e2e Secure Cloud Connect Service - Service Definition Document

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "e2e Secure Cloud Connect Service - Service Definition Document"

Transcription

1 e2e Secure Cloud Connect Service - Service Definition Document Overview A cloud connectivity service that connects users, devices, offices and clouds together over the Internet. Organisations can choose a service that suits their security and connectivity requirements. Includes VPN clients that support Windows, Mac, Linux and most tablets and phones to provide secure anywhere access to cloud resources. This is a cloud independent service as it covers cloud connectivity to e2e or any other suitable cloud provider. Service Overview Cloud services offer outstanding value for money but the connectivity to and from the services is often overlooked. e2e s secure cloud connect service takes away all the hassle of implementing and managing the secure connectivity required to consume the services securely. The service is designed to the highest security standards and follows CESG best practice and architectural guidelines. This can provide all the security and service advantages of commissioning dedicated private links but is much quicker, cost effective and scalable. The service reduces an organisation s exposure to threats by consolidating all cloud connectivity to a security gateway that cleanses and monitors traffic. This gateway provides security services such as in-line antivirus scanning, intrusion prevention and optional protective monitoring as well as other advanced security monitoring services. The service provides a complete VPN and security hub that provides strong encryption with certificate based, always-on full tunnel client/mobile VPNs as well as on demand, two-factor based thin client style connectivity from appropriately secured devices. Mobile devices are supported and can be managed as part of the service. Allows your organisation to connect to and manage cloud resources using CESG approved technologies Allows your organisation to connect to and manage cloud resources using a wide range of Windows, Linux, MAC and even Android and IOS devices Allows your organisation to connect to and manage cloud resources using a wide range of tablets, phones, and other similar devices running Windows, Linux, MAC, Android and IOS Mobile Device Management as an option we can provide a fully managed MDM solution with integrated device security, secure app containers, secure , etc. Assured service design the service is designed by a Senior CESG IA Architect in line with CESG guidelines and to a proven, tested design 1

2 Security assurance the service has a Protective Monitoring service aligned with your risk posture and threat model Cloud service model only pay for what you use Cloud procurement model no CAPEX, no setup charges, just a monthly fee for the services you use Flexibility to run whatever applications and services you choose within the service Scale-up on demand service flexes with your business to ensure the resources are available when you need them most Securely enables your business by allowing you to pursue the best value services and maximise opportunities whilst maintaining your security posture Agile, adaptive cloud aware service secures your journey to the cloud by supporting connectivity to hybrid or existing customer solutions and other cloud services Three service levels available to ensure you have a level of service that fits your needs Highly available and DDOS resistant - designed to provide 99.99% monthly availability Provides a single, resilient cloud access method secures your cloud by reducing the entry points to one resilient, multi-site secure connect gateway thereby dramatically reducing your exposure and providing auditable, secure access Optional proxy service provided so that organisations can send all their Internet bound traffic through the security services thereby increasing threat detection and infected host detection All Private Clouds used for this service are located in the UK, all data resides in the UK and the service is managed by a UK company using SC cleared staff All access to the service can be secured with two or even three factor authentication Optional Protective Monitoring and Alerting service for potential and verified threats Expert Incident Response available before a cyber-event becomes a major security incident Standards compliance - built to work with existing organisations security frameworks and facilitate compliance with ISO27001, IASME and Cyber Essentials Plus Simply put these cloud connect services enable you to consume the benefits of the cloud without compromising security and affordability. 2

3 The Cloud Connect Service The service is designed to offer a level of security that fits your organisations risk appetite and business goals. Every service is designed to a set pattern with levels differentiated on service/support levels and security features. The diagram below illustrates how the service works. 3

4 e2e Secure Cloud Connect Service Connectivity options and responsibilities The diagram above shows the managed cloud on the right. Items in blue are the customer s responsibility and items in orange and green are e2e s responsibility. The service is designed to be consumed over the Internet using IPSec VPNs or TLS encryption. e2e can provide an optional dedicated VPN device at any of the customers locations in order to provide a managed site to site VPN service. The customer can also choose to provide their own fixed VPN endpoint. Remote access VPNs follow the same pattern; e2e can provide a VPN client or the customer can use their existing VPN client (so long as it is a CESG CPA foundation approved product). How do I know which service is appropriate? There is a level of service appropriate for all organisations. If you do not currently know what the right level of service is we offer a simple process: 1. e2e provide a free, one day on site cloud workshop led by a CESG Senior IA Architect where we work with your organisation to establish your requirements and cover aspects such as your organisations risk profile and security assurance requirements, connectivity requirements as well as your platform and application requirements. 2. The workshop report includes expert advice from e2e and includes generating your heat map similar to the below and this gives us a score: 3. This score then maps to our recommended services: 4

5 4. If you need more help we can provide follow up workshops with no commitment from you to purchase a cloud service. We will walk you through a risk based approach that starts with your business requirements and allows you to decide which service aligns best. 5

