PROTECTIVE MONITORING SERVICE G-CLOUD SERVICE DEFINITION

Size: px
Start display at page:

Download "PROTECTIVE MONITORING SERVICE G-CLOUD SERVICE DEFINITION"

Transcription

1 PROTECTIVE MONITORING SERVICE G-CLOUD SERVICE DEFINITION 15

2 Table of contents 1 Introduction Service Overview Protective Monitoring Service Description Scenario: Basis for price Technical Requirements Customer Requirements Optional Additional Services Associated BAE Systems Managed Security Services Service Delivery Service management Service constraints Service Levels Information assurance Backup/Restore & Disaster Recovery Data restoration / service migration Trial Services On-boarding Training Commercial Arrangements Pricing Ordering and invoicing process Customer responsibilities BAE Systems Managed Security Protective Monitoring Terms and Conditions Termination terms Financial recompense model for not meeting service levels Intellectual Property Applied Intelligence: Information Intelligence Protective Monitoring Service Page 1 of 14

3 1 Introduction BAE Systems Applied Intelligence (formerly known as Detica) Cyber Security capabilities within G-Cloud are drawn from our portfolio of services and solutions which are designed to assist organisations in making cyber space safe for business and governments. Our capabilities are organised into the four principal areas of Prepare, Protect, Monitor and Respond as shown in Figure 1 below. Business and technical services that help our customers understand and manage their cyber risk, make informed investment decisions and drive through improvements. Repeatable products and solution integration to protect business critical information from cyber attack and enable secure collaboration with partners, clients and employees Products and services that monitor networks to identify malicious behaviour, understand its intent and prevent it from achieving its goal. Consulting services which minimise the business impact of a successful cyber security attack through remediation and crisis management Figure 1 - BAE Systems Cyber Security Services BAE Systems Cyber Security offering to G-Cloud is based on elements from the Prepare and Monitor capability areas as described in the following Service Description documents: BAE Systems Managed Security Protective Monitoring Service (this document) BAE Systems Managed Security Advanced Threat Detection Service BAE Systems Managed Information Assurance Services BAE Systems Security and Information Risk Services Protective Monitoring Service Page 2 of 14

4 2 Service Overview 2.1 Protective Monitoring The BAE Systems Managed Security Protective Monitoring Service is a real time security monitoring service that detects and notifies the Customer of Security Incidents on the monitored network, as supporting compliance for standards such as GPG13. The Security Incident Notification and regular Security Incident reporting processes provide visibility of Security Incidents and malicious behaviour impacting the Customer s business. In addition BAE Systems continually develops rules and content for the Protective Monitoring platform using information derived from our Threat Intelligence and Advanced Threat Detection Services to develop new Indicators of Compromise (IOCs). BAE Systems Operational service is depicted in the figure below and comprises the Protective Monitoring service in addition to a number of supporting services which enable this service, such as, Service Desk, Service Management, Threat Co-ordination and Technology Support. Security alerts are triaged by our analysts and on detection of a security incident, analysts have access to threat information and empirical knowledge to prioritise incidents and reduce false positive rates. Security incident reports contain recommended remedial actions and the necessary contextual information to allow the security incident to be resolved. Clients and third parties can interact directly through our Service Management portal or through sending an to the Service Desk, allowing customers to create and update Incidents and Service Requests with pertinent information. The Service Management portal provides a secure fully audited environment which also provides access to service performance information and reports. Protective Monitoring Service Page 3 of 14

5 2.2 Service Description In the delivery of this Service BAE Systems shall: Protective Monitoring Collect Security Data from collectors deployed as BAE Systems CPE on the Customer environment. The details of deployment are provided within the Deployment Plan; Transfer collected Security Data in near real time 24/7/365 according to the SLAs from the Customer monitoring environment to the storage Solution in compliance with an agreed Code of Connection (CoCo); Generate Security Alerts by processing Security Data using detection rulesets and compliance rulesets (such as GPG13, depending on requirements); Deploy new or modified Rulesets that have been confirmed by BAE Systems to accurately identify cyber threats, to continually improve the generation of Security Alerts; Process and analyse the Security Alerts generated by the SIEM throughout the agreed Service Hours; Raise a Security Incident once a threat has been identified by a BAE Systems security analyst; Security Incident Investigation and Remediation Advice Prioritise Security Incidents against an agreed Prioritisation Schema and log as a Security Incident within the BAE Systems ITIL v3 aligned Service Management Tool; Conduct a triage of each Security Incident prior to it being issued to the Customer; Access the BAE Systems knowledge base to check for any known remediation instructions related to the Security Incident, for example where it is a repeat incident. Attach known remediation instructions to the incident where these are identified to aid the Customer in incident remediation Generate remediation instructions in response to previous Security Incidents; Accept known remediation instructions provided by the Customer to BAE Systems through the BAE Systems Service Desk, for subsequent inclusion in future Security Incident reports; Client Service Desk Communicate to a single destination within the Customer the details of Security Incidents that conform to the agreed reporting criteria and according to the timescales defined in the agreed Service Levels; The communication will be via over an appropriately secure channel as specified within the Deployment Plan, with a confirmatory phone call for P1 level incidents; Where further information is identified by the Service which relates to an existing Security Incident, BAE Systems shall communicate, to a single destination within the Customer an update to the Security Incident. Protective Monitoring Service Page 4 of 14

6 2.3 Scenario: Basis for price The price provided has been generated using the following scenario: Maximum events per second of 20 Protective Monitoring to a maximum of GPG13 DETECT Security data relating to the following devices will be monitored: o o o o o o 95 user laptops/workstations 5 low volume additional devices (printers, wireless etc.) (by agreement) 20 servers 2 routers 2 firewalls 2 business applications 2.4 Technical Requirements BAE Systems shall deploy log collection applications on a virtual machine infrastructure provided by the customer in their own data centre. This virtual machine should be deployed in a management VLAN that is remotely accessible to BAE Systems staff via a VPN connection connecting the BAE Systems data centre environments to the customer estate. The customer will provide BAE Systems with access and credentials to install the collection applications. Network connectivity between the customer and the BAE Systems Security Operations Centre (SOC) will be achieved through an Internet VPN link that will be supplied by the customer. BAE Systems compress all data traffic that is extracted from the client environment to reduce the required bandwidth utilisation. With respect to the maximum events-persecond (EPS) of the environment being 20 the required bandwidth will be around 0.3 Mbps. 2.5 Customer Requirements The Customer shall: Manage all remediation activity associated with a notified Security Incident; Provide an appropriately secure single point of channel for receiving notification of Security Incidents; Provide connectivity to the Customer site for transfer of Security Data. 2.6 Optional Additional Services BAE Systems have not scoped the following services into the above scenario as they are not core to Protective Monitoring or associated compliance monitoring. If these services are required, BAE Systems will discuss your requirements and propose a suitable service and associated prices. Protective Monitoring Service Page 5 of 14

