G-Cloud Service Definition. Atos Information Security Wireless Scanning Service

Size: px
Start display at page:

Download "G-Cloud Service Definition. Atos Information Security Wireless Scanning Service"

Transcription

1 G-Cloud Service Definition Atos Information Security Wireless Scanning Service

2 Keeping your wireless networks secure Atos Information Security Wireless Scanning Service The Atos Wireless Scanning Service uses state of the art technology, combined with analysis by certified security professionals to safeguard systems and valuable data from unauthorised access, loss and corruption over wireless networks. This on site scanning service searches for and identifies rogue and vulnerable wireless network access points that could threaten the security of the organisations infrastructure and data. The scan analysis and report identifies the actions for remediation. Atos Information Security Wireless Scanning Service Flexible service The service can be applied to single and multiple sites on a monthly or quarterly scanning schedule. Additional scans can be ordered. Managed service The service is managed and overseen by SSCP and CISSP qualified staff. On site scanning specialists are trained at the Atos Cyber Security Academy in partnership with University of Derby. Easy to budget Simple modular price table with separation of setup, scanning and reporting costs make it easy to budget for the service. High risk sites can be scheduled for more frequent scanning. Assists with compliance requirements e.g. PCI DSS The service identifies rogue (unmanaged unsecured) wireless access points and verifies whether the wireless access points discovered comply with the organisation s access control policies that determine compliance. The service is evidence of the network management process and the scan reports verify the network management policy is being fulfilled. What is it? The Atos Wireless Scanning Service searches for and identifies vulnerable wireless network entry points using the latest hacker toolkits so that weaknesses can be remedied and the risk of exploitation reduced. The service includes site scanning, data analysis by certified security professionals and vulnerability reporting. An insecure wireless network presents a significant risk for the loss of confidential data and for unauthorised access to services. Insecure wireless networks are an easily exploited entry point into an organisations technology estate. Furthermore wireless network vulnerabilities are often exploitable from outside the organisations buildings and site boundary. ii

3 Data and/or service loss is a vulnerability that requires the utmost attention, regular wireless audits help ensure secure procedures are in place to manage the wireless networks and monitor compliance. PCI DSS compliance for Cardholder Data Environments (CDE) recognises the potential weakness of wireless networks. The Atos Wireless Scanning Service helps fulfil the requirement for organisations to check and remove unauthorised wireless devices from the CDE and verify the management of the wireless access points against the security policy. The service: Scans wireless networks for weak points Discovers malicious rogue access points Works across ITIL functions, Towers and Accounts Integrates with needs of Security and Risk Management Scan data analysis is overseen by SSCP and CISSP qualified staff Recommends best levels of protection and encryption for access points Assists with compliance requirements for security policies and PCI DSS. What makes us unique? The scan results are interpreted and analysed by certified security specialists, SSCP and CISSP. It is more than just an automated scan. The report provides remediation guidance to the organisation. Atos service staff conducting the site scans are accredited in the Atos Cyber Security Academy in conjunction with Derby University. Consequently, they are trained and aware of the security procedures, risks and threats which may be presented to them on site. The service is delivered using a custom platform developed and updated by Atos research and development team using the latest hacker toolkits. This ensures the wireless network is evaluated against the current exploits available. The Service includes: Service Delivery Agreement (SDA) that includes the agreed scanning schedule sites and scan locations within a site. Regular scans and scan reports according to the schedule defined in SDA. Options for extended reporting and additional scans. Any organisation: wanting to secure its network infrastructure against wireless intrusions Needing wireless network scanning to verify compliance against the organisation s security policy statements on wireless network infrastructure. Needing to demonstrate compliance with the wireless network regulations for PCI DSS for Cardholder Data Environment (CDE). iii

4 iv

5 Contents 1. Introduction Service summary How this solution can be used Service overview Service Roadmap Information assurance Backup/restore and disaster recovery On-boarding and off-boarding Pricing Service management Service constraints Service levels Financial recompense Training Ordering and invoicing process Termination terms By consumers (i.e. consumption) By the Supplier (removal of the G-Cloud Service) Data restoration / service migration Consumer responsibilities Technical requirements Trial service Glossary of Terms v

6 1. Introduction Atos provides a wide range of world class security solutions that help customers save money whilst simultaneously increasing security. Atos Information Security Wireless Scanning Service is one such service. The service is delivered by trained certified security specialists using our custom scanning platform. 1.1 Service summary The Atos Wireless Scanning Service uses leading technology and best practices to safeguard systems and valuable data from unauthorised access, loss and corruption over wireless networks. Atos deploy a custom scanning platform, which uses a software portfolio that can be found in both off the shelf and professional hacker s toolkits. The scanners gather comprehensive endpoint and network intelligence from the target network. Atos applies advanced analytics to identify and prioritize the vulnerabilities that pose the most risk to business critical systems and the state of compliancy. The result is actionable information that enables IT security teams to focus on the tasks that will most quickly and effectively reduce unnecessary residual risks. Successful remediation helps the organisation to stay compliant with internal security policy, government legislation and industry regulations. Wireless scanning is a mandatory condition for the PCI-DSS regulation, exclusively requirement 11.1, Test for the presence of wireless access points and detect unauthorized wireless access points on a quarterly basis. 1.2 How this solution can be used It is recognised that every IT system has weak points, which can be exploited. These can be caused by weak encryption, malicious internal staff, poor network and system configuration and lack of best practices. One major result of these weak points is the loss of important or confidential data and services. Insecure wireless networks can also be used as an entry point into a customer s technology estate(s). Data and/or service loss is a vulnerability that requires the utmost attention, regular wireless audits can help to ensure secure procedures are in place to prevent this. PCI compliance is required for any customer that handles, or processes card holder data. The service: Scans wireless networks for weak points Discovers malicious rogue access points Works across ITIL functions, Towers and Accounts Integrates with needs of Security and Risk Management Recommends best levels of encryption for access points Assists with compliance requirements for example PCI DSS. 1

