHIVE SERVICE SERVICE DEFINITION

REDCENTRIC MANAGED ARCHIVE SERVICE SERVICE DEFINITION REDCENTRIC MANAGED ARCHIVE SERVICE SERVICE DEFINITION SD005 V2.0 Issue Date 02 July 2014 1) SERVICE OVERVIEW Redcentric's Managed Archive Service allows customers to regain control of their Microsoft Exchange

More information

Case Management powered by Microsoft Dynamics CRM

Case Management powered by Microsoft Dynamics CRM - From case capture to resolution powered by Microsoft Dynamics CRM CasePoint is a Solution that combines the best of the Microsoft Dynamics CRM with purpose-built functionality to deliver complete case

More information

Riverbed SteelCentral. Product Family Brochure

Riverbed SteelCentral. Product Family Brochure Riverbed SteelCentral Product Family Brochure Application performance from the perspective that matters most: Yours Applications are now the center of the business world. We rely on them to reach customers,

More information

SharePoint Microsoft SharePoint has become

SharePoint Microsoft SharePoint has become The Essential Guide to SharePoint S p o n s o r e d b y Microsoft SharePoint has become a mission-critical platform for sharing information and delivering improved collaboration to organizations of all

More information

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004 A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:

More information

Amazon Compute - EC2 and Related Services

Amazon Compute - EC2 and Related Services Amazon Compute - EC2 and Related Services G-Cloud Service 1 1.An overview of the G-Cloud Service Arcus Global are approved to sell to the UK Public Sector as official Amazon Web Services resellers. Amazon

More information

How To Protect Yourself Online

How To Protect Yourself Online NetBank security guide Commonwealth Bank Personal 1 Contents Page 4 5 5 5 7 7 9 9 9 11 12 12 13 13 13 14 14 14 16 16 16 17 18 18 19 19 20 21 Section Peace of mind with NetBank What are the common online

More information

e2e Secure Cloud Connect Service - Service Definition Document

e2e Secure Cloud Connect Service - Service Definition Document e2e Secure Cloud Connect Service - Service Definition Document Overview A cloud connectivity service that connects users, devices, offices and clouds together over the Internet. Organisations can choose

More information

Office SharePoint Server 2007

Office SharePoint Server 2007 Top 10 Benefits of WSS 3.0 Office SharePoint Server 2007 1. Improve team productivity with easy-to-use collaborative tools Connect people with the information and resources they need. Users can create

More information

Use of Exchange Mail and Diary Service Code of Practice

Use of Exchange Mail and Diary Service Code of Practice Use of Exchange Mail and Diary Service Code of Practice Introduction This code of practice outlines the support mechanisms in place for the security of the Exchange mail and diary service. References are

More information

Operationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment

Operationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment Microsoft IT Systems Strategy DATACENTER APPLICATIONS Process-Led, Model-Driven Unified and Virtualized USER-CENTRICITY ServiceEnabled Basic Standardize d Rationalized Dynamic Cost center Efficient cost

More information