SBL Integration, Capabilities, and Enablement in Defence

Size: px
Start display at page:

Download "SBL Integration, Capabilities, and Enablement in Defence Justice@softbox.co.uk. 01347 812148 www.softbox.co.uk"

Transcription

1 SBL Integration, Capabilities, and Enablement in Defence

2 Contents Page 3 SBL Company Overview 4 SBL in Justice 5 SBL Apple Authorised Reseller 5 SBL Apple Authorised Reseller Events 6 SBL, Apple Authorised Reseller in Justice 7 SBL Package Capabilities for Justice Diagram

3 SBL Company Overview Expertise in IT Solutions since 1987 SBL is a vendor independent, enterprise level specialist in the supply of hardware, software solutions and professional services including training and consultancy. Recognised as a market leader in Information Assurance (IA), SBL plays a key role in supporting government through IA initiatives and services. Vendor independence and our commitment to the highest levels of customer service have ensured SBL s continued success since Our vendor independence policy is designed to ensure that our customers get the product or service that best suits their needs, regardless of other considerations. Operation of this policy enables us to offer positive advice and make recommendations with confidence that they are informed by a thorough analysis of the customer s requirements and a comprehensive knowledge of the marketplace. Public Sector SBL has over 25 years experience in delivering value, expertise and excellence of service to the UK Public Sector. Dedicated teams look after Local Government, Health Services, Ministry of Defence and Central Government & Criminal Justice customers. SBL Scotland, provides a dedicated resource for our customers in Scotland and our Education division OLC (On Line Computers) provides a complete range of ICT services to the Education sector. Over the course of our 25 years serving the UK Public Sector SBL has developed and invested in sophisticated and mature business processes which have been purpose-built to accommodate the pattern of Public Sector procurement. SBL holds places on major Public Sector frameworks including GPS, G-Cloud and the DE&S framework. SBL provide dedicated support services to the DII (Defence Information Infrastructure) for some of the largest Software Enterprise Agreements in Europe. These services include an online managed system which enables the secure download of software updates, service packs, patches and fixes.

4 SBL in Justice Overview SBL s Justice Team has been a trusted advisor and significant Vendor Independent Supplier to the Police for over 13 years for security solutions, COTS, hardware and consultancy. SBL are also the leading security advisor & supplier to the Police for restricted and top secret projects. SBL have historically been a leading supplier for the ACPO Framework and currently sits on the following framework and purchasing routes: CITHS DE&S G-Cloud ProcServe Recent News Recent Projects & Hot Topics Include: Confidential Network Technology Supply MDM Sandbox App Centre IPS & Advanced Malware Protection VPN & Laptop Encryption IL3-6 Surveillance Solutions IL4 DOBUS Patch Delivery Managed Service IL3-IL4 Document Scanning Projects Regional Force Vendor Consolidation Services Desktop Virtualisation Server, SAN & Virtualisation Projects Digital Certificates & PKI Master Data Management Open Source Solutions CESG Desktop Encryption and Gateway Encryption Security

5 SBL Apple Authorised Reseller SBL is an Apple Authorised Reseller with expertise in ipad and the Classic Mac products (imac and the Apple Notebook offering). SBL has been able to work with our partners and Apple to ensure a service for our customers that enables the secure use and deployment of ipad and Apple products. SBL offers a range of proprietary software, services and training to assist users to integrate Apple products into their enterprise as well as associated peripherals and accessories. SBL Apple Authorised Reseller Training & Events Since becoming an Apple Authorised Reseller SBL have held ipad events that aim to ensure delegates gain a greater understanding of how to secure and integrate ipad in to a secure network. Events held at Apple headquarters, have taken place for our NHS and Defence customers since 2012 and included presentations from SBL s own Public Sector Business Development Director, Colin Williams, relevant partners who have aided facilitation of Apple products as well as Apple and CESG presentations. SBL have a dedicated Events Management Team, who organise specific IT Security Events comprising exhibition and seminar programs for customers. The Events Team, alongside SBL s dedicated Apple Authorised Reseller Team are utilised to ensure all ipad Events include the latest and most relevant information available to the relevant Sector. SBL working with Apple can offer a range of training that can aid the use and integration of Apple products within your network, as simple and easy to use as most Apple products are, the importance of ensuring the right software and user s capabilities is key to really creating an effective and efficient deployment. SBL also offers various Security and Software training, specialising in Information Assurance and Quality Standards training which is delivered either at our training facility in York, or on a customer s site. Consultants will design and deliver tailored courses to suit the needs of your organisation.