7 Security Log Retention: Collected security data, and historical correlation/analysis (as well as associated alerts) for any duration from months to years, both online, near-line and offline as required. Security Device Management: BAE Systems will manage your network security devices, including (but not exclusively) firewalls, IDS/IPS, web proxies and vulnerability management services. Response services: BAE Systems Cyber Response services are one of only four CESG Cyber Incident Response Scheme providers and we have responded to many varied and complex targeted attacks, insider attacks and more over several years and have a proven methodology. Services include forensics (including s, servers, network data and logs) and incident management services. These services are available as per-incident services or on an annual retention basis. Threat Intelligence: BAE Systems Managed Security services are built upon and continuously improved by our Threat Intelligence research and collaboration. Elements of this service are also available as an advisory service to further help UK Government customers prepare for and response to cyber security incidents. BAE Systems Managed Security Advanced Threat Detection (as detailed below) 2.7 Associated BAE Systems Managed Security Services Protective Monitoring provides holistic protection through the ingest and analysis of live log data, and delivers real time alert of security incidents leveraged from data available from existing security infrastructure and known threat signatures and likely indicators of compromise. The Protective Monitoring Service is part of the wider BAE Systems Managed Security service portfolio, and compliments the Advanced Threat Detection service. Advanced Threat Detection compliments and extends your security monitoring by focussing on network and application behaviour from collected data, providing deep insight into sophisticated threats using metadata gathered from network traffic, s, web traffic and DNS lookups. Our monitoring for advanced threats identifies deep rooted and complex threats which may lay dormant for many years, slowly gathering IPR or sensitive confidential data in preparation for future exfiltration. These threats are rarely identifiable using traditional security tooling and are designed to not be detected through monitoring of gateways and firewalls. Together, the BAE Systems Managed Security monitoring services offer unparalleled confidence in security posture and on-going protection against the full spectrum of cyber security threats. Protective Monitoring Service Page 6 of 14

8 When taken together, there are also operational benefits and overlaps that lead to operational cost reductions please contact BAE Systems for more information on procuring a combined service as opposed to individual lots. Protective Monitoring Service Page 7 of 14

9 3 Service Delivery 3.1 Service management BAE Systems manages the delivery of Services to the Customer using ITIL v3 aligned Service Management practices. This includes Service governance, escalation and continual Service improvement. Standard Service Reports will be provided as part of the Operational Services. Name Description Format Due Service Delivery Management Report Monthly/Quarterly Service Review Annual Service Review A report delivered to the Customer detailing the Incidents detected, as well as performance against all Customer Service Levels Face to face review of Service Delivery with the BAE Systems Service Delivery Manager and the Customer Account Manager Face to face review of Service Delivery with the BAE Systems Service Delivery Manager, the Customer Account Manager and the Customer Director(s) PDF report via (encrypted) Slide deck for discussion at Customer or BAE Systems offices Slide deck for discussion at Customer or BAE Systems offices Monthly Quarterly Annually The pricing assumes customer site visits within the M25 or BAE Systems Guildford office 3.2 Service constraints The service and corresponding pricing has been sized to the scenario contained in section 2.3 in order to offer a representative price for comparison purposes. BAE Systems can however operate the Protective Monitoring Service for larger estates, monitoring many thousands of devices and a wide variety of devices and applications. 3.3 Service Levels The scenario and corresponding pricing has been based on the scenario contained in section 2.3 and on the following indicative service levels Service Measure Channel Threshold P1 Security Incident Notification P2 Security Incident Notification P3 Security Incident Notification sent to Customer Report sent to Customer Report sent to Customer 75 minutes (95% within Target Incident Notification Time if 20 or more incidents or no more than one failure if less than 20 incidents) Included within the Monthly Security Incident Report Included within the Monthly Security Incident Report Protective Monitoring Service Page 8 of 14

10 P4 Security Incident Notification Availability of Protective Monitoring Report sent to Customer P1 Service Incident duration Included within the Monthly Security Incident Report 97% Availability The service Levels above a subset of the standard set of measures. 3.4 Information assurance The service as described above is only available for customer estates assured to IL3 and below. For IL4 and above (where the security meta-data is of the same impact level), or GPG13 compliance levels above detect please contact BAE Systems to discuss your requirements further. 3.5 Backup/Restore & Disaster Recovery Disaster Recovery is included in the scope of this proposed scenario, the RPO for the scenario in this proposal is 4 hours and the RTO for the scenario in this proposal is 48 hours. BAE Systems maintain a Business Continuity Plan should a scenario arise that affects the ability of our analysts to operate from the Security Operations Centre, at which point the operation of the service shall be from an alternate BAE Systems site. 3.6 Data restoration / service migration Not applicable. 3.7 Trial Services Trial options are not possible with this service. 3.8 On-boarding During the Transition phase BAE Systems will work closely with the Customer to align the processes delivered by BAE Systems with the Customer business processes required to deliver the Operational Service. BAE Systems will deliver the following deliverables as part of transition phase: Protective Monitoring Policy; Deployment Plan; Operational Service Pack, During the transition phase there will be two key delivery milestones: Interim Operational Capability (IOC): The point at which there is an operational service executing and service charges become effective. Full Operational Capability (FOC): The point at which the service is fully operational and has completed Operational Acceptance Test (OAT) and all SLAs become effective. Protective Monitoring Service Page 9 of 14

