Deloitte Service Code: D-G6-L4-543 December 2014

Size: px
Start display at page:

Download "Deloitte Service Code: D-G6-L4-543 December 2014"

Transcription

1 Managed Cyber Security Cyber Intelligence Centre Deloitte LLP Service Deloitte Service Code: D-G6-L4-543 December 2014

2 Contents 1 Service Overview 1 2 Detailed Service Definition 2 3 Pricing 6 4 Ordering and Invoicing Process 7 5 Additional Information 8

3 1 Service Overview 1.1 Managed Cyber Security Cyber Intelligence Centre The Cyber Intelligence Centre from Deloitte is a managed services solution for your cyber security needs, integrating leading technology with 24x7 support from our experienced team. Whether you choose one or all of the services, they are tailored for you and delivered in the context of your organisation s risk framework. Deloitte s Cyber Intelligence Centre offers the following fully-managed security services: CyberMonitor An advanced SIEM solution that consumes your logs and monitors them for the presence of cyber threats and compliance issues; issues identified are alerted to you with the threat analysis and business context to enable response CyberWatch A cyber threat monitoring service that uses threat intelligence and Internet-scanning technology to monitor online channels for active or growing threats targeting your organisation, or information leakage from your organisation that has not been prevented by your controls CyberProtect A data loss prevention service that monitors sensitive information as it flows across and out of your network, alerting you to cyber threats and compliance issues CyberCheck - A vulnerability identification and prioritization service that inventories and scans your assets and reports on the critical vulnerabilities within your environment CyberGovern A managed governance, risk, and compliance capability, which can capture, coordinate, and assess the security risk and compliance issues in your organisation 1.2 Features Implement threat monitoring and alerting with remediation advice Strategic and tactical threat intelligence alerting and reporting Phishing and cyber-squatting detection and takedown services Vulnerability assessment, reporting, and PCI-DSS ASV scanning Managed data leakage prevention, policy management, alerting and reporting 24x7 support available provided by our UK-based vetted security team Professionally qualified staff in cyber security, threat analysis, incident response Alerting, regular reporting, monthly service reviews, quarterly executive briefings Single, secure service management portal Free quotes available on request; service trials / proofs of concept offered 1.3 Benefits 24x7 security monitoring with no headcount increase and predictable costs Flexible pricing schemes; option to spread on-boarding costs over contract Business-facing alerting and reporting, not purely technical output Improve the business value of cyber security reporting Enable your security teams to focus on what matters Improved threat detection and visibility of current and evolving threats Make informed risk-based decisions based on contextualised service outputs Addresses the talent management challenges in security operations Reduce dependency on multiple consultants, contractors, and vendors Available in work packages The Cyber Intelligence Centre Services are available to Central Government, defence, security and justice, home affairs and police, health, transport, local and devolved government. Deloitte LLP G-Cloud Service 1

4 2 Detailed Service Definition 2.1 Our Approach Our Cyber Intelligence Centre (CIC) combines deep cyber intelligence with broad business intelligence to deliver relevant, tailored and actionable insights to inform business decision making. The CIC fuses a number of services together to provide our clients with a truly tailored service that enables them to fully understand their cyber risks and adopt proportionate responses in an increasingly digital, interconnected environment. We do this by providing our clients with improved visibility of threats and assets, based on highly relevant intelligence that reflects their specific business, market and industry context. We work with our clients during the setup of services to enhance our combined knowledge of the organisation being monitored. This is critical to the successful delivery of the service as we firmly believe that a security monitoring solution can only provide a return on investment when the monitored scope is prioritised according to business risk, and alerts are contextualised for the business, system, and applications or processes they impact. The CIC delivery team is composed of four key roles that operate under the overarching leadership of the CIC Service Director. By adopting the Cyber Intelligence Centre, clients benefit from the expertise and scalability of our delivery team. CIC Service Director Accountable for all services which make up the CIC, including the delivery of services to defined Service Level Agreements (SLAs) and for developing and implementing changes to capabilities and services Service Delivery Manager Responsible for the delivery of service to clients, including allocation of tasks to team members, maintaining the technical and process capabilities of the service, and service and output quality. The Service Delivery Manager will be your point of call for business process/management related queries Senior Analysts Senior analysts review all alerts produced by the threat analysts prior to distribution. They also produce reports and briefs to provide a description of the threat landscape and from this work with you to develop effective awareness campaigns Threat Analysts Responsible for receiving data from both the automated and manual tools and processes. The threat analysts review, prioritise, contextualise and report threats as required We recognise that the success of delivering managed services is built on a foundation of good people. We continue to invest heavily in the development of our employees to ensure that they remain top talent in the industry. Our professionals possess a wealth of qualifications (such as CISM, PMP, CRISC, CISA, CIA, CISSP, ISO 27001, CFE, GIAC, CREST etc.) and experience that positions them to serve unique clients with unique needs. 2.2 Inputs We have assumed that you will be in a position to provide certain inputs to the service, which we have listed here. If you are not in a position to provide all of these inputs then we can discuss options, as it is likely we can reach agreement to alter our approach to accommodate your situation. Organisation scoping data; for example IP address ranges, domains, keywords, and organisational structure Intelligence requirements for external threat intelligence: these set the direction of the threat research and data gathering, and are used by the CIC to tailor the output of the services Deloitte LLP G-Cloud Service 2