6 e2e Secure Cloud Connect Service levels of service Baseline Target SLA/Month (during service hours) 99.50% Service Hours 8am to 6pm Mon-Fri Service Hours Response Time 1 hour Emergency/out of hours 24/7 response time 8 hours Optional (Baseline Protective Monitoring Service recommended) DOS and DDOS Protection Baseline Mobile VPN, fixed VPN, Security features triple-tier firewalls, twofactor authentication Enhanced Target SLA/Month during service hours 99.99% Service Hours 8am to 6pm Mon-Fri Service Hours Response Time 1 hour Emergency/out of hours 24/7 response time 8 hours DOS and DDOS Protection Enhanced Optional (Enhanced Protective Monitoring Service recommended) Mobile VPN, fixed VPN, triple-tier firewalls, twofactor authentication, Security features network anti-virus, network IPS, network IDS Premium Target SLA/Month during service hours 99.99% Service Hours 8am to 8pm Mon-Fri Service Hours Response Time 1 hour Emergency/out of hours 24/7 response time 4 hours DOS and DDOS Protection Premium Optional (Premium Protective Monitoring Service recommended) Mobile VPN, fixed VPN, triple-tier firewalls, twofactor authentication, Security features network anti-virus, network IPS, network IDS, Botnet detection, DLP, triple-factor authentication 6

7 Roles and responsibilities This is a fully managed service that covers the creation of the fixed VPNs, provision of the mobile VPN devices and cloud connect security services. Each customer solution has dedicated VPN devices at the e2e datacentre and customers can either use existing VPN devices or e2e provided devices at their managed VPN end points. The customer (or the customers 3 rd party supplier) is responsible for installing and configuring the mobile VPN clients and supporting the end users. The customer is responsible for managing any of their own VPN devices used in the service or delegating management of these devices to e2e. e2e are responsible for managing all the VPN devices they provide as part of the service. The customer is responsible for providing details of all users and informing e2e of users leaving the service. Pricing There is an on-boarding charge for this service. This is to enable your organisation to be able to consume the service and includes training and guided build workshops to streamline the on-boarding. The on-boarding charges are one off charges that are incurred at service commencement. There is a second one off charge that is incurred when scaling up. This is due to the increase in license, underlying private compute, bandwidth and other service costs that are required to provide the new level of service. There are three parts to the pricing; the number of mobile VPN users, MDM users and the number of fixed VPNs. Mobile VPNs Baseline Enhanced Premium On-boarding Scale-up One off at service commencement Number of users Monthly price per user Monthly price per user Monthly price per user Incurred when scaling up (one off, not per month) , , , , , , , ,

8 , , , , Fixed VPNs Baseline Enhanced Premium On-boarding Scale-up One off at service commencement Number of fixed VPNS Monthly price per VPN Monthly price per VPN Monthly price per VPN Incurred when scaling up (one off, not per month) , , , , , , , , , , , , Mobile Devices (MDM) Baseline Enhanced Premium On-boarding Scale-up One off at service commencement Monthly price per device Monthly price per device Monthly price per device Incurred when scaling up (one off, not per month) Number of devices , , , , , , , , , , , , , ,

9 Cloud Connect Security Monitoring/ Protective Monitoring Service The Cloud Connect service can be purchased without a protective monitoring service if an organisation determines that they do not require it. This would result in the service logging data but no actions being taken to investigate or inform the customer of the alerts. Organisations can also choose one of three levels of protective monitoring i.e. they can choose a premium cloud connect service and a baseline protective monitoring service or any other such combination that best aligns with their risk posture. The protective monitoring service provides a complete security monitoring system, designed and built by e2e experts who have spent over 15 years designing and building security systems for major banks, telco s, payment providers and the military. e2e have taken the best of open source and commercial systems and blended them together to provide a formidable arsenal of security services. Some of the components of this system have been provided below: Log collection, storage and monitoring of all data flowing through the secure cloud connect Network based IDS using open source tools and network based IPS using commercial tools Traffic monitoring and intelligent traffic analysis (i.e. detects and classifies traffic based on its type not it s port number e.g. detects data tunnelling and applications using nonstandard ports, exfiltration and other data leakages) Packet capture and analysis to enable investigations into alerts and to support incident response DNS monitoring to detect DNS lookups to known or suspected malware or other suspicious domain names Botnet monitoring hunts for and alerts on any type of connection known to be used by botnets Web and threat monitoring monitors access to the Internet and s and hunts for known threats and signs of potential threats in web site browsing, URLs and s Threat indicator monitoring and latest threat intelligence monitoring Geographic analysis of all attacks and traffic Cloud-focused service design that provides monitoring of the latest cloud based threats and intelligence Fully managed cloud service that can be provided with varying levels of customer involvement as appropriate In depth reporting on all aspects of the service Threat detection across a wide range of traffic web, smtp, http and https inspection as an option 9

10 There are three levels of service available: Baseline Protective Monitoring and Alerting Service Log Collection Log Storage Log Reporting Log Alerting alerts to customer Monthly statistical report Retention periods of 3-12 months Log collection limited to 10 logs per second per device averaged over month Any log source capable of generating collectable logs Includes one virtual network IDS per 128 IP addresses Includes one instance of packet capture, DNS monitoring, botnet, web and monitoring Customer responsible for investigating events, or purchasing e2e incident response days to be used for this purpose Enhanced Protective Monitoring and Alerting Service As baseline plus: Monthly event and threat summary Retention periods of months for logs and one week for full packet captures Alerts triaged by e2e vsoc and escalated to customer when appropriate Includes host based IDS agent (optional if network based IDS can be deployed effectively) Includes one on-premises security monitoring device provide by e2e as part of the service Threat indicator detection (detects typical signs of threats by their indicators) 10 Premium Protective Monitoring and Alerting Service As enhanced plus: Fully managed service that includes e2e triage prior to raising alerts with customer Includes e2e incident response engagement (first 5 days) for any incident e2e escalate to customer as a Priority 1 Includes event triage and investigation services (provides customer with evidence and advice and options to mitigate, contain or manage threat). Includes full event reporting, security processes management, monthly review meeting and continuous service improvement Removes the requirement for customer to provide any security resources Includes external vulnerability scanning and alerting services