11 The Customer shall: Make available suitable security and network architects to work with BAE Systems and attend workshops and to work with BAE Systems to define and agree the Operating Policy. Provide an Event Source list, providing the IP address of each asset from which Security Event data will be collected on the Customer estate; Allow site access to BAE Systems engineers as required to carry out break fix processes; 3.9 Training Transition is dependent on individual customer requirements; It is estimated that the transition will be approximately 4-6 weeks duration. Not applicable. Protective Monitoring Service Page 10 of 14

12 4 Commercial Arrangements 4.1 Pricing Price to operate The price (excluding VAT) for the service is 137 per day, which equates to approximately 50,000 per annum, for a one year commitment. For a price which meets your specific requirements please contact BAE Systems Scenario restrictions A single geographic UK data centre and a single UK based office location IL0-IL3 accreditation, where IL3 metadata may be monitored from an IL2 platform. Protective Monitoring to a maximum of GPG13 DETECT Operation: UK business hours (8x5) service Monitoring by exception: the platform will be tuned to high severity issues such as IPS alarms, firewall denies and login failures. Low existing threat level in the monitored estate o If, through due diligence, BAE Systems believe there to be a greater existing threat this will be addressed through the transition phase No customer requirement for log retention: this will be defined at contract negotiation depending on customer requirements. Service operation only: See the On-Boarding section above for an indicative timescale for transition. Exit costs are not included in this price. 4.2 Ordering and invoicing process The Customer shall pay Supplier for the G-Cloud Services in the amount or at the rates set out in section 4.1 together with all reasonable travel and subsistence expenses and any other direct, non-labour charges as may be applicable. Supplier will invoice the Customer quarterly in advance i.e. for the depicted scenario 12.5k on the contract start date, and each quarter thereafter. All sums payable by the Customer to Supplier shall be paid, without discount, set-off, counterclaim or other deduction within 30 days from the date of Supplier s invoice. Applicable taxes (including value added tax) shall be payable additionally by the Customer at the prescribed rate at the time of invoicing. The Customer shall notify Supplier in writing within 7 days of receipt of an invoice if the Customer considers all or part of such invoice incorrect or invalid for any reason and the reasons for disputing payment failing which the Customer will raise no objection to any such invoice and will make full payment in accordance with it. 4.3 Customer responsibilities The Customer shall provide to Supplier at no charge and in a timely manner, all such documents information, materials, facilities, support, services and co-operation relating to the G-Cloud Services including (without limitation) computer programs, data, reports and specifications and other information (together Customer Material ) as Supplier may reasonably require for the proper performance of the G-Cloud Services and within sufficient time to enable Supplier to perform those G-Cloud Services and the Customer Protective Monitoring Service Page 11 of 14

13 shall ensure that such are accurate and complete, and Supplier shall be entitled to rely upon such as being accurate and complete without seeking to verify or check it. The Customer shall provide Supplier, its agents, subcontractors, consultants and employees, in a timely manner and at no charge, with access to any of the Customer's premises, office accommodation, equipment, systems, networks, software, data and other facilities as reasonably required by Supplier. 4.4 BAE Systems Managed Security Protective Monitoring Terms and Conditions The full terms and conditions for this service can be found in BAE Systems Applied Intelligence MSS MSA. 4.5 Termination terms Not Applicable 4.6 Financial recompense model for not meeting service levels Not applicable. 4.7 Intellectual Property Details of the terms and conditions of the foreground IPR, please see the BAE Systems Applied Intelligence MSS MSA. The proposed service in this document encompasses some elements of the Threat Intelligence service; in addition to the standard IPR terms and conditions please be aware of the following additional IPR restrictions: Ownership of copyright and all other intellectual property in the Threat Intelligence Deliverables and Services shall remain with BAE Systems at all times. Subject to payment in full of each instalment of the fees for the Services Customer is granted a nonexclusive, non sub-licensable, non-transferable, non-assignable, limited royalty free license to use and copy the Threat Intelligence Deliverables solely for the Customer s internal business purposes. The Customer shall expressly not: (i) sublicense, distribute, publicly perform or display, or otherwise share or make accessible any Threat Intelligence Deliverables, data-feed, signatures, metadata, analysis, tools or results from the Services or portions thereof to a third party; (ii) export the Threat Intelligence Deliverables, data-feed, signatures, metadata, analysis, tools or results from the Services, in whole or in part, in violation of applicable laws or regulations or; (iii) use the Services to offer products and services competitive with those of BAE Systems, as reasonably determined by BAE Systems. All rights pertaining to Threat Intelligence, in all materials created by BAE Systems during its performance of the Services shall vest in and be the sole property of BAE Systems. Protective Monitoring Service Page 12 of 14

14 5 Applied Intelligence: Information Intelligence BAE Systems Applied Intelligence is an information intelligence specialist. We help government and commercial organisations exploit information to deliver critical business services more effectively and economically. We also develop solutions to strengthen national security and resilience, enabling citizens to go about their lives freely and with confidence. By combining technical innovation and domain knowledge, we integrate and deliver world-class solutions often based on our own unique intellectual property to our customers most complex operational problems. We recognise the importance of Cloud services to the realisation of HMG s IT Strategy and have optimised many of our most compelling IT service offerings for Government on G-Cloud. Through these offerings we are at the forefront of realising the full benefits of Information Technology for our customers. Below is a summary of our G-Cloud services. G-Cloud Service Consultancy Service Integration and Management (SIAM) Information Security Agile Design and Delivery Architecture Data Services Service Description Providing Business and IT strategy and transformation consultancy services, including requirements management, organisational change, and business case & benefits management. Covering all aspects of SIAM services, from target operating model design, to service integration, supplier management, architecture and transition and transformation management. Cyber security assessments, architecture and testing services; Threat detection, protective monitoring and security management services; Cyber incident response, and Industrial Protection, Secure Web Gateway and Cross domain services. Services delivered using the Agile method for design and development, including Secure-by-Design services. The design of end-to-end architecture solutions, including infrastructure, operations, applications and service, as well as enterprise architecture. Data management, protection and exploitation services covering people, process, data and technologies. Includes maturity assessments, organisation design and provision of data analytics services. Programme Management Digital Media Secure Mobility & MobileProtect Provision of programme management and support experts to provide delivery and/or assurance of internal and external programmes. Digital transformation, media development, including user experience, social business and mobile media. From mobile strategy, through to development of your secure mobile proposition for your user base; Cloud based protection for your user base portfolio of mobile devices. NetReveal OnDemand Cl Cloud based delivery of the global leader in counter fraud software. For more details on our G-Cloud services for G-Cloud, visit or send us an at gcloud@baesystems.com. Applied Intelligence is part of BAE Systems, the premier global defence, security and aerospace company. BAE Systems delivers a full range of products and services for air, land and naval forces, as well as advanced electronics, security, information technology solutions and customer support services. Protective Monitoring Service Page 13 of 14