6 SBL Apple Authorised Reseller in Justice As an Apple Authorised Reseller SBL has the capability to enable the use and deployment of ipad and other Apple products in to a secure network, whilst enabling the security of these products to varying levels dependant on your requirement. SBL also offers a range of proprietary software, services and training to assist users to integrate Apple products into their enterprise as well as associated peripherals and accessories. Services: Support Experienced & Expert Team Partners and Solution Providers Bespoke Packages High level Deployment Relevant Defence Frameworks Accessories: Ruggedized Cases & Covers Cables, Keyboards and Power Packs Associated peripherals and accessories Mobile Device Management Best of Breed Solutions Enablement, Enhancement & Expertise Access Control and Identity Management Solutions Data Loss Prevention (DLP) VPN Technologies Encryption & Security Solutions In-House Etching Facility Defence Specific Industry Advice & Support Cyber Security and Information Security Training & Events Training & Consultancy Apple Training Security Training Cyber Training Security Consultancy Training Security UK Safe Harbour Secure Applications Centre Secure Network updates Guidelines & Mandate (GPG13) DOBUS DOBUS To Go

7 SBL in Justice Capabilities Assessment Consideration Expert Advice Secure Enable Support Educate SBL ensure the buying process is as easy and understandable as possible; being available to support customers through each step is integral to ensuring the right solution is implemented. What works for one customer may not for the next, therefore SBL understands the importance of assessment and evaluation, the importance of education and enablement and of course the ability to deploy and facilitate solutions in to a Justice network. Deploy Facilitate For more information about SBL Justice capabilities and how SBL can enable your deployment please contact your Justice Account Manager Decision Evaluation Evaluate Analyse justice@softbox.co.uk Tel: Web:

8 East Moor House, Green Park Business Centre, Goose Lane, Sutton-on-the-Forest, York, North Yorkshire, YO61 1ET

Secure Mobile Solutions

Secure Mobile Solutions Secure Mobile Solutions Manage workloads securely on the move sevices@softbox.co.uk 01347 812100 www.softbox.co.uk Contents Secure Mobile Solutions Key Features and Benefits Integration and Management

More information

DOBUS And SBL Cloud Services Brochure

DOBUS And SBL Cloud Services Brochure 01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure enquiries@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted

More information

DOBUS And SBL Cloud Services Brochure

DOBUS And SBL Cloud Services Brochure 01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure cloud@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted managed

More information

Clear Innovation Sectors & Divisions

Clear Innovation Sectors & Divisions Clear Innovation Sectors & Divisions An Introduction to Centerprise International Centerprise International Ltd, Hampshire International Business Park, Lime Tree Way, Basingstoke, Hampshire, RG24 8GQ 01256

More information

Service Definition MMaaS Mobile Device Management. G- Cloud VII. Service Definition Nine23 MMaaS Mobile Device Management

Service Definition MMaaS Mobile Device Management. G- Cloud VII. Service Definition Nine23 MMaaS Mobile Device Management Service Definition MMaaS Mobile Device Management G- Cloud VII 1 Table of Contents 1 SERVICE MMAAS MOBILE DEVICE MANAGEMENT... 3 1.1 OVERVIEW NINE23... 3 1.2 SERVICE SUMMARY MMAAS MOBILE DEVICE MANAGEMENT...

More information

Delivering Government Cloud in 2012 Andy Tait VMware UK. VMware Copyright 2009 VMware, Inc. All rights reserved.

Delivering Government Cloud in 2012 Andy Tait VMware UK. VMware Copyright 2009 VMware, Inc. All rights reserved. Delivering Government Cloud in 2012 Andy Tait VMware UK VMware Copyright 2009 VMware, Inc. All rights reserved. Agenda A Brief History The UK Commitment to Cloud Latest Progress Update The CloudStore The

More information

HNOLOGY IN POLICING SECURITY & CYBERSPACE SITUATION

HNOLOGY IN POLICING SECURITY & CYBERSPACE SITUATION S e c u r i t y & D e f e n c e Bringing The Digital Edge To Your Operations ITY & CYBERSPACE SITUATIONAL AWARENESS CRITICAL COM S CRITICAL COMMUNICATIONS TECHNOLOGY IN POLICING SE ITUATIONAL AWARENESS

More information

Thales Service Definition for PSN Secure Email Gateway Service for Cloud Services

Thales Service Definition for PSN Secure Email Gateway Service for Cloud Services Thales Definition for PSN Secure Email Gateway Thales Definition for PSN Secure Email Gateway for Cloud s April 2014 Page 1 of 12 Thales Definition for PSN Secure Email Gateway CONTENT Page No. Introduction...

More information

Mobile Device Management. Simplified centralised Mobile Device Management solutions for the UK education sector.

Mobile Device Management. Simplified centralised Mobile Device Management solutions for the UK education sector. Mobile Device Management. Simplified centralised Mobile Device Management solutions for the UK education sector. Mobile Device Management. The use of mobile technology in the classroom has increased exponentially

More information

Embrace the G-Cloud. Ultra Secure Colocation Services for the Public Sector. thebunker.net Phone: 01304 814800 Fax: 01304 814899 info@thebunker.