7 2. Service overview The Atos Wireless Scanning Service is delivered as a single deployment. A standalone platform is used to probe a client s network, identifying any potential rogue access points broadcasting within the network. The service mirrors potential threats a hacker would take to gain access to an identified network. This is a mandatory requirement for any PCI DSS compliant Customers and needs to conducted on a quarterly basis. This is to ensure that no leakage of data is occurring within the estate. To do this, the scanning platform is directed to assess all possible access points that are broadcasting within a target network. By assessing each access point the scanning platform displays key values on the discovered Access Point. These values include: BSSID this is the MAC address that identifies the manufacturer of the device Channel the channel that the detected access point is broadcasting on. Privacy this value shows the level of security on the detected device Null/Open values show no security is present on the device WEP values show a weak level of security is present on the device WPA/WPA2 values show a strong level of security on the device (dependent upon configuration) Power this displays the strength of the signal for the device. Higher values indicate the device is broadcasting in close proximity to the scanning platform. Any values lower than -40 indicate the access point is broadcasting away from the scanned network ESSID this is the naming convention for the wireless network. Once a scan has been successfully completed, a report is generated, detailing the findings from the scan. Investigations are made from these gathered results, to determine if any detected devices could be potential rogue access points within the network. The report is then made readily available to all relevant stakeholders for the account, to remedy any recommendations made within the report. The service is delivered in modules to allow service configuration to meet the customer s specific needs: Mandatory/optional Modules Mandatory modules Basic Wireless Scanning Service (1 variant) Standard Service Requests for the Basic Service Optional modules Service Setup (New Customer) Service Setup (Additional Scanner) Consultancy and Technical Support Extended Service Reporting Standard Service Requests for the Optional Modules 2

8 Important characteristics: The entire network infrastructure is analysed scrupulously, ensuring all key areas are covered by the service The entire wireless network infrastructure is covered, during the scanning process The service will identify weak security methods used on access points across all the scanned networks The Atos security team continuously research and develop improve the underlying product Delivered by dedicated Security Operational Centres with trained, certified industry experts providing the wireless scan, analysis and response services Atos service staff accredited in the Atos Cyber Security Academy in conjunction with Derby University A standardised approach for verifying PCI DSS compliance of wireless access points. Benefits: A standardised scanning process leading to great reduction of data loss for the customer and to the business Increasing the levels of network access point encryption to further protect customers against data loss A standardised method of PCI DSS compliance as this requires Wi-Fi networks to be scanned quarterly A simple and cheap process to protect customers from malicious attacks. 2.1 Service Roadmap The wireless scanning platform is a product developed and customised by Atos. The platform is kept up to date with open source and hacker tools that are widely available on the internet and are found in the toolkits of individuals who intend to cause malicious damage or attempt to compromise a target. The solution benefits from a constant development programme to take in to account the constant changes and challenges within this environment. Atos use a large number of products and toolkits to provide our clients with the confidence that our services protect their valuable networks and infrastructures. 3

9 3. Information assurance The standard product is available at Impact Level 0 (IL0). The service can be run at higher Impact Levels up to Impact Level 5 (IL5) if required subject to a formal accreditation. 4

10 4. Backup/restore and disaster recovery Data from the wireless scan is downloaded from the custom platform and stored securely. In the event of the scanning platform failing a new platform will be built from a master build image. Collected scan data is stored in Atos UK data centres with DR capability. 5

11 5. On-boarding and off-boarding On-boarding On-boarding the service is simple. Prior to conducting the wireless scan the Atos security specialists will discuss the customer s needs of the scan to determine the site coverage, scanning schedule and the type of reporting required. For orders of a regular scan service we create a Service Delivery Agreement defining the service and points of escalation to be used for the duration of the service. Off-boarding Should the customer decide to de-commission the wireless scanning service, all future scans are cancelled and the customer will receive a copy of the data collected in the scanning activities conducted to that date, all data held by Atos will then be destroyed. Costs for off-boarding will be charged against any residual service charge. 6

12 6. Pricing The service is priced according to time and material spent on mandatory modules and a selection of optional modules. Modules Frequency Type Mandatory: Basic Wireless Scanning Service (1 variant) Monthly / Quarterly See below Standard Service Requests for the Basic Wireless Scanning Service Monthly / Quarterly See below Optional: Consultancy and Technical Support On demand Rates as per SFIA rate card - Atos Extended Service Reporting On demand Rates as per SFIA rate card - Atos Standard Service Requests for the Optional Modules On demand Rates as per SFIA rate card - Atos Ad-hoc request for scan on existing scope & measurement (scan on demand) On demand Rates as per SFIA rate card - Atos Adjust scan schedule On demand subject to resource availability Rates as per SFIA rate card - Atos The basic wireless scanning components of the service are priced according to number of scans performed. The pricing elements of the basic scanning service are listed in the table below. Basic Wireless Scanning Pricing Service Delivery Agreement, (one off cost for each customer order received) Fixed price element for each site visit for each scan (time traveling, setup and site research) Package Price for 6 scans (i.e. 6 different locations of scanning platform within a single site). Note that scans are sold in packages of 6 scans. Therefore 7 scans will require purchase of two scan packages. First Report Subsequent Reports Price 990 per order 990 per visit 495 per package of 6 scans 990- for 1 st report 495 per report 7

13 Travel and Subsistence for site visits Payable at the Customer s standard T&S rate. Mileage for site visits Payable at the Customer s standard T&S rate Professional Indemnity Insurance included in service rate. Example pricing: Customer has a single site with one building (approx. 30m by 60m) with 2 floors. Customer requests floor scan and perimeter scan for PCI-DSS compliance. The service is required for 12 months with 5 scans in that period, one scan immediately and then one scan every 3 months until month 12. Item Price Setup service: (Service Delivery Agreement and setting up account) 990 Site visits (5 visits over 12 months), 5x Each visit performs 2 scans per floor and 2 perimeter scans, total of 6 scans per visit to site, 5 site visits, 5x 495 Reports First report, 990 Subsequent reports, 495, 4 reports in 12 months, 4x 495 Total price of 12 month service (not including travel, subsistence and mileage for site visits) 2,475 2,970 11,385 8