11 The protective monitoring service is priced per device or IP address that passes through the cloud connect service. This should be the real number of customer IP addresses protected by the service. There are no on-boarding or scale up charges. Cloud Connect Baseline Protective Monitoring and Alerting Service Number of IP addresses monitored Per Month , , , , , Cloud Connect Enhanced Protective Monitoring and Alerting Service Number of IP addresses monitored Per Month , , , , , , Cloud Connect Premium Protective Monitoring and Alerting Service Number of IP addresses monitored Per Month ,

12 , , , , , , VPN devices Where e2e are required to provide a VPN device there is fixed charge per device that covers the device and installation. CPA VPN Device Installation of an e2e provided CPA VPN device Per device 2, Proxy Services Web, DNS, NTP and SMTP proxy services can be provided to further secure your organisation s cloud. You will need to configure all your services to point to a cluster of proxy services at e2e and close down all other outbound internet access from your other services other than the VPNs. This dramatically increases your security and simplifies your cloud landscape. The same can be done for SMTP traffic. If required we can also provide SSL inspection of all outgoing HTTPS traffic to look for threats buried in encrypted traffic. This method of cloud security is highly effective at bringing your cloud under control and allows us to identify anomalous traffic by its characteristics as well as by matching against known threats. These services are only available at Enhanced and Premium. Organisations will only ever need one of each of the items below unless they chose a dual site service which then requires two. Web proxy service (1 to 250 users/ IP addresses) Web proxy/https proxy/dns/ntp cluster at one location Per month SMTP proxy service (1 to 250 users/ IP addresses) SMTP proxy cluster at one location Per month Web proxy service ( IP addresses) Web proxy/https proxy/dns/ntp cluster at one location Per month SMTP proxy service ( users/ip addresses) SMTP proxy cluster at one location Per month Web proxy service ( users/ip addresses)) 12

13 Web proxy/https proxy/dns/ntp cluster at one location Per month SMTP proxy service ( users/ip addresses) SMTP proxy cluster at one location Per month It is also possible for web browsing and to be directed through other cloud web SMTP security services that they customer may already have or wish to procure. In those cases the services above would not be required and we would route the traffic to the requested cloud provider. Priced examples A customer requires 25 mobile vpn users to connect two offices, one cloud service and the baseline service best fits their needs. The monthly cost would be: 25X Mobile VPN users at baseline = X Fixed VPN at baseline = 1,200 Total: 2, per month They choose the baseline protective monitoring service. There are 25 mobile VPN users and they connect to two servers in the office and one in the cloud. The protective monitoring service needs to cover 28 IP addresses: Protective Monitoring: per month The on-boarding charges are: Mobile: 2, Fixed: 2,

14 A customer requires connectivity for 110 users and one cloud service. The monthly cost for an enhanced service would be: 110X Mobile VPN users at enhanced= 2, x Fixed VPN at enhanced = Total: 3, per month They choose the enhanced protective monitoring service. There are 110 mobile VPN users and they connect to two web servers in the cloud and one server in the cloud. The protective monitoring service needs to cover 113 IP addresses: Protective Monitoring: 1, per month The on-boarding charges are: Mobile: 2, Fixed: 2, A customer with 500 users and 10 VPNs with a Premium service would be: 500X Mobile VPN users premium = 10, X Fixed VPN premium = 4, Total: 14, per month The on-boarding charges are: Mobile: 5, Fixed: 2, They choose the premium protective monitoring service. There are 500 mobile VPN users and they connect to two web servers in the cloud and one server in the cloud. The protective monitoring service needs to cover 600 IP addresses as they direct all cloud traffic through the service as well as opting for the full Web proxy service: Protective monitoring: 9, per month Web proxy: 1, per month 14

15 A customer requires an MDM solution for 50 devices. These devices need to connect to their on premise system. The enhanced service best fits their needs: 1X Fixed VPN enhanced = X MDM devices = 1, The customer scales up to 100X MDM devices: The scale up charge is: 1, Total = 3, per month (after scale up) The on-boarding charges are: Fixed: 2,500.00, MDM: 2, They decide that the baseline protective monitoring service best suits their needs and there are 55 IP addresses to be protected before the scale up and 165 after: Protective monitoring: per month Protective monitoring: 1, per month (after scale up) A customer requires connectivity for 2 offices, 2 cloud services, 50 mobile vpn users and 50 mobile devices at enhanced. They opt for no protective monitoring service. 4X Fixed VPN enhanced = X Mobile VPN users = 1, X MDM devices = 1, Total: 5, per month The on-boarding charges are: Fixed: 2,500.00, Mobile: 2,500.00, MDM: 2,

16 Service scale up/scale down options Secure Cloud Connect Service It is possible to scale up and scale down the service levels of from Baseline to Enhanced and from Enhanced to Premium or from Baseline to Premium. There is no charge for scaling up or down service levels. Scale up example: A customer requires 25 mobile vpn users to connect two offices and one cloud service. The baseline service best fits their needs. The monthly cost would be: 25X Mobile VPN users at baseline = X Fixed VPN at baseline = 1,200 Total: 2, per month The customer decides to scale up the service level to enhanced for a critical period of 2 months. During those two months the customer pays: The monthly cost would be: 25X Mobile VPN users at enhanced = 1, X Fixed VPN at enhanced = 1, Total: 2, per month Service scale up /scale down options Secure Cloud Connect Protective Monitoring Service It is also possible to scale up or scale down the service levels of the protective monitoring element of the service on a month by month basis. There is no charge for scaling up or down service levels. Scale up support options The service includes the BAU activities relating to managing the services and providing support but it is possible that the customer requires the reassurance of having dedicated e2e resource on hand to support their IT team during critical times. The following scale up option allowing customers to purchase cost effective support and scale it up at times of emergency or heightened importance: Private Cloud Management and Support Ad hoc items Extended support add on 24/7 response uplifts support level to a one hour response 24/7 for any day or number of days Per Day