Embrace the G-Cloud. Ultra Secure Colocation Services for the Public Sector. thebunker.net Phone: 01304 814800 Fax: 01304 814899 info@thebunker. Embrace the G-Cloud Ultra Secure Colocation Services for the Public Sector 1 Phone: 01304 814800 Fax: 01304 814899 info@ Contents Introduction What is G-Cloud? Types of accreditation: Business Impact Levels

More information

FRAMEWORK BRIEF. Information Communication Technology (ICT) Solutions

FRAMEWORK BRIEF. Information Communication Technology (ICT) Solutions FRAMEWORK BRIEF Information Communication Technology (ICT) Solutions FRAMEWORK OVERVIEW The HealthTrust Europe (HTE) Information Communication Technology (ICT) Solutions framework for the provision of

More information

Scheduled Onsite Technician Support. Fully scalable onsite technical support services for the UK education sector.

Scheduled Onsite Technician Support. Fully scalable onsite technical support services for the UK education sector. Scheduled Onsite Technician Support. Fully scalable onsite technical support services for the UK education sector. Scheduled onsite technician support for schools. Our ICT provides a scheduled onsite technician

More information

IT Security for Education A guide to securing data and applications within education, in line with Government guidelines

IT Security for Education A guide to securing data and applications within education, in line with Government guidelines IT Security for Education A guide to securing data and applications within education, in line with Government guidelines Secure Your World. Introduction Schools are increasingly using the power of the

More information

8. DIGITAL BY DESIGN - CUSTOMER RELATIONSHIP MANAGEMENT SYSTEM

8. DIGITAL BY DESIGN - CUSTOMER RELATIONSHIP MANAGEMENT SYSTEM 8. DIGITAL BY DESIGN - CUSTOMER RELATIONSHIP MANAGEMENT SYSTEM REPORT OF: Contact Officer: Wards Affected: Key Decision: Report to: HEAD OF DIGITAL AND CUSTOMER SERVICES Simon Hughes, Head of Digital and

More information

TECHNICAL VULNERABILITY & PATCH MANAGEMENT

TECHNICAL VULNERABILITY & PATCH MANAGEMENT INFORMATION SECURITY POLICY TECHNICAL VULNERABILITY & PATCH MANAGEMENT ISO 27002 12.6.1 Author: Owner: Organisation: Document No: Chris Stone Ruskwig TruePersona Ltd SP-12.6.1 Version No: 1.1 Date: 1 st

More information

Secure Systems & Technologies Ltd. Capabilities Overview

Secure Systems & Technologies Ltd. Capabilities Overview Secure Systems & Technologies Ltd. Capabilities Overview SST TM Credentials Secure Systems & Technologies Ltd. (SST TM ) designs and manufactures TEMPEST (NATO SDIP-27), EMC-rated, rugged, encryption,

More information

Accessing and sending data securely across security domains

Accessing and sending data securely across security domains In this White Paper Connectivity is good. Secure connectivity is essential. This white paper by Thales UK explains how Thales Gateway Services protect the exchange of data across security domains. It discusses

More information

Corporate Overview NEC Australia

Corporate Overview NEC Australia Corporate Overview NEC Australia NEC Australia au.nec.com Company facts Strong history in Australia - Forty six years local expertise combined with global reach as part of NEC Corporation, a global leader

More information

ICT and Information Security Resources

ICT and Information Security Resources Methods GCloud Service Definition ICT and Information Security Resources HEAD OFFICE: 125 Shaftesbury Avenue, London WC2H 8AD Scottish Office: Exchange Place 2, 5 Semple Street, Edinburgh, EH3 8BL t: +44

More information

Tailored ICT Solutions for Schools

Tailored ICT Solutions for Schools Tailored ICT Solutions for Schools www.viglen.co.uk/school We see ICT as an enabler for teaching and learning in a modern and progressive curriculum. Our solutions give schools the confidence to focus

More information

IT Heath Check Scoping guidance ALPHA DRAFT

IT Heath Check Scoping guidance ALPHA DRAFT IT Heath Check Scoping guidance ALPHA DRAFT Version 0.1 November 2014 Document Information Project Name: ITHC Guidance Prepared By: Mark Brett CLAS Consultant Document Version No: 0.1 Title: ITHC Guidance

More information

Secure by design: taking a strategic approach to cybersecurity

Secure by design: taking a strategic approach to cybersecurity Secure by design: taking a strategic approach to cybersecurity The cybersecurity market is overly focused on auditing policy compliance and performing vulnerability testing when the level of business risk

More information

G-CLOUD FRAMEWORK RM1557-vi 5DRIVE PROFESSIONAL STORAGE (PRO)

G-CLOUD FRAMEWORK RM1557-vi 5DRIVE PROFESSIONAL STORAGE (PRO) Commercial in Confidence 1 G-CLOUD FRAMEWORK RM1557-vi SERVICE DEFINITION 5DRIVE PROFESSIONAL STORAGE (PRO) 5NINES 5NINES Data Centre Services Service Offered 5DRIVE PERSONAL CLOUD STORAGE with remote

More information

Cloud Consultancy for Schools. Professional Cloud Adoption Consultancy services for the UK education sector.