14 7. Service management The service is typically available during standard Working Hours/Days Monday to Friday 09:00 to 17:30 excluding public holidays. Reports from the wireless scans are communicated within 5 days of the scan completion. 9

15 8. Service constraints In order for the wireless scan to be conducted the Customer will need to: Give authorisation for the scan to proceed Give access to the perimeter of scanned estate Give access inside the scanned estate if that is within scope of the scan The service only provides information of the vulnerabilities discovered, remediation remains a customer responsibility or that of the customer s service providers. 10

16 9. Service levels The standard service level is: Service measure Typical service level Service Availability 95% Service Availability Window Support Availability Window (second line) Support Language Report generation 09:00-17:00 Mon-Fri Business Days 5*9 hours: Business Days, 08:00-17:00 h English Inform stakeholders that a report is readily available within 5 days after scan has been conducted 11

17 10. Financial recompense To minimise the cost to users, Atos does not provide service credits for use of the service. All Atos services are provided on a reasonable endeavours basis. Please refer to the standard terms and conditions documents. In accordance with the guidance within the GPS G-Cloud Framework Terms and Conditions, the Customer may terminate the contract at any time, without cause, by giving at least thirty (30) Working Days prior notice in writing. The Call Off Contract terms and conditions and the Atos terms will define the circumstances where a refund of any pre-paid service charges may be available 12

18 11. Training No training is required to benefit from this service although the scan report should be communicated to security and infrastructure specialists in the customer organisation or that of the service providers to remedy the vulnerabilities. Our security specialists will discuss the coverage and benefit from the various scan options prior to scanning the estate. If training and guidance to customer staff and providers is required it can be provided at the rates defined in our Atos Information Security Professional Services SFIA Rate Card - Atos that was submitted as part of our G-Cloud submission. Please get in touch for details (gcloud@atos.net). 13

19 12. Ordering and invoicing process Ordering this product is a straightforward process. Please forward your requirements to the address GCloud@atos.net Atos will prepare a quotation and agree that quotation with you, including any volume discounts that may be applicable. Once the quotation is agreed, Atos will issue the customer with the necessary documentation (as required by the G-Cloud Framework) and ask for the customer to provide Atos with a purchase order. Once received, the customer services will be configured to the requirements as per the original quotation. For new customers, additional new supplier forms may to be completed. Invoices will be issued to the customer and Shared Services (quoting the purchase order number) for the services procured. On a monthly basis, Atos will also complete the mandated management information reports to Government Procurement Services detailing the spend that the customer has placed with us. Cabinet Office publishes a summary of this monthly management information at: < 14

20 13. Termination terms 13.1 By consumers (i.e. consumption) Termination shall be in accordance with: The G-Cloud Framework terms and conditions Any terms agreed within the Call Off Contract under section 10.2 of the Order Form (termination without cause) where the Government Procurement Service (GPS) guidance states At least thirty (30) Working Days in accordance with Clause CO-9.2 of the Call-Off Contract Our Supplier Terms for this Service as listed on the G-Cloud CloudStore. By default we ask for at least thirty (30) Working Days prior written notice of termination as per the guidance within the GPS G-Cloud Framework Terms and Conditions By the Supplier (removal of the G-Cloud Service) Atos commits to continue to provide the service for the duration of the Call Off Contract subject to the terms and conditions of the G-Cloud Framework and our Supplier Terms. 15

21 14. Data restoration / service migration Not applicable as there is no data to restore and no service to migrate. 16

22 15. Consumer responsibilities The principal consumer responsibilities are: The consumer will provide all required authorisation for access (escorted or un-escorted) to the Customer Sites. Where access disputes arise, the consumer will mediate the dispute and inform the Atos security team of the outcome The consumer will ensure that the Security Specialist conducting the scan has full or escorted access to all areas of the customer sites to ensure that all devices are traced The consumer will provide all possible assistance to allow the Atos security teams to operate at the specified sites The consumer will escalate and manage the actions required to deal with any unauthorised or insecure wireless access points discovered. 17

23 16. Technical requirements Technical requirements will be discussed and agreed with customer and their representatives prior to the first scan. 18

24 17. Trial service There is no trial service. 19

25 18. Glossary of Terms Term 2FA ASAC-S CDE GPS IL LDAP OATH PCI DSS RADIUS RSA SAML SMS SSL SSO TCO VPN Explanation Two Factor Authentication Atos Secure Authentication for Cloud SafeNet Cardholder Data Environment (PCI DSS term) Government Procurement Service Impact Level Lightweight Directory Access Protocol Open Authentication an open source standard Payment Card Industry Data Security Standard Remote Authentication Dial-In User Service Product Vendor Security Assertion Mark-up Language Short Message Service Secure Socket Layer Single Sign On Total Cost of Ownership Virtual Private Network 20

26 21

G-Cloud Service Definition. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS

G-Cloud Service Definition. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS G-Cloud Service Definition Atos infrastructure Vulnerability Scanning (Outpost24) SaaS Atos Infrastructure Vulnerability Scanning (Outpost24) SaaS Atos Infrastructure Vulnerability Scanning SaaS powered

More information

G-Cloud Service Definition. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS

G-Cloud Service Definition. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS G-Cloud Service Definition Atos infrastructure Vulnerability Scanning (Outpost24) SaaS Atos Infrastructure Vulnerability Scanning (Outpost24) SaaS Atos Infrastructure Vulnerability Scanning SaaS is powered

More information

G-Cloud Service Definition. Atos Security Professional Services SCS

G-Cloud Service Definition. Atos Security Professional Services SCS G-Cloud Service Definition Atos Security Professional Services SCS Atos Security Professional Services SCS Security Professional Services delivered by experienced certified professionals empowered by market