15 Applied intelligence Limited is a BAE Systems company, trading as BAE Systems Applied Intelligence. Applied Intelligence Limited is registered in England (No ) with its registered office at Surrey Research Park, Guildford, England, GU2 7YP. Copyright BAE Systems plc All Rights Reserved. BAE SYSTEMS, APPLIED INTELLIGENCE and the names of the BAE Systems Applied Intelligence products referenced herein are trademarks of BAE Systems plc and are registered in certain jurisdictions. Protective Monitoring Service Page 14 of 14

ADVANCED THREAT DETECTION G-CLOUD SERVICE DEFINITION

ADVANCED THREAT DETECTION G-CLOUD SERVICE DEFINITION ADVANCED THREAT DETECTION G-CLOUD SERVICE DEFINITION 14 Table of contents 1 Introduction...2 2 Service Overview...3 2.1 Advanced Threat Detection Service...3 2.2 Service Description...4 2.3 Scenario: Basis

More information

DATA ANALYTICS SERVICES. G-CLOUD SERVICE DEFINITION.

DATA ANALYTICS SERVICES. G-CLOUD SERVICE DEFINITION. DATA ANALYTICS SERVICES. G-CLOUD SERVICE DEFINITION. Table of contents 1 Introduction...3 2 Services Overview...4 2.1 Rapid KPI Reporting Delivery Services...4 2.2 Data Discovery & Exploitation Services...5

More information

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. Table of contents 1 Introduction...3 2 Architecture Services...4 2.1 Enterprise Architecture Services...5 2.2 Solution Architecture Services...6 2.3 Service

More information

DATA ANALYTICS SERVICES G-CLOUD SERVICE DEFINITION

DATA ANALYTICS SERVICES G-CLOUD SERVICE DEFINITION DATA ANALYTICS SERVICES G-CLOUD SERVICE DEFINITION 3 Table of contents 1 Introduction...2 2 Service Overview...3 2.1 Rapid Reporting Delivery Services...3 2.2 Data Discovery & Exploitation Services...4

More information

BAE SYSTEMS CYBERREVEAL G-CLOUD SERVICE DEFINITION

BAE SYSTEMS CYBERREVEAL G-CLOUD SERVICE DEFINITION BAE SYSTEMS CYBERREVEAL G-CLOUD SERVICE DEFINITION 20 Table of contents 1 Introduction...2 2 CyberReveal Overview...3 2.1 CyberReveal Platform...3 2.2 CyberReveal Analytics...5 2.3 CyberReveal Investigator...7

More information

Lot 1 Service Specification MANAGED SECURITY SERVICES

Lot 1 Service Specification MANAGED SECURITY SERVICES Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services

More information

Service Definition Document

Service Definition Document Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)

More information

CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES

CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES PROTECTIVE MONITORING SERVICE In a world where cyber threats are emerging daily, often from unknown sources, information security is something

More information

Protecting Malaysia in the Connected world

Protecting Malaysia in the Connected world Protecting Malaysia in the Connected world cyber Security Company of the Year (Cybersecurity Malaysia, 2014) Most innovative information security company in Malaysia (Cybersecurity Malaysia, 2012) BAE

More information

Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 1.0, Issue Date: 05/02/201405/02/2014. Classification: Open

Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 1.0, Issue Date: 05/02/201405/02/2014. Classification: Open Protective Monitoring as a Service Version: 1.0, Issue Date: 05/02/201405/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 2014. Other than for the sole purpose of evaluating this

More information

GPG13 Protective Monitoring. Service Definition

GPG13 Protective Monitoring. Service Definition GPG13 Protective Monitoring Service Definition Issue Number V1.3 Document Date 27 November 2014 Author: D.M.Woodcock Classification UNCLASSIFIED Version G-Cloud 6 2014 Copyright Assuria Limited. All rights

More information

SERVICE DEFINITION G-CLOUD 7 SECURE FILE TRANSFER DIODE. Classification: Open

SERVICE DEFINITION G-CLOUD 7 SECURE FILE TRANSFER DIODE. Classification: Open SERVICE DEFINITION G-CLOUD 7 SECURE FILE TRANSFER DIODE Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this

More information

PSN Protective Monitoring. Service Definition

PSN Protective Monitoring. Service Definition PSN Protective Monitoring Service Definition Issue Number V3.0 Document Date 29 September 2015 Author: R.N. Connor Classification UNCLASSIFIED Version G-Cloud 7 2015 Copyright Tenian Limited. All rights

More information

Ubertas Cloud Services: Service Definition

Ubertas Cloud Services: Service Definition Ubertas Cloud Services: Service Definition February 2013 Innovation. Power. Trust. Contents 1. About Ubertas... 2 Our Company... 2 Our Approach to Service Delivery... 2 Our Partner Network & the UK Cloud

More information

Secure Remote Backup (IL3) G-Cloud Lot3 IaaS

Secure Remote Backup (IL3) G-Cloud Lot3 IaaS Secure Remote Backup (IL3) G-Cloud Lot3 IaaS Contents Service Definition... 3 An overview of the Remote Backup as a Service... 3 Key Service Attributes... 4 Information assurance... 5 Details of the level

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

G-Cloud Service Definition. Atos Information Security Wireless Scanning Service

G-Cloud Service Definition. Atos Information Security Wireless Scanning Service G-Cloud Service Definition Atos Information Security Wireless Scanning Service Keeping your wireless networks secure Atos Information Security Wireless Scanning Service The Atos Wireless Scanning Service

More information

Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 2.1, Issue Date: 05/02/201405/02/2014. Classification: Open

Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 2.1, Issue Date: 05/02/201405/02/2014. Classification: Open Protective Monitoring as a Service Version: 2.1, Issue Date: 05/02/201405/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 201416/12/2014. Other than for the sole purpose of evaluating

More information

GPS G-Cloud Lot 4: Oracle Business Intelligence Cloud Consultancy Service Definition

GPS G-Cloud Lot 4: Oracle Business Intelligence Cloud Consultancy Service Definition GPS G-Cloud Lot 4: Contents 1 Introduction... 3 2 Service... 4 2.1 Cloud Consultancy Overview... 4 2.2 Information assurance... 5 2.3 Backup/Restore and Disaster Recovery... 6 2.4 On-boarding and Off-boarding...