Cloud Consultancy for Schools. Professional Cloud Adoption Consultancy services for the UK education sector. Cloud Consultancy for Schools. Professional Cloud Adoption Consultancy services for the UK education sector. Introduction. As schools continue to embrace cloud computing throughout 2015, the number of

More information

Best value security report

Best value security report Best value security report Getting the balance right between cost and quality Do more with less IT security for Local Government and the Emergency Services Thank you for downloading the best value security

More information

We are XMA in Education.

We are XMA in Education. We are XMA in Education. Call 0115 846 4900 Visit www.xma.co.uk/alllearn Email alllearn@xma.co.uk Follow us @WeareXMA We are XMA. We are XMA in Education We deliver innovative IT solutions that enhance

More information

INFRASTRUCTURE ARCHITECTURE BLUEPRINT

INFRASTRUCTURE ARCHITECTURE BLUEPRINT INFRASTRUCTURE ARCHITECTURE BLUEPRINT MESYUARAT PENGURUS-PENGURUS ICT SEKTOR AWAM BIL.3 TAHUN 2010 26 Oktober 2010 BERSAMA MELAKSANA TRANSFORMASI Table of Content Introduction Current Environment Overview

More information

Tailored ICT Solutions for Schools

Tailored ICT Solutions for Schools SCH ICT Solutions Brochure 2010-12:SCH ICT Solutions Brochure 2010-12 07/01/2011 14:58 Page 1 Tailored ICT Solutions for Schools www.viglen.co.uk/school SCH ICT Solutions Brochure 2010-12:SCH ICT Solutions

More information

Data Access Request Service

Data Access Request Service Data Access Request Service Guidance Notes on Security Version: 4.0 Date: 01/04/2015 1 Copyright 2014, Health and Social Care Information Centre. Introduction This security guidance is for organisations

More information

Microsoft Software Licensing for Schools. Helping schools to circumvent the complexities of Microsoft Education Licensing.

Microsoft Software Licensing for Schools. Helping schools to circumvent the complexities of Microsoft Education Licensing. Microsoft Software Licensing for Schools. Helping schools to circumvent the complexities of Microsoft Education Licensing. Microsoft Software Licensing. As a Microsoft Authorised Education Reseller and

More information

Managed IT Services. Maintain, manage and report

Managed IT Services. Maintain, manage and report Managed IT Services Maintain, manage and report 1 2 Comunet was established in 1995 to provide professional Information Technology services to Australian businesses and organisations. Its vision now, as

More information

UK Government IA Recent Changes and Update

UK Government IA Recent Changes and Update UK Government IA Recent Changes and Update INTRODUCTION Agenda Part 1 Government IA and Cyber Security Background Quick Threat Update UK Government Cyber Security Initiative Government Asset Control in

More information

SCC Information Assurance Practice, CLAS Consulting, Check Testing and Accreditation Services

SCC Information Assurance Practice, CLAS Consulting, Check Testing and Accreditation Services SCC Information Assurance Practice, CLAS Consulting, Check Testing and Accreditation Services Contents 1 Introduction...2 2 IA, CLAS Consulting and CHECK Testing...3 3 Information Assurance...4 4 Accreditation...5

More information

Networks that Support Modern Policing

Networks that Support Modern Policing Networks that Support Modern Policing 1 Embrace new ways of working that meet the need to increase efficiency and drive down costs. How can technology help you to be more effective in the field and in

More information

I.T. Security Specialists. Cyber Security Solutions and Services. Caretower Corporate Brochure 2015 1

I.T. Security Specialists. Cyber Security Solutions and Services. Caretower Corporate Brochure 2015 1 I.T. Security Specialists Cyber Security Solutions and Services Caretower Corporate Brochure 2015 1 about us As an independent IT security specialist, with over 17 years experience, we provide tailored

More information

Assurance in the Cloud: Outsourcing Risk in a Shifting Landscape

Assurance in the Cloud: Outsourcing Risk in a Shifting Landscape by SCC We make IT work Assurance in the Cloud: Outsourcing Risk in a Shifting Landscape 02 CONTENTS You hold sensitive public sector data Sentinel protects it. Sentinel by SCC not only provides faster

More information

Digital Forensics G-Cloud Service Definition

Digital Forensics G-Cloud Service Definition Digital Forensics G-Cloud Service Definition 2013 General Dynamics Information Technology Limited. All rights 1 GDIT Team Clients Metropolitan Police Service The General Dynamics Information Technology