More information

G-Cloud Service Definition Canopy Big Data proof of concept Service SCS

G-Cloud Service Definition Canopy Big Data proof of concept Service SCS G-Cloud Service Definition Canopy Big Data proof of concept Service SCS Canopy Big Data proof of concept Service SCS Canopy Big Data Proof of Concept (PoC) Service is a consulting service that helps the

More information

G-Cloud 7 Service Definition. Atos Oracle Cloud ERP Implementation Services

G-Cloud 7 Service Definition. Atos Oracle Cloud ERP Implementation Services G-Cloud 7 Service Definition Atos Oracle Cloud ERP Implementation Services Atos Oracle Cloud ERP Implementation Services Customers need adaptive and agile Enterprise Resource Planning (ERP) systems to

More information

G-Cloud Service Definition. Atos Data Quality Audit SCS

G-Cloud Service Definition. Atos Data Quality Audit SCS G-Cloud Service Definition Atos Data Quality Audit SCS Atos Data Quality Audit SCS As organisations increasingly utilise a hybrid of Legacy and Cloud based technology platforms, it becomes increasingly

More information

G-Cloud Service Definition. Atos Business Intelligence Dashboards and Analytics SCS

G-Cloud Service Definition. Atos Business Intelligence Dashboards and Analytics SCS G-Cloud Service Definition Atos Business Intelligence Dashboards and Analytics SCS Atos Business Intelligence Dashboards and Analytics SCS The Atos approach to Business Intelligence (BI) Dashboards and

More information

G-Cloud Service Definition Canopy Big Data proof of concept Service SCS

G-Cloud Service Definition Canopy Big Data proof of concept Service SCS G-Cloud Service Definition Canopy Big Data proof of concept Service SCS Canopy Big Data proof of concept Service SCS Canopy Big Data Proof of Concept (PoC) Service is a consulting service that helps the

More information

G-Cloud Service Definition. Atos Oracle Cloud ERP Implementation Services

G-Cloud Service Definition. Atos Oracle Cloud ERP Implementation Services G-Cloud Service Definition Atos Oracle Cloud ERP Implementation Services Atos Oracle Cloud ERP Implementation Services Customers need adaptive and agile Enterprise Resource Planning (ERP) systems to support

More information

G-Cloud Service Definition. Atos Rapid Pilot Mobile Application Development Service SCS

G-Cloud Service Definition. Atos Rapid Pilot Mobile Application Development Service SCS G-Cloud Service Definition Atos Rapid Pilot Mobile Application Development Service SCS Atos Rapid Pilot Mobile Applications Development Service SCS Designed to provide rapid development and deployment

More information

G-Cloud Service Definition. Atos Business Intelligence Dashboards and Analytics SCS

G-Cloud Service Definition. Atos Business Intelligence Dashboards and Analytics SCS G-Cloud Service Definition Atos Business Intelligence Dashboards and Analytics SCS Atos Business Intelligence Dashboards and Analytics SCS The Atos approach to Business Intelligence (BI) Dashboards and

More information

G-Cloud Service Definition. Atos SI Oracle CRM and CX Services

G-Cloud Service Definition. Atos SI Oracle CRM and CX Services G-Cloud Service Definition Atos SI Oracle CRM and CX Services Atos SI Oracle CRM and CX Services SCS Atos provides a range of expert Customer Relationship Management (CRM) and Customer Experience (CX)

More information

GPG13 Protective Monitoring. Service Definition

GPG13 Protective Monitoring. Service Definition GPG13 Protective Monitoring Service Definition Issue Number V1.3 Document Date 27 November 2014 Author: D.M.Woodcock Classification UNCLASSIFIED Version G-Cloud 6 2014 Copyright Assuria Limited. All rights

More information

G-Cloud Service Definition Lotus Notes to Microsoft SharePoint Migration Discovery Service

G-Cloud Service Definition Lotus Notes to Microsoft SharePoint Migration Discovery Service G-Cloud Service Definition Lotus Notes to Microsoft SharePoint Migration Discovery Service Lotus Notes to Microsoft SharePoint Migration Discovery Service This service provides an opportunity to review

More information

PSN Protective Monitoring. Service Definition

PSN Protective Monitoring. Service Definition PSN Protective Monitoring Service Definition Issue Number V3.0 Document Date 29 September 2015 Author: R.N. Connor Classification UNCLASSIFIED Version G-Cloud 7 2015 Copyright Tenian Limited. All rights

More information

G-Cloud Service Definition. Atos SharePoint Development Service

G-Cloud Service Definition. Atos SharePoint Development Service G-Cloud Service Definition Atos SharePoint Development Service SharePoint Development Services SCS A comprehensive electronic document and records management, collaboration or web content management solution

More information

G-Cloud Service Definition. Canopy Unmanaged Enterprise Private Cloud (IL3 Capable) IaaS

G-Cloud Service Definition. Canopy Unmanaged Enterprise Private Cloud (IL3 Capable) IaaS G-Cloud Service Definition Canopy Unmanaged Enterprise Private Cloud (IL3 Capable) IaaS Canopy Unmanaged Enterprise Private Cloud IaaS Canopy Unmanaged Enterprise Private Cloud delivers the efficiencies,

More information

G-Cloud Service Definition. Atos Call Centre Services SCS

G-Cloud Service Definition. Atos Call Centre Services SCS G-Cloud Service Definition Atos Call Centre Services SCS Atos Call Centre Services SCS Summary Atos SIAM Service Desk is designed to provide a core part of the SIAM Tower model for ICT delivery. This service

More information

G-Cloud Service Definition. Atos Oracle Database Upgrade

G-Cloud Service Definition. Atos Oracle Database Upgrade G-Cloud Service Definition Atos Oracle Database Upgrade Database Upgrade for SCS While providing a technical database upgrade facility, Atos also assist organisations in maximising the benefits from the

