WYNYARD GROUP ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE. CONNECTING THE DOTS.
|
|
- Rodger Flynn
- 8 years ago
- Views:
Transcription
1 WYNYARD GROUP ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE. CONNECTING THE DOTS.
2
3 Wynyard Group Advanced Crime Analytics 1 POWERFUL SOFTWARE. CONNECTING THE DOTS. Government and financial institutions face challenges that continue to grow in scale, complexity and impact. These challenges include: Growth in the volume and sophistication of crime which includes violent offences, cybercrime, internal and external fraud, as well as money laundering, drug trafficking and other serious crimes. Managing exponential increases in data volumes that may be stored in disparate, siloed systems and the challenge of creating value from that information in order to address the threats of crime. Time and resource pressures, and highly organised criminal networks. At Wynyard Group, we understand these challenges and have been helping government and financial institutions globally to solve them. Wynyard s software enables its clients to gain a better understanding of the criminal environment as well as overcome issues of data silos, duplicate or conflicting data and share information securely for more effective outcomes. ADVANCED CRIME ANALYTICS RISK MANAGEMENT INVESTIGATIVE CASE MANAGEMENT Wynyard Group is a market leader in advanced crime analytics, risk management and investigative case management software. Built on a highly configurable platform, Wynyard s software can be deployed to meet a range of needs. Our team works with clients to design and configure solutions for their individual requirements. Wynyard s offerings include: DIGITAL FORENSICS Digital evidence investigator ADVANCED CRIME ANALYTICS Fraud analytics Anti-money laundering/counter-terrorism financing (AML/CTF) Serious and organised crime analytics Mobile device analytics Person of interest analytics Gun crime analytics INVESTIGATIVE CASE MANAGEMENT Financial crime investigations Breach and incident management Covert operations
4 2 Wynyard Group Advanced Crime Analytics ADVANCED CRIME ANALYTICS Wynyard s advanced crime analytics is a powerful software platform enabling the automatic identification of threats, vulnerabilities and connections within the ever-increasing amount of information available. Configured to meet specific needs and challenges of government and financial services agencies, Wynyard s advanced crime analytics software is used around the world to help in the fight against serious and organised crime, human trafficking, gun running, drug smuggling, fraud, anti-money laundering and counter terrorist financing. Advanced crime analytics helps by: Utilising operational and specialist resources more effectively Addressing the exponential increase in data Connecting complex and disparate data sets for a comprehensive view and better analysis Enhancing inter-agency co-operation Increasing efficiency by getting users to the answers faster Visualise and discover the relationships between entities in order to identify suspicious activities and determine causes Key features: Flexible rules management and transaction monitoring Rules can be created or modified at any time as information becomes clearer, business models evolve, new processes are introduced or regulations change. Context aware visualisation Uncover, visualise and analyse data and relationships or patterns that may otherwise remain hidden. Text mining Text mining aims to obtain valuable insights from large amounts of unstructured text. The software can automatically extract and classify entities and then connect and link these to other known entities to provide a comprehensive view of the data. Open source intelligence ingestion Open source intelligence (OSINT) including social media and news feeds can be used throughout Wynyard s solutions as a data source for intelligence gathering and network analysis purposes.
5 Wynyard Group Advanced Crime Analytics 3 Watchlists and screening Wynyard s system is fully integrated with world-leading watchlists from Dow Jones Risk and Compliance to provide complete and up-to-date data when screening people to identify politically exposed persons (PEPs) and their relatives or close associates (RCAs), special interest persons or entities (SIPs/SIEs) government sanctioned entities, and high-profile criminals. Powerful search and queries The Wynyard platform contains a high-performance, full-featured text search engine. It delivers ranked search results and supports many powerful query types including phrase queries, wildcard queries, fuzzy queries, proximity queries, and range queries. Highly configurable solutions Wynyard s advanced crime analytics platform is scalable both in terms of users and data volume and can be deployed agency wide and configured to address all analysis requirements. Alternatively it can be installed within a department or team to address a specific operational challenge. Wynyard advanced crime analytics for government provides capabilities such as: Mobile device analytics Gun crime analytics Serious and organised crime analytics Person of interest analytics Mobile device analytics Gun crime analytics Serious and organised crime analytics Wynyard advanced crime analytics for financial services provides capabilities such as: Fraud analytics to detect cross-channel or internal fraud, or anomalous fraudulent behaviours. It is designed specifically for insurers, banks and credit unions to aid in the rapid detection and prevention of fraud, to reduce the risk of loss and to increase the effective management of fraud across the organisation. Allowing organisations to build on traditional anti-money laundering/counter-terrorism financing detection, alerts and reporting, adding rules, analytics and visualisation capabilities. It allows risk mitigation by rapidly delivering enhanced due diligence integrated with industry-leading watchlists. ANALYSE DATA Identify: Linked incidents, entities, crime networks and locations PRODUCE EVIDENCE Prepare: Case graphics/timelines, link charts, evidence report INVESTIGATION APPLY ADVANCED CRIME ANALYTICS INTELLIGENCE-LED INVESTIGATIONS CASE REPORT PROSECUTE INCIDENT CASE
6 4 Wynyard Group Advanced Crime Analytics INVESTIGATIVE CASE MANAGEMENT Wynyard investigative case management is a comprehensive, highly configurable, secure, solution for managing investigations. Wynyard s software incorporates intelligence-led case management techniques and provides the tools for investigators to identify and act on critical information faster. Investigation teams and specialist departments face rising pressure to efficiently and effectively manage investigations and cases supporting at-risk individuals. Providing a 360 degree view of the case Wynyard s solution integrates reports, charts, evidence packs and data analysis capability streamlining investigations and enabling investigators to identify opportunities for both independent overt and covert activity, whilst simultaneously building the case file using standardised categories. Investigative Case Management helps by: Enhancing analysis and providing access to data in real time Enabling more effective and efficient case management Delivery of a granular security model designed to meet the highest security and privacy standards Integrating case management data with wider intelligence holdings Providing a complete view of the case Tracking of user s access and activity with comprehensive audit functionality Key features Complete Configurability Meet your specific requirements without incurring extra costs by configuring the solution in house. Intuitive Visualisation See a complete picture of the case by visualising all the key entities, relationships and events involved. Full Auditability Keep track of every user s access and activity with comprehensive audit functionality. Connect Intelligence and Investigations data together Combine case data with wider intelligence holdings by importing and exporting data into advanced crime analytics for more in depth analysis.