More information

UK Government ICT Storyboard July 2010

UK Government ICT Storyboard July 2010 UK Government ICT Storyboard July 2010 1 SOME BASICS: ICT across the Public Sector has key challenges that have arisen through the silo d and individual development of ICT Today s Challenge ICT costs and

More information

SOAS Controlled Procedure CP-PP06 IT Asset Management Procedure

SOAS Controlled Procedure CP-PP06 IT Asset Management Procedure SOAS Controlled Procedure CP-PP06 IT Asset Management Procedure Page 1 of 6 Martin Whiteside Version 1.1 March 2015 CP-PP06 IT Asset Management Procedure 1 Document Overview This document provides the

More information

IT Security Testing Services

IT Security Testing Services Context Information Security T +44 (0)207 537 7515 W www.contextis.com E gcloud@contextis.co.uk IT Security Testing Services Context Information Security Contents 1 Introduction to Context Information

More information

DELTATECH G-Cloud SaaS Services

DELTATECH G-Cloud SaaS Services DELTATECH G-Cloud SaaS Services 1.1.1.1.1.1 SecureOps Service Service Definition A DeltaTech G-Cloud SaaS service DeltaTech SaaS Services SecureOps Tactical Operations Management System Managing secure

More information

HEALTHCARE SOLUTIONS

HEALTHCARE SOLUTIONS HEALTHCARE SOLUTIONS Healthcare solutions HEALTHCARE COMMUNICATIONS THE CHALLENGES The organisation is asking for improved communications, but resources and budget will not extend to a huge IP communications

More information

Meeting the challenge

Meeting the challenge Meeting the challenge Working with you to ensure your IT infrastructure delivers Infrastructure Management Services Overview Real solutions to tough challenges Infrastructure Management Services Overview

More information

Ubertas Cloud Services: Service Definition

Ubertas Cloud Services: Service Definition Ubertas Cloud Services: Service Definition February 2013 Innovation. Power. Trust. Contents 1. About Ubertas... 2 Our Company... 2 Our Approach to Service Delivery... 2 Our Partner Network & the UK Cloud

More information

The Oracle Infrastructure Specialist

The Oracle Infrastructure Specialist The Oracle Infrastructure Specialist Q Associates provides information systems and services that align IT strategy with commercial value. Our aim is to improve IT efficiency and performance whilst reducing

More information

TECHNICAL & ENGINEERING INSURANCE ACE TECHNICAL LINES

TECHNICAL & ENGINEERING INSURANCE ACE TECHNICAL LINES TECHNICAL & ENGINEERING INSURANCE ACE TECHNICAL LINES Companies today are looking for an insurer who can cater for their whole range of technical or engineering insurance requirements, from machinery breakdown,

More information

e2e Secure Cloud Connect Service - Service Definition Document

e2e Secure Cloud Connect Service - Service Definition Document e2e Secure Cloud Connect Service - Service Definition Document Overview A cloud connectivity service that connects users, devices, offices and clouds together over the Internet. Organisations can choose

More information

Security and Services

Security and Services Written by Maxine Holt, May 2005 TA000824SAS Technology Infrastructure Butler Group Subscription Services Security and Services TECHNOLOGY AUDIT Symantec Corporation Managed Security Service (MSS) Abstract

More information

Taking your business to new heights with Cloud Computing.

Taking your business to new heights with Cloud Computing. is to make businesses more efficient by using the best technology available to them and save them money. Taking your business to new heights with Cloud Computing. Cloud Computing is... a space stored on

More information

Advice on how schools can connect into their servers remotely

Advice on how schools can connect into their servers remotely Advice on how schools can connect into their servers remotely Steve Prentice Ian Gover elearning and Information Management Support Services for Education elimadmin@somerset.gov.uk 1 Scenario You want

More information

Cyber Essentials Scheme

Cyber Essentials Scheme Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these

More information

D-G4-L4-253 Data Loss Prevention Risk Assessment Deloitte LLP Service for G-Cloud IV

D-G4-L4-253 Data Loss Prevention Risk Assessment Deloitte LLP Service for G-Cloud IV D-G4-L4-253 Data Loss Prevention Risk Assessment Deloitte LLP Service for G-Cloud IV September 2013 Contents 1 Service Overview 1 2 Detailed Service Description 3 3 Commercials 6 4 Our G-Cloud Services

More information

REDCENTRIC HEALTHCARE SOLUTIONS

REDCENTRIC HEALTHCARE SOLUTIONS REDCENTRIC HEALTHCARE SOLUTIONS REDCENTRIC AT A GLANCE Redcentric is an accredited N3 service provider with over a decades experience of delivering NHS network services. DEDICATED N3 INFORMATION GOVERNANCE

More information

Putting Operators at the Centre of

Putting Operators at the Centre of Putting Operators at the Centre of Enterprise Mobile Security Introduction Small and Medium Enterprises make up the majority of firms and employees in all major economies, yet are largely unidentified

