Security. Trusted solutions from the independent experts. Plan Design Enable

Size: px
Start display at page:

Download "Security. Trusted solutions from the independent experts. Plan Design Enable"

Transcription

1 Security Trusted solutions from the independent experts Plan Design Enable

2 Atkins overview Atkins provides comprehensive security services and solutions that are not tied to specific vendors or technologies. With independence as our hallmark, our services incorporate all aspects, from concept masterplanning of an entire security network, through detailed design, to equipment specification and implementation. Regardless of project size and complexity, our aim is to provide a fully integrated solution, that is innovative yet proven in its approach to emerging technologies and threats. We deliver an extensive range of services for clients across the private and public sectors. By utilising our well-honed project lifecycle process, our highly skilled consulting teams can provide both breadth and depth of capability, tackling security projects in any geography. Atkins Group at a glance l l l l 1,250M revenue 17,000 people The largest multi-disciplinary consultancy in Europe The world s fifth-largest international design firm

3 Four cornerstones of security Using a holistic approach, Atkins delivers specialist consultancy around the four cornerstones of security Strategy Our work includes strategic security advice for major projects, ranging from threat assessments and risk analyses, to defining and auditing security plans. Our projects span major international sporting events, identity management for key government departments, and transportation infrastructures. Procedure We design and develop the essential security procedures and processes which are core to securing government, defence and large corporate programmes. Technology Our design engineers analyse the requirements, evaluate options, create and implement innovative technical solutions that safeguard critical national infrastructure, city centres, buildings and transport systems. Physical protection Drawing on our in-depth engineering skills, we analyse and design hardened physical structures, access control systems and security perimeters for a wide range of global clients. For any security challenge international or local, complex or simple ask Atkins. We can plan, build and enable the right solution for you. 3

4 Define the strategy Atkins will help you to understand the main threats to your business and develop an appropriate strategy supported by the best procedures, technical design and physical response Analysis and strategy development Our consultants have extensive experience in the planning and development of security strategies that will protect the value of your assets and instil confidence across your workforce. These strategies are underpinned by established methodologies for generating impact assessments that support decision making and inform the degree of protection needed in each case. Our threat assessments and detailed risk analyses are balanced against value, to ensure that budget and effort are prioritised effectively. Embracing a holistic approach, we consistently deliver a coherent, balanced and co-ordinated approach to security planning, and ensure effective integration with any existing security systems. Within the transport sector, for example, our security analysis and planning helps to ensure the safe movement of passengers, creating resilient, robust and sustainable transport networks. Secure-by-Design: delivering long-term value The Atkins approach to security is based on the Secure-by-Design model, from original concept through to detailed drawings. This key methodology ensures that buildings, transport infrastructure and systems are fully and reliably protected against the identified threats. Whole life value and cost-efficiency, including environmental impacts, are included in all our assessments and designs, as part of an integrated security programme. Adhering to Secure by Design principles, Atkins offers genuine and long lasting value for security projects over the total lifecycle.

5 Comprehensive programme management We offer a comprehensive suite of security services including planning, design, programme management and project support. We bring expert planning skills to complex programmes, ensuring the essential change management required to maximise investment in new security systems, particularly on sensitive government projects. Security accredited consultants With nationally-accredited consultants (including personnel on the CESG Listed Advisor Scheme and BS auditors), we support a wide range of Government and commercial projects including: BOWMAN, the UK military radio system Future Rapid Effects System (FRES) High-grade messaging for UK MoD (ANSON) Future cryptographic procurement programme for UK MoD Global Information Infrastructure (GII) for Network Enabled Capability Network and web servers for enterprise organisations With a combination of expertise and a wealth of domain knowledge, we can help develop systems that meet the information security needs of Government departments and the enterprise sector. Our clients include Foreign & Commonwealth Office, Department for Constitutional Affairs and Cabinet Office as well as independent health sector, international legal organisations, water and communications companies. Case study: transport threat assessment Atkins was commissioned by Kowloon- Canton Railway Corporation (KCRC) to provide, manage and deliver a Threat and Vulnerability Assessment for its key assets. We used US and UK Government Standards as the basis for the assessment. The most likely threats, including the range of attack objectives and methods that could be used were assessed, together with the vulnerabilities of each asset to such threats. 5

6 Design the process We help you to identify the right procedures to minimise risks, to secure your assets, and to protect your information and your people Advanced security procedures Robust procedures mean that if processes are followed and deviations and exceptions are trapped and traced, then your security system will work well and deliver real benefit. Procedures that can be avoided, bypassed or disregarded negate even the best network or physical security system, invalidate evidential trails, and can result in wasted investment and unnecessary risk. Case study: passenger and identity management Atkins designed and managed the largest biometric trial of its kind in the UK at London Heathrow Airport. Technologies included face, finger, iris and palm vein recognition for a throughput of over 12,000 passengers. The success of these trials was followed by the installation of the Atkins Passenger Authentication Scanning System (PASS) in Terminal 1, which provides the logical separation of all domestic passengers passing through the integrated departure lounges. This becomes operational at Heathrow s new Terminal 5 in early 2008, and embraces more than 450 processes.