5 Log sources, configured to send logs to our technology platform, including security appliances, network devices, device / server / desktop management systems, servers, end user computing devices, operating systems, databases and applications Monitoring requirements and policy setting for internal monitoring capabilities 2.3 Your Contribution Our services are designed to be delivered with you rather than to you. We have assumed that you will be able to make the following contribution to the work. If you are not in a position to take on these responsibilities then please get in touch to discuss options, as it is likely we can reach agreement to alter our approach to accommodate your situation. Timely decision-making during service on-boarding and ongoing service delivery Own the intelligence direction process for the organisation and work with us to set clear, discrete and specific requirements Provide access to stakeholders and information during service on-boarding, e.g. for consultation on the requirements Agree, supported by us, the operational processes for issuing alerts and disseminating other outputs from the services Provide log data in the formats required for the threat monitoring platforms Provide access to systems and environments (where required, e.g. to install our monitoring systems, or to capture data from your systems) Provide governance and resource to consume the services and act on recommendations, and to attend regular service performance reviews 2.4 Outputs What will you get in terms of deliverables, outputs and outcomes from this service? The CIC services produce regular reports on the events processed and analysed, using a standard set of templates. These reports are available for download from the client portal or can be delivered via . Custom report templates can be requested, which will then be reviewed for impact/cost. In addition, our clients have access to both ad hoc and regular reports related to individual incidents as well as reports related to our service performance. We will work with you to agree the frequency of reporting and will tailor our standard reports to meet your specific requirements. Please see below examples of detailed reports we can provide. Single incident reports: describe what has happened, the possible impact, and suggested remediation steps; we will agree with you which severities and types of incidents you require these alerts for Regular incident reports: at a frequency agreed with you (e.g. weekly, monthly), regular reports on incidents during the reporting period, including those not alerted according to our agreed criteria Regular trend reports: at a frequency agreed with you (e.g. monthly, quarterly), regular trend reports on incidents during the reporting period, including broader perspectives from your sector, and from other industries Regular service performance reports: including our performance against the Service Level Agreements, and other metrics relating to the service We can also provide our Cyber Incident Response service (search for Advisory Cyber Services) for clients who receive our Cyber Intelligence Centre services. Through the Cyber Incident Response service we assist our clients to assess incidents and determine their cause, contain incidents and limit damage, and recover business operations. Our Cyber Incident Response practitioners can perform or assist in forensic investigations to determine how and why the incident happened, and provide recommendations and action to preventing it from happening again. Our clients are able to focus on risk-management and decision making as the Cyber Intelligence Centre handles the day-to-day information overload that their security technologies are generating. Our detailed business context Deloitte LLP G-Cloud Service 3

6 on-boarding and continuous service improvement processes enable us to assess the information in context to the organisation, resulting in actionable alerting and reporting on the threats and issues that matter. 2.5 Business Context What situations is this service designed to be used in? The Cyber Intelligence Centre services are designed for organisations who want to outsource some or all of their security management operations, or who are struggling with any of the following challenges: Cyber security talent shortages and staffing pressures Budgetary constraints Information overload in operational security and network teams Increasing complexity and breadth of cyber security threats Increasing complexity and scope of IT services (including cloud services and outsourced business processes) 2.6 Scale and Complexity The effort involved in delivering our service is driven partly by what we will do (which we have described in section 2.1 above) and what you will do before we arrive and alongside us whilst we work (which we have described in sections 2.2 and 2.3 above respectively). It is also driven by the scale and complexity of your business situation. This section describes the scale and complexity that we have designed this service to address. If your business situation is bigger or smaller than this then we can discuss options, as it is likely we can reach agreement to alter our approach to accommodate your situation. We have experience of providing our services to small organisations (e.g. 1-2 people in the information security team) to leading domestic and international companies, with facilities all over the world. The scope of our services will be determined through consultation with you and will depend on, among other factors: Size of organisation (number of office and data centre locations, number of people / customers) Number of brands / keywords used to direct threat intelligence research and automated monitoring Number and complexity of log sources Reporting thresholds and frequency Maturity of environment; e.g. how many alerts are produced, and of what severity Operational hours, for example, 24x7, business hours ( , Monday-Friday excluding Bank Holidays), extended hours ( , Monday-Friday, weekends and Bank Holidays) 2.7 Exclusions Our service description in Sections 2.1 to 2.6 above defines the scope of what we will deliver. For the avoidance of doubt, we have listed below any activities that (in our experience) are sometimes expected to be in our scope but which are not included within this service. We will not carry out a specific review of your systems and internal controls and accordingly it is not part of our responsibilities to provide comments on their effectiveness or the ability of the systems and internal controls to support the business and its expected growth in the future. You acknowledge that it is your responsibility to manage and maintain an effective internal controls system and that nothing in our work is designed to detect errors or irregularities in those controls, nor prevent errors or irregularities occurring. We do not guarantee to detect all threats or any specific threat, nor to detect to any specific timescale Alerts from the service may identify perceived threats that are neither authorised by nor relevant to you ( False Positives ) We do not guarantee or offer any privacy of an open source threat once it has been detected by us The provision of the services does not relieve you of the responsibility to implement additional security measures to protect your organisation Deloitte LLP G-Cloud Service 4

7 Your organisation will not be immune, protected, or secured by the use of this Service We will attempt to take down sites that have been classified as either phishing or malicious but cannot guarantee that our attempts will be successful. Our requests to the Internet Service Provider ( ISP ) to shut down such sites are founded on the contravention by the site of the ISP s terms and conditions (which provider should also not knowingly host an illegal site). We will not notify you prior to issuing a take-down request to the ISP, but we will notify you of the outcome of any take-down attempt in the relevant alert delivered to you in accordance with our delivery of the services Service Constraints Where service constraints exist of a general nature, they would usually be addressed in the Service Definition document. These and any other constraints would need to be discussed with the client prior to placing the Order. This includes constraints that are specific to the client or the client s situation or that need to be addressed before delivery of the service. We will rely on the client to bring to our attention, before the order is agreed, any specific constraints that need to be addressed including those that could impact on quality, service levels, costs or duration of the engagement. We can advise on maintenance windows, level of customisation permitted, schedule for deprecation of functionality/features and other matters if relevant to the service. Deloitte LLP G-Cloud Service 5

8 3 Pricing 3.1 Pricing Document Please refer to the associated Pricing Document relevant for this Service. 3.2 Expenses This service will be delivered predominantly from Deloitte s premises (the Cyber Intelligence Centre). On-boarding work and service review meetings may take place in the customer's own premises. No expenses will be charged for travel to premises within the M25, but there may be additional charges for travel and accommodation expenses incurred for services delivered at premises outside the M25. These will be agreed in the Service Order. Deloitte LLP G-Cloud Service 6

9 4 Ordering and Invoicing Process Please contact us to discuss your requirements or send your requirement to Following discussions, Deloitte will send a fully priced proposal detailing the services to be provided. 4.1 Priced Offers There are two ordering routes available: 1. Contact the Cyber Intelligence Centre on +44 (0) or your usual Deloitte contact. Alternatively: 2. Send an to g-cloud@deloitte.co.uk with the following information: a. Your organisation s name b. The name of this service c. Your name and contact details d. A brief description of your business situation e. Your preferred timescales for starting the work. 4.2 Order Form The Order Form will need to be completed with details of the order and service to be provided. We can advise on completion once the service has been agreed. 4.3 Invoicing We will invoice regularly in advance based on the invoice schedule for the service and on-boarding defined in the Service Order agreed with the customer. Deloitte LLP G-Cloud Service 7