More information

Qualification Specification. Level 4 Certificate in Cyber Security and Intrusion For Business

Qualification Specification. Level 4 Certificate in Cyber Security and Intrusion For Business Qualification Specification Level 4 Certificate in Cyber Security and Intrusion For Business ProQual 2015 Contents Page Introduction 3 Qualification profile 3 Centre requirements 4 Support for candidates

More information

Service Definition Nine23 MDM

Service Definition Nine23 MDM Service Definition Nine23 MDM G-Cloud iv Contents 1 Service Nine23 Mobile Device Management System.....4 1.1 Overview Nine23 MDM...... 4 1.2 Open Standards. 5 1.3 User requirements.....5 1.3.1 Client Browser....5

More information

BlackBerry 10.3 Work and Personal Corporate

BlackBerry 10.3 Work and Personal Corporate GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network

More information

G-Cloud Service Definition. Atos Security Professional Services SCS

G-Cloud Service Definition. Atos Security Professional Services SCS G-Cloud Service Definition Atos Security Professional Services SCS Atos Security Professional Services SCS Security Professional Services delivered by experienced certified professionals empowered by market

More information

CYBER SECURITY Audit, Test & Compliance

CYBER SECURITY Audit, Test & Compliance www.thalescyberassurance.com CYBER SECURITY Audit, Test & Compliance 02 The Threat 03 About Thales 03 Our Approach 04 Cyber Consulting 05 Vulnerability Assessment 06 Penetration Testing 07 Holistic Audit

More information

secure For the ultimate in Cyber Defence TRL Technology

secure For the ultimate in Cyber Defence TRL Technology //Government secure Grade Network Security For the ultimate in Cyber Defence // CATAPAN Government Grade Network Security L-3 TRL has over a decade of experience in developing and supporting sophisticated

More information

Central Technology. Seamless IT & Communication Solutions

Central Technology. Seamless IT & Communication Solutions Central Technology Seamless IT & Communication Solutions Our client base is built on reputation for service and quick response times WELCOME Our Business Services It support Cloud Solutions Unified Communications

More information

Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services

Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services Page 1 1 Contents 1 Contents... 2 2 Transcend360 Introduction... 3 3 Service overview... 4 3.1 Service introduction... 4

More information

Cloud Computing. What does it really mean for your business?

Cloud Computing. What does it really mean for your business? Cloud Computing What does it really mean for your business? Technology transforming business The IDC survey, conducted with 696 IT executives and CIOs said that 41 percent are either evaluating cloud solutions

More information

ICT Manager Support. Complementing the skillset of your schools internal ICT function.

ICT Manager Support. Complementing the skillset of your schools internal ICT function. ICT Manager Support. Complementing the skillset of your schools internal ICT function. Introducing ICT Manager Support. Our ICT continues to work in partnership with a growing number of schools that require

More information

PROGRAMME OVERVIEW: G-CLOUD APPLICATIONS STORE FOR GOVERNMENT DATA CENTRE CONSOLIDATION

PROGRAMME OVERVIEW: G-CLOUD APPLICATIONS STORE FOR GOVERNMENT DATA CENTRE CONSOLIDATION PROGRAMME OVERVIEW: G-CLOUD APPLICATIONS STORE FOR GOVERNMENT DATA CENTRE CONSOLIDATION 1. Introduction This document has been written for all those interested in the future approach for delivering ICT

More information

School Admin Network Support. Specialist telephone, remote and scheduled onsite support for the school admin network.

School Admin Network Support. Specialist telephone, remote and scheduled onsite support for the school admin network. School Admin Network Support. Specialist telephone, remote and scheduled onsite support for the school admin network. Introducing school admin network support. In addition to our scheduled onsite technical

More information

BYOD Guidance: BlackBerry Secure Work Space

BYOD Guidance: BlackBerry Secure Work Space GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.

More information

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware How to Execute Your Next Generation of Mobile Initiatives Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware Company Facts 12000 1,800 employees 150 countries 17 languages 11 global

More information

Secure IT Relocation & Technical Solutions

Secure IT Relocation & Technical Solutions Secure IT Relocation & Technical Solutions We have yet to meet a more professional and dedicated team. The Sunspeed service is second to none. CGI Insight & knowledge Established in 1987, Sunspeed is one

More information

Secondary School 1/04/2015. ICT Service Specification by: Andrea Warburton ONE IT SERVICES AND SOLUTIONS

Secondary School 1/04/2015. ICT Service Specification by: Andrea Warburton ONE IT SERVICES AND SOLUTIONS 1/04/2015 Secondary School ICT Service Specification by: 1 Andrea Warburton ONE IT SERVICES AND SOLUTIONS SERVICE SPECIFICATION One IT Services and Solutions offer a one stop shop ICT support service,

More information

Cloud Storage Policy (Draft for consultation)

Cloud Storage Policy (Draft for consultation) (Draft for consultation) Please note that this draft is under consultation with stakeholders in colleges and university services, before refinement and approval by the appropriate University Committee.

