IBM Hosted Application Scanning
|
|
- Gillian Sharon Blake
- 8 years ago
- Views:
Transcription
1 IBM Hosted Application Scanning Service Definition IBM Hosted Application Scanning 1
2 1. Summary 1.1 Service Description IBM Hosted Application Security Services Production Application Scanning Service (called Services ) is designed for IBM to provide the Services Recipient with the ability to initiate and perform application scans of production environments. The Service provides access to a hosted and managed IBM environment and includes training of your personnel to help them understand the features of the Service. Scans of customer environments are performed either by IBM or by the Services Recipient depending on the details of the customer order. The Services are intended to be leveraged to assess the security posture of an application that is in a production environment and can be assessed using non-intrusive application checks. The size of an application directly affects the time required to properly assess the security posture of the application. For this reason, applications to be scanned under the IBM Hosted Application Security Services Production Application Scanning are classified by application size: Level 1 Small (page count <1000) Level 2 Large (page count >1000) The upper limit on the number of pages of a Level 2 application is 10,000. An application that exceeds that limit shall be considered 2 applications. Please note that form filling and login are not supported for either application size. 1.2 Service Characteristics Lot Applicability Hosted Application Scanning Any private or public sector organisation with applications that require security scanning. Contract Duration Contract Price Lead time to start Flexible to be agreed in the Call-Off Order Variable based on time and materials depending on agreeing, with the Contracting Authority, the resources required for the Call-Off Order, based on the IBM SFIA rate table. The price will be subject to VAT and out of pocket expenses incurred outside the M25. 4 weeks IBM Hosted Application Scanning 2
3 Related Lot(s) /Offering(s) IBM Hosted Vulnerability Management VMS 1.3 Why IBM IBM is able to provide a solution that uses a blend of both its products and experience to provide a holistic approach to managing operational security risks within any system environment. Our solution is flexible that it can be integrated with existing or non-ibm solutions. We provide experienced staff to support and monitor operational environments and who can interpret system threats and support customers where incidents arise. IBM has been a member of the CESG Listed Adviser Scheme (CLAS) since 2002 and currently employs a total of 11 CLAS consultants as well as high quality independent contractors. In addition to CLAS, our consultants hold qualifications such as CISSP, CISM, CISA, IISP, ISO27001 Lead Auditor & Implementer, CSSLP, CRISC, Certified Data Protection Practitioner, CEH and Tiger Scheme as well as IBM Certification at Experienced and Expert levels as Security Consultants and Security Architects. As a List X organisation IBM has a full time List-X Security Controller with access to the full Security Policy Framework. We work closely with the security authorities to implement physical and personnel security as well as information security. As a result of this our CLAS consultants are able to advise on vetting and physical security matters, undertaking a Security Assessment for Protectively Marked Assets (SAPMA) where appropriate. Our approach to documenting and delivering information security controls, processes and procedures consistently is in accord with ISO/IEC27002:2005. We have extended this with technical standards for implementation and configuration of security functions, based on our extensive experience of deploying solutions in high assurance environments. This approach, together with other applicable industry standards, including ISO/IEC27003, ISO/IEC 27005, SAS70, COBIT and ITIL, provides a unique integrated management system that fully meets specific security requirements. This approach was used to great effect on recent projects including IABS for the UKBA which was accredited for live operations in February Accreditation included signing the GSI Code of Connection and interconnecting with POISE (Home Office IT system) and the UKBA Warnings Index. IBM Hosted Application Scanning 3
4 1.4 Contact Contact Name Steve Cliff Title IBM UK Cloud Alliances Executive Address PO Box 41 North Harbour Portsmouth Hants, PO6 3AU Contact Contact Phone IBM Hosted Application Scanning 4