7 Wynyard Group Advanced Crime Analytics 5 Highly configurable solutions Wynyard s Investigative Case Management enables you to tailor the software to meet specific operational requirements for managing investigations, witness protection programmes, the protection of other at-risk individuals and any other type of operation. The solution can be deployed organisation wide to support all of your investigation and case management requirements or alternatively it can be deployed within a department or team to address a specific operational challenge. Wynyard s serious and organised crime case management software is purpose built to manage tasks, evidence and cases. Wynyard s software is highly secure and can be configured to support business processes to reduce manual processes and the duplication of effort. This enables investigative teams to work more efficiently. The integration of crime analytics enables intelligenceled operations so users can identify patterns, anomalies and relationships. Information is rapidly made available to frontline agents to solve serious crimes faster and disrupt organised criminal networks. The granular security model is a core component of the system and limits access to information based upon the case and the user s permissions. Witness protection case management is a secure, robust and configurable solution for managing the protection of victims, witnesses and associated people. This solution is purpose built for law enforcement agencies and designed to protect the integrity of investigations through effective action plan management and secure communication and collaboration. Wynyard s software has a comprehensive security model that is designed to isolate information with layered mechanisms in place to counter unauthorised access. Covert operations case management is a scalable, highly configurable, secure and comprehensive solution for covert operations. Wynyard s software is purpose built to protect all details of covert operations: the software has a proven and granular security model that is designed to isolate information; a series of layered defences limits the ability for users to access data; and an alert and audit system provides an additional layer to counter attempted or unauthorised access. All data, information, evidence and exhibits may be loaded into a single repository so that investigators and analysts can rapidly understand complex relationships and extract more value out of their information, which in turn reduces the time required to achieve operational benefits. EMPLOYEE INTERVIEWS BANKING RECORDS OPEN SOURCE INTELLIGENCE CCTV EMPLOYEE RECORDS S INCIDENT FILE OPENED INVESTIGATIVE CASE MANAGMENT REPORT AUTHORITIES NOTIFIED SUBSIDIARY COMPANIES ADVANCED CRIME ANALYTICS OTHER DEPARTMENTS OTHER INCIDENTS
8 6 Wynyard Group Advanced Crime Analytics DIGITAL EVIDENCE INVESTIGATOR Wynyard s digital evidence investigator software is a proven, purpose-built tool for investigators enabling rapid access and examination of digital evidence. The exponential growth in the number of devices seized as part of an investigation including CCTV footage, laptops, servers, mobile phones, game consoles and GPS units means that law enforcement agencies need to interrogate and analyse the content more efficiently. Wynyard s software enables frontline personnel to quickly identify which device or piece of information is relevant to the case. This reduces the need for extended custody periods and speeds up the judicial process. By allowing rapid access to digital content for investigative teams, Wynyard s solution allows evidence from the device to be introduced into the investigation at an early stage in the process and while the suspect is still in custody. Digital evidence investigator helps by: Providing rapid access to digital evidence for detectives and investigators Improving speed through the justice system Reducing forensic backlogs by managing the exponential growth in digital devices Delivering savings in financial and human resource by removing the reliance on specialist staff Key features: Analyse internet activity Utilising internet evidence finder inside the software enables a quick drill-down to analyse internet activity like Skype, Google searches, WhatsApp messages and many other communication methods. Automatic processing The processing engine can identify objectionable material such as images, videos and s and then connect to external databases including INTERPOL, C4All, CETS and ANVIL for victim identification and rescue. Designed for investigators and detectives Keeps the investigation moving by enabling investigators familiar with the case to quickly produce actionable intelligence and evidential reports for prosecution. Integrate with advanced analytics Discover the relationships between acquired digital evidence and wider intelligence holdings by analysing the data and intuitively visualising the connections and networks.