7 Security audits We evaluate existing systems and procedures and provide trusted advice to meet changing threat levels. As a trusted critical friend, we will provide this service through a comprehensive security audit. As an international company, we are able to call upon support from our specialists with specific cultural, country and industry sector expertise. Maintaining standards Designing, managing and ensuring that appropriate configuration standards for ICT infrastructure are met is a core service Atkins provides to key Government Departments. Our SCIDA (Site Coordination Installation Design Authority) services support complex command and communications facilities, and ensure the maintenance of design standards for the availability, reliability, survivability and confidentiality of UK MoD and other government systems. Case study: security audit RWS, as one of the world s leading patent translation and search companies, has a heavy reliance on information technology where the security of client information paramount. RWS asked Atkins to audit its physical, network and server configurations. We proposed several enhancements to the network Intruder Prevention and Intruder Detection System (IPS/IDS) as well as other improvements to the firewalls and to the Authentication, Authorisation and Accounting (AAA) systems. The physical aspects of security surrounding the network and the servers were also examined and recommendations on improvements were made. 7

8 Design the technical solution Being a fully vendor-independent company, our commitment is to design the best value solution to meet your security requirements Breadth of talent Our wide range of skills offer comprehensive plan, build and operate capabilities, from feasibility studies and system design, through to project implementation. We can support your procurement process with tender preparation and vendor selection, and specify the training requirements, system operations and maintenance schedules. Security architecture design Following analysis and surveys, our experts provide detailed design and technical specifications for single projects or for large-scale systems. We cover the whole spectrum of security, producing the concepts and architecture, designing the system and specifying components. This includes detailed design of the secure communications infrastructure, and integrating detection sensors and surveillance systems with their control and monitoring rooms. Case study: oil production security To meet increased threat levels, Atkins has been retained to define and design a major security surveillance system for a Middle East oil company. This required site survey of 100 locations, including wellheads, storage areas, pipelines, and offices. Our design and comprehensive specifications include more than 3,000 cameras, with a sophisticated control and recording capability. The access control system includes perimeter detection and vehicle checks. We have designed a new resilient optical network to carry the video and data traffic, which also includes a new IP telephony system. A central control room and several satellite control rooms provide the necessary command and control facilities.

9 Complex surveillance systems Atkins provides the definition and design for wide-area surveillance schemes, with associated recording, Control Room design, Automatic Number Plate Recognition (ANPR) and supporting systems. Our team of experienced engineers have developed a range of skills and knowledge that places Atkins at the forefront of the planning and provision of both digital and analogue CCTV surveillance systems. Our consultants continue to play a critical and central role as Design Authority for many government and industrial projects. Advanced identity management Institutions and businesses across the globe face a growing number of national and international security challenges, including amongst others human trafficking, illegal immigration, airport passenger management and internet identity fraud. We are experts at assisting organisations in managing these security challenges. We can help you select and procure the right solutions to assist with establishing the true identity of an individual as part of a wider identity assurance programme. We are currently assisting several government departments in identity management projects where technical expertise, trusted partner status and delivery capability are core requirements. Case study: integrated sea- and airport CCTV Atkins was appointed by States of Guernsey Customs & Excise to design and project manage the installation of a new CCTV system in the commercial ferry port of St Peter Port and the new terminal building at Guernsey International Airport. The system had to monitor both airside and landside areas, including all arrivals and departures areas, car parks and approaches to both ports of entry. Atkins designed the system and specified the optical and microwave transmission network linking sensors to the control rooms. ANPR technology was deployed on all highway approaches with evidentialquality digital video recording. 9

10 Design security environments Our approach includes the principles of Secure-by-Design and Crime Prevention Through Environmental Design to provide an unobtrusive and effective security system Perimeter, border and barrier design Sensitive installations require effective physical perimeter security. We have extensive experience of designing physical structures, associated intrusion detection systems and sophisticated lighting. These systems can be complex, especially in environments where external triggers could create false alarms and need to be carefully specified. Our designs for vehicle access control arrangements include road blockers, chicanes and barriers with appropriate electronic controls such as ANPR identification systems. Masterplanning: from concept to delivery Our services incorporate all aspects, from concept masterplanning of an entire security network, through detailed design, to equipment specification and implementation. Atkins is vendor-independent, free to specify and select systems, hardware and software that deliver the best, total value, integrated solutions. Regardless of project size and complexity, our aim is to provide a fully integrated solution that is fully proven, innovative in its approach, and able to address current and emerging threats and technologies.