10 5 Additional Information The following information addresses the full list of requirements for the Service Definition for each service as specified in Schedule 1 of the G-Cloud 6 framework agreement (Clause S1-3.1). Some elements of these requirements have been described in greater detail in other parts of this Service Definition or in the separate Pricing Document. This Mandatory Information should also be read in conjunction with the Deloitte G-Cloud 6 Terms and Conditions as attached in a separate document. 5.1 Overview of the G-Cloud Service An overview of this Deloitte G-Cloud 6 service is provided earlier on in this Service Definition document. A short summary and details of features, benefits and software accreditations (if relevant) can be also be found at the beginning of this Service Definition document and also on the Digital Marketplace. 5.2 Information Assurance Deloitte LLP holds a suitably scoped ISO27001 certificate for this G-Cloud Service Deloitte has processes and facilities in place to manage documents and information provided in paper or electronic media under the new system of Government Security Classifications (GSC): OFFICIAL (including OFFICIAL SENSITIVE), SECRET and TOP SECRET. Deloitte has List X status, including accredited facilities, and the services of a Security Controller. 5.3 Data Back-up, Data Restoration and Disaster Recovery As a firm, Deloitte has plans, processes and systems in place that form our Business Continuity and Resilience programme. We have a policy for testing and exercising our business continuity and resilience arrangements, and regularly review, update and test at appropriate levels and frequencies. Any specific requirement for backup/restore and disaster recovery would be discussed and agreed with the customer prior to an order being placed. The requirement would be documented in the Order Form as agreed between Deloitte and the customer. 5.4 On-Boarding, Off-Boarding, Service Migration, Scope etc. Where appropriate to the service, we will discuss with customers any on-boarding, off-boarding, service migration or scope of exit requirements and reach agreement on the most suitable approach prior to an order being placed. The requirements should be documented in the Order Form by the customer, and Deloitte will include details in the Order Form as agreed between Deloitte and the customer. 5.5 Service Management As Platinum members of the Chartered Institute for IT, we follow a number of BS15000/ BS20000 related IT Service Management procedures and Software Testing standards (IEEE 829). We hold IT Infrastructure Library (ITIL) Foundation and Practitioner Certification in IT Service Management. Many of our staff have PRINCE 2 Methodology Foundation and Practitioner Accreditation. Where appropriate to the service, we will apply the service management procedures that are relevant. 5.6 Service Levels The Deloitte Business Management System, which encompasses our national and regionally-based Consulting Practice, satisfies the requirements of BS EN ISO 9001:2008, against which it is independently assessed by the Deloitte LLP G-Cloud Service 8

11 British Standards Institution (BSi). Our Consulting Practice has been registered with BSi since 1986, when our software group was amongst the first organisations to obtain BS 5750 registration. The Consulting Practice of Deloitte in the UK is also registered with the TickIT scheme. TickIT provides for the certification of software developers against ISO 9001 by accredited assessors. We can provide a wide range of service levels and options to customers. We will work proactively with customers to discuss and agree appropriate service levels and reach agreement prior to an order being placed. This includes performance, availability, support hours and severity definitions if relevant to the service. The service levels should be documented in the Order Form as agreed between Deloitte and the customer. 5.7 Financial Recompense Model for not Meeting Service Levels As one of the leading providers of professional and consulting services in the UK it is our aim to perform in line with our customer s expectations. Our quality assurance and risk management procedures are designed to focus on the customer so that engagements have the appropriate quality checks and review points. 5.8 Training Generally speaking customers do not require training to use our services. Should there be a specific training requirement, we will discuss it with you prior to placing an order. Many of our services include capability transfer as routine. Should you need capability transfer, please discuss it with us prior to placing the order. 5.9 Termination Process For the termination process by consumers (i.e. consumption) and by Deloitte as the Supplier (removal of the G- Cloud Service), please see the G-Cloud 6 Framework Agreement (Clause FW-12 and CO-9) and the Deloitte Standard Terms and Conditions in the attachments area Customer Responsibilities Details of the customer s responsibilities are set-out in the applicable Deloitte Terms. Any additional customer responsibilities will be discussed with the customer prior to an order being placed. Additional customer responsibilities should be documented in the Order Form, as agreed between the customer and Deloitte Technical Requirements and Client-Side Requirements Technical requirements (service dependencies and detailed technical interfaces, client side requirements, bandwidth/latency requirements etc.) can be discussed prior to an order being placed. The requirements should be documented in the Order Form as agreed between the Customer and Deloitte Availability of Trial Service We would be pleased to discuss your requirement and the possibility of trial services in more detail. Deloitte LLP G-Cloud Service 9

12 Important notice This document is not an offer and cannot be accepted. Should you wish to obtain our services, please contact us using the Ordering Process described in Section 4 above to discuss your requirements and how we may meet them. Following these discussions and our internal acceptance procedures, we would then enter into a direct order with you in accordance with these Framework terms to confirm our appointment. The information contained in this document has been compiled by Deloitte LLP and includes material which may have been obtained from information provided by various sources and discussions with management but has not been verified or audited. This document also contains confidential material proprietary to Deloitte LLP. Except in the general context of evaluating our capabilities, no reliance may be placed for any purposes whatsoever on the contents of this document or on its completeness. No representation or warranty, express or implied, is given and no responsibility or liability is or will be accepted by or on behalf of Deloitte LLP or by any of its partners, members, employees, agents or any other person as to the accuracy, completeness or correctness of the information contained in this document or any other oral information made available and any such liability is expressly disclaimed. In this document references to Deloitte are references to Deloitte LLP. Deloitte LLP is the United Kingdom member firm of Deloitte Touche Tohmatsu Limited ( DTTL ), a UK private company limited by guarantee, whose member firms are legally separate and independent entities. Please see for a detailed description of the legal structure of DTTL and its member firms Deloitte LLP. All rights reserved. Deloitte LLP is a limited liability partnership registered in England and Wales with registered number OC and its registered office at 2 New Street Square, London EC4A 3BZ, United Kingdom.