9 Wynyard Group Advanced Crime Analytics 7 Design principles Reduce complexity Sequential processing model Simplified platform solution with commodity hardware Hardware-agnostic Increased performance Distributed and multi-threaded processing model enabling decreased time-to-completion of a single exhibit, or total processing throughput across all exhibits, or a combination of both Faster file I/O Enhanced operational impact Apple Mac O/S support C4ALL and local Image Hash database integration Enhance bookmarking and evidence tagging XRY and Cellebrite support Internet Evidence Finder (IEF) integration Increased forensic container support Terminology DEI implements the concepts of Cases, Exhibits and Media. A Case is a logical grouping of Exhibits and is identified using a case number. Another reference number (Operation name or other) can be attributed to a Case. An Exhibit is a logical grouping of Media and is identified using an exhibit number and a description. An exhibit is generally a computer, or other container that contains media. In the case of a piece of media that doesn t have a container object (e.g.; a hard drive, or USB stick found on a desk), then the exhibit and media are the same item. Media is a device or object that can contain electronic data. It typically represents hard disks, optical or other removable media. DEI functional areas Digital Evidence Investigator has a modern, adaptable and scalable architecture. The main functional areas are: The back-end (application tier), which contains the file processing agents. A front-end (client tier) browser based application used by investigators to serach, examine and bookmark the digital evidence. The third functional area is administration and security. These components provide full auditing and authorisation including the ability to manage users, cases, exhibits and security policy requirements. The software has removed an month backlog. Our digital forensic specialists can now focus on more complex and high profile cases. Maarten Kleintjes MNZM, Manager National e-crime Group (Ret.) - NZ Police DEI SERVER NETWORK USER NETWORK DISTRIBUTED PROCESSING Web services SQL DATABASE STORAGE
10 8 Wynyard Group Advanced Crime Analytics TECHNICAL OVERVIEW On-boarding and off-boarding Wynyard provides a structured and managed process to support the efficient on-boarding of new customers ensuring that the operational benefit is rapidly achieved. This process is supported by an agile requirements capture process to ensure that Advanced Crime Analytics (ACA) is deployed in a configuration to maximise the achievement of key operational drivers as defined by the customer. The off-boarding processes are equally structured to ensure that the customer has a responsive and efficient mechanism to securely terminate utilisation of ACA or transition to an alternative solution. Data backup Wynyard provides a range of standard and bespoke data backup options (including Disaster Recovery services where required) to provide a proven solution to protect the integrity and security of the data within ACA. Database backup services incorporate encryption services to ensure that the security model is maintained when data backups are undertaken. If required, additional CESG approved infrastructure solutions can provide disk level encryption services to supplement the ACA database security model. Real-time database replication can be used to facilitate low impact online backups and, optionally, as a method to provide geographic disaster recovery of the intelligence database. Data restoration / service migration Wynyard provides a range of data restoration and service migration services that can be bespoke to a customer s specific requirements based upon the scope and complexity of the project. Data restoration services will be scoped as part of the overall service definition, either as a standard service or bespoke for specific customer requirements for business continuity and disaster recovery. Wynyard offers a range of service migration services that can be bespoke to meet both on boarding and off boarding activities. These services include: Service Design; Requirements capture and analysis; Development; Project Management; Transition Management. Connectivity The ACA application architecture utilises industry standard network protocols and services to provide a secure but flexible deployment model. HTTP and HTTPS protocols are utilised providing a simple to deploy but secure model to support the required level of accreditation. The ACA client is browser based and utilises only the HTTP/HTTPS protocols, simplifying customer network access requirements. Data integration The ACA solution provides a flexible data integration model to support the integration and ingestion of a wide range of data sources and structures as outlined below. ACA utilises an XML/XSD based framework for the ingest process, simplifying the source data mapping activities. The ACA solution supports a broad range of data integration capabilities, including: Structured data. E.g. CSV, Excel, JSON, XML; Unstructured data. Raw textual data. E.g. MS Word, PDFs, web articles, , web blogs, reports etc; Semi-structured data. Raw textual data combined with structured data. E.g. , interview transcripts, case notes, government forms containing free text fields. Where infrastructure and security factors permit, Extract, Transform and Load (ETL) and Enterprise Service Bus (ESB) integrations can also be supported. Wynyard would welcome discussions for bespoke integration of such services. User interface ACA supports a range of commercial browser solutions to provide the client presentation layer, which includes Microsoft Internet Explorer, Google Chrome, Firefox, etc. The browser can be configured to both utilise the default HTTP configuration as well as fully supporting HTTPS connectivity to the business logic tier of ACA. Secure Socket Layers (SSL) can be configured to the required levels of encryption to provide transport layer security. The ACA client therefore only requires HTTP/HTTPS protocols to be supported within the transport layer of the network it is installed in which simplifies firewall configuration requirements and provides a robust and secure architecture. Scalability ACA provides an extensible and open architecture which allows for the scaling of the solution to meet customer requirements as their operational utilisation grows. The ACA architecture utilises COTS products which provides a value for money solution to support step changes in the scaling of the solution. Information assurance ACA can be deployed at IL2 and above to meet customer specific requirements.
11 Wynyard Group Advanced Crime Analytics 9 UNSTRUCTURED DATA STRUCTURED DATA DATA MAPPING EXTRACT TRANSFORM RESULTS LOADED XEREM MODEL
12 10 Wynyard Group Advanced Crime Analytics WORKING WITH US Led by our professional services team and built over 20 years working in tandem with our clients in government and financial services, Wynyard s robust and proven solution implementation process brings together leading industry experts, data scientists and software engineers to design, configure and deploy advanced software solutions. Our team is made up of professionals with real world experience of our customers environments. Many of our team members come from the financial services, consulting and law enforcement sectors with experience in investigations, analytics, operational risks and financial crime applications. Throughout the design and delivery phase Wynyard ensure our clients work with a team who have a deep domain understanding of their challenges. SOLUTION DESIGN Requirements gathering and security analysis Solution design, data mapping and integration SOLUTION CONFIGURATION Define scope Workflow, alerts and security Dashboards WYNYARD PLATFORM THREAT ASSESSMENT ADVANCED CRIME ANALYTICS INVESTIGATIVE CASE MANAGEMENT Solution pilot Soft data models Visualisation CHANGE MANAGEMENT PROJECT MANAGEMENT Infrastructure and operation Support IMPLEMENTATION, OPERATION & SUPPORT Install Migrate Test Train users Go live
13 JIM OAKES Director Financial Crime Wynyard Group Jim Oakes has been with Wynyard Group since 2013 as the Director of Financial Crime. A former Fraud Squad Detective, Jim is a Certified Fraud Examiner and Certified Financial Crimes Investigator. He is an invaluable industry expert and advisor for Wynyard and brings over 30 years experience in Fraud, Security and Anti-Money Laundering. Jim has deep operational experience having operated as Financial Crime Director with some of the world s largest banks in countries across Europe, the Middle East, Africa, North America, and Asia. As organised crime continues to take advantage of new technologies and develops ever increasingly complex techniques to commit financial crime, the need for advanced crime analytics has never been greater.