11 Experienced blast engineering Atkins is one of the leading specialists in the planning of critical buildings, including defence establishments. Our expertise covers blast analysis and the provision of designs to mitigate blast and weapons effects with the design of hardened structures. Our design work is based on the detailed evaluation of potential threats and includes structures resistant to accidental damage, terrorist attack, civil insurrection and acts of nature, including: Explosion and blast Seismic activity Bombs and missiles Nuclear, chemical and biological attack Major equipment damage Major structural damage Minor damage Drawing on our deep understanding of the security environment, which we have gained internationally, our skilled teams bring a breadth and enviable depth of engineering, operational and technical experience to every security project. Case study: secure military base This 900m project encompassed the replacement of almost an entire military base with modern facilities, demonstrating the full range of multi-disciplinary skills within Atkins. The design included extensive counter terrorism measures, such as advanced structural stability and integrity of beams, columns and roof rafters as well as cladding and glazing materials. Atkins reviewed the internal layout and masonry, paying particular attention to single-storey ties and struts. We also designed the fencing arrangements and perimeter protection systems. 11

12 Our values Dedicated to clients Atkins is independent of all contractors, service providers and suppliers. We offer unbiased advice and we are committed to obtaining the best value for money through technical excellence, innovation and execution for all our clients. Quality at the heart Atkins and each of its business groups adopts a systematic approach to quality management and maintains a documented quality system. Our integrated management system is accredited to BSN ISO 9001:2000 (Quality Management Standard) TickIT Scheme Version 5, OHSAS 18001:1999 (H&S Management Standard) and ISO 14001:2004 (Environmental Management Standard). Respecting our people Atkins is committed to attracting, training and retaining the best people. We are one of the top 20 Best Big Companies to Work For (The Times, 2007) and one of the UK s top 100 graduate employers (The Times, 2007). Valuing the environment We take environmental impact into account in the planning, design and implementation of our contracts to help prevent pollution, minimise our impacts on local communities and ensure that activities with high environmental risks are controlled effectively. We are proud of our reputation in the field. Contact Atkins: Atkins Ltd 2620 Aztec West Park Avenue Almondsbury Bristol BS32 4GQ United Kingdom Web: securitygroup@atkinsglobal.com The Atkins logo, the open A device and the strapline Plan Design Enable are trademarks of Atkins Limited, a WS Atkins plc company. Copyright 2008 Atkins Limited except where stated otherwise. This brochure is printed on 9Lives 80 paper, one of the new generation of eco-friendly materials, with class-leading whiteness and printability, with 80% recycled content.

Surveillance and Security Systems

Surveillance and Security Systems Surveillance and Security Systems Surveillance & Security Systems Surveillance Company Overview and Security Systems Company Overview Company Overview Ultra Electronics Surveillance and Security Systems

More information

Integrated Physical Security and Incident Management

Integrated Physical Security and Incident Management IT Enterprise Services Integrated Physical Security and Incident Management Every organisation needs to be confident about its physical security and its ability to respond to unexpected incidents. Protecting

More information

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1 How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1 2 How does IBM deliver cloud security? Contents 2 Introduction 3 Cloud governance 3 Security governance, risk management

More information

Experts who understand security, integration and great project delivery. Leading Security Through Innovation

Experts who understand security, integration and great project delivery. Leading Security Through Innovation Experts who understand security, integration and great project delivery Leading Security Through Innovation ATEC is a specialist in the security of critical infrastructure, public space and multi-site

More information

MANAGE THIRD PARTY RISKS

MANAGE THIRD PARTY RISKS SECURITY FOR INDUSTRIAL CONTROL SYSTEMS MANAGE THIRD PARTY RISKS A GOOD PRACTICE GUIDE Disclaimer Reference to any specific commercial product, process or service by trade name, trademark, manufacturer,

More information

A guide to access control for manufacturing sites

A guide to access control for manufacturing sites A guide to access control for manufacturing sites What is access control? Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round

More information

Remote Monitoring offers a comprehensive range of services, which are continually

Remote Monitoring offers a comprehensive range of services, which are continually Remote Monitoring Since the early 1990 s commercial remote monitoring has provided security solutions across a broad spectrum of industries. As the threat of crime and the cost of manned guarding have

More information

Beyond security: ATEC s contribution to Birmingham Airport s management systems

Beyond security: ATEC s contribution to Birmingham Airport s management systems Critical infrastructure / transportation Airports Beyond security: ATEC s contribution to Birmingham Airport s management systems As progressive transport hubs such as Birmingham Airport (BAL) invest in