17 Dual site options The service can be distributed across two e2e datacentres. This provides availability levels above 99.99%. This increases the quantity of fixed VPNs required. The dual site costs are double the single site cost. e2e provide connectivity between sites as part of the dual site service. Either site on its own is capable of handling all traffic. Other Services A range of other services are available that can be used to perform tasks such as assisting you with the roll out of VPN clients, connecting the mobile VPN to active directory or certificate services for user authentication or to assist with design aspects of the service. These are priced per day as per e2e s SFIA rate card. Other Services Design effort per day Service training per day Ad hoc support per day User authentication integration (e.g. mobile VPN to customers active directory per day) Advice and consultancy per day 1,

18 Service Specific Terms and Conditions On-boarding is included with the following scope: e2e will support the customer in connecting/enrolling the requested fixed VPNs, mobile VPNS and mobile devices into the service. Optionally we can also migrate data into the service on a time and material basis. Examples of this would be connecting to an existing customer active directory service which would be On-boarding charged on a time and material basis. Off-boarding is included with the following scope: all user access will be revoked and any e2e cloud connect components containing customer data will be wiped and factory reset. All customer data will be removed. The customer is expected to migrate their own data out of the service prior to the end of the service. Optionally we can also migrate the data out of the Off-boarding service (such as historical access logs) on a time and material basis. Backups Disaster recovery Service lead time Minimum term Early exit charge Termination charge Consumer responsibilities Technical requirements Ordering and Invoicing Data restoration/service migration All e2e managed devices are backed up as part of the service. The service can be split across two UK datacentres if required. Typically working days from acceptance of order. The service has a minimum term of 6 months. One month of service cost. Termination before initial 6 months incurs early exit charge The control and management of end users of the service and any VPN components installed or provisioned on customer equipment including end user devices To manage the service the user is required to enrol with our two-factor authentication service and connect to the service using one of the following: Windows, Linux, MAC, IOS, Android. To create a fixed VPN the customer is required to either provide a CESG CPA foundation level approved device (IPsec Security Gateway) or allow e2e to supply and provision one. To create a mobile VPN the customer us required to either provide and support a CESG CPA foundation level approved device (IPSec VPN for remote working) or allow e2e to supply one. Monthly in arrears by Purchase Order or Direct Debit. Data can be migrated into and out of the service using the VPN access methods provided. e2e can assist with this process on a time and materials basis if required. 18

19 Financial recompense model Training Trial Service If the service level falls below the stated availability (excluding planned or emergency maintenance and excluding any fault that is not the responsibility of e2e or e2e components), consumers will be eligible for a service credit. Service credits are provided as professional service credits that can be used for any support, design or security activities and are calculated at a value of 10% of service spend on the particular service. The customer can choose to purchase training days. There is no trial service available. More information and contact details For more details on this service and to see the other services we offer visit Enquiries, and more information is available on request, with any queries. 19

e2e Managed Customer Private Cloud Infrastructure Service Definition Document

e2e Managed Customer Private Cloud Infrastructure Service Definition Document e2e Managed Customer Private Cloud Infrastructure Service Definition Document Overview A range of Private Cloud infrastructure managed services where the customer buys or already owns the physical equipment

More information

Service description RFL Virtual Data Centre

Service description RFL Virtual Data Centre Service description RFL Virtual Data Centre IaaS G-Cloud 6 1 Contents Overview... 3 Highlights... 3 Description... 3 Use cases... 3 Use cases... 5 Use cases... 5 Pricing... 5 Information assurance... 5

More information

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review The security threat landscape is constantly changing and it is important to periodically review a business

More information

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE AUSTRALIA

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE AUSTRALIA TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE AUSTRALIA WELCOME TO TELSTRA CLOUD SERVICES Our cloud infrastructure solutions are made up of a combination of scalable cloud resources, including

More information

PART D NETWORK SERVICES

PART D NETWORK SERVICES CONTENTS 1 ABOUT THIS PART... 2 2 PUBLIC NETWORK... 2 Internet... 2 3 PRIVATE NETWORK... 3 Global WAN services... 3 4 SECURITY SERVICES... 3 Firewall... 4 Intrusion Prevention (Network)... 5 SSL/IPSEC

More information

Desktop Services (Production) Lot 2 - Platform as a Service. Version: 2.0, Issue Date: 05/02/2014. Classification: Open

Desktop Services (Production) Lot 2 - Platform as a Service. Version: 2.0, Issue Date: 05/02/2014. Classification: Open Desktop Services (Production) Lot 2 - Platform as a Service Version: 2.0, Issue Date: 05/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 2014. Other than for the sole purpose

More information

Vodafone Total Managed Mobility

Vodafone Total Managed Mobility Vodafone Total Managed Mobility More productivity, less complexity Vodafone Power to you What s inside? What you get see how your business benefits 4 In detail find out how it all works 5 Service lifecycle

More information

Integrated windows authentication for customers based on Probation GSI network

Integrated windows authentication for customers based on Probation GSI network Product Overview Victims Tracker (VT) is a software application, which was developed by London Probation Trust (LPT) to effectively manage the engagement / contact with victims of crime and the management