More information

allchoice We are XMA. Empowering employee device choice within the workplace

allchoice We are XMA. Empowering employee device choice within the workplace allchoice Empowering employee device choice within the workplace We are XMA. We are XMA. We deliver innovative IT solutions that enhance how people learn, teach, govern, deliver healthcare and do business.

More information

What are the benefits of Cloud Computing for Small Business?

What are the benefits of Cloud Computing for Small Business? Cloud Computing A Small Business Guide. Whilst more and more small businesses are adopting Cloud Computing services, it is fair to say that most small businesses are still unsure of what Cloud Computing

More information

How To Protect Your Data From Being Hacked

How To Protect Your Data From Being Hacked Data Security and the Cloud TABLE OF CONTENTS DATA SECURITY AND THE CLOUD EXECUTIVE SUMMARY PAGE 3 CHAPTER 1 CHAPTER 2 CHAPTER 3 CHAPTER 4 CHAPTER 5 PAGE 4 PAGE 5 PAGE 6 PAGE 8 PAGE 9 DATA SECURITY: HOW

More information

USING GENIE REMOTELY

USING GENIE REMOTELY USING GENIE REMOTELY This document outlines the available options for using Genie in offsite logging mode (Genie single user) or remotely in real-time via a remote desktop (terminal services) connection.

More information

Government Cloud, Datacentre consolidation & Apps store development A perspective. Andy Macleod. Strategy and Policy Public Sector

Government Cloud, Datacentre consolidation & Apps store development A perspective. Andy Macleod. Strategy and Policy Public Sector Government Cloud, Datacentre consolidation & Apps store development A perspective Andy Macleod Strategy and Policy Public Sector Disclaimer This information is sourced from previous presentations by the

More information

Remote Network Monitoring. A specialist remote network infrastructure monitoring solution for the UK education sector.

Remote Network Monitoring. A specialist remote network infrastructure monitoring solution for the UK education sector. Remote Network Monitoring. A specialist remote network infrastructure monitoring solution for the UK education sector. Keeping a watchful eye over your schools network infrastructure. Our ICT introduces

More information

Tactical Cost Reduction

Tactical Cost Reduction Tactical Cost Reduction G-Cloud Service 1 An overview of the G-Cloud Service Information assurance Backup/restore and disaster recovery On-boarding and Off-boarding processes/scope etc. Pricing Service

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

LIVE CHAT CLOUD SECURITY Everything you need to know about live chat and communicating with your customers securely

LIVE CHAT CLOUD SECURITY Everything you need to know about live chat and communicating with your customers securely LIVE CHAT CLOUD SECURITY Everything you need to know about live chat and communicating with your customers securely LIVE CHAT CLOUD SECURITY Introduction Security is a top priority online it is vital that

More information

A Guide to the Cyber Essentials Scheme

A Guide to the Cyber Essentials Scheme A Guide to the Cyber Essentials Scheme Published by: CREST Tel: 0845 686-5542 Email: admin@crest-approved.org Web: http://www.crest-approved.org/ Principal Author Jane Frankland, Managing Director, Jane

More information

DOCUMATION S DOCUMENT MANAGEMENT

DOCUMATION S DOCUMENT MANAGEMENT Documation is a leading provider of document-centric workflow and content management software, delivering services and solutions to businesses and organisations in the UK, Europe and around the world.

More information

IT Managed Services National (Cat A) Framework

IT Managed Services National (Cat A) Framework IT Managed Services National (Cat A) Framework This type of framework contract is an excellent offering which combines purchasing power under one framework agreement. John F McClelland CBE Key points Available

More information

Is your business secure in a hosted world?

Is your business secure in a hosted world? Is your business secure in a hosted world? Threats to the security of business data are constantly growing and evolving - What can you do ensure your data remains secure? Introduction The safe use of computer

More information

Managed Encryption Service

Managed Encryption Service Amethyst Cryptographic Services Ltd Managed Encryption Service An Overview Chris Greengrass March 2011 Encryption and Cryptography The use of encryption/decryption is as old as the art of communication.

More information

White Paper. The benefits of basing email and web security in the cloud. including cost, speed, agility and better protection

White Paper. The benefits of basing email and web security in the cloud. including cost, speed, agility and better protection White Paper The benefits of basing email and web security in the cloud A White Paper by Bloor Research Author : Fran Howarth Publish date : July 2010 the outsourcing of email and web security defences

More information

PROACTIS Purchase-to-Pay Upgrade Services The Rapid, Painless, Cost-Effective Route to a World of New Spend Control Capabilities

PROACTIS Purchase-to-Pay Upgrade Services The Rapid, Painless, Cost-Effective Route to a World of New Spend Control Capabilities PROACTIS Purchase-to-Pay Upgrade Services The Rapid, Painless, Cost-Effective Route to a World of New Spend Control Capabilities Contents 2 Introduction 3-8 Why Upgrade? New Capabilities New Operational

More information

Protect Identities for people, workstations, mobiles, networks

Protect Identities for people, workstations, mobiles, networks ot Corporate ID Protect Identities for people, workstations, mobiles, networks Address your security needs with the leader in the corporate identity market Corporate security challenges The security of

More information

The Challenges Posed by BYOD.