G Cloud III Framework Lot 4 (SCS) Project Management

G Cloud III Framework Lot 4 (SCS) Project Management G Cloud III Framework Lot 4 (SCS) Project Management Contents Executive Summary 3 Project Management 4 Why Deloitte? 6 SFIA Rate Card 7 Contact 8 Service Definition (a) to (p) 9 Executive Summary PROJECT

More information

D-G4-L4-126 Police contact management and demand reduction review Deloitte LLP Service for G-Cloud IV

D-G4-L4-126 Police contact management and demand reduction review Deloitte LLP Service for G-Cloud IV D-G4-L4-126 Police contact management and demand reduction review Deloitte LLP Service for G-Cloud IV September 2013 Contents 1 Service Overview 1 2 Detailed Service Description 2 3 Commercials 6 4 Our

More information

How To Help Your Business Succeed

How To Help Your Business Succeed G Cloud III Framework Lot 4 (SCS) CHECK Accredited Penetration Testing Services Contents Executive Summary 3 CHECK Accredited Penetration Testing Services 4 Why Deloitte? 5 Package Cost 7 Contact 9 Service

More information

D-G4-L4-231 Data Governance Assessment Design and Implementation Deloitte LLP Service for G- Cloud IV

D-G4-L4-231 Data Governance Assessment Design and Implementation Deloitte LLP Service for G- Cloud IV D-G4-L4-231 Data Governance Assessment Design and Implementation Deloitte LLP Service for G- Cloud IV September 2013 Contents 1 Service Overview 1 2 Detailed Service Description 4 3 Commercials 8 4 Our

More information

D-G5-L4-318 Data Integration Hub Deloitte LLP Service for G-Cloud V

D-G5-L4-318 Data Integration Hub Deloitte LLP Service for G-Cloud V D-G5-L4-318 Data Integration Hub Deloitte LLP Service for G-Cloud V April 2014 Contents 1 Service Overview 1 2 Detailed Service Description 2 3 Commercials 6 4 Our G-Cloud Services 7 5 About Deloitte 8

More information

D-G4-L4-235 Supply Chain Analytics Deloitte LLP Service for G- Cloud IV

D-G4-L4-235 Supply Chain Analytics Deloitte LLP Service for G- Cloud IV D-G4-L4-235 Supply Chain Analytics Deloitte LLP Service for G- Cloud IV September 2013 Contents 1 Service Overview 1 2 Detailed Service Description 3 3 Commercials 7 4 Our G-Cloud Services 8 5 About Deloitte

More information

D-G4-L4-025 Mobile Working Technology Feasibility Study for a Healthcare Body Deloitte LLP Service for G-Cloud IV

D-G4-L4-025 Mobile Working Technology Feasibility Study for a Healthcare Body Deloitte LLP Service for G-Cloud IV D-G4-L4-025 Mobile Working Technology Feasibility Study for a Healthcare Body Deloitte LLP Service for G-Cloud IV September 2013 Contents 1 Service Overview 1 2 Detailed Service Description 2 3 Commercials

More information

D-G4-L4-253 Data Loss Prevention Risk Assessment Deloitte LLP Service for G-Cloud IV

D-G4-L4-253 Data Loss Prevention Risk Assessment Deloitte LLP Service for G-Cloud IV D-G4-L4-253 Data Loss Prevention Risk Assessment Deloitte LLP Service for G-Cloud IV September 2013 Contents 1 Service Overview 1 2 Detailed Service Description 3 3 Commercials 6 4 Our G-Cloud Services

More information

This image cannot currently be displayed. D-G4-L4-241 Predictive analytics (software as service) Deloitte LLP Service for G-Cloud IV

This image cannot currently be displayed. D-G4-L4-241 Predictive analytics (software as service) Deloitte LLP Service for G-Cloud IV This image cannot currently be displayed. D-G4-L4-241 Predictive analytics (software as service) Deloitte LLP Service for G-Cloud IV September 2013 Contents 1 Service Overview 1 2 Detailed Service Description

More information

This image cannot currently be displayed. D-G4-L4-242 Strategic and policy data analytics (software as service) Deloitte LLP Service for G-Cloud IV

This image cannot currently be displayed. D-G4-L4-242 Strategic and policy data analytics (software as service) Deloitte LLP Service for G-Cloud IV This image cannot currently be displayed. D-G4-L4-242 Strategic and policy data analytics (software as service) Deloitte LLP Service for G-Cloud IV September 2013 Contents 1 Service Overview 1 2 Detailed

More information

D-G4-L4-094 Asset Management Systems Strategy and Roadmap Deloitte LLP Service for G-Cloud IV

D-G4-L4-094 Asset Management Systems Strategy and Roadmap Deloitte LLP Service for G-Cloud IV D-G4-L4-094 Asset Management Systems Strategy and Roadmap Deloitte LLP Service for G-Cloud IV September 2013 Contents 1 Service Overview 1 2 Detailed Service Description 2 3 Commercials 6 4 Our G-Cloud

More information

D-G5-L4-285 IT Disputes and Forensic Technology Support Deloitte LLP Service for G-Cloud V

D-G5-L4-285 IT Disputes and Forensic Technology Support Deloitte LLP Service for G-Cloud V D-G5-L4-285 IT Disputes and Forensic Technology Support Deloitte LLP Service for G-Cloud V April 2014 Contents 1 Service Overview 1 2 Detailed Service Description 2 3 Commercials 6 4 Our G-Cloud Services

More information

ISO27032 Guidelines for Cyber Security

ISO27032 Guidelines for Cyber Security ISO27032 Guidelines for Cyber Security Deloitte Point of View on analysing and implementing the guidelines Deloitte LLP Enterprise Risk Services Security & Resilience Contents Foreword 1 Cyber governance

More information

Service Definition Document

Service Definition Document Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)

More information

Addressing Cyber Risk Building robust cyber governance

Addressing Cyber Risk Building robust cyber governance Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber

More information

G-Cloud Service Definition. Atos Information Security Wireless Scanning Service

G-Cloud Service Definition. Atos Information Security Wireless Scanning Service G-Cloud Service Definition Atos Information Security Wireless Scanning Service Keeping your wireless networks secure Atos Information Security Wireless Scanning Service The Atos Wireless Scanning Service

More information

Digital Forensics G-Cloud Service Definition

Digital Forensics G-Cloud Service Definition Digital Forensics G-Cloud Service Definition 2013 General Dynamics Information Technology Limited. All rights 1 GDIT Team Clients Metropolitan Police Service The General Dynamics Information Technology