More information

Specialist Cloud Services. Acumin Cloud Security Resourcing

Specialist Cloud Services. Acumin Cloud Security Resourcing Specialist Cloud Services Acumin Cloud Security Resourcing DOCUMENT: FRAMEWORK: STATUS Cloud Security Resourcing Service Definition G-Cloud Released VERSION: 1.0 CLASSIFICATION: CloudStore Acumin Consulting

More information

G-Cloud Service Definition. Atos Digital Marketing Specialist Cloud Services

G-Cloud Service Definition. Atos Digital Marketing Specialist Cloud Services G-Cloud Service Definition Atos Digital Marketing Specialist Cloud Services Atos Digital Marketing SCS Atos Digital Marketing is a range of services to help customers develop and promote their digital

More information

Closing Wireless Loopholes for PCI Compliance and Security

Closing Wireless Loopholes for PCI Compliance and Security Closing Wireless Loopholes for PCI Compliance and Security Personal information is under attack by hackers, and credit card information is among the most valuable. While enterprises have had years to develop

More information

G-Cloud Service Definition. Atos Software Development Services

G-Cloud Service Definition. Atos Software Development Services G-Cloud Service Definition Atos Software Development Services Atos Software Solution Development Services A flexible and robust software development service focussed on delivering maximum business value

More information

G-Cloud Service Definition. Canopy Remote Backup for Cloud SaaS

G-Cloud Service Definition. Canopy Remote Backup for Cloud SaaS G-Cloud Service Definition Canopy Remote Backup for Cloud SaaS Canopy Remote Backup for Cloud SaaS Canopy, an Atos company provides a highly secure, cloud backup and file management service for Internet-connected

More information

Integrated windows authentication for customers based on Probation GSI network

Integrated windows authentication for customers based on Probation GSI network Product Overview Victims Tracker (VT) is a software application, which was developed by London Probation Trust (LPT) to effectively manage the engagement / contact with victims of crime and the management

More information

G-CLOUD FRAMEWORK SERVICE DEFINITION. Kofax Model Office Bundle Proposal ISSUE 1

G-CLOUD FRAMEWORK SERVICE DEFINITION. Kofax Model Office Bundle Proposal ISSUE 1 G-CLOUD FRAMEWORK SERVICE DEFINITION Kofax Model Office Bundle Proposal ISSUE 1 Sept 2013 Table of Contents 1 SERVICE OVERVIEW & SOLUTION... 2 2 INFORMATION ASSURANCE... 3 3 BACKUP/RESTORE AND DISASTER

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

G-Cloud Service Description. Atos Microsoft Dynamics CRM on Demand

G-Cloud Service Description. Atos Microsoft Dynamics CRM on Demand G-Cloud Service Description Atos Microsoft Dynamics CRM on Demand February 2013 Atos, the Atos logo, Atos Consulting, Atos Worldline, Atos Sphere, Atos Cloud, Atos Healthcare (in the UK) and Atos WorldGrid

More information

G-Cloud Framework. Page 1. Document for Service Definition Audit management System. In response to G Cloud 6 Requirements

G-Cloud Framework. Page 1. Document for Service Definition Audit management System. In response to G Cloud 6 Requirements 1 G-Cloud Framework Document for Service Definition Audit management System In response to G Cloud 6 Requirements 1 2 Table of Content Audit Management System Minimize the Risk 1.The Audit management System.........

More information

Lot 1 Service Specification MANAGED SECURITY SERVICES

Lot 1 Service Specification MANAGED SECURITY SERVICES Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

G-Cloud Service Definition. Atos Total Application Performance Management for Cloud SaaS

G-Cloud Service Definition. Atos Total Application Performance Management for Cloud SaaS G-Cloud Service Definition Atos Total Application Performance Management for Cloud SaaS Atos Total Application Performance Management Cloud SaaS Total Application Performance Management helps your organisation

More information

G-CLOUD 7 - VIRTUAL ASSET MANAGER (VAM) SPECIALIST CLOUD SERVICES (SCS)

G-CLOUD 7 - VIRTUAL ASSET MANAGER (VAM) SPECIALIST CLOUD SERVICES (SCS) G-CLOUD 7 - VIRTUAL ASSET MANAGER (VAM) SPECIALIST CLOUD SERVICES (SCS) Service Definition 6th October 2015 TABLE OF CONTENTS VIRTUAL ASSET MANAGER (VAM) SPECIALIST CLOUD SERVICES (SCS) 3 SERVICE SUMMARY

More information

G-Cloud Service Definition. Canopy Remote Backup for Cloud SaaS

G-Cloud Service Definition. Canopy Remote Backup for Cloud SaaS G-Cloud Service Definition Canopy Remote Backup for Cloud SaaS Canopy Remote Backup for Cloud SaaS Canopy, an Atos company provides a highly secure, cloud backup and file management service for Internet-connected

More information

G-Cloud Pricing. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS

G-Cloud Pricing. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS G-Cloud Pricing Atos infrastructure Vulnerability Scanning (Outpost24) SaaS Contents 1. Introduction... 1 2. Pricing... 2 2.1 External Network Scan... 2 2.2 PCI DSS Approved Scanner Vendor (ASV) Scan...

More information

Growth Through Excellence

Growth Through Excellence Growth Through Excellence Public/Private Cloud Services Service Definition Document G- Cloud 5 REFERENCE NUMBER RM1557v Table of Contents Table of Contents... 3 Executive Summary... 4 About the Company...