More information

Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services

Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services Page 1 1 Contents 1 Contents... 2 2 Transcend360 Introduction... 3 3 Service overview... 4 3.1 Service introduction... 4

More information

Growth Through Excellence

Growth Through Excellence Growth Through Excellence Public/Private Cloud Services Service Definition Document G- Cloud 5 REFERENCE NUMBER RM1557v Table of Contents Table of Contents... 3 Executive Summary... 4 About the Company...

More information

North American Electric Reliability Corporation (NERC) Cyber Security Standard

North American Electric Reliability Corporation (NERC) Cyber Security Standard North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation

More information

AGILE DESIGN AND DELIVERY SERVICES. G-CLOUD SERVICE DEFINITION.

AGILE DESIGN AND DELIVERY SERVICES. G-CLOUD SERVICE DEFINITION. AGILE DESIGN AND DELIVERY SERVICES. G-CLOUD SERVICE DEFINITION. Table of contents 1 Introduction...3 1.1 Agile Lifecycle Services...3 1.2 Secure by Design (SbD)...4 2 Services Overview...5 2.1 Agile Delivery

More information

Security Consultants / Security Managed Services

Security Consultants / Security Managed Services Security Consultants / Security Managed Services Service Definition Document for G-Cloudv7 Services October 2015 Table of Contents Service Overview...3 Our Approach... 3 Features... 3 Benefits... 4 ON-BOARDING

More information

Thales Service Definition for PSN Secure Email Gateway Service for Cloud Services

Thales Service Definition for PSN Secure Email Gateway Service for Cloud Services Thales Definition for PSN Secure Email Gateway Thales Definition for PSN Secure Email Gateway for Cloud s April 2014 Page 1 of 12 Thales Definition for PSN Secure Email Gateway CONTENT Page No. Introduction...

More information

G-CLOUD 7 - VIRTUAL ASSET MANAGER (VAM) SPECIALIST CLOUD SERVICES (SCS)

G-CLOUD 7 - VIRTUAL ASSET MANAGER (VAM) SPECIALIST CLOUD SERVICES (SCS) G-CLOUD 7 - VIRTUAL ASSET MANAGER (VAM) SPECIALIST CLOUD SERVICES (SCS) Service Definition 6th October 2015 TABLE OF CONTENTS VIRTUAL ASSET MANAGER (VAM) SPECIALIST CLOUD SERVICES (SCS) 3 SERVICE SUMMARY

More information

Introduction to Centerprise International Limited

Introduction to Centerprise International Limited RM1557vi Introduction to Centerprise International Limited Centerprise International Limited was established in 1983 as an engineering and manufacturing company, specialising in designing and building

More information

GOOD PRACTICE GUIDE 13 (GPG13)

GOOD PRACTICE GUIDE 13 (GPG13) GOOD PRACTICE GUIDE 13 (GPG13) GPG13 - AT A GLANCE Protective Monitoring (PM) is based on Good Practice Guide 13 Comprises of 12 sections called Proactive Monitoring Controls 1-12 Based on four Recording

More information

Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services

Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services Page 1 1 Contents 1 Contents... 2 2 Transcend360 Introduction... 3 3 Service overview... 4 3.1 Service introduction... 4 3.2 Service description...

More information

G-Cloud 7 Service Definition. Atos Oracle Cloud ERP Implementation Services

G-Cloud 7 Service Definition. Atos Oracle Cloud ERP Implementation Services G-Cloud 7 Service Definition Atos Oracle Cloud ERP Implementation Services Atos Oracle Cloud ERP Implementation Services Customers need adaptive and agile Enterprise Resource Planning (ERP) systems to

More information

e2e Secure Cloud Connect Service - Service Definition Document

e2e Secure Cloud Connect Service - Service Definition Document e2e Secure Cloud Connect Service - Service Definition Document Overview A cloud connectivity service that connects users, devices, offices and clouds together over the Internet. Organisations can choose

More information

Software as a Service (SaaS) Online HR

Software as a Service (SaaS) Online HR Software as a Service (SaaS) Online HR Contents Service Definition... 3 An overview of the G-Cloud Service... 3 Key Service Attributes... 4 Information assurance... 4 Details of the level of backup/restore

More information

Open Source Sales Force Automation (SFA) in the Cloud SaaS

Open Source Sales Force Automation (SFA) in the Cloud SaaS Open Source Sales Force Automation (SFA) in the Cloud SaaS Service Overview Our open source Sales Force Automation (SFA) in the cloud service allows customers to perform marketing automation through multi

More information

Caretower s SIEM Managed Security Services

Caretower s SIEM Managed Security Services Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During

More information

CASSIDIAN CYBERSECURITY

CASSIDIAN CYBERSECURITY CASSIDIAN CYBERSECURITY ADVANCED PERSISTENT THREAT (APT) SERVICE In a world where cyber threats are emerging daily, often from unknown sources, information security is something no organisation can afford

More information

Service Management and ICT Monitoring and Reporting Advisory and Implementation Services

Service Management and ICT Monitoring and Reporting Advisory and Implementation Services Service Management and ICT Monitoring and Reporting Advisory and Implementation Services G-Cloud Service 1 1. An overview of the G-Cloud Service Arcus can assist you with a review and advice on the effectiveness