More information

Cybersecurity The role of Internal Audit

Cybersecurity The role of Internal Audit Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government

More information

Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 1.0, Issue Date: 05/02/201405/02/2014. Classification: Open

Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 1.0, Issue Date: 05/02/201405/02/2014. Classification: Open Protective Monitoring as a Service Version: 1.0, Issue Date: 05/02/201405/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 2014. Other than for the sole purpose of evaluating this

More information

How To Run A Cloud Service For A Large Business

How To Run A Cloud Service For A Large Business Lot: 4 Specialist Cloud Services Service 25: Digital Continuity - ediscovery Solutions An overview of the G-Cloud Service (functional, non functional) Discover Information based on content, metadata and

More information

Lot 1 Service Specification MANAGED SECURITY SERVICES

Lot 1 Service Specification MANAGED SECURITY SERVICES Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services

More information

Specialist Cloud Services. Acumin Cloud Security Resourcing

Specialist Cloud Services. Acumin Cloud Security Resourcing Specialist Cloud Services Acumin Cloud Security Resourcing DOCUMENT: FRAMEWORK: STATUS Cloud Security Resourcing Service Definition G-Cloud Released VERSION: 1.0 CLASSIFICATION: CloudStore Acumin Consulting

More information

G-Cloud 7 Service Definition. Atos Oracle Cloud ERP Implementation Services

G-Cloud 7 Service Definition. Atos Oracle Cloud ERP Implementation Services G-Cloud 7 Service Definition Atos Oracle Cloud ERP Implementation Services Atos Oracle Cloud ERP Implementation Services Customers need adaptive and agile Enterprise Resource Planning (ERP) systems to

More information

G-Cloud Service Description. Atos: Cloud Professional Services: Requirements Specification

G-Cloud Service Description. Atos: Cloud Professional Services: Requirements Specification G-Cloud Service Description Atos: Cloud Professional Services: Requirements Specification Atos, the Atos logo, Atos Consulting, Atos Worldline, Atos Sphere, Atos Cloud, Atos Healthcare (in the UK) and

More information

G-Cloud Service Definition. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS

G-Cloud Service Definition. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS G-Cloud Service Definition Atos infrastructure Vulnerability Scanning (Outpost24) SaaS Atos Infrastructure Vulnerability Scanning (Outpost24) SaaS Atos Infrastructure Vulnerability Scanning SaaS powered

More information

G-Cloud Service Definition. Atos SI Oracle CRM and CX Services

G-Cloud Service Definition. Atos SI Oracle CRM and CX Services G-Cloud Service Definition Atos SI Oracle CRM and CX Services Atos SI Oracle CRM and CX Services SCS Atos provides a range of expert Customer Relationship Management (CRM) and Customer Experience (CX)

More information

G-CLOUD 7 - VIRTUAL ASSET MANAGER (VAM) SPECIALIST CLOUD SERVICES (SCS)

G-CLOUD 7 - VIRTUAL ASSET MANAGER (VAM) SPECIALIST CLOUD SERVICES (SCS) G-CLOUD 7 - VIRTUAL ASSET MANAGER (VAM) SPECIALIST CLOUD SERVICES (SCS) Service Definition 6th October 2015 TABLE OF CONTENTS VIRTUAL ASSET MANAGER (VAM) SPECIALIST CLOUD SERVICES (SCS) 3 SERVICE SUMMARY

More information

CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES

CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES PROTECTIVE MONITORING SERVICE In a world where cyber threats are emerging daily, often from unknown sources, information security is something

More information

G-Cloud Service Definition. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS

G-Cloud Service Definition. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS G-Cloud Service Definition Atos infrastructure Vulnerability Scanning (Outpost24) SaaS Atos Infrastructure Vulnerability Scanning (Outpost24) SaaS Atos Infrastructure Vulnerability Scanning SaaS is powered

More information

Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services

Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services Page 1 1 Contents 1 Contents... 2 2 Transcend360 Introduction... 3 3 Service overview... 4 3.1 Service introduction... 4 3.2 Service description...

More information

Ubertas Cloud Services: Service Definition

Ubertas Cloud Services: Service Definition Ubertas Cloud Services: Service Definition February 2013 Innovation. Power. Trust. Contents 1. About Ubertas... 2 Our Company... 2 Our Approach to Service Delivery... 2 Our Partner Network & the UK Cloud

More information

Open Source Sales Force Automation (SFA) in the Cloud SaaS

Open Source Sales Force Automation (SFA) in the Cloud SaaS Open Source Sales Force Automation (SFA) in the Cloud SaaS Service Overview Our open source Sales Force Automation (SFA) in the cloud service allows customers to perform marketing automation through multi

More information

Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 2.1, Issue Date: 05/02/201405/02/2014. Classification: Open

Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 2.1, Issue Date: 05/02/201405/02/2014. Classification: Open Protective Monitoring as a Service Version: 2.1, Issue Date: 05/02/201405/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 201416/12/2014. Other than for the sole purpose of evaluating

More information

Service: Contract Management (Software as a Service)

Service: Contract Management (Software as a Service) Service: Contract Management (Software as a Service) 1. Description: An overview of the G-Cloud Service (functional, non-functional) econtract Management allows for the management of a contract after award,

More information

Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services

Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services Page 1 1 Contents 1 Contents... 2 2 Transcend360 Introduction... 3 3 Service overview... 4 3.1 Service introduction... 4

More information

Under control 2015 Hot topics for IT internal audit in financial services. An Internal Audit viewpoint

Under control 2015 Hot topics for IT internal audit in financial services. An Internal Audit viewpoint Under control 2015 Hot topics for IT internal audit in financial services An Internal Audit viewpoint Introduction Welcome to our fourth annual review of the IT hot topics for IT internal audit in financial

More information

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. Table of contents 1 Introduction...3 2 Architecture Services...4 2.1 Enterprise Architecture Services...5 2.2 Solution Architecture Services...6 2.3 Service

More information

Deloitte Shared Services, GBS & BPO Conference SMAC / Enabling Technologies and Shared Services in the Public Sector

Deloitte Shared Services, GBS & BPO Conference SMAC / Enabling Technologies and Shared Services in the Public Sector Deloitte Shared Services, GBS & BPO Conference SMAC / Enabling Technologies and Shared Services in the Public Sector Carolyn Williamson, Hampshire County Council; David Harker, Deloitte 22 23 September