More information

Software as a Service (SaaS) Online HR

Software as a Service (SaaS) Online HR Software as a Service (SaaS) Online HR Contents Service Definition... 3 An overview of the G-Cloud Service... 3 Key Service Attributes... 4 Information assurance... 4 Details of the level of backup/restore

More information

PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region

PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Service Definition Nine23 MDM

Service Definition Nine23 MDM Service Definition Nine23 MDM G-Cloud iv Contents 1 Service Nine23 Mobile Device Management System.....4 1.1 Overview Nine23 MDM...... 4 1.2 Open Standards. 5 1.3 User requirements.....5 1.3.1 Client Browser....5

More information

G-Cloud Service Definition. Atos Accredited Oracle Business Intelligence Solutions SCS

G-Cloud Service Definition. Atos Accredited Oracle Business Intelligence Solutions SCS G-Cloud Service Definition Atos Accredited Oracle Business Intelligence Solutions SCS Atos Accredited Oracle Business Intelligence Solutions SCS Robust, scalable Cloud computing and consumption-based reporting

More information

1. Perimeter Security Dealing with firewall, gateways and VPNs and technical entry points. Physical Access to your premises can also be reviewed.

1. Perimeter Security Dealing with firewall, gateways and VPNs and technical entry points. Physical Access to your premises can also be reviewed. Service Definition Technical Security Review Overview of Service Considering the increasing importance of security, the number of organisations that allow for contingency in their Information Security

More information

IPL Service Definition - Data Recovery, Conversion and Migration

IPL Service Definition - Data Recovery, Conversion and Migration IPL Proposal IPL Service Definition - Data Recovery, Conversion and Migration Project: Date: 10 April 2014 Issue Number: V1 Customer: Crown Commercial Service Page 1 of 10 IPL Information Processing Limited

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

University of Sunderland Business Assurance PCI Security Policy

University of Sunderland Business Assurance PCI Security Policy University of Sunderland Business Assurance PCI Security Policy Document Classification: Public Policy Reference Central Register IG008 Policy Reference Faculty / Service IG 008 Policy Owner Chief Financial

More information

Service: Contract Management (Software as a Service)

Service: Contract Management (Software as a Service) Service: Contract Management (Software as a Service) 1. Description: An overview of the G-Cloud Service (functional, non-functional) econtract Management allows for the management of a contract after award,

More information

Open Source Sales Force Automation (SFA) in the Cloud SaaS

Open Source Sales Force Automation (SFA) in the Cloud SaaS Open Source Sales Force Automation (SFA) in the Cloud SaaS Service Overview Our open source Sales Force Automation (SFA) in the cloud service allows customers to perform marketing automation through multi

More information

Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 1.0, Issue Date: 05/02/201405/02/2014. Classification: Open

Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 1.0, Issue Date: 05/02/201405/02/2014. Classification: Open Protective Monitoring as a Service Version: 1.0, Issue Date: 05/02/201405/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 2014. Other than for the sole purpose of evaluating this

More information

Service Definition (Q-D1) Penetration Testing. Overview of Service. Functional and non-functional Detail. Q-D1: Service Definition

Service Definition (Q-D1) Penetration Testing. Overview of Service. Functional and non-functional Detail. Q-D1: Service Definition Service Definition (Q-D1) Penetration Testing Overview of Service The commissioning of a penetration test or vulnerability assessment is an excellent way to ensure that security technologies and controls

More information

Lot 4 Service Specification BUSINESS PROCESS MANAGEMENT (BPM) PROFESSIONAL SERVICES

Lot 4 Service Specification BUSINESS PROCESS MANAGEMENT (BPM) PROFESSIONAL SERVICES Lot 4 Service Specification BUSINESS PROCESS MANAGEMENT (BPM) PROFESSIONAL SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF BUSINESS PROCESS MANAGEMENT (BPM) PROFESSIONAL SERVICES Business Process Management

More information

G-Cloud Service Definition. Canopy Enterprise Content Management for Cloud SaaS

G-Cloud Service Definition. Canopy Enterprise Content Management for Cloud SaaS G-Cloud Service Definition Canopy Enterprise Content Management for Cloud SaaS Canopy Enterprise Content Management (ECM) Canopy ECM is a central, on-demand hub providing the entire Customer document and

More information

IBM Web Server as a Service

IBM Web Server as a Service IBM Web Server as a Service Service Definition IBM G-Cloud Web Server as a Service 1 1. Summary 1.1 Service Description This offering is provided by IBM Global Business Services and provides a Web Server

More information

Service Definition Document

Service Definition Document Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)

More information

Digital Forensics G-Cloud Service Definition

Digital Forensics G-Cloud Service Definition Digital Forensics G-Cloud Service Definition 2013 General Dynamics Information Technology Limited. All rights 1 GDIT Team Clients Metropolitan Police Service The General Dynamics Information Technology

More information

GPS G-Cloud Lot 4: Oracle Business Intelligence Cloud Consultancy Service Definition

GPS G-Cloud Lot 4: Oracle Business Intelligence Cloud Consultancy Service Definition GPS G-Cloud Lot 4: Contents 1 Introduction... 3 2 Service... 4 2.1 Cloud Consultancy Overview... 4 2.2 Information assurance... 5 2.3 Backup/Restore and Disaster Recovery... 6 2.4 On-boarding and Off-boarding...

More information

MDM & ENTERPRISE MOBILITY SERVICE DESCRIPTION G-CLOUD 7 OCTOBER 3, 2015

MDM & ENTERPRISE MOBILITY SERVICE DESCRIPTION G-CLOUD 7 OCTOBER 3, 2015 OCTOBER 3, 2015 MDM & ENTERPRISE MOBILITY SERVICE DESCRIPTION G-CLOUD 7 607 Milton Keynes Business Centre Hayley Court, Linford Wood, Milton Keynes. MK14 6gD Table of Contents 1 Introduction 4 1.1 Executive

More information

DIGITAL MARKETPLACE (G-CLOUD 7) OFFERING. Sopra Steria OneMobile SaaS Service. Introduction. Service Definition. Sopra Steria in the public sector

DIGITAL MARKETPLACE (G-CLOUD 7) OFFERING. Sopra Steria OneMobile SaaS Service. Introduction. Service Definition. Sopra Steria in the public sector DIGITAL MARKETPLACE (G-CLOUD 7) OFFERING Sopra Steria OneMobile SaaS Service Sopra Steria in the public sector Organisations across the public sector choose Sopra Steria to deliver transformation programmes