More information

Understanding Sage CRM Cloud

Understanding Sage CRM Cloud Understanding Sage CRM Cloud Data centre and platform security whitepaper Document version 2016 Table of Contents 1.0 Introduction 3 2.0 Sage CRM Cloud Data centre Infrastructure 4 2.1 Site location 4

More information

Protecting Malaysia in the Connected world

Protecting Malaysia in the Connected world Protecting Malaysia in the Connected world cyber Security Company of the Year (Cybersecurity Malaysia, 2014) Most innovative information security company in Malaysia (Cybersecurity Malaysia, 2012) BAE

More information

Physical Security Services

Physical Security Services Physical Security Services The ANVIL Group Physical Security Services The ANVIL Group is an internationally renowned and accredited security company specialising in Crisis Avoidance. Established in 1988,

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

A GOOD PRACTICE GUIDE FOR EMPLOYERS

A GOOD PRACTICE GUIDE FOR EMPLOYERS MITIGATING SECURITY RISK IN THE NATIONAL INFRASTRUCTURE SUPPLY CHAIN A GOOD PRACTICE GUIDE FOR EMPLOYERS April 2015 Disclaimer: Reference to any specific commercial product, process or service by trade

More information

HNOLOGY IN POLICING SECURITY & CYBERSPACE SITUATION

HNOLOGY IN POLICING SECURITY & CYBERSPACE SITUATION S e c u r i t y & D e f e n c e Bringing The Digital Edge To Your Operations ITY & CYBERSPACE SITUATIONAL AWARENESS CRITICAL COM S CRITICAL COMMUNICATIONS TECHNOLOGY IN POLICING SE ITUATIONAL AWARENESS

More information

CYBER SECURITY Audit, Test & Compliance

CYBER SECURITY Audit, Test & Compliance www.thalescyberassurance.com CYBER SECURITY Audit, Test & Compliance 02 The Threat 03 About Thales 03 Our Approach 04 Cyber Consulting 05 Vulnerability Assessment 06 Penetration Testing 07 Holistic Audit

More information

SUPPORTING THE RAIL INDUSTRY UNIQUE SOLUTIONS FOR UNIQUE SITUATIONS WWW.SGS.COM/RAIL

SUPPORTING THE RAIL INDUSTRY UNIQUE SOLUTIONS FOR UNIQUE SITUATIONS WWW.SGS.COM/RAIL SUPPORTING THE RAIL INDUSTRY UNIQUE SOLUTIONS FOR UNIQUE SITUATIONS WWW.SGS.COM/RAIL OUR UNIQUE SOLUTION TO YOUR UNIQUE SITUATION SGS is recognised as the global benchmark for quality and integrity. We

More information

Cyber security. Ideal logo position here

Cyber security. Ideal logo position here Cyber security Ideal logo position here Cyber security Cundall IT and audio visual Setting the scene UK construction industry Computer networks Ethical hacker Case studies Summary Final thoughts IT and

More information

Corporate Overview NEC Australia

Corporate Overview NEC Australia Corporate Overview NEC Australia NEC Australia au.nec.com Company facts Strong history in Australia - Forty six years local expertise combined with global reach as part of NEC Corporation, a global leader

More information

Command and Control Integrated Solutions. Transforming security needs into unique custom-made solutions. Building Technologies

Command and Control Integrated Solutions. Transforming security needs into unique custom-made solutions. Building Technologies Command and Control Integrated Solutions Transforming security needs into unique custom-made solutions Building Technologies A Changing World A Basic Need Our cities become more complex; our transportation

More information

ICT Security. High-Quality Information and Know How Protection. Design and implementation of security. Covering almost all of ICT security

ICT Security. High-Quality Information and Know How Protection. Design and implementation of security. Covering almost all of ICT security ICT High-Quality Information and Know How Protection Design and implementation of security solutions optimised to meet the client s needs Implementing state-of-the-art hardware and software security products

More information

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations

More information

Bio-inspired cyber security for your enterprise

Bio-inspired cyber security for your enterprise Bio-inspired cyber security for your enterprise Delivering global protection Perception is a network security service that protects your organisation from threats that existing security solutions can t

More information

Implanting Large Security Systems in Seaports

Implanting Large Security Systems in Seaports Implanting Large Security Systems in Seaports The Role of the Security Consultant Presented by Yuval Alon Senior Maritime Security Expert 1 Company s History 37 YEARS International Activity in Homeland

More information

CyberSecurity Solutions. Delivering

CyberSecurity Solutions. Delivering CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions

More information

Secure by design: taking a strategic approach to cybersecurity

Secure by design: taking a strategic approach to cybersecurity Secure by design: taking a strategic approach to cybersecurity The cybersecurity market is overly focused on auditing policy compliance and performing vulnerability testing when the level of business risk

More information

THE STRATEGIC POLICING REQUIREMENT. July 2012

THE STRATEGIC POLICING REQUIREMENT. July 2012 THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12

More information

Advanced automation and real-time business intelligence Solutions for the Energy & Utilities markets M A N A G I N G T H E E S S E N T I A L S

Advanced automation and real-time business intelligence Solutions for the Energy & Utilities markets M A N A G I N G T H E E S S E N T I A L S Advanced automation and real-time business intelligence Solutions for the Energy & Utilities markets M A N A G I N G T H E E S S E N T I A L S making a difference in system integration Capula is a leading

More information

Enterprise Risk Management taking on new dimensions

Enterprise Risk Management taking on new dimensions Enterprise Risk Management taking on new dimensions October 2006 The practice of Enterprise Risk Management (ERM) is becoming more critical and complex every day. There is a growing need for organizations

More information

Procuring Penetration Testing Services

Procuring Penetration Testing Services Procuring Penetration Testing Services Introduction Organisations like yours have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat

More information

Practitioner Certificate in Information Assurance Architecture (PCiIAA)

Practitioner Certificate in Information Assurance Architecture (PCiIAA) Practitioner Certificate in Information Assurance Architecture (PCiIAA) 15 th August, 2015 v2.1 Course Introduction 1.1. Overview A Security Architect (SA) is a senior-level enterprise architect role,

More information

IT Security. Securing Your Business Investments

IT Security. Securing Your Business Investments Securing Your Business Investments IT Security NCS GROUP OFFICES Australia Bahrain China Hong Kong SAR India Korea Malaysia Philippines Singapore Sri Lanka Securing Your Business Investments! Information

More information

Central Sponsor for Information Assurance. A National Information Assurance Strategy

Central Sponsor for Information Assurance. A National Information Assurance Strategy Central Sponsor for Information Assurance A National Information Assurance Strategy A NATIONAL INFORMATION ASSURANCE STRATEGY i Foreword Information and communications technology is changing the way that

More information

Remote control. With RVR you can be sure you ll never be alone. Remote control

Remote control. With RVR you can be sure you ll never be alone. Remote control Remote control Remote control Remote locations are often the most vulnerable to attack, and similarly the most difficult to protect. Utilities with critical infrastructure; forecourts with expensive cars;

More information

Critec Consult. Independent Security Consultants. Critec Consult provide totally independent advice on all physical security disciplines, including:

Critec Consult. Independent Security Consultants. Critec Consult provide totally independent advice on all physical security disciplines, including: Critec Consult Independent Security Consultants Critec Consult Established in 2001, Critec Consult Limited is a totally independent physical security consultancy. Critec Consult provide totally independent

More information

Data Security Concerns for the Electric Grid

Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid The U.S. power grid infrastructure is a vital component of modern society and commerce, and represents a critical

More information

ata ports & harbours airports railways roads & highways 0333 0112 046 info@ata-recruitment.co.uk www.ata-recruitment.co.uk

ata ports & harbours airports railways roads & highways 0333 0112 046 info@ata-recruitment.co.uk www.ata-recruitment.co.uk TRANSPORT INFRASTRUCTURE RECRUITMENT airports ports & harbours roads & highways railways 0333 0112 046 info@-recruitment.co.uk INTRODUCTION ATA has specialist operating teams who are strategically focussed

More information

Compliance Guide: ASD ISM OVERVIEW

Compliance Guide: ASD ISM OVERVIEW Compliance Guide: ASD ISM OVERVIEW Australian Information Security Manual Mapping to the Principles using Huntsman INTRODUCTION In June 2010, The Australian Government Protective Security Policy Framework

More information

MANAGING THE SOFTWARE PUBLISHER AUDIT PROCESS

MANAGING THE SOFTWARE PUBLISHER AUDIT PROCESS MANAGING THE SOFTWARE PUBLISHER AUDIT PROCESS 3 THE USE OF BUSINESS SOFTWARE AND SPORTS ARE DEFINITELY QUITE SIMILAR; IF YOU WANT TO PLAY (USE THE SOFTWARE), YOU HAVE TO ACCEPT THE RULES. THIS INCLUDES

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

FM & SECURITY SOLUTIONS. SSS Managed Services. Impartial, innovative, involved

FM & SECURITY SOLUTIONS. SSS Managed Services. Impartial, innovative, involved FM & SECURITY SOLUTIONS SSS Managed Services Impartial, innovative, involved SSS MANAGED SERVICES INTRODUCTION SSS Managed Services provides a range of flexible, scalable and service-led solutions for