5 2. Delivery 2.1 Context Scanning allows for a thorough assessment of the quality of the security surrounding an organisation s applications, enabling vulnerabilities to be identified swiftly and the gaps filled by counteractive measures. This facilitates the safeguarding of any business or personal confidential data present on these applications. 2.2 What we will deliver IBM offers both the tools and the expertise to provide thorough, directed, automated application scanning to assess the vulnerabilities of its clients Web-based applications. Depending on the terms of the agreement, the client organisation can either opt for a comprehensive, professional scanning service, with IBM resources performing the scans, or else purchase the tools and knowledge to enable their own employees to do so. The Service can offer the following measurable features, gauged using Service Level Agreements: IBM Scanning Platform availability 99.9% IBM Managed Security Services (MSS) Portal Availability 99.9% Authorised Security Contacts 3 users Scan Initiation Response 1 or 2 business days Critical Priority Issue Alert Notification 60 minutes Scan Review Initiation 1 business day False Positive Rate 0% Request to Re-Scan Execute 1 or 2 business days Response to Inquiry 4 business hours The Service features here described are dependent on the availability and supportability of the products and product features being utilised. Even in the case of supported products, not all product features may be supported. Information on supported features is available from IBM upon request. This includes both IBM-provided and non- IBM-provided hardware, software, and firmware. The Services will be provided using IBM AppScan Enterprise Edition Software (the Scanning Software ). IBM Hosted Application Security Services are delivered by resources located in IBM facilities. The Scanning Platform is available 24 hours/day, 7 days/week; however, access to Application Security Analysts for Services is provided during normal business hours, IBM Hosted Application Scanning 5
6 2.3 Commercials This will be a Time and Materials contract however, following the first phase of the work, there could be the opportunity to discuss the conversion of the initial quote into either a Fixed Price or Risk/Reward based contract in order to provide increased flexibility for the customer. Initial work will be carried out under the Strategy and Architecture category of the IBM SFIA rate table unless agreed otherwise. Follow on work will be under the appropriate category(ies) of the IBM SFIA rate table. The scope of work will be set out in the Call Off Order Form and agreed by both parties. Follow on services to enable you to complete implementation of cloud services can be provided by IBM. Details should be agreed via the Call-Off Order and priced using the IBM SFIA rate card. 2.4 Key Points Other key points to note are as follows: This offering is subject to availability of IBM resources. The Charges for this Service are on the basis that no Parent Company Guarantee is required. If one is required and agreed to by IBM then the Charges will be revised accordingly. For Fixed Price offerings, Travel and Subsistence (T&S) costs are included for work within the M25. For work outside the M25, T&S will be payable using the Contracting Body s standard T&S rates. The pricing and terms on individual call-off orders should be handled as commercially sensitive by the Contracting Body. Where work is of a sensitive and secure nature, security standards will be agreed between IBM and the Contracting Body, and if necessary IBM will ask the Contracting Body to issue a Security Aspects letter. Whilst we do not propose to handle or have access to any personal data, we will suggest and agree alternative approaches such as the use of anonymised data for testing purposes. The work is subject to IBM s Terms of Business, which are attached separately to this catalogue item. IBM Hosted Application Scanning 6
7 IBM Hosted Application Scanning 7
IBM Security in the Software Development Lifecycle
IBM Security in the Software Development Lifecycle Service Definition 1 1. Summary 1.1 Service Description This offering is provided by IBM Global Technology Services, Security and Privacy, for the design
More informationIBM Business Analytics Requirements Analysis and Planning
IBM Business Analytics Requirements Analysis and Planning Service Definition IBM Business Analytics Requirements Analysis and Planning 1 1. Summary 1.1 Service Description As an integral part of IBM Business
More informationIBM Penetration Testing Services
IBM Penetration Testing Services Service Definition IBM Penetration Testing Services 1 1. Summary 1.1 Service Description IBM offers a comprehensive set of Security Assessment and Penetration Testing services,
More informationCustomer Management - Cloud Transformation Services
Customer Management - Cloud Transformation Services The Customer Management services IBM offer include customer strategy development, customer experience design and the design and build of CRM, digital,
More informationAutomated Cloud Environment Build Service