14 12 Wynyard Group Advanced Crime Analytics TRAINING Wynyard adopts a train-the-trainer approach with its customers and offers the following training packages for all products. These can be modified and tailored to suit individual customer requirements. Application Admin Training: Includes user setup and day-today administration of the software. Super User Training: Includes training in advanced product functionality aimed at frequent users of the software. Business User Training: This includes training for normal usage of the software. IT Training: This includes training around operational maintenance, backups, recovery, installation etc.
15 Wynyard Group Advanced Crime Analytics 13 TEAM COMPOSTITION Wynyard provides expert maintenance and support services throughout the lifecycle of engagement with the customer. Our Professional and Technical Services teams are spread across the globe and come from a range of backgrounds that equip them with in-depth industry knowledge and expertise. Some members of Wynyard s global professional services and support team: SOLUTIONS ARCHITECTS: Architectural design for Wynyard solutions to meet unique client specifications. Support regional Wynyard sales and services teams in pre-sales, solution design and solution implementation. Configuration of the Wynyard platform based on customer goals and preferences. Provides expertise to identify and translate system requirements into software design documentation. SOLUTIONS CONSULTANTS: Analysis and definition of customer requirements by conducting client requirements workshops, functional design documents and configuration of software solutions. Designing, testing and implementing Wynyard solutions tailored to the specific needs of clients. Overall solution delivery of Wynyard solutions. TECHNICAL SERVICES AND SUPPORT CONSULTANTS: Implementation of Wynyard products at client site and post-implementation support. Providing application configuration and maintenance of Wynyard systems. On-site customer interaction and product training. Administering and diagnosing technical issues. WYNYARD SUPPORT SERVICES HELP DESK Wynyard Technical Services & Support (TSS) team provides application support to our global client base. Wynyard s experienced TSS consultants are supported by mature process and tools to provide improved support service levels. Customers can subscribe for 2nd line or 3rd line support to improve response and resolution time for user issues. Users can raise issues directly on a web based portal as well access Wynyard TSS consultants on our manned service desk number during normal business hours. The service is subject to maintenance windows and planned downtimes. Wynyard will provide monthly report on SLA performance and conduct periodic performance review of the support engagement.
16 SERVICE COVERAGE The Maintenance and Support Services provided by Wynyard comprise of the following: Services Description Corrective Maintenance Software Updates Documentation Updates Help Desk Service Site Attendance Monthly Fault Report Critical Support Hours Fixes to specific software faults which may include new versions of a program, patches or fixes, remedial software or workarounds, Wynyard reserving the right at all times to determine what is included and excluded in any corrective maintenance release. Interim updates to the software that may contain enhancements and bug fixes. Periodic or interim updates to software documentation. Help desk services are operated through the 24/7 customer portal or via if the customer portal is unavailable; and is used for problem reporting, progressing resolution and general help. The attendance on site by a support consultant (at the client s cost) to assist in the provision of the maintenance and support services should it be deemed necessary by Wynyard. A monthly fault status report. 24 x 364 (excludes 25th of December). NORMAL SUPPORT HOURS All times based on the selected time zone: 08:00 18:00 Note: Category 1 faults are supported outside of normal support hours We also set categories of software faults, response times and action timetable for each category. The service levels relating to each category will be reviewed on an annual basis.
17 Wynyard Group Advanced Crime Analytics 15 ABOUT WYNYARD GROUP Know the threats, connect the dots & uncover the truth. Wynyard Group is a market leader in risk management and crime fighting software used in investigations and intelligence operations by government agencies and financial organisations. Wynyard solutions help solve and prevent crime, defend against advanced persistent cyber threats and counter terrorism. Wynyard s powerful software platform combines big data, advanced crime analytics and tradecraft to identify persons of interest, stop offenders and protect victims. Wynyard has more than 100,000 users of its solutions and offices in the United States, United Kingdom, Canada, United Arab Emirates, Australia and New Zealand. For more information visit Toronto Arlington, VA London Dubai Sydney Auckland Wellington Christchurch FEMALE TRAFFICKING Wynyard Group Trans-national organised PIRACY crime movements Office locations DRUGS Female trafficking Piracy MIGRANT SMUGGLING Drugs FIREARMS Migrant smuggling COUNTERFEIT GOODS Firearms Counterfeit goods CYBER CRIME Cyber crime Contact us wynyardgroup.com advisor@wynyardgroup.com
18 16 Wynyard Group Advanced Crime Analytics Wynyard Group Advanced Crime Analytics
WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME
WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME HELPING LAW ENFORCEMENT AGENCIES SOLVE CRIMES FASTER, WITH LOWER COSTS AND FEWER RESOURCES. 1 Wynyard Group Advanced Crime
More informationWYNYARD RISK MANAGEMENT POWERFUL SOFTWARE. CONNECTING THE DOTS.