More information

G-Cloud Service Definition. Atos Oracle Cloud ERP Implementation Services

G-Cloud Service Definition. Atos Oracle Cloud ERP Implementation Services G-Cloud Service Definition Atos Oracle Cloud ERP Implementation Services Atos Oracle Cloud ERP Implementation Services Customers need adaptive and agile Enterprise Resource Planning (ERP) systems to support

More information

Deloitte Service Code: D-G6-L4-543 December 2014

Deloitte Service Code: D-G6-L4-543 December 2014 Managed Cyber Security Cyber Intelligence Centre Deloitte LLP Service Deloitte Service Code: D-G6-L4-543 December 2014 Contents 1 Service Overview 1 2 Detailed Service Definition 2 3 Pricing 6 4 Ordering

More information

Integrated windows authentication for customers based on Probation GSI network

Integrated windows authentication for customers based on Probation GSI network Product Overview Victims Tracker (VT) is a software application, which was developed by London Probation Trust (LPT) to effectively manage the engagement / contact with victims of crime and the management

More information

PAAS Public Sector Managed Services

PAAS Public Sector Managed Services Meritec Limited Meritec House, Acorn Business Park, Skipton, North Yorkshire, BD23 2UE 0845 3451155 servicepoint@meritec.co.uk www.meritec.co.uk Registered In England & Wales No. 3224622 Table of Contents

More information

Digital Forensics G-Cloud Service Definition

Digital Forensics G-Cloud Service Definition Digital Forensics G-Cloud Service Definition 2013 General Dynamics Information Technology Limited. All rights 1 GDIT Team Clients Metropolitan Police Service The General Dynamics Information Technology

More information

G Cloud III Framework Lot 4 (SCS) Project Management

G Cloud III Framework Lot 4 (SCS) Project Management G Cloud III Framework Lot 4 (SCS) Project Management Contents Executive Summary 3 Project Management 4 Why Deloitte? 6 SFIA Rate Card 7 Contact 8 Service Definition (a) to (p) 9 Executive Summary PROJECT

More information

IBM Smartcloud Managed Backup

IBM Smartcloud Managed Backup IBM Smartcloud Managed Backup Service Definition 1 1. Summary 1.1 Service Description The IBM SmartCloud Managed Backup service provides public, private and hybrid cloudbased data protection solutions

More information

DIGITAL MARKETPLACE (G-CLOUD 7) OFFERING. Sopra Steria OneMobile SaaS Service. Introduction. Service Definition. Sopra Steria in the public sector

DIGITAL MARKETPLACE (G-CLOUD 7) OFFERING. Sopra Steria OneMobile SaaS Service. Introduction. Service Definition. Sopra Steria in the public sector DIGITAL MARKETPLACE (G-CLOUD 7) OFFERING Sopra Steria OneMobile SaaS Service Sopra Steria in the public sector Organisations across the public sector choose Sopra Steria to deliver transformation programmes

More information

G Cloud 6. Service Definition: Platform as a Service (PaaS)

G Cloud 6. Service Definition: Platform as a Service (PaaS) G Cloud 6 Service Definition: Platform as a Service (PaaS) Introduction to Centerprise International Limited Centerprise International Limited was established in 1983 as an engineering and manufacturing

More information

Tactical Cost Reduction

Tactical Cost Reduction Tactical Cost Reduction G-Cloud Service 1 An overview of the G-Cloud Service Information assurance Backup/restore and disaster recovery On-boarding and Off-boarding processes/scope etc. Pricing Service

More information

Thales Service Definition for NOC Services for Cloud

Thales Service Definition for NOC Services for Cloud Thales Service Definition for UK NOC Services Thales Service Definition for NOC Services for Cloud April 2014 Page 1 of 13 Thales Service Definition for UK NOC Services CONTENT Page No. Introduction...

More information

Marval Software Limited. G Cloud iii Framework Service Definition

Marval Software Limited. G Cloud iii Framework Service Definition 1 Marval Software Limited G Cloud iii Framework Service Definition Page 1 of 9 2 Contents An overview of the Marval Service Management (MSM) Software Solution... 3 Information assurance Impact Level (IL)

More information

Thales Service Definition for IL3 Encrypted Overlay for Cloud Services

Thales Service Definition for IL3 Encrypted Overlay for Cloud Services Thales Service Definition for UK IL3 Encrypted Overlay Thales Service Definition for IL3 Encrypted Overlay for Cloud Services April 2014 Page 1 of 11 Thales Service Definition for UK IL3 Encrypted Overlay

More information

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table BAE Systems PCI Essentail PCI Requirements Coverage Summary Table Introduction BAE Systems PCI Essential solution can help your company significantly reduce the costs and complexity of meeting PCI compliance

More information

How To Help Your Business Succeed

How To Help Your Business Succeed G Cloud III Framework Lot 4 (SCS) CHECK Accredited Penetration Testing Services Contents Executive Summary 3 CHECK Accredited Penetration Testing Services 4 Why Deloitte? 5 Package Cost 7 Contact 9 Service

More information

The Cyber Threat Profiler

The Cyber Threat Profiler Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are

More information

Solution Overview. Our Solution employs two tiers of storage aligning costs of storage with the changing value of data over time.

Solution Overview. Our Solution employs two tiers of storage aligning costs of storage with the changing value of data over time. Service Solution Overview Online Backup per TB model Databarracks fully managed online backup solution uses the Asigra software to back up and protect both physical and virtual environments. Housed in

More information

Der Weg, wie die Verantwortung getragen werden kann!