More information

Lot 4 Specialist Cloud Service Questmark Ltd. Video Conferencing Small Meeting Room Service

Lot 4 Specialist Cloud Service Questmark Ltd. Video Conferencing Small Meeting Room Service Lot 4 Specialist Cloud Services Lot 4 Specialist Cloud Service Questmark Ltd Video Conferencing Small Meeting Room Service QUESTMARK LIMITED Park House, 104 Derby Road, Long Eaton, NG10 4LS Telephone:

More information

SERVICE DEFINITION DOCUMENT MANAGEMENT IN THE CLOUD

SERVICE DEFINITION DOCUMENT MANAGEMENT IN THE CLOUD Commercial in Confidence 1 G-CLOUD III FRAMEWORK SERVICE DEFINITION DOCUMENT MANAGEMENT IN THE CLOUD Capita Division / Supplier: Capita Business Services Ltd powered by SkyScape Service Name: Document

More information

Agilisys G-Cloud Service V

Agilisys G-Cloud Service V Agilisys G-Cloud Service V Service Definition Endpoint Management Lot 1 Infrastructure as a Service (IaaS) April 2014 At Agilisys we deliver success through innovation working with our clients to transform

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. Table of contents 1 Introduction...3 2 Architecture Services...4 2.1 Enterprise Architecture Services...5 2.2 Solution Architecture Services...6 2.3 Service

More information

IPL Service Definition - Master Data Management for Cloud Related Services

IPL Service Definition - Master Data Management for Cloud Related Services IPL Proposal April 2014 IPL Service Definition - Master Data Management for Cloud Related Services Project: Date: 10 April 2014 Issue Number: Customer: Crown Commercial Service Page 1 of 11 IPL Information

More information

Business Process Approval Workflow Manager. Services Definition Document

Business Process Approval Workflow Manager. Services Definition Document Business Process Approval Workflow Manager Services Definition Document Introducing CoreStream CoreStream is a UK based provider of technology solutions focused on helping organisations manage risk, satisfy

More information

IBM G-Cloud Microsoft Windows Active Directory as a Service

IBM G-Cloud Microsoft Windows Active Directory as a Service IBM G-Cloud Microsoft Windows Active Directory as a Service Service Definition IBM G-Cloud Windows AD as a Service 1 1. Summary 1.1 Service Description This offering is provided by IBM Global Business

More information

Business Analysis from Quadrant - to enable more or better use of Cloud Services (Service Definition, G-Cloud CloudStore Services)

Business Analysis from Quadrant - to enable more or better use of Cloud Services (Service Definition, G-Cloud CloudStore Services) - to enable more or better use of Cloud Services (Service Definition, G-Cloud CloudStore Services) Quadrant Consultants Limited Golden Cross House, 8 Duncannon St, WC2N 4JF Tel: 00 44 (0)20 7868 5470 Email:

More information

Big Data Analytics Service Definition G-Cloud 7

Big Data Analytics Service Definition G-Cloud 7 Big Data Analytics Service Definition G-Cloud 7 Big Data Analytics Service Service Overview ThinkingSafe s Big Data Analytics Service allows information to be collected from multiple locations, consolidated

More information

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00 PCI PA - DSS Point XSA Implementation Guide Atos Worldline Banksys XENTA SA Version 1.00 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page number 2 (16)

More information

Worldpay s guide to the Payment Card Industry Data Security Standard (PCI DSS)

Worldpay s guide to the Payment Card Industry Data Security Standard (PCI DSS) Worldpay s guide to the Payment Card Industry Data Security Standard (PCI DSS) What is PCI DSS? The 12 Requirements Becoming compliant with SaferPayments Understanding the jargon SaferPayments Be smart.

More information

Ubertas Cloud Services: Service Definition

Ubertas Cloud Services: Service Definition Ubertas Cloud Services: Service Definition February 2013 Innovation. Power. Trust. Contents 1. About Ubertas... 2 Our Company... 2 Our Approach to Service Delivery... 2 Our Partner Network & the UK Cloud

More information

Cloud Brokerage. G-Cloud Service. Arcus Global 2014 1

Cloud Brokerage. G-Cloud Service. Arcus Global 2014 1 Cloud Brokerage G-Cloud Service 1 An overview of the G-Cloud Service Information assurance Backup/restore and disaster recovery On-boarding and Off-boarding processes/scope etc. Pricing Service management

More information

GFI White Paper PCI-DSS compliance and GFI Software products

GFI White Paper PCI-DSS compliance and GFI Software products White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption

More information

G-Cloud Service Description. Atos: Cloud Professional Services: Requirements Specification

G-Cloud Service Description. Atos: Cloud Professional Services: Requirements Specification G-Cloud Service Description Atos: Cloud Professional Services: Requirements Specification Atos, the Atos logo, Atos Consulting, Atos Worldline, Atos Sphere, Atos Cloud, Atos Healthcare (in the UK) and

More information

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Payment Card Industry Data Security Standard Introduction Purpose Audience Implications Sensitive Digital Data Management In an effort to protect credit card information from unauthorized access, disclosure

More information

How To Run A Cloud Service For A Large Business

How To Run A Cloud Service For A Large Business Lot: 4 Specialist Cloud Services Service 25: Digital Continuity - ediscovery Solutions An overview of the G-Cloud Service (functional, non functional) Discover Information based on content, metadata and

More information

Cyber Essentials Scheme

Cyber Essentials Scheme Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these

More information

PCI Solution for Retail: Addressing Compliance and Security Best Practices

PCI Solution for Retail: Addressing Compliance and Security Best Practices PCI Solution for Retail: Addressing Compliance and Security Best Practices Executive Summary The Payment Card Industry (PCI) Data Security Standard has been revised to address an evolving risk environment

More information

Need to be PCI DSS compliant and reduce the risk of fraud?