WYNYARD RISK MANAGEMENT POWERFUL SOFTWARE. CONNECTING THE DOTS. 2 Wynyard Group Solutions for Financial Services Wynyard Group Solutions for Financial Services 3 KNOW THE THREATS CONNECT THE DOTS UNCOVER
More informationPOWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. KEY SOLUTION HIGHLIGHTS
ADVANCED CYBER THREAT ANALYTICS POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. Wynyard Advanced Cyber Threat Analytics (ACTA) is a Pro-active Cyber Forensics solution that helps protect organisations
More informationAudit Management. service definition document
Audit Management service definition document Contents Introduction... 3 Service Description... 3 Features and Benefits... 4 Architecture... 5 Service Delivery... 6 Service Provisioning Time... 7 Service
More informationService Definition Document
Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)
More informationWebFOCUS Cloud Express. The WebFOCUS Cloud Express service is delivered as a managed G-Cloud service by Amtex Solutions Ltd.
Service Definition The name of the Service is: WebFOCUS Cloud Express An overview of WebFOCUS Cloud Express The WebFOCUS Cloud Express service is delivered as a managed G-Cloud service by Amtex Solutions
More informationCAPABILITY STATEMENT LEGAL TECHNOLOGIES AND COMPUTER FORENSICS. www.controlrisks.com DECEMBER 2013
LEGAL TECHNOLOGIES AND COMPUTER FORENSICS DECEMBER 2013 Copyright Control Risks. All rights reserved. This document cannot be reproduced without the express written permission of Control Risks. Any reproduction
More informationPAAS Public Sector Managed Services
Meritec Limited Meritec House, Acorn Business Park, Skipton, North Yorkshire, BD23 2UE 0845 3451155 servicepoint@meritec.co.uk www.meritec.co.uk Registered In England & Wales No. 3224622 Table of Contents
More informationOPERATIONAL RISK MANAGEMENT & MODELLING FROM WYNYARD GROUP & EVMTECH
WYNYARDGROUP.COM OPERATIONAL RISK MANAGEMENT & MODELLING FROM WYNYARD GROUP & EVMTECH Wynyard Group and EVMTech s combined solution provides an end-to-end risk management process that enables organisations
More informationPhysical Security Services
Physical Security Services The ANVIL Group Physical Security Services The ANVIL Group is an internationally renowned and accredited security company specialising in Crisis Avoidance. Established in 1988,
More informationEmpLive Technical Overview
Version 1.6 Updated 27/08/2015 Support: +61 2 8399 1688 Email: support@wfsaustralia.com Website: wfsaustralia.com Legal Notice Copyright WFS: A WorkForce Software Company. All Rights Reserved. By receiving
More informationAgilisys G-Cloud Service V
Agilisys G-Cloud Service V Service Definition Endpoint Management Lot 1 Infrastructure as a Service (IaaS) April 2014 At Agilisys we deliver success through innovation working with our clients to transform
More informationSERVICE DEFINITION G-CLOUD 7 SECURE FILE TRANSFER DIODE. Classification: Open
SERVICE DEFINITION G-CLOUD 7 SECURE FILE TRANSFER DIODE Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this
More informationINTELLIGENCE. RISK MITIGATION. RESPONSE. CONSULTANCY.
INTELLIGENCE. RISK MITIGATION. RESPONSE. CONSULTANCY. 23 Grafton Street London W1S 4EY UK Main Tel: +44 (0) 207 887 2699 ABOUT PGI PGI is a privately owned UK business offering integrated, intelligence-led
More informationCaretower s SIEM Managed Security Services
Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During
More informationRSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief
RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with
More informationInformed Solutions InformedINSIGHT Big Data G-Cloud5 Service Definition
Informed Solutions InformedINSIGHT Big Data V1.0.0 **PROTECT COMMERCIAL** London 11 Old Queen Street, Westminster, London, SW1H 9JA, UK Tel: +44(0)20 3042 2000 Fax: +44(0)20 3042 2015 www.informed.com
More informationG-Cloud Service Definition. Atos Accredited Oracle Business Intelligence Solutions SCS
G-Cloud Service Definition Atos Accredited Oracle Business Intelligence Solutions SCS Atos Accredited Oracle Business Intelligence Solutions SCS Robust, scalable Cloud computing and consumption-based reporting
More informationwith Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief
RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking
More informationService Definition MMaaS Mobile Device Management. G- Cloud VII. Service Definition Nine23 MMaaS Mobile Device Management
Service Definition MMaaS Mobile Device Management G- Cloud VII 1 Table of Contents 1 SERVICE MMAAS MOBILE DEVICE MANAGEMENT... 3 1.1 OVERVIEW NINE23... 3 1.2 SERVICE SUMMARY MMAAS MOBILE DEVICE MANAGEMENT...