Der Weg, wie die Verantwortung getragen werden kann! Managed Security Services Der Weg, wie die Verantwortung getragen werden kann! Christoph Altherr System Engineer Security 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Agenda Enterprise

More information

G-CLOUD IIII FRAMEWORK SERVICE DEFINITION: SCHOOLS HOSTED SERVICE FOR SIMS

G-CLOUD IIII FRAMEWORK SERVICE DEFINITION: SCHOOLS HOSTED SERVICE FOR SIMS G-CLOUD IIII FRAMEWORK SERVICE DEFINITION: SCHOOLS HOSTED SERVICE FOR SIMS Capita Division / Supplier: Service Name: Capita Business Services Ltd SIMS OVERVIEW OF THE SERVICE The hosted service for SIMS

More information

Service Description Archive Storage in the Cloud

Service Description Archive Storage in the Cloud Service Description Archive Storage in the Cloud Product Overview Archive Storage in the Cloud enables an organisation to migrate their valuable but seldom used data to a cost efficient, reliable and secure

More information

Vodafone Private Cloud

Vodafone Private Cloud Vodafone Private Cloud Overview Vodafone Private Cloud is our dedicated public sector cloud service that connects you to your own private IL2/IL3 network and / or core government networks, including the

More information

G-Cloud Service Definition. Atos SI Oracle CRM and CX Services

G-Cloud Service Definition. Atos SI Oracle CRM and CX Services G-Cloud Service Definition Atos SI Oracle CRM and CX Services Atos SI Oracle CRM and CX Services SCS Atos provides a range of expert Customer Relationship Management (CRM) and Customer Experience (CX)

More information

Master Data Management

Master Data Management 1 3 Master Data Management Support Services Service Definition MASTER DATA MANAGEMENT SUPPORT SERVICES Service Description The Master Data Management Support Services are part of the Cognizant Information

More information

Service: Contract Management (Software as a Service)

Service: Contract Management (Software as a Service) Service: Contract Management (Software as a Service) 1. Description: An overview of the G-Cloud Service (functional, non-functional) econtract Management allows for the management of a contract after award,

More information

Cloud Brokerage. G-Cloud Service. Arcus Global 2014 1

Cloud Brokerage. G-Cloud Service. Arcus Global 2014 1 Cloud Brokerage G-Cloud Service 1 An overview of the G-Cloud Service Information assurance Backup/restore and disaster recovery On-boarding and Off-boarding processes/scope etc. Pricing Service management

More information

Big Data Support Services. Service Definition

Big Data Support Services. Service Definition 1 3 Big Data Support Services Service Definition BIG DATA SUPPORT SERVICES Service Description The Big Data Support Services are part of the Cognizant Information Management service family. Providing a

More information

Agilisys G-Cloud Service V

Agilisys G-Cloud Service V Agilisys G-Cloud Service V Service Definition Endpoint Management Lot 1 Infrastructure as a Service (IaaS) April 2014 At Agilisys we deliver success through innovation working with our clients to transform

More information

McAfee Security Architectures for the Public Sector

McAfee Security Architectures for the Public Sector White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed

More information

Amazon Compute - EC2 and Related Services

Amazon Compute - EC2 and Related Services Amazon Compute - EC2 and Related Services G-Cloud Service 1 1.An overview of the G-Cloud Service Arcus Global are approved to sell to the UK Public Sector as official Amazon Web Services resellers. Amazon

More information

G-Cloud Service Definition. Atos SharePoint Development Service

G-Cloud Service Definition. Atos SharePoint Development Service G-Cloud Service Definition Atos SharePoint Development Service SharePoint Development Services SCS A comprehensive electronic document and records management, collaboration or web content management solution

More information

Specialist Cloud Services. Acumin Cloud Security Resourcing

Specialist Cloud Services. Acumin Cloud Security Resourcing Specialist Cloud Services Acumin Cloud Security Resourcing DOCUMENT: FRAMEWORK: STATUS Cloud Security Resourcing Service Definition G-Cloud Released VERSION: 1.0 CLASSIFICATION: CloudStore Acumin Consulting

More information

CenturyLink IT Consulting Services. G-Cloud 6 - SCS. REFERENCE NUMBER RM1557vi

CenturyLink IT Consulting Services. G-Cloud 6 - SCS. REFERENCE NUMBER RM1557vi CenturyLink IT Consulting Services G-Cloud 6 - SCS REFERENCE NUMBER RM1557vi Overview of the Service (functional and non-functional) IT Consulting Services CenturyLink's Solutions Consulting delivers customised

More information

1. Perimeter Security Dealing with firewall, gateways and VPNs and technical entry points. Physical Access to your premises can also be reviewed.

1. Perimeter Security Dealing with firewall, gateways and VPNs and technical entry points. Physical Access to your premises can also be reviewed. Service Definition Technical Security Review Overview of Service Considering the increasing importance of security, the number of organisations that allow for contingency in their Information Security

More information

G-Cloud Services 6. Service Definition. Data Centre Storage and Services

G-Cloud Services 6. Service Definition. Data Centre Storage and Services G-Cloud Services 6 Service Definition Data Centre Storage and Services 1. Introduction to Neil Stevens Consulting Ltd As a specialist provider of public sector advice in relation to IM&T and business change

More information

Backup to the Cloud Service Definition

Backup to the Cloud Service Definition Backup to the Cloud Service Definition Service Overview Working together with its Cloud Services Partner, Skyscape, SynApps Solutions (SynApps) has developed its Backup to the Cloud service to enable organisations

More information

Defending against modern cyber threats

Defending against modern cyber threats Defending against modern cyber threats Protecting Critical Assets October 2011 Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Agenda 1. The seriousness of today s situation

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Amazon Relational Database Service (RDS)

Amazon Relational Database Service (RDS) Amazon Relational Database Service (RDS) G-Cloud Service 1 1.An overview of the G-Cloud Service Arcus Global are approved to sell to the UK Public Sector as official Amazon Web Services resellers. Amazon

More information

Cloud-based Infrastructure and Application Support Service Definition

Cloud-based Infrastructure and Application Support Service Definition +44 (0) 20 3603 7830 hello@equalexperts.com www.equalexperts.com 30 Brock Street London, NW1 3FG Cloud-based Infrastructure and Application Support Service Definition Overview We provide 24/7 support to

More information

G-Cloud Service Definition. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS

G-Cloud Service Definition. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS G-Cloud Service Definition Atos infrastructure Vulnerability Scanning (Outpost24) SaaS Atos Infrastructure Vulnerability Scanning (Outpost24) SaaS Atos Infrastructure Vulnerability Scanning SaaS powered

More information

G-Cloud Service Definition. Atos Accredited Oracle Business Intelligence Solutions SCS

G-Cloud Service Definition. Atos Accredited Oracle Business Intelligence Solutions SCS G-Cloud Service Definition Atos Accredited Oracle Business Intelligence Solutions SCS Atos Accredited Oracle Business Intelligence Solutions SCS Robust, scalable Cloud computing and consumption-based reporting

More information

Securing business data. CNS White Paper. Cloud for Enterprise. Effective Management of Data Security

Securing business data. CNS White Paper. Cloud for Enterprise. Effective Management of Data Security Securing business data CNS White Paper Cloud for Enterprise Effective Management of Data Security Jeff Finch, Head of Business Development, CNS Mosaic 2nd July 2015 Contents 1 Non-Disclosure Statement...