More information

Asset Management. Enabling effective estates strategies >

Asset Management. Enabling effective estates strategies > Asset Management Enabling effective estates strategies Enabling effective estates strategies In these challenging times, we help our clients deliver strategies that contribute to the overall performance

More information

Cybersecurity Delivering Confidence in the Cyber Domain

Cybersecurity Delivering Confidence in the Cyber Domain Cybersecurity Delivering Confidence in the Cyber Domain With decades of intelligence and cyber expertise, Raytheon offers unmatched, full-spectrum, end-to-end cyber solutions that help you secure your

More information

The Next Generation of Broadband

The Next Generation of Broadband In the current information age where government, businesses and individuals rely on technology, high speed broadband has become the fourth utility generating an expectation of availability. The Next Generation

More information

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information

More information

HMG Security Policy Framework

HMG Security Policy Framework HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of

More information

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. Table of contents 1 Introduction...3 2 Architecture Services...4 2.1 Enterprise Architecture Services...5 2.2 Solution Architecture Services...6 2.3 Service

More information

developing your potential Cyber Security Training

developing your potential Cyber Security Training developing your potential Cyber Security Training The benefits of cyber security awareness The cost of a single cyber security incident can easily reach six-figure sums and any damage or loss to a company

More information

Technology applied to the most innovative and demanding sectors of the market.

Technology applied to the most innovative and demanding sectors of the market. STE is an Italian medium sized private Systems Integration Company leader in Information and Communication Technology applied to the most innovative and demanding sectors of the market. Established on

More information

Committees Date: Subject: Public Report of: For Information Summary

Committees Date: Subject: Public Report of: For Information Summary Committees Audit & Risk Management Committee Finance Committee Subject: Cyber Security Risks Report of: Chamberlain Date: 17 September 2015 22 September 2015 Public For Information Summary Cyber security

More information

How To Help Your Business Succeed

How To Help Your Business Succeed G Cloud III Framework Lot 4 (SCS) CHECK Accredited Penetration Testing Services Contents Executive Summary 3 CHECK Accredited Penetration Testing Services 4 Why Deloitte? 5 Package Cost 7 Contact 9 Service

More information

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions Managed Security Managed Security MANAGED SECURITY SOLUTIONS I would highly recommend for your company s network review... were by far the best company IT Manager, Credit Management Agency Presenting IT

More information

System Security. Your data security is always our top priority

System Security. Your data security is always our top priority Your data security is always our top priority Data security is an important factor for every client, our continued investment in the latest technology methods and world class data centres show our commitment

More information

DATA SECURITY POLICY. Data Security Policy

DATA SECURITY POLICY. Data Security Policy Data Security Policy Contents 1. Introduction 3 2. Purpose 4 3. Data Protection 4 4. Customer Authentication 4 5. Physical Security 5 6. Access Control 6 7. Network Security 6 8. Software Security 7 9.

More information

CONTENTS. PCI DSS Compliance Guide

CONTENTS. PCI DSS Compliance Guide CONTENTS PCI DSS COMPLIANCE FOR YOUR WEBSITE BUILD AND MAINTAIN A SECURE NETWORK AND SYSTEMS Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not

More information

IBM Connections Cloud Security

IBM Connections Cloud Security IBM Connections White Paper September 2014 IBM Connections Cloud Security 2 IBM Connections Cloud Security Contents 3 Introduction 4 Security-rich Infrastructure 6 Policy Enforcement Points Provide Application

More information

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous

More information

Aon Risk Solutions Aon Crisis Management. Crisis Management Consulting Terrorism Probable Maximum Loss (PML) Studies

Aon Risk Solutions Aon Crisis Management. Crisis Management Consulting Terrorism Probable Maximum Loss (PML) Studies Aon Risk Solutions Crisis Management Consulting Terrorism Probable Maximum Loss (PML) Studies A terrorist incident at or near your operations, could result in human casualties, property damage, business

More information

Business continuity management

Business continuity management Business continuity management The world is a riskier place. Emerging threats such as product recalls with the increasing vulnerability of sophisticated global supply chains and unpredictable natural

More information

MSc Cyber Security. identity. hacker. virus. network. information

MSc Cyber Security. identity. hacker. virus. network. information identity MSc Cyber Security hacker virus QA is the foremost provider of education in the UK. We work with individuals at all stages of their careers, from our award-winning apprenticeship programmes, through

More information

The Protection Mission a constant endeavor

The Protection Mission a constant endeavor a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring

More information

Cisco Security Optimization Service

Cisco Security Optimization Service Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless

More information

Oil & Gas Industry Towards Global Security. A Holistic Security Risk Management Approach. www.thalesgroup.com/security-services