Automated Cloud Environment Build Service Service Definition Cloud Application Design, Delivery and Integration (DDI) 1 1. Summary 1.1 Service Description This offering is provided by IBM Global Business
More informationIBM Mobile Strategy Accelerator
IBM Mobile Strategy Accelerator The IBM Mobile Strategy Accelerator is an 8-12 week focused strategic offering which deploys experienced IBM Enterprise Mobility Subject Matter Experts into your business
More informationIBM G-Cloud Application Systems Management as a Service
IBM G-Cloud Application Systems Management as a Service Service Definition 1 1. Summary 1.1 Service Description This offering is provided by IBM Global Business Services and provides a Systems Management
More informationHR Cloud IT Strategy. HR Cloud IT Strategy 1
HR Cloud IT Strategy This offering will produce a defined strategy for HR in the Cloud and a roadmap to support the execution of the strategy. The service will work with customers to envision and articulate
More informationData Centre Facilities Assessment, Design and Build. Service Definition. G Cloud V IBM Data Centre Facilities Assessment, Design & Build 1
Data Centre Facilities Assessment, Design and Build Service Definition 1 1. Summary 1.1 Service Description This offering is provided by IBM Global Technology, Infrastructure Technology Services, and provides
More informationIBM Web Server as a Service
IBM Web Server as a Service Service Definition IBM G-Cloud Web Server as a Service 1 1. Summary 1.1 Service Description This offering is provided by IBM Global Business Services and provides a Web Server
More informationIBM Sterling Order Management
IBM Sterling Order Management Service Definition 1 1. Summary 1.1 Service Description IBM Sterling Order Management provides a centralised inventory, order promising and fulfilment hub facilitating omni-channel
More informationIBM Transport Management System
IBM Transport Management System Service Definition 1 1. Summary 1.1 Service Description IBM Sterling Transportation Management System (Sterling TMS) is a carrier management, cloud-based system that optimizes
More informationIBM Database as a Service
IBM Database as a Service Service Definition IBM G-Cloud Database as a Service 1 1. Summary 1.1 Service Description This offering is provided by IBM Global Business Services and provides a versatile (relational
More informationIBM Payment Services. Service Definition. IBM Payment Services 1
IBM Payment Services Service Definition IBM Payment Services 1 1. Summary 1.1 Service Description This offering is provided by IBM Global Process Services to allow Government bodies to deliver commerce
More informationICT and Information Security Resources
Methods GCloud Service Definition ICT and Information Security Resources HEAD OFFICE: 125 Shaftesbury Avenue, London WC2H 8AD Scottish Office: Exchange Place 2, 5 Semple Street, Edinburgh, EH3 8BL t: +44
More informationHP Cyber Security Control Cyber Insight & Defence
HP Cyber Security Control Cyber Insight & Defence Security awareness at board level Security leadership is under immense pressure Cyber threat Extended supply chain Financial loss Reputation damage Cost
More informationDIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES
G Cloud IV Framework Lot 4 DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES Service Description - ANSEC IA Limited CONTENTS 1 Company Profile. 2 The ANSEC Effect 3 Qualifications 4 Service Description..
More informationIBM G-Cloud Microsoft Windows Active Directory as a Service
IBM G-Cloud Microsoft Windows Active Directory as a Service Service Definition IBM G-Cloud Windows AD as a Service 1 1. Summary 1.1 Service Description This offering is provided by IBM Global Business
More information3.1 Security Operations Centers. 3.2 Portal. 3.3 Services Contacts
Services Description IBM United Kingdom Limited Registered in England: 741598 Registered Office: PO Box 41, North Harbour, Portsmouth, PO6 3AU (hereinafter IBM ) IBM Managed Security Services (Cloud Computing)
More informationGrowth Through Excellence
Growth Through Excellence Public/Private Cloud Services Service Definition Document G- Cloud 5 REFERENCE NUMBER RM1557v Table of Contents Table of Contents... 3 Executive Summary... 4 About the Company...
More informationTerms of Reference for an IT Audit of
National Maritime Safety Authority (NMSA) TASK DESCRIPTION PROJECT/TASK TITLE: EXECUTING AGENT: IMPLEMENTING AGENT: PROJECT SPONSOR: PROJECT LOCATION: To engage a professional and qualified IT Auditor
More informationANNEX B. Terms of Reference. CTBTO Information Security Management System Support on Call-off Basis
ANNEX B Terms of Reference CTBTO Information Security Management System Support on Call-off Basis Table of Contents Acronyms 3 Introduction 4 Background 4 Objectives and Expected Results 5 Scope of Work
More informationCyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13
Cyber Security Consultancy