More information

IBM QRadar as a Service

IBM QRadar as a Service Government Efficiency through Innovative Reform IBM QRadar as a Service Service Definition Copyright IBM Corporation 2014 Table of Contents IBM Cloud Overview... 2 IBM/Sentinel PaaS... 2 QRadar... 2 Major

More information

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

G-Cloud Service Definition. Atos Data Quality Audit SCS

G-Cloud Service Definition. Atos Data Quality Audit SCS G-Cloud Service Definition Atos Data Quality Audit SCS Atos Data Quality Audit SCS As organisations increasingly utilise a hybrid of Legacy and Cloud based technology platforms, it becomes increasingly

More information

G-Cloud Service Description. Atos: Cloud Professional Services: Requirements Specification

G-Cloud Service Description. Atos: Cloud Professional Services: Requirements Specification G-Cloud Service Description Atos: Cloud Professional Services: Requirements Specification Atos, the Atos logo, Atos Consulting, Atos Worldline, Atos Sphere, Atos Cloud, Atos Healthcare (in the UK) and

More information

Xerox Print Monitoring Service (XPMS)

Xerox Print Monitoring Service (XPMS) Xerox Print Monitoring Service (XPMS) Service Description G-Cloud : Lot 3 : Software as a Service (SaaS) April 2014 Version 1.0 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are

More information

Documentum Document Management in the Cloud Service Definition

Documentum Document Management in the Cloud Service Definition Documentum Document Management in the Cloud Service Definition Service Overview Working together with its Cloud Services Partner, Skyscape, SynApps Solutions (SynApps) has developed its Documentum Document

More information

G-Cloud Service Definition. Atos Rapid Pilot Mobile Application Development Service SCS

G-Cloud Service Definition. Atos Rapid Pilot Mobile Application Development Service SCS G-Cloud Service Definition Atos Rapid Pilot Mobile Application Development Service SCS Atos Rapid Pilot Mobile Applications Development Service SCS Designed to provide rapid development and deployment

More information

G - Cloud Service Definition IT Infrastructure Monitoring And Helpdesk

G - Cloud Service Definition IT Infrastructure Monitoring And Helpdesk IT Professional Services G - Cloud Service Definition IT Infrastructure Monitoring And Helpdesk Registered Office: Technium Springboard Centre, Llantarnam Park Cwmbran Newport, South Wales. NP44 3AW Registered

More information

D-G4-L4-126 Police contact management and demand reduction review Deloitte LLP Service for G-Cloud IV

D-G4-L4-126 Police contact management and demand reduction review Deloitte LLP Service for G-Cloud IV D-G4-L4-126 Police contact management and demand reduction review Deloitte LLP Service for G-Cloud IV September 2013 Contents 1 Service Overview 1 2 Detailed Service Description 2 3 Commercials 6 4 Our

More information

G-Cloud Service Definition. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS

G-Cloud Service Definition. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS G-Cloud Service Definition Atos infrastructure Vulnerability Scanning (Outpost24) SaaS Atos Infrastructure Vulnerability Scanning (Outpost24) SaaS Atos Infrastructure Vulnerability Scanning SaaS is powered

More information

Platform as a Service

Platform as a Service Platform as a Service Service Definition Version: 1.0 Version date: October 2015 Classification: Public Backup-as-a-Service Systems Monitoring DR-as-a-Service Storage-as-a-Service Hosted Exchange Colocation

More information

Migrating to the Cloud. Developing the right Cloud strategy and minimising migration risk with Logicalis Cloud Services

Migrating to the Cloud. Developing the right Cloud strategy and minimising migration risk with Logicalis Cloud Services Migrating to the Cloud Developing the right Cloud strategy and minimising migration risk with Logicalis Cloud Services Organisations are looking for new ways to deliver IT services and demanding that ICT

More information

DOBUS And SBL Cloud Services Brochure

DOBUS And SBL Cloud Services Brochure 01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure enquiries@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted

More information

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with

More information

Overview. Service Description: BCP & DR Strategy (L6)

Overview. Service Description: BCP & DR Strategy (L6) Service Description: BCP & DR Strategy (L6) Government Enterprise Architecture Specialists T: 07966 457 571 E: peter@vision-ist.net Overview Visionist will help your organisation develop a Business Continuity

More information

Cisco Remote Management Services for Security

Cisco Remote Management Services for Security Cisco Remote Management Services for Security Innovation: Many Take Advantage of It, Some Strive for It, Cisco Delivers It. Cisco Remote Management Services (RMS) for Security provide around the clock

More information

2. Consultancy and Support

2. Consultancy and Support G-Cloud Services 4 Service Definition Grant Management Services Lot 3 1. CC Grant Tracker 2. Consultancy and Support Submitted By: Dave Allan CC Technology Ltd 375 West George St Glasgow G2 4LW dave.allan@cctechnology.com

More information

Security. Security consulting and Integration: Definition and Deliverables. Introduction

Security. Security consulting and Integration: Definition and Deliverables. Introduction Security Security Introduction Businesses today need to defend themselves against an evolving set of threats, from malicious software to other vulnerabilities introduced by newly converged voice and data

More information

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous

More information

IBM G-Cloud Microsoft Windows Active Directory as a Service

IBM G-Cloud Microsoft Windows Active Directory as a Service IBM G-Cloud Microsoft Windows Active Directory as a Service Service Definition IBM G-Cloud Windows AD as a Service 1 1. Summary 1.1 Service Description This offering is provided by IBM Global Business

More information