More information

DIGITAL MARKETPLACE (G-CLOUD 7) OFFERING. Sopra Steria OneMobile SaaS Service. Introduction. Service Definition. Sopra Steria in the public sector

DIGITAL MARKETPLACE (G-CLOUD 7) OFFERING. Sopra Steria OneMobile SaaS Service. Introduction. Service Definition. Sopra Steria in the public sector DIGITAL MARKETPLACE (G-CLOUD 7) OFFERING Sopra Steria OneMobile SaaS Service Sopra Steria in the public sector Organisations across the public sector choose Sopra Steria to deliver transformation programmes

More information

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014 Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security

More information

Microsoft SharePoint Architectural Models

Microsoft SharePoint Architectural Models Microsoft SharePoint This topic is 1 of 5 in a series Introduction to Fundamental SharePoint This series is intended to raise awareness of the different fundamental architectural models through which SharePoint

More information

DIR Contract Number DIR-TSO-2621 Appendix C Pricing Index

DIR Contract Number DIR-TSO-2621 Appendix C Pricing Index DIR Contract Number DIR-TSO-2621 Appendix C Index CenturyLink Technology s offers Tier 3 Cloud services: Public Cloud, Private Cloud and Hybrid Cloud provided over our Tier One network. We own and operate

More information

74% 96 Action Items. Compliance

74% 96 Action Items. Compliance Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated

More information

Service Definition Nine23 MDM

Service Definition Nine23 MDM Service Definition Nine23 MDM G-Cloud iv Contents 1 Service Nine23 Mobile Device Management System.....4 1.1 Overview Nine23 MDM...... 4 1.2 Open Standards. 5 1.3 User requirements.....5 1.3.1 Client Browser....5

More information

Lot 1 Service Specification MANAGED SECURITY SERVICES

Lot 1 Service Specification MANAGED SECURITY SERVICES Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services

More information

Security Administration R77

Security Administration R77 Security Administration R77 Validate your skills on the GAiA operating system Check Point Security Administration R77 provides an understanding of the basic concepts and skills necessary to configure Check

More information

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper with Cloud-Based Security Services > White Paper It s a phenomenon and a fact: employees are always on today. They connect to the network whenever they want, from wherever they happen to be, with laptops,

More information

On and off premises technologies Which is best for you?

On and off premises technologies Which is best for you? On and off premises technologies Which is best for you? We don t mind what you buy, as long as it is YELLOW! Warren Sealey and Paul-Christian Garpe On Premises or in the cloud? 1 Agenda Why Symantec? Email

More information

McAfee Security Architectures for the Public Sector

McAfee Security Architectures for the Public Sector White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed

More information

Preparing for GO!Enterprise MDM On-Demand Service

Preparing for GO!Enterprise MDM On-Demand Service Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

Connecting to the Cloud. Lot 4 - Specialist Cloud Services. Version: 3.0, Issue Date: 01/12/2014. Classification: Open

Connecting to the Cloud. Lot 4 - Specialist Cloud Services. Version: 3.0, Issue Date: 01/12/2014. Classification: Open Connecting to the Cloud Version: 3.0, Issue Date: 01/12/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 201415/12/2014. Other than for the sole purpose of evaluating this Response,

More information

Introduction to the Mobile Access Gateway

Introduction to the Mobile Access Gateway Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch

More information

Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document

Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document Microsoft Services - GCloud 7 Catalogue Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document 1 Overview of the Service 1.1 Service Objectives The 2

More information

V1.4. Spambrella Email Continuity SaaS. August 2

V1.4. Spambrella Email Continuity SaaS. August 2 V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable

More information

SERVICE DEFINITION G-CLOUD 7 SECURE FILE TRANSFER DIODE. Classification: Open

SERVICE DEFINITION G-CLOUD 7 SECURE FILE TRANSFER DIODE. Classification: Open SERVICE DEFINITION G-CLOUD 7 SECURE FILE TRANSFER DIODE Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this

More information

IINS Implementing Cisco Network Security 3.0 (IINS)

IINS Implementing Cisco Network Security 3.0 (IINS) IINS Implementing Cisco Network Security 3.0 (IINS) COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

BYOD Guidance: BlackBerry Secure Work Space

BYOD Guidance: BlackBerry Secure Work Space GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.

More information

Firewall Environments. Name

Firewall Environments. Name Complliiance Componentt DEEFFI INITION Description Rationale Firewall Environments Firewall Environment is a term used to describe the set of systems and components that are involved in providing or supporting

More information

Cloud economics and flexibility with local choice and control

Cloud economics and flexibility with local choice and control Cloud economics and flexibility with local choice and control Schools are expected to operate in a hybrid IT environment for the foreseeable future, part on-premise and part cloud service. Schools require

More information

At dincloud, Cloud Security is Job #1

At dincloud, Cloud Security is Job #1 At dincloud, Cloud Security is Job #1 A set of surveys by the international IT services company, the BT Group revealed a major dilemma facing the IT community concerning cloud and cloud deployments. 79

More information

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

Getting Started with the iscan Online Data Breach Risk Intelligence Platform Getting Started with the iscan Online Data Breach Risk Intelligence Platform 2 Table of Contents Overview... 3 Data Breach Risk Intelligence... 3 Data Breach Prevention Lifecycle Defined... 3 Choosing

More information

McAfee Next Generation Firewall (NGFW) Administration Course

McAfee Next Generation Firewall (NGFW) Administration Course McAfee Product Education McAfee Next Generation Firewall (NGFW) Administration Course The McAfee NGFW Administration course from Education Services provides attendees with hands-on training on the design,

More information

Unified Threat Management, Managed Security, and the Cloud Services Model

Unified Threat Management, Managed Security, and the Cloud Services Model Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical

More information

SERVICE DEFINITION G-CLOUD 7 THALES PSN MAIL GATEWAY. Classification: Open

SERVICE DEFINITION G-CLOUD 7 THALES PSN MAIL GATEWAY. Classification: Open SERVICE DEFINITION G-CLOUD 7 THALES PSN MAIL GATEWAY Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this

More information

GPG13 Protective Monitoring. Service Definition

GPG13 Protective Monitoring. Service Definition GPG13 Protective Monitoring Service Definition Issue Number V1.3 Document Date 27 November 2014 Author: D.M.Woodcock Classification UNCLASSIFIED Version G-Cloud 6 2014 Copyright Assuria Limited. All rights

More information

SoftLayer Fundamentals. Security / Firewalls. August, 2014

SoftLayer Fundamentals. Security / Firewalls. August, 2014 SoftLayer Fundamentals Security / Firewalls August, 2014 Security Overview SoftLayer provides a security-rich environment for deploying and running customer workloads. Architecture and operational responsibilities

More information

Thales Service Definition for IL3 Encrypted Overlay for Cloud Services

Thales Service Definition for IL3 Encrypted Overlay for Cloud Services Thales Service Definition for UK IL3 Encrypted Overlay Thales Service Definition for IL3 Encrypted Overlay for Cloud Services April 2014 Page 1 of 11 Thales Service Definition for UK IL3 Encrypted Overlay

More information

MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013

MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013 MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY EMEA Webinar July 2013 Protecting the Enterprise Full Footprint Mobile user Application access management & Application security Enterprise headquarters

More information

CALNET 3 Category 7 Network Based Management Security. Table of Contents

CALNET 3 Category 7 Network Based Management Security. Table of Contents State of California IFB STPD 12-001-B CALNET 3 Category 7 Network Based Security Table of Contents 7.2.1.4.a DDoS Detection and Mitigation Features... 1 7.2.2.3 Email Monitoring Service Features... 2 7.2.3.2

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious

More information

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...

More information

E2BN Direct - Network Services for Schools and Academies

E2BN Direct - Network Services for Schools and Academies E2BN Direct - Network Services for Schools and Academies E2BN Direct provides internet, web filtering and other services directly to Schools and Academies. We use proven products backed by dedicated support,

More information

MDM & ENTERPRISE MOBILITY SERVICE DESCRIPTION G-CLOUD 7 OCTOBER 3, 2015

MDM & ENTERPRISE MOBILITY SERVICE DESCRIPTION G-CLOUD 7 OCTOBER 3, 2015 OCTOBER 3, 2015 MDM & ENTERPRISE MOBILITY SERVICE DESCRIPTION G-CLOUD 7 607 Milton Keynes Business Centre Hayley Court, Linford Wood, Milton Keynes. MK14 6gD Table of Contents 1 Introduction 4 1.1 Executive

More information

GETTING STARTED WITH THE ISCAN ONLINE DATA BREACH PREVENTION LIFECYCLE

GETTING STARTED WITH THE ISCAN ONLINE DATA BREACH PREVENTION LIFECYCLE GETTING STARTED WITH THE ISCAN ONLINE DATA BREACH PREVENTION LIFECYCLE iscan Online 5600 Tennyson Parkway Suite 343 Plano, Tx 75024 Table of Contents Overview... 3 Data Breach Prevention... 4 Choosing

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Guidance End User Devices Security Guidance: Apple ios 7

Guidance End User Devices Security Guidance: Apple ios 7 GOV.UK Guidance End User Devices Security Guidance: Apple ios 7 Updated 10 June 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform Can

More information

BYOD Guidance: Architectural Approaches

BYOD Guidance: Architectural Approaches GOV.UK Guidance BYOD Guidance: Architectural Approaches Published Contents 1. Service separation 2. Scenario 1: Exposing internal web applications 3. Scenario 2: Exposing email, calendar and contacts This

More information

A HELPING HAND TO PROTECT YOUR REPUTATION

A HELPING HAND TO PROTECT YOUR REPUTATION OVERVIEW SECURITY SOLUTIONS A HELPING HAND TO PROTECT YOUR REPUTATION CONTENTS INFORMATION SECURITY MATTERS 01 TAKE NOTE! 02 LAYERS OF PROTECTION 04 ON GUARD WITH OPTUS 05 THREE STEPS TO SECURITY PROTECTION

More information

CONTENTS. PCI DSS Compliance Guide

CONTENTS. PCI DSS Compliance Guide CONTENTS PCI DSS COMPLIANCE FOR YOUR WEBSITE BUILD AND MAINTAIN A SECURE NETWORK AND SYSTEMS Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

MyCloud Dedicated Unified Communications (UC) Transforming Business Communications

MyCloud Dedicated Unified Communications (UC) Transforming Business Communications MyCloud Dedicated Unified Communications (UC) Transforming Business Communications Businesses need communications tools that make their work easier and are available anywhere, anytime including within

More information

RemoteApp Publishing on AWS

RemoteApp Publishing on AWS RemoteApp Publishing on AWS WWW.CORPINFO.COM Kevin Epstein & Stephen Garden Santa Monica, California November 2014 TABLE OF CONTENTS TABLE OF CONTENTS... 2 ABSTRACT... 3 INTRODUCTION... 3 WHAT WE LL COVER...