The Challenges Posed by BYOD. The Challenges Posed by BYOD. The Challenges Posed by BYOD.... 1 Introduction... 3 Primary Bring Your Own Device Challenges... 3 Enable Workers to Securely Accomplish Business Tasks... 4 Managing Multiple

More information

Mobile technology for your world. 2 way paging

Mobile technology for your world. 2 way paging Mobile technology for your world 2 way paging Welcome to PageOne PageOne is the UK s leading mobile technology company. For 25 years, we ve been the pioneers of mobile messaging, providing award-winning

More information

SOFTWARE LICENSING AWARENESS IN DYNAMIC ENVIRONMENTS

SOFTWARE LICENSING AWARENESS IN DYNAMIC ENVIRONMENTS SOFTWARE LICENSING AWARENESS IN DYNAMIC ENVIRONMENTS 3 CLOUD TECHNOLOGIES AND EMPLOYEE COLLABORATION MAY SATISFY BUSINESS FLEXIBILITY, DYNAMISM AND INSTANT DEMAND BUT THE LICENSING IMPACT AND FINANCIAL

More information

The Attacker s Target: The Small Business

The Attacker s Target: The Small Business Check Point Whitepaper The Attacker s Target: The Small Business Even Small Businesses Need Enterprise-class Security to protect their Network July 2013 Contents Introduction 3 Enterprise-grade Protection

More information

Providing a quality IT Support & Consultancy service in the South East

Providing a quality IT Support & Consultancy service in the South East Providing a quality IT Support & Consultancy service in the South East At M2 Computing, we provide flexible, affordable IT consultancy and systems support across the South East. With a proven track record

More information

DIGITAL MARKETPLACE (G-CLOUD 7) OFFERING. Sopra Steria OneMobile SaaS Service. Introduction. Service Definition. Sopra Steria in the public sector

DIGITAL MARKETPLACE (G-CLOUD 7) OFFERING. Sopra Steria OneMobile SaaS Service. Introduction. Service Definition. Sopra Steria in the public sector DIGITAL MARKETPLACE (G-CLOUD 7) OFFERING Sopra Steria OneMobile SaaS Service Sopra Steria in the public sector Organisations across the public sector choose Sopra Steria to deliver transformation programmes

More information

NSF-DBA Medical Device Diploma. Learning through doing with experts at your side

NSF-DBA Medical Device Diploma. Learning through doing with experts at your side NSF-DBA Medical Device Diploma Learning through doing with experts at your side Medical Device Diploma The Medical Device Diploma Learning through doing with experts at your side NSF-DBA launch a ground

More information

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web

More information

FEATURE. THE RISE OF SSL VPNS by Ian Kilpatrick, chairman Wick Hill Group. Summary of feature. 1300 words. * Recent growth of SSL VPNs

FEATURE. THE RISE OF SSL VPNS by Ian Kilpatrick, chairman Wick Hill Group. Summary of feature. 1300 words. * Recent growth of SSL VPNs FEATURE THE RISE OF SSL VPNS by Ian Kilpatrick, chairman Wick Hill Group 1300 words Summary of feature * Recent growth of SSL VPNs * Aim of VPN technology - controlled, secure and managed access to any

More information

BlackBerry 10.3 Work Space Only

BlackBerry 10.3 Work Space Only GOV.UK Guidance BlackBerry 10.3 Work Space Only Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network architecture

More information

Your Guide to Navigating the Cloud. www.ukcloudalliance.co.uk

Your Guide to Navigating the Cloud. www.ukcloudalliance.co.uk Your Guide to Navigating the Cloud www.ukcloudalliance.co.uk 0800 138 4443 Sharing knowledge, ideas and innovation Welcome to the UK Cloud Alliance. Medium sized UK companies tell us they want the best

More information

ROYAL AUSTRALASIAN COLLEGE OF SURGEONS Division Resources Ref. No. RES-INT-010 Department Information Technology Asset Management

ROYAL AUSTRALASIAN COLLEGE OF SURGEONS Division Resources Ref. No. RES-INT-010 Department Information Technology Asset Management 1. PURPOSE AND SCOPE The purpose of this policy is to define the management of Iinformation Technology (IT) assets of the IT at the Royal Australasian College of Surgeons (the College). 2. KEYWORDS, Assets,

More information