More information

PAAS Public Sector Managed Services

PAAS Public Sector Managed Services Meritec Limited Meritec House, Acorn Business Park, Skipton, North Yorkshire, BD23 2UE 0845 3451155 servicepoint@meritec.co.uk www.meritec.co.uk Registered In England & Wales No. 3224622 Table of Contents

More information

GPG13 Protective Monitoring. Service Definition

GPG13 Protective Monitoring. Service Definition GPG13 Protective Monitoring Service Definition Issue Number V1.3 Document Date 27 November 2014 Author: D.M.Woodcock Classification UNCLASSIFIED Version G-Cloud 6 2014 Copyright Assuria Limited. All rights

More information

G-Cloud Service Description. Atos Microsoft Dynamics CRM on Demand

G-Cloud Service Description. Atos Microsoft Dynamics CRM on Demand G-Cloud Service Description Atos Microsoft Dynamics CRM on Demand February 2013 Atos, the Atos logo, Atos Consulting, Atos Worldline, Atos Sphere, Atos Cloud, Atos Healthcare (in the UK) and Atos WorldGrid

More information

Documentum Document Management in the Cloud Service Definition

Documentum Document Management in the Cloud Service Definition Documentum Document Management in the Cloud Service Definition Service Overview Working together with its Cloud Services Partner, Skyscape, SynApps Solutions (SynApps) has developed its Documentum Document

More information

Applications and Solutions Architecture Cloud Services

Applications and Solutions Architecture Cloud Services Applications and Solutions Architecture Cloud Services G-Cloud IV Service Definition Lot 4 - SCS Contact us: Danielle Pratt Email: G-Cloud@esynergy-solutions.co.uk About is a leading provider of IT Consultancy

More information

Software as a Service (SaaS) Online HR

Software as a Service (SaaS) Online HR Software as a Service (SaaS) Online HR Contents Service Definition... 3 An overview of the G-Cloud Service... 3 Key Service Attributes... 4 Information assurance... 4 Details of the level of backup/restore

More information

Discovery Phase Delivery Service Definition

Discovery Phase Delivery Service Definition 17 Blossom Street London E1 6PL United Kingdom T : +44 20 7183 4250 F : +44 20 7183 4251 www.unboxedconsulting.com Discovery Phase Delivery Service Definition Unboxed Consulting Limited is registered in

More information

The enemies ashore Vulnerabilities & hackers: A relationship that works

The enemies ashore Vulnerabilities & hackers: A relationship that works The enemies ashore Vulnerabilities & hackers: A relationship that works Alexandros Charvalias, Manager CISSP, CISA, ACDA Assurance & Enterprise Risk Services Cyber security maturity model How effectively

More information

Social Media Monitoring, Planning and Delivery

Social Media Monitoring, Planning and Delivery Social Media Monitoring, Planning and Delivery G-CLOUD 4 SERVICES September 2013 V2.0 Contents 1. Service Overview... 3 2. G-Cloud Compliance... 12 Page 2 of 12 1. Service Overview Introduction CDS provide

More information

Lot 4 Service Specification BUSINESS PROCESS MANAGEMENT (BPM) PROFESSIONAL SERVICES

Lot 4 Service Specification BUSINESS PROCESS MANAGEMENT (BPM) PROFESSIONAL SERVICES Lot 4 Service Specification BUSINESS PROCESS MANAGEMENT (BPM) PROFESSIONAL SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF BUSINESS PROCESS MANAGEMENT (BPM) PROFESSIONAL SERVICES Business Process Management

More information

PROTECTIVE MONITORING SERVICE G-CLOUD SERVICE DEFINITION

PROTECTIVE MONITORING SERVICE G-CLOUD SERVICE DEFINITION PROTECTIVE MONITORING SERVICE G-CLOUD SERVICE DEFINITION 15 Table of contents 1 Introduction...2 2 Service Overview...3 2.1 Protective Monitoring...3 2.2 Service Description...4 2.3 Scenario: Basis for

More information

Agilisys G-Cloud Service V

Agilisys G-Cloud Service V Agilisys G-Cloud Service V Service Definition Endpoint Management Lot 1 Infrastructure as a Service (IaaS) April 2014 At Agilisys we deliver success through innovation working with our clients to transform

More information

IPL Service Definition - Master Data Management for Cloud Related Services

IPL Service Definition - Master Data Management for Cloud Related Services IPL Proposal April 2014 IPL Service Definition - Master Data Management for Cloud Related Services Project: Date: 10 April 2014 Issue Number: Customer: Crown Commercial Service Page 1 of 11 IPL Information

More information

ISO 27001 Information Security Management Services (Lot 4)

ISO 27001 Information Security Management Services (Lot 4) ISO 27001 Information Security Management Services (Lot 4) CONTENTS 1. WHY LEICESTERSHIRE HEALTH INFORMATICS SERVICE?... 3 2. LHIS TECHNICAL ASSURANCE SERVICES... 3 3. SERVICE OVERVIEW... 4 4. EXPERIENCE...

More information

G-Cloud 6 SERVICE DEFINITION

G-Cloud 6 SERVICE DEFINITION ORACLE CORPORATION UK LTD ( Oracle ) G-Cloud 6 SERVICE DEFINITION Date: [ 29 / 11] 2014 v. 1 This is Oracle s G-Cloud 6 Service Definition for the following service(s): Oracle Business Intelligence Cloud

More information

G-Cloud Service Definition. Atos Oracle Cloud ERP Implementation Services

G-Cloud Service Definition. Atos Oracle Cloud ERP Implementation Services G-Cloud Service Definition Atos Oracle Cloud ERP Implementation Services Atos Oracle Cloud ERP Implementation Services Customers need adaptive and agile Enterprise Resource Planning (ERP) systems to support

More information

Business Operations. Module Db. Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL:

Business Operations. Module Db. Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL: Module Db Technical Solution Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL: Cost is reduced through greater economies of scale, removal of duplication

More information

Big Data Analytics Service Definition G-Cloud 7

Big Data Analytics Service Definition G-Cloud 7 Big Data Analytics Service Definition G-Cloud 7 Big Data Analytics Service Service Overview ThinkingSafe s Big Data Analytics Service allows information to be collected from multiple locations, consolidated