More information

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS EXTENDING THREAT PROTECTION AND WHITEPAPER CLOUD-BASED SECURITY SERVICES PROTECT USERS IN ANY LOCATION ACROSS ANY NETWORK It s a phenomenon and a fact: employees are always on today. They connect to the

More information

Your complete guide to Cloud Computing

Your complete guide to Cloud Computing Your complete guide to Cloud Computing 1 Doc V1.0 Dec 2013 Table of Contents Hosted Desk- 3 The Cloud and Cloud Computing... 4 The benefits of Cloud Solutions 6 The Cloud is Growing - Rapidly 7 Resolving

More information

Service Definition Document

Service Definition Document Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

Security Information & Event Management (SIEM)

Security Information & Event Management (SIEM) Security Information & Event Management (SIEM) Peter Helms, Senior Sales Engineer, CISA, CISSP September 6, 2012 1 McAfee Security Connected 2 September 6, 2012 Enterprise Security How? CAN? 3 Getting

More information

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop White Paper Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop What You Will Learn Cisco Virtualization Experience Infrastructure (VXI) delivers a service-optimized desktop virtualization

More information

Configuration Guide BES12. Version 12.1

Configuration Guide BES12. Version 12.1 Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...

More information

Cloud economics and flexibility with local choice and control

Cloud economics and flexibility with local choice and control Cloud economics and flexibility with local choice and control Schools are expected to operate in a hybrid IT environment for the foreseeable future, part on-premise and part cloud service. Schools require

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

AppGuard. Defeats Malware

AppGuard. Defeats Malware AppGuard Defeats Malware and phishing attacks, drive-by-downloads, zero-day attacks, watering hole attacks, weaponized documents, ransomware, and other undetectable advanced threats by preventing exploits

More information

Microsoft Exchange Email Services

Microsoft Exchange Email Services Microsoft Exchange Email Services Safe and secure hosted exchange platform G-Cloud 5 Service Definition CONTENTS Overview of Service... 2 Westgate IT s Microsoft Exchange Email Services... 2 Why Use a

More information

Backup as a Service. Service Definition. G-Cloud VI. Information Security Management System

Backup as a Service. Service Definition. G-Cloud VI. Information Security Management System Backup as a Service Service Definition Version: 1.0 Version date: October 2015 Classification: Public Backup-as-a-Service Systems Monitoring DR-as-a-Service Storage-as-a-Service Hosted Exchange Colocation

More information

Zscaler Internet Security Frequently Asked Questions

Zscaler Internet Security Frequently Asked Questions Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices

More information

MaaS360 Mobile Enterprise Gateway

MaaS360 Mobile Enterprise Gateway MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software

More information

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Stop advanced targeted attacks, identify high risk users and control Insider Threats TRITON AP-EMAIL Stop advanced targeted attacks, identify high risk users and control Insider Threats From socially engineered lures to targeted phishing, most large cyberattacks begin with email. As these

More information

MaaS360 Mobile Enterprise Gateway

MaaS360 Mobile Enterprise Gateway MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2014 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software described

More information

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance NERC CIP Whitepaper How Endian Solutions Can Help With Compliance Introduction Critical infrastructure is the backbone of any nations fundamental economic and societal well being. Like any business, in

More information

Google Identity Services for work

Google Identity Services for work INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new

More information

Secure Cloud-Ready Data Centers Juniper Networks

Secure Cloud-Ready Data Centers Juniper Networks Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security

More information

Hosted Desktop as a Service

Hosted Desktop as a Service Hosted Desktop as a Service Contents 1 Introduction to Hosted Desktop Service...2 2 Service Definition...3 2.1 Functionality & Features... 3 2.2 Administration... 4 2.3 Access Methods... 4 2.4 Service

More information

End User Devices Security Guidance: Apple ios 8

End User Devices Security Guidance: Apple ios 8 GOV.UK Guidance End User Devices Security Guidance: Apple ios 8 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best satisfy

More information

CWSI Service Definition for Mobile Device Management and Security

CWSI Service Definition for Mobile Device Management and Security CWSI Service Definition for Mobile Device Management and Security October 2015 Contents I. Document Control... 3 a). History... 3 b). Reference Documents... 3 II. Company and Contact information... 3 1.

More information

Migrating to the Cloud. Developing the right Cloud strategy and minimising migration risk with Logicalis Cloud Services

Migrating to the Cloud. Developing the right Cloud strategy and minimising migration risk with Logicalis Cloud Services Migrating to the Cloud Developing the right Cloud strategy and minimising migration risk with Logicalis Cloud Services Organisations are looking for new ways to deliver IT services and demanding that ICT

More information

Involve Cloud Video Conferencing Service. VC:me (Video Conferencing: made easy) Service Definition

Involve Cloud Video Conferencing Service. VC:me (Video Conferencing: made easy) Service Definition Involve Cloud Video Conferencing Service VC:me (Video Conferencing: made easy) Service Definition Contents 1. Service Overview... 3 Reservations Service... 4 Endpoint Management... 4 Reporting... 4 Testing...

More information

1. Perimeter Security Dealing with firewall, gateways and VPNs and technical entry points. Physical Access to your premises can also be reviewed.