More informationAmazon Relational Database Service (RDS)
Amazon Relational Database Service (RDS) G-Cloud Service 1 1.An overview of the G-Cloud Service Arcus Global are approved to sell to the UK Public Sector as official Amazon Web Services resellers. Amazon
More informationService Definition Nine23 MDM
Service Definition Nine23 MDM G-Cloud iv Contents 1 Service Nine23 Mobile Device Management System.....4 1.1 Overview Nine23 MDM...... 4 1.2 Open Standards. 5 1.3 User requirements.....5 1.3.1 Client Browser....5
More informationDigital Forensics G-Cloud Service Definition
Digital Forensics G-Cloud Service Definition 2013 General Dynamics Information Technology Limited. All rights 1 GDIT Team Clients Metropolitan Police Service The General Dynamics Information Technology
More informationHow To Create An Insight Analysis For Cyber Security
IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics
More informationLot 1 Service Specification MANAGED SECURITY SERVICES
Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services
More informationAUSTRAC. supervision strategy 2012 14
AUSTRAC supervision strategy 2012 14 Commonwealth of Australia 2012 This work is copyright. You may download, display, print and reproduce this material in unaltered form only (retaining this notice) for
More informationG-CLOUD FRAMEWORK SERVICE DEFINITION. Kofax Model Office Bundle Proposal ISSUE 1
G-CLOUD FRAMEWORK SERVICE DEFINITION Kofax Model Office Bundle Proposal ISSUE 1 Sept 2013 Table of Contents 1 SERVICE OVERVIEW & SOLUTION... 2 2 INFORMATION ASSURANCE... 3 3 BACKUP/RESTORE AND DISASTER
More informationProtecting Malaysia in the Connected world
Protecting Malaysia in the Connected world cyber Security Company of the Year (Cybersecurity Malaysia, 2014) Most innovative information security company in Malaysia (Cybersecurity Malaysia, 2012) BAE
More information<cloud> Secure Hosting Services
Global Resources... Local Knowledge Figtree offers the functionality of Figtree Systems Software without the upfront infrastructure investment. It is the preferred deployment solution for organisations
More informationIBM G-Cloud Microsoft Windows Active Directory as a Service
IBM G-Cloud Microsoft Windows Active Directory as a Service Service Definition IBM G-Cloud Windows AD as a Service 1 1. Summary 1.1 Service Description This offering is provided by IBM Global Business
More informationMaking critical connections: predictive analytics in government
Making critical connections: predictive analytics in government Improve strategic and tactical decision-making Highlights: Support data-driven decisions using IBM SPSS Modeler Reduce fraud, waste and abuse
More informationVirtual Server Hosting Service Definition. SD021 v1.8 Issue Date 20 December 10
Virtual Server Hosting Service Definition SD021 v1.8 Issue Date 20 December 10 10 Service Overview Virtual Server Hosting is InTechnology s hosted managed service for virtual servers. Our virtualisation
More informationIBM QRadar as a Service
Government Efficiency through Innovative Reform IBM QRadar as a Service Service Definition Copyright IBM Corporation 2014 Table of Contents IBM Cloud Overview... 2 IBM/Sentinel PaaS... 2 QRadar... 2 Major
More informationACEYUS REPORTING. Aceyus Intelligence Executive Summary
ACEYUS REPORTING Aceyus Intelligence Executive Summary Aceyus, Inc. June 2015 1 ACEYUS REPORTING ACEYUS INTELLIGENCE EXECUTIVE SUMMARY Aceyus Intelligence is a suite of products for optimizing contact
More informationCloud Vendor Evaluation
Cloud Vendor Evaluation Checklist Life Sciences in the Cloud Cloud Vendor Evaluation Checklist What to evaluate when choosing a cloud vendor in Life Sciences Cloud computing is radically changing business
More informationHNOLOGY IN POLICING SECURITY & CYBERSPACE SITUATION
S e c u r i t y & D e f e n c e Bringing The Digital Edge To Your Operations ITY & CYBERSPACE SITUATIONAL AWARENESS CRITICAL COM S CRITICAL COMMUNICATIONS TECHNOLOGY IN POLICING SE ITUATIONAL AWARENESS
More informationCASSIDIAN CYBERSECURITY
CASSIDIAN CYBERSECURITY ADVANCED PERSISTENT THREAT (APT) SERVICE In a world where cyber threats are emerging daily, often from unknown sources, information security is something no organisation can afford
More informationPiecing Digital Evidence Together. Service Information
Piecing Digital Evidence Together Service Information Services Overview Mobile and Tablet Forensics Mobile Phone Forensics is the legally tested and approved systematic examination of mobile phones, SIM
More informationKaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
More informationGPS G-Cloud Lot 4: Oracle Business Intelligence Cloud Consultancy Service Definition
GPS G-Cloud Lot 4: Contents 1 Introduction... 3 2 Service... 4 2.1 Cloud Consultancy Overview... 4 2.2 Information assurance... 5 2.3 Backup/Restore and Disaster Recovery... 6 2.4 On-boarding and Off-boarding...