More information

Secure Remote Backup (IL3) G-Cloud Lot3 IaaS

Secure Remote Backup (IL3) G-Cloud Lot3 IaaS Secure Remote Backup (IL3) G-Cloud Lot3 IaaS Contents Service Definition... 3 An overview of the Remote Backup as a Service... 3 Key Service Attributes... 4 Information assurance... 5 Details of the level

More information

Security Consultants / Security Managed Services

Security Consultants / Security Managed Services Security Consultants / Security Managed Services Service Definition Document for G-Cloudv7 Services October 2015 Table of Contents Service Overview...3 Our Approach... 3 Features... 3 Benefits... 4 ON-BOARDING

More information

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

Execview Outsourced Services Management

Execview Outsourced Services Management EXECVIEW for G-Cloud Framework Users Execview Outsourced Services Management Service Definition for G-Cloud iv G-Cloud iv Service Description An overview of the G-Cloud Service (functional, non-functional)

More information

IPL Service Definition - Data Recovery, Conversion and Migration

IPL Service Definition - Data Recovery, Conversion and Migration IPL Proposal IPL Service Definition - Data Recovery, Conversion and Migration Project: Date: 10 April 2014 Issue Number: V1 Customer: Crown Commercial Service Page 1 of 10 IPL Information Processing Limited

More information

Cloud Brokerage. G-Cloud Service. Arcus Global 2014 1

Cloud Brokerage. G-Cloud Service. Arcus Global 2014 1 Cloud Brokerage G-Cloud Service 1 An overview of the G-Cloud Service Information assurance Backup/restore and disaster recovery On-boarding and Off-boarding processes/scope etc. Pricing Service management

More information

Service Management and ICT Monitoring and Reporting Advisory and Implementation Services

Service Management and ICT Monitoring and Reporting Advisory and Implementation Services Service Management and ICT Monitoring and Reporting Advisory and Implementation Services G-Cloud Service 1 1. An overview of the G-Cloud Service Arcus can assist you with a review and advice on the effectiveness

More information

Growth Through Excellence

Growth Through Excellence Growth Through Excellence Public/Private Cloud Services Service Definition Document G- Cloud 5 REFERENCE NUMBER RM1557v Table of Contents Table of Contents... 3 Executive Summary... 4 About the Company...

More information

2. Consultancy and Support

2. Consultancy and Support G-Cloud Services 4 Service Definition Grant Management Services Lot 3 1. CC Grant Tracker 2. Consultancy and Support Submitted By: Dave Allan CC Technology Ltd 375 West George St Glasgow G2 4LW dave.allan@cctechnology.com

More information

Liaison Technologies BPM, Data and Integration Consulting Service Definition. The G-Cloud Lot 4 Services offered (functional, non-functional) are:

Liaison Technologies BPM, Data and Integration Consulting Service Definition. The G-Cloud Lot 4 Services offered (functional, non-functional) are: Liaison Technologies BPM, Data and Integration Consulting Service Definition Liaison has for many years provided Strategic and Implementation consultancy around BPM, Data and Integration. Whilst Liaison

More information

Application Management. Lot 4 - Specialist Cloud Services. Version: 3.0, Issue Date: 05/02/2014. Classification: Open

Application Management. Lot 4 - Specialist Cloud Services. Version: 3.0, Issue Date: 05/02/2014. Classification: Open Application Management Version: 3.0, Issue Date: 05/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 2014. Other than for the sole purpose of evaluating this Response, no part

More information

PSN Protective Monitoring. Service Definition

PSN Protective Monitoring. Service Definition PSN Protective Monitoring Service Definition Issue Number V3.0 Document Date 29 September 2015 Author: R.N. Connor Classification UNCLASSIFIED Version G-Cloud 7 2015 Copyright Tenian Limited. All rights

More information

SmartImpact MS Dynamics CRM. Support Service Definition

SmartImpact MS Dynamics CRM. Support Service Definition SmartImpact MS Dynamics CRM Support Service Definition Alliance House, 12 Caxton Road, London, SW1H 0QS United Kingdom Phone: +44 (0) 84 5544 2043 E-mail: info@smartimpact.co.uk http://www.smartimpact.co.uk/

More information

Service Description Archive Storage in the Cloud

Service Description Archive Storage in the Cloud Service Description Archive Storage in the Cloud Product Overview Archive Storage in the Cloud enables an organisation to migrate their valuable but seldom used data to a cost efficient, reliable and secure

More information

Integrated windows authentication for customers based on Probation GSI network

Integrated windows authentication for customers based on Probation GSI network Product Overview Victims Tracker (VT) is a software application, which was developed by London Probation Trust (LPT) to effectively manage the engagement / contact with victims of crime and the management

More information

1. Perimeter Security Dealing with firewall, gateways and VPNs and technical entry points. Physical Access to your premises can also be reviewed.

1. Perimeter Security Dealing with firewall, gateways and VPNs and technical entry points. Physical Access to your premises can also be reviewed. Service Definition Technical Security Review Overview of Service Considering the increasing importance of security, the number of organisations that allow for contingency in their Information Security

More information

SERVICE DEFINITION G-CLOUD 7 SECURE FILE TRANSFER DIODE. Classification: Open

SERVICE DEFINITION G-CLOUD 7 SECURE FILE TRANSFER DIODE. Classification: Open SERVICE DEFINITION G-CLOUD 7 SECURE FILE TRANSFER DIODE Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this

More information

INFORMATION ASSURANCE

INFORMATION ASSURANCE Service Definition Thomson Reuters Legal Matter Management service (Serengeti Tracker) is the highest rated legal matter management, e-billing and analytics system designed for inhouse legal departments.

More information

Our consultancy team will provide guidance throughout the process helping you to produce the necessary documentation and raise staff awareness.

Our consultancy team will provide guidance throughout the process helping you to produce the necessary documentation and raise staff awareness. Service Definition Business Continuity Plan Overview of Service Sapphire provides a bespoke service, working with your organisation to develop a comprehensive Business Continuity Plan (BCP) designed to

More information

IPL Service Definition - Data Quality

IPL Service Definition - Data Quality IPL Proposal V1 April 2014 Project: Date: 10 April 2014 Issue Number: V1 Customer: Crown Commercial Service Page 1 of 11 IPL Information Processing Limited 2014 Contents 1. Service - Data Quality 3 1.1.