Need to be PCI DSS compliant and reduce the risk of fraud? Need to be PCI DSS compliant and reduce the risk of fraud? NCR Security lessens your PCI compliance burden and protects the integrity of your network An NCR White Paper Experience a new world of interaction

More information

CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES

CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES PROTECTIVE MONITORING SERVICE In a world where cyber threats are emerging daily, often from unknown sources, information security is something

More information

How To Help Your Business Succeed

How To Help Your Business Succeed G Cloud III Framework Lot 4 (SCS) CHECK Accredited Penetration Testing Services Contents Executive Summary 3 CHECK Accredited Penetration Testing Services 4 Why Deloitte? 5 Package Cost 7 Contact 9 Service

More information

Nine Steps to Smart Security for Small Businesses

Nine Steps to Smart Security for Small Businesses Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...

More information

Business Operations. Module Db. Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL:

Business Operations. Module Db. Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL: Module Db Technical Solution Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL: Cost is reduced through greater economies of scale, removal of duplication

More information

G Cloud III Framework Lot 4 (SCS) Project Management

G Cloud III Framework Lot 4 (SCS) Project Management G Cloud III Framework Lot 4 (SCS) Project Management Contents Executive Summary 3 Project Management 4 Why Deloitte? 6 SFIA Rate Card 7 Contact 8 Service Definition (a) to (p) 9 Executive Summary PROJECT

More information

Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems

Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems Page 1 of 5 Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems In July the Payment Card Industry Security Standards Council (PCI SSC) published

More information

Service Definition (Q-D1) Vulnerability Scan (LITE Test) Overview of Service. Functional and non-functional Detail. Q-D1: Service Definition

Service Definition (Q-D1) Vulnerability Scan (LITE Test) Overview of Service. Functional and non-functional Detail. Q-D1: Service Definition Service Definition (Q-D1) Vulnerability Scan (LITE Test) Overview of Service The commissioning of a penetration test or vulnerability assessment is an excellent way to ensure that security technologies

More information

PCI DSS COMPLIANCE DATA

PCI DSS COMPLIANCE DATA PCI DSS COMPLIANCE DATA AND PROTECTION EagleHeaps FROM CONTENTS Overview... 2 The Basics of PCI DSS... 2 PCI DSS Compliance... 4 The Solution Provider Role (and Accountability).... 4 Concerns and Opportunities

More information

Security Consultants / Security Managed Services

Security Consultants / Security Managed Services Security Consultants / Security Managed Services Service Definition Document for G-Cloudv7 Services October 2015 Table of Contents Service Overview...3 Our Approach... 3 Features... 3 Benefits... 4 ON-BOARDING

More information

Firewall Administration and Management

Firewall Administration and Management Firewall Administration and Management Preventing unauthorised access and costly breaches G-Cloud 5 Service Definition CONTENTS Overview of Service... 2 Protects Systems and data... 2 Optimise firewall

More information

ICT and Information Security Resources

ICT and Information Security Resources Methods GCloud Service Definition ICT and Information Security Resources HEAD OFFICE: 125 Shaftesbury Avenue, London WC2H 8AD Scottish Office: Exchange Place 2, 5 Semple Street, Edinburgh, EH3 8BL t: +44

More information

SERVICE DEFINITION CYBER SECURITY SERVICES CONTENTS

SERVICE DEFINITION CYBER SECURITY SERVICES CONTENTS SERVICE DEFINITION CYBER SECURITY SERVICES CONTENTS Cyber Security Overview About FDM Management Structure Relating to this Offering Your Responsibilities Other Key Points Relating to this Offering SFIA

More information

PAAS Public Sector Managed Services

PAAS Public Sector Managed Services Meritec Limited Meritec House, Acorn Business Park, Skipton, North Yorkshire, BD23 2UE 0845 3451155 servicepoint@meritec.co.uk www.meritec.co.uk Registered In England & Wales No. 3224622 Table of Contents

More information

PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core PCI PA - DSS Point BKX Implementation Guide Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core Version 2.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566

More information

SmartImpact MS Dynamics CRM. Support Service Definition

SmartImpact MS Dynamics CRM. Support Service Definition SmartImpact MS Dynamics CRM Support Service Definition Alliance House, 12 Caxton Road, London, SW1H 0QS United Kingdom Phone: +44 (0) 84 5544 2043 E-mail: info@smartimpact.co.uk http://www.smartimpact.co.uk/

More information

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness CISP BULLETIN Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness November 21, 2006 To support compliance with the Cardholder Information Security Program (CISP), Visa USA

More information

74% 96 Action Items. Compliance

74% 96 Action Items. Compliance Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated

More information

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE ebook Series 2 Headlines have been written, fines have been issued and companies around the world have been challenged to find the resources, time and capital

More information

IBM G-Cloud Application Systems Management as a Service

IBM G-Cloud Application Systems Management as a Service IBM G-Cloud Application Systems Management as a Service Service Definition 1 1. Summary 1.1 Service Description This offering is provided by IBM Global Business Services and provides a Systems Management

More information

Single Sign On Service Definition

Single Sign On Service Definition Single Sign On Service Definition Prepared by: Date: 7 th April 2014 Robbie Cruickshank-Sutton For enquiries regarding this document, please contact: European Head Office: Olympian Trading Estate, Cayton

More information

ediscovery Services from Quadrant - to enable more or better use of Cloud Services (Service Definition, G-Cloud CloudStore Services)

ediscovery Services from Quadrant - to enable more or better use of Cloud Services (Service Definition, G-Cloud CloudStore Services) - to enable more or better use of Cloud Services (Service Definition, G-Cloud CloudStore Services) Quadrant Consultants Limited Golden Cross House, 8 Duncannon St, WC2N 4JF Tel: 00 44 (0)20 7868 5470 Email:

More information

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) Addressing the PCI DSS with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 info@coresecurity.com

More information