Oil & Gas Industry Towards Global Security. A Holistic Security Risk Management Approach. www.thalesgroup.com/security-services Oil & Gas Industry Towards Global Security A Holistic Security Risk Management Approach www.thalesgroup.com/security-services Oil & Gas Industry Towards Global Security This white paper discusses current

More information

MANAGEMENT SYSTEMS CERTIFICATION FROM AUTOMOTIVE SPECIALISTS

MANAGEMENT SYSTEMS CERTIFICATION FROM AUTOMOTIVE SPECIALISTS MANAGEMENT SYSTEMS CERTIFICATION FROM AUTOMOTIVE SPECIALISTS VCA - Delivering a Safer Environment VCA - Delivering a Safer Environment 1 Contents Pg 2 Formal Certification Burden or Benefit? 3 Why VCA?

More information

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to

More information

Network Assessment Services

Network Assessment Services Network ment Services Information networks are arguably your most important IT assets, their speed and reliability are the foundations upon which your critical business systems and applications run. Ensuring

More information

Transforming. Source & Deploy Solutions from Computacenter

Transforming. Source & Deploy Solutions from Computacenter Transforming the IT Supply Chain Source & Deploy Solutions from Computacenter CONTENTS 03 04-05 06-07 08-09 10 Effecting change Standard practice EXPERIENCE CERTAINTY Centres of excellence Reaping the

More information

Application management services that power business transformation

Application management services that power business transformation SOLUTION MAP Application management services that power business transformation Protecting business reputation and revenue through superior application performance Application management for IT and business

More information

WHITE PAPER. An Introduction to Network- Vulnerability Testing

WHITE PAPER. An Introduction to Network- Vulnerability Testing An Introduction to Network- Vulnerability Testing C ONTENTS + Introduction 3 + Penetration-Testing Overview 3 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and

More information

Cyber Essentials Scheme

Cyber Essentials Scheme Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these

More information

MANAGEMENT SYSTEMS CERTIFICATION

MANAGEMENT SYSTEMS CERTIFICATION MANAGEMENT SYSTEMS CERTIFICATION VCA - Delivering a Safer Environment VCA - Delivering a Safer Environment 1 Contents Pg 2 Formal Certification - Burden or Benefit? 4 Why VCA? 6 ISO 14001 8 Acorn (A Phased

More information

Introduction. Industry Changes

Introduction. Industry Changes Introduction The Electronic Safety and Security Design Reference Manual (ESSDRM) is designed to educate and inform professionals in the safety and security arena. The ESSDRM discusses trends and expertise

More information

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture 2 Data Security and Privacy Principles for IBM SaaS Contents 2 Introduction

More information

Datacentre London 1. Dedicated managed environment for mission critical services. Six Degrees Group www.6dg.co.uk

Datacentre London 1. Dedicated managed environment for mission critical services. Six Degrees Group www.6dg.co.uk Dedicated managed environment for mission critical services www.6dg.co.uk Our datacentres are the core of our business. At we own and manage 30,000 square feet of highly available, geographically diverse

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

D-G4-L4-126 Police contact management and demand reduction review Deloitte LLP Service for G-Cloud IV

D-G4-L4-126 Police contact management and demand reduction review Deloitte LLP Service for G-Cloud IV D-G4-L4-126 Police contact management and demand reduction review Deloitte LLP Service for G-Cloud IV September 2013 Contents 1 Service Overview 1 2 Detailed Service Description 2 3 Commercials 6 4 Our

More information

A Guide to the Cyber Essentials Scheme

A Guide to the Cyber Essentials Scheme A Guide to the Cyber Essentials Scheme Published by: CREST Tel: 0845 686-5542 Email: admin@crest-approved.org Web: http://www.crest-approved.org/ Principal Author Jane Frankland, Managing Director, Jane

More information

Expert. Trusted. Effective. IT managed services tailored to you. From Modern Networks.

Expert. Trusted. Effective. IT managed services tailored to you. From Modern Networks. Expert. Trusted. Effective. IT managed services tailored to you. From Modern Networks. A Complete End-to-End Portfolio Established in 1999, Modern Networks is a managed service provider helping clients

More information

Growth Through Excellence

Growth Through Excellence Growth Through Excellence Public/Private Cloud Services Service Definition Document G- Cloud 5 REFERENCE NUMBER RM1557v Table of Contents Table of Contents... 3 Executive Summary... 4 About the Company...