More information

The IaaS Server On Boarding Process

The IaaS Server On Boarding Process SERVICE DEFINITION G-Cloud 7 MANAGED SERVER Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this material

More information

Big Data Support Services. Service Definition

Big Data Support Services. Service Definition 1 3 Big Data Support Services Service Definition BIG DATA SUPPORT SERVICES Service Description The Big Data Support Services are part of the Cognizant Information Management service family. Providing a

More information

Execview Corporate Performance Management

Execview Corporate Performance Management EXECVIEW for G-Cloud Framework Users Execview Corporate Performance Management Service Definition for G-Cloud iii G-Cloud ITT Service Definition overview (This section of our response is intended to provide

More information

Tactical Cost Reduction

Tactical Cost Reduction Tactical Cost Reduction G-Cloud Service 1 An overview of the G-Cloud Service Information assurance Backup/restore and disaster recovery On-boarding and Off-boarding processes/scope etc. Pricing Service

More information

GCloud Application Development Service Definition. Application Development

GCloud Application Development Service Definition. Application Development GCloud Service Definition GCloud Service Definition Contents 1.... 3 1.1. Overview... 3 1.2. Information Assurance... 6 1.3. Backup / Restore / Disaster Recovery... 6 1.4. On-boarding and Off-boarding

More information

Log and Refer Service Desk IL0. September 2013

Log and Refer Service Desk IL0. September 2013 Log and Refer Service Desk IL0 September 2013 TABLE OF CONTENTS 1 Service Overview... 3 2 Why Capgemini?... 5 3 The Capgemini Proposition... 6 3.1 Approach... 7 4 Benefits... 9 4.1 Summary of Proposition...

More information

Infrastructure Services

Infrastructure Services Information Security Management System Infrastructure Services Service Definition Version: 1.0 Version date: October 2015 Classification: Public Backup-as-a-Service Systems Monitoring DR-as-a-Service Storage-as-a-Service

More information

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13 Cyber Security Consultancy Standard Version 0.2 Crown Copyright 2015 All Rights Reserved Page 1 of 13 Contents 1. Overview... 3 2. Assessment approach... 4 3. Requirements... 5 3.1 Service description...

More information

Service Definition Nine23 MDM

Service Definition Nine23 MDM Service Definition Nine23 MDM G-Cloud iv Contents 1 Service Nine23 Mobile Device Management System.....4 1.1 Overview Nine23 MDM...... 4 1.2 Open Standards. 5 1.3 User requirements.....5 1.3.1 Client Browser....5

More information

Marval Software Limited. G Cloud iii Framework Service Definition

Marval Software Limited. G Cloud iii Framework Service Definition 1 Marval Software Limited G Cloud iii Framework Service Definition Page 1 of 9 2 Contents An overview of the Marval Service Management (MSM) Software Solution... 3 Information assurance Impact Level (IL)

More information

DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES

DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES G Cloud IV Framework Lot 4 DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES Service Description - ANSEC IA Limited CONTENTS 1 Company Profile. 2 The ANSEC Effect 3 Qualifications 4 Service Description..

More information

Cyber intelligence exchange in business environment : a battle for trust and data

Cyber intelligence exchange in business environment : a battle for trust and data Cyber intelligence exchange in business environment : a battle for trust and data Experiences of a cyber threat information exchange research project and the need for public private collaboration Building

More information

G Cloud 6. Service Definition: Platform as a Service (PaaS)

G Cloud 6. Service Definition: Platform as a Service (PaaS) G Cloud 6 Service Definition: Platform as a Service (PaaS) Introduction to Centerprise International Limited Centerprise International Limited was established in 1983 as an engineering and manufacturing

More information

Cloud Infrastructure Security Management

Cloud Infrastructure Security Management www.netconsulting.co.uk Cloud Infrastructure Security Management Visualise your cloud network, identify security gaps and reduce the risks of cyber attacks. Being able to see, understand and control your

More information

Keeping sight of your business Hot topics facing Financial Services organisations in IT Internal Audit

Keeping sight of your business Hot topics facing Financial Services organisations in IT Internal Audit Keeping sight of your business Hot topics facing Financial Services organisations in IT Internal Audit 2014 Welcome to our third annual review of the IT hot topics facing Internal Audit functions within

More information

Platform as a Service

Platform as a Service Platform as a Service Service Definition Version: 1.0 Version date: October 2015 Classification: Public Backup-as-a-Service Systems Monitoring DR-as-a-Service Storage-as-a-Service Hosted Exchange Colocation

More information

IBM Hosted Application Scanning

IBM Hosted Application Scanning IBM Hosted Application Scanning Service Definition IBM Hosted Application Scanning 1 1. Summary 1.1 Service Description IBM Hosted Application Security Services Production Application Scanning Service

More information

English UK VAT & Overseas Agents

English UK VAT & Overseas Agents English UK VAT & Overseas Agents Deloitte Contacts Simon Prinn, Partner Tel. 0118 322 2825 Jack Stoakes, Senior Manager Tel. 01293 761249 Charlotte McMillan, Assistant Manager Tel. 01293 761392 July 2012

More information

PERFORMANCE MANAGEMENT

PERFORMANCE MANAGEMENT PERFORMANCE MANAGEMENT integrated software solutions 01 EXECUTIVE SUMMARY SOLUTION OVERVIEW Concerto provides a secure, web-based solution incorporating complete project and programme performance management

More information

Bramble.cc Konetic - Applicant Tracking/eRecruitment

Bramble.cc Konetic - Applicant Tracking/eRecruitment www.bramble.cc www.konetic.com Service 9 Bramble.cc Konetic - Applicant Tracking/eRecruitment Delivery partner name Konetic Limited An overview of the G-Cloud Service (functional, non functional) Konetic

More information

Involve Cloud Video Conferencing Service. VC:me (Video Conferencing: made easy) Service Definition

Involve Cloud Video Conferencing Service. VC:me (Video Conferencing: made easy) Service Definition Involve Cloud Video Conferencing Service VC:me (Video Conferencing: made easy) Service Definition Contents 1. Service Overview... 3 Reservations Service... 4 Endpoint Management... 4 Reporting... 4 Testing...

More information

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations

More information

Business Intelligence

Business Intelligence 1 3 Business Intelligence Support Services Service Definition BUSINESS INTELLIGENCE SUPPORT SERVICES Service Description The Business Intelligence Support Services are part of the Cognizant Information

More information