1. Perimeter Security Dealing with firewall, gateways and VPNs and technical entry points. Physical Access to your premises can also be reviewed. Service Definition Technical Security Review Overview of Service Considering the increasing importance of security, the number of organisations that allow for contingency in their Information Security

More information

October 2015 Issue No: 1.1. CESG Architectural Pattern No. 17 Internet Gateways

October 2015 Issue No: 1.1. CESG Architectural Pattern No. 17 Internet Gateways October 2015 Issue No: 1.1 CESG Architectural Pattern No. 17 Internet Gateways Architectural Pattern No. 17 Internet Gateways Issue No: 1.1 October 2015 Crown copyright 2015. CESG shall at all times retain

More information

Vodafone Private Cloud

Vodafone Private Cloud Vodafone Private Cloud Overview Vodafone Private Cloud is our dedicated public sector cloud service that connects you to your own private IL2/IL3 network and / or core government networks, including the

More information

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions The objective of Implementing Citrix NetScaler 10.5 for App and Desktop Solutions is to provide the foundational concepts and skills

More information

PROTECTIVE MONITORING SERVICE G-CLOUD SERVICE DEFINITION

PROTECTIVE MONITORING SERVICE G-CLOUD SERVICE DEFINITION PROTECTIVE MONITORING SERVICE G-CLOUD SERVICE DEFINITION 15 Table of contents 1 Introduction...2 2 Service Overview...3 2.1 Protective Monitoring...3 2.2 Service Description...4 2.3 Scenario: Basis for

More information

Additional Security Considerations and Controls for Virtual Private Networks

Additional Security Considerations and Controls for Virtual Private Networks CYBER SECURITY OPERATIONS CENTRE APRIL 2013 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL REFERENCES

More information

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control

More information

Fortigate Features & Demo

Fortigate Features & Demo & Demo Prepared and Presented by: Georges Nassif Technical Manager Triple C Firewall Antivirus IPS Web Filtering AntiSpam Application Control DLP Client Reputation (cont d) Traffic Shaping IPSEC VPN SSL

More information

Keyfort Cloud Services (KCS)

Keyfort Cloud Services (KCS) Keyfort Cloud Services (KCS) Data Location, Security & Privacy 1. Executive Summary The purposes of this document is to provide a common understanding of the data location, security, privacy, resiliency

More information

PSN Protective Monitoring. Service Definition

PSN Protective Monitoring. Service Definition PSN Protective Monitoring Service Definition Issue Number V3.0 Document Date 29 September 2015 Author: R.N. Connor Classification UNCLASSIFIED Version G-Cloud 7 2015 Copyright Tenian Limited. All rights

More information

ClearSkies SIEM Security-as-a-Service (SecaaS) Infocom Security Athens April 2014

ClearSkies SIEM Security-as-a-Service (SecaaS) Infocom Security Athens April 2014 1 ClearSkies SIEM Security-as-a-Service (SecaaS) Infocom Security Athens April 2014 About the Presenters Ms. Irene Selia, Product Manager, ClearSkies SecaaS SIEM Contact: iselia@odysseyconsultants.com,

More information

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0 Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...

More information

MANAGED EXCHANGE SOLUTIONS Secure, Scalable and Compliant Hosted Environments

MANAGED EXCHANGE SOLUTIONS Secure, Scalable and Compliant Hosted Environments Page 0 2015 SOLUTION BRIEF MANAGED EXCHANGE SOLUTIONS Secure, Scalable and Compliant Hosted Environments NET ACCESS LLC 9 Wing Drive Cedar Knolls NJ 07927 www.nac.net Page 1 Table of Contents 1. Introduction...

More information

Simple security is better security Or: How complexity became the biggest security threat

Simple security is better security Or: How complexity became the biggest security threat Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1 What do they have in common? DATA BREACH 2 Security is HARD! Components

More information

G-Cloud Service Definition. Atos Information Security Wireless Scanning Service

G-Cloud Service Definition. Atos Information Security Wireless Scanning Service G-Cloud Service Definition Atos Information Security Wireless Scanning Service Keeping your wireless networks secure Atos Information Security Wireless Scanning Service The Atos Wireless Scanning Service

More information

Agilisys G-Cloud Service V

Agilisys G-Cloud Service V Agilisys G-Cloud Service V Service Definition Endpoint Management Lot 1 Infrastructure as a Service (IaaS) April 2014 At Agilisys we deliver success through innovation working with our clients to transform

More information

Attachment A. Identification of Risks/Cybersecurity Governance

Attachment A. Identification of Risks/Cybersecurity Governance Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year

More information

Service Definition MMaaS Mobile Device Management. G- Cloud VII. Service Definition Nine23 MMaaS Mobile Device Management

Service Definition MMaaS Mobile Device Management. G- Cloud VII. Service Definition Nine23 MMaaS Mobile Device Management Service Definition MMaaS Mobile Device Management G- Cloud VII 1 Table of Contents 1 SERVICE MMAAS MOBILE DEVICE MANAGEMENT... 3 1.1 OVERVIEW NINE23... 3 1.2 SERVICE SUMMARY MMAAS MOBILE DEVICE MANAGEMENT...

More information

F5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France

F5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France F5 Identity and Access Management (IAM) Overview Laurent PETROQUE Manager Field Systems Engineering, France F5 s Security Strategy Protect Apps/Data Wherever They Reside Control Access to Apps/Data from

More information

MANAGED SHAREPOINT SOLUTIONS

MANAGED SHAREPOINT SOLUTIONS Page 0 2015 SOLUTION BRIEF MANAGED SHAREPOINT SOLUTIONS Private SharePoint 2013 SharePoint 2013 with Office apps NET ACCESS LLC 9 Wing Drive Cedar Knolls, NJ 07927 www.nac.net Page 1 Table of Contents

More information

Quick Start 5: Introducing and configuring Websense Cloud Web Security solution

Quick Start 5: Introducing and configuring Websense Cloud Web Security solution Quick Start 5: Introducing and configuring Websense Cloud Web Security solution Websense Support Webinar April 2013 TRITON STOPS MORE THREATS. WE CAN PROVE IT. 2013 Websense, Inc. Page 1 Presenter Greg

More information