More information<workers> Online Claims and Injury Management
Global Resources... Local Knowledge With over 30 years experience in workers compensation, our claims management systems have been adopted by Self-Insured Organisations, Third Party Administrators and
More informationAssuria from ZeroDayLab
Passionate about Total Security Management Assuria from ZeroDayLab Forensic Log Management SIM/SIEM2 As one of Europe s leading IT Security Consulting companies, ZeroDayLab has been carrying out Security
More informationIMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle
More informationMarket Data + Services. Advanced outsourcing solutions. IT Hosting and Managed Services
Market Data + Services Advanced outsourcing solutions IT Hosting and Managed Services Table of Contents 3 Table of Contents Introduction Market Data + Services powers the financial community with a range
More informationSimplify Your Network Security with All-In-One Unified Threat Management
Singtel Business Product Factsheet Brochure Managed Defense Unified Services Management Simplify Your Network Security with All-In-One Unified Management Singtel Managed Unified Management (UTM) Services,
More informationThird Party Approval & Risk Management
Third Party Approval & Risk Management Rivo Software Solution Layer enables organizations to manage the third party approval process, identify and assess third party risk across vendors, contractors and
More informationCloud Technology Platform Enables Leading HR and Payroll Services Provider To Meet Solution Objectives
Greytip Online Cloud based HR & Payroll software Cloud Technology Platform Enables Leading 16 Snapshot Client Profile A global HR & Payroll outsourcing company. The company is in the business of delivering
More informationPrivate Cloud. One solution managed by Applied
Private Cloud : : C L O U D S E R V I C E S : : One solution managed by Applied THE CLOUD IS NO LONGER AN IT CONSIDERATION ALONE IT IS FUNDAMENTALLY CHANGING THE WAY EXECUTIVES ACROSS DEPARTMENTS VIEW
More informationCASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES
CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES PROTECTIVE MONITORING SERVICE In a world where cyber threats are emerging daily, often from unknown sources, information security is something
More informationCustomer Guide Helpdesk & Product Support. [Customer Name] www.four.co.uk Page 1 of 13
Customer Guide Helpdesk & Product Support [Customer Name] www.four.co.uk Page 1 of 13 Table of Contents HELP DESK AND PRODUCT SUPPORT SUMMARY... 3 1 FOUR HELP DESK STRUCTURE AND CALL ESCALATION... 6 2
More informationEMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST
EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST Enabling user efficiency with a cloud-based email platform With productivity, revenues and reputation at stake, an
More informationMeeting FFIEC Guidance and Cutting Costs with Automated Fraud Prevention. White Paper
Meeting FFIEC Guidance and Cutting Costs with Automated Fraud Prevention White Paper Table of Contents Executive Summary 3 Key Requirements for Effective and Sustainable Online Banking Fraud Prevention
More informationKelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan
The Truth about Data Loss Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan RSA Data Loss Prevention Data Breaches Overview RSA DLP Solution Five Critical Factors
More informationPlatform as a Service
Platform as a Service Service Definition Version: 1.0 Version date: October 2015 Classification: Public Backup-as-a-Service Systems Monitoring DR-as-a-Service Storage-as-a-Service Hosted Exchange Colocation
More informationwww.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services
www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse Finland Who are we? Bring a robust forensics team to the table to support your organisation Our practice can
More information<risk> Enterprise Risk Management
Global Resources... Local Knowledge is vital in supporting business continuity across diverse and challenging environments and operating models. By consolidating risk management activities into a single,
More informationMaking Critical Connections: Predictive Analytics in Government
Making Critical Connections: Predictive Analytics in Improve strategic and tactical decision-making Highlights: Support data-driven decisions. Reduce fraud, waste and abuse. Allocate resources more effectively.
More informationHow To Protect Your Network From Attack From A Network Security Threat
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
More informationUnicenter Asset Intelligence r11
Unicenter Asset Intelligence r11 Key Features at a Glance Comprehensive Out of the Box Business Relevant Answers Complete and Accurate IT Asset Information Real-Time Analysis Risk Alerting Compliance Utilization
More informationThe Six Critical Considerations of Social Media Threat Intelligence
The Six Critical Considerations of Social Media Threat Intelligence Every day, angry rhetoric and hints of potential danger flow though streams of social media data. Some of these threats may affect your
More informationIBM Data Security Services for endpoint data protection endpoint data loss prevention solution
Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Facilitate policy-based expertise and
More informationXerox Workflow Automation Services Solutions Brochure. Xerox DocuShare 7.0. Enterprise content management for every organization.
Xerox Workflow Automation Services Solutions Brochure Xerox DocuShare 7.0 Enterprise content management for every organization. Office Work Can Work Better Despite huge advances in the technology and tools
More informationUnited Nations Office on Drugs and Crime
UNODC contribution to combat Crime A UNODC contribution to combat CRIME A A product of the Information Technology Service Nations Office on Drugs and Crime United Nations Office on Drugs and Crime United
More informationSILOBREAKER ENTERPRISE SOFTWARE SUITE
INSIGHT AS A SERVICE SILOBREAKER ENTERPRISE SOFTWARE SUITE Fully customizable behind your firewall! Silobreaker Enterprise Software Suite is Silobreaker s flagship product. It is ideal for organizations
More informationMarval Software Limited. G Cloud iii Framework Service Definition
1 Marval Software Limited G Cloud iii Framework Service Definition Page 1 of 9 2 Contents An overview of the Marval Service Management (MSM) Software Solution... 3 Information assurance Impact Level (IL)
More informationHow To Use Concerto.Com
ASSET AND FACILITIES integrated software solutions 01 EXECUTIVE SUMMARY SOLUTION OVERVIEW Concerto provides a secure, web based, property asset management suite of software incorporating comprehensive
More informationKNOW YOUR THIRD PARTY
Thomson Reuters KNOW YOUR THIRD PARTY EXECUTIVE SUMMARY The drive to improve profitability and streamline operations motivates many organizations to collaborate with other businesses, increase outsourcing
More informationSpecific recommendations
Background OpenSSL is an open source project which provides a Secure Socket Layer (SSL) V2/V3 and Transport Layer Security (TLS) V1 implementation along with a general purpose cryptographic library. It
More informationImpact Level HootSuite does not yet have an Impact Level accreditation, however if we were to apply we believe we would be at the IL3 level.
Overview G Cloud 4: Service Definition HootSuite is a social media monitoring and listening platform for businesses and organisations to collaboratively execute social media strategies across multiple
More informationSymantec ediscovery Platform, powered by Clearwell
Symantec ediscovery Platform, powered by Clearwell Data Sheet: Archiving and ediscovery The brings transparency and control to the electronic discovery process. From collection to production, our workflow
More informationEnterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...
CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...
More informationCompany Overview. Enterprise Cloud Solutions
2016 Company Overview Enterprise Cloud Solutions ENTERPRISE CLOUD SOLUTIONS Unitas Global utilizes leading cloud technologies to optimize enterprise IT environments. By designing, deploying, and managing
More informationMicrosoft IT Increases Security and Streamlines Antimalware Management by Using Microsoft Forefront Endpoint. Protection 2010.
Situation Microsoft IT had limited monitoring and reporting functionality with its existing antimalware system. Although the system could scan for malware, there was no reporting capability or configurable
More informationFirewall Administration and Management
Firewall Administration and Management Preventing unauthorised access and costly breaches G-Cloud 5 Service Definition CONTENTS Overview of Service... 2 Protects Systems and data... 2 Optimise firewall
More informationGPG13 Protective Monitoring. Service Definition
GPG13 Protective Monitoring Service Definition Issue Number V1.3 Document Date 27 November 2014 Author: D.M.Woodcock Classification UNCLASSIFIED Version G-Cloud 6 2014 Copyright Assuria Limited. All rights
More informationHosted SharePoint: Questions every provider should answer
Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money
More informationThe SIEM Evaluator s Guide
Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,
More informationCloud Store Product Definition Web Server as a Service
Cloud Store Product Definition Web Server as a Service March 2014 Contact Information Your primary point of contact in relation to this document is: Name Andy Dunn Head of New Business Address Broadgate
More informationAVANTGARD Hosting and Managed Services
AVANTGARD Hosting and Managed Services AVANTGARD HOSTING AND MANAGED SERVICES SunGard meets its customers diverse set of requirements by not only bringing to market scalable, flexible, and industry leading
More informationThe Education Fellowship Finance Centralisation IT Security Strategy
The Education Fellowship Finance Centralisation IT Security Strategy Introduction This strategy outlines the security systems in place to optimise, manage and protect The Education Fellowship data and
More informationCitrix XenApp Design & Implementation Service
Citrix XenApp Design & Implementation Service G-Cloud 7 November 2015 Citrix XenApp Design and Implementation Service Service Overview RealServe IT s XenApp Design and Implementation Service aims to analyse
More informationCyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things
Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations
More informationCyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
More informationDefending against modern cyber threats
Defending against modern cyber threats Protecting Critical Assets October 2011 Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Agenda 1. The seriousness of today s situation
More informationFirst Line of Defense
First Line of Defense SecureWatch ANALYTICS FIRST LINE OF DEFENSE OVERVIEW KEY BENEFITS Comprehensive Visibility Powerful web-based security analytics portal with easy-to-read security dashboards Proactive
More informationWebsense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration
Websense Data Security Suite and Cyber-Ark Inter-Business Vault The Power of Integration Websense Data Security Suite Websense Data Security Suite is a leading solution to prevent information leaks; be
More informationFirst Pacific Islands Capacity Building Workshop on Child Online Protection
First Pacific Islands Capacity Building Workshop on Child Online Protection Extracting Intelligence to Turn the Tables on Child Abuse Material Traffickers. Dr Allan Watt Centre for Policing, Intelligence
More informationExecview Corporate Performance Management
EXECVIEW for G-Cloud Framework Users Execview Corporate Performance Management Service Definition for G-Cloud iii G-Cloud ITT Service Definition overview (This section of our response is intended to provide
More informationREDCENTRIC MANAGED ARCHIVE SERVICE SERVICE DEFINITION
REDCENTRIC MANAGED ARCHIVE SERVICE SERVICE DEFINITION SD005 V2.0 Issue Date 02 July 2014 1) SERVICE OVERVIEW Redcentric's Managed Archive Service allows customers to regain control of their Microsoft Exchange
More informationCase Management powered by Microsoft Dynamics CRM
- From case capture to resolution powered by Microsoft Dynamics CRM CasePoint is a Solution that combines the best of the Microsoft Dynamics CRM with purpose-built functionality to deliver complete case
More informationRiverbed SteelCentral. Product Family Brochure
Riverbed SteelCentral Product Family Brochure Application performance from the perspective that matters most: Yours Applications are now the center of the business world. We rely on them to reach customers,
More informationSharePoint Microsoft SharePoint has become
The Essential Guide to SharePoint S p o n s o r e d b y Microsoft SharePoint has become a mission-critical platform for sharing information and delivering improved collaboration to organizations of all
More informationA Database Security Management White Paper: Securing the Information Business Relies On. November 2004
A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:
More informationAmazon Compute - EC2 and Related Services
Amazon Compute - EC2 and Related Services G-Cloud Service 1 1.An overview of the G-Cloud Service Arcus Global are approved to sell to the UK Public Sector as official Amazon Web Services resellers. Amazon
More informationHow To Protect Yourself Online
NetBank security guide Commonwealth Bank Personal 1 Contents Page 4 5 5 5 7 7 9 9 9 11 12 12 13 13 13 14 14 14 16 16 16 17 18 18 19 19 20 21 Section Peace of mind with NetBank What are the common online
More informatione2e Secure Cloud Connect Service - Service Definition Document
e2e Secure Cloud Connect Service - Service Definition Document Overview A cloud connectivity service that connects users, devices, offices and clouds together over the Internet. Organisations can choose
More informationOffice SharePoint Server 2007
Top 10 Benefits of WSS 3.0 Office SharePoint Server 2007 1. Improve team productivity with easy-to-use collaborative tools Connect people with the information and resources they need. Users can create
More informationUse of Exchange Mail and Diary Service Code of Practice
Use of Exchange Mail and Diary Service Code of Practice Introduction This code of practice outlines the support mechanisms in place for the security of the Exchange mail and diary service. References are
More informationOperationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment
Microsoft IT Systems Strategy DATACENTER APPLICATIONS Process-Led, Model-Driven Unified and Virtualized USER-CENTRICITY ServiceEnabled Basic Standardize d Rationalized Dynamic Cost center Efficient cost
More information