More information

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc. JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President

More information

DORSET & WILTSHIRE FIRE AND RESCUE AUTHORITY Performance, Risk and Business Continuity Management Policy

DORSET & WILTSHIRE FIRE AND RESCUE AUTHORITY Performance, Risk and Business Continuity Management Policy Not Protectively Marked Item 6 Appendix B DORSET & WILTSHIRE FIRE AND RESCUE AUTHORITY Management Policy The Dorset & Wiltshire Fire and Rescue Authority () is the combined fire and rescue authority for

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

Network Systems Integration

Network Systems Integration Network Systems Integration Strong Networks for Mission-Critical Services Turnkey Solutions for Today s Large-Scale Networks Government and business enterprises turn to General Dynamics Information Technology

More information

GoodData Corporation Security White Paper

GoodData Corporation Security White Paper GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share

More information

Embrace the G-Cloud. Ultra Secure Colocation Services for the Public Sector. thebunker.net Phone: 01304 814800 Fax: 01304 814899 info@thebunker.

Embrace the G-Cloud. Ultra Secure Colocation Services for the Public Sector. thebunker.net Phone: 01304 814800 Fax: 01304 814899 info@thebunker. Embrace the G-Cloud Ultra Secure Colocation Services for the Public Sector 1 Phone: 01304 814800 Fax: 01304 814899 info@ Contents Introduction What is G-Cloud? Types of accreditation: Business Impact Levels

More information

National Surface Transport Security Strategy. September 2013. Transport and Infrastructure Senior Officials Committee. Transport Security Committee

National Surface Transport Security Strategy. September 2013. Transport and Infrastructure Senior Officials Committee. Transport Security Committee National Surface Transport Security Strategy September 2013 Transport and Infrastructure Senior Officials Committee Transport Security Committee 1 National Surface Transport Security Strategy (NSTSS) Foreword

More information

Am I safe traveling home?

Am I safe traveling home? Am I safe traveling home? Through intelligent security solutions with Siveillance, we help make the world a safer place. Answers for infrastructure. 2 How can we secure the city without restricting movement

More information

University of Brighton School and Departmental Information Security Policy

University of Brighton School and Departmental Information Security Policy University of Brighton School and Departmental Information Security Policy This Policy establishes and states the minimum standards expected. These policies define The University of Brighton business objectives

More information

Appendix 1a: Facilities Management Guide elements of FM Soft FM

Appendix 1a: Facilities Management Guide elements of FM Soft FM Catering Responsibility for the management of on site catering often falls within the remit of the Facilities Manager. In the public sector this can range from the provision of vending or coffee bar type

More information

Section A: Introduction, Definitions and Principles of Infrastructure Resilience

Section A: Introduction, Definitions and Principles of Infrastructure Resilience Section A: Introduction, Definitions and Principles of Infrastructure Resilience A1. This section introduces infrastructure resilience, sets out the background and provides definitions. Introduction Purpose

More information

DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES

DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES G Cloud IV Framework Lot 4 DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES Service Description - ANSEC IA Limited CONTENTS 1 Company Profile. 2 The ANSEC Effect 3 Qualifications 4 Service Description..

More information

ESKISP6054.01 Conduct security testing, under supervision

ESKISP6054.01 Conduct security testing, under supervision Overview This standard covers the competencies required to conduct security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to

More information

UK SBS Physical Security Policy

UK SBS Physical Security Policy UK SBS Physical Security Policy Version Date Author Owner Comments 1.0 16 June 14 Head of Risk, Information and Security Compliance (Mel Nash) Senior Information Risk Owner (Andy Layton) Ist Issue following

More information

CPNI VIEWPOINT 02/2010 PROTECTION OF DATA CENTRES

CPNI VIEWPOINT 02/2010 PROTECTION OF DATA CENTRES CPNI VIEWPOINT 02/2010 PROTECTION OF DATA CENTRES APRIL 2010 CPNI in conjunction with the Sister Banks would like to acknowledge and thank ECA Ltd for their help in the preparation of this report. The

More information

JE PANEL/BENCHMARKING REF NO: 867/4 EVALUATION DATE:

JE PANEL/BENCHMARKING REF NO: 867/4 EVALUATION DATE: 1. JOB TITLE Job Title: Project Manager (Transport Infrastructure) Reports to: Design Programme Manager Service: Highways and Transport Environment & Infrastructure Date: November 2014 2. JOB PURPOSE To

More information

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES Final Report Prepared by Dr Janet Tweedie & Dr Julie West June 2010 Produced for AGIMO by

More information

Global Information Security Survey 2002

Global Information Security Survey 2002 M ARCH 2002 Global Information Security Survey 2002!@# Issues at a glance Only 40% of organisations are confident they would detect a systems attack 40% of organisations do not investigate information

More information

integrated fire and security solutions Maximum protection for buildings

integrated fire and security solutions Maximum protection for buildings integrated fire and security solutions Maximum protection for buildings integrated fire and security solutions Johnson Controls: expert qualified in building protection Johnson Controls is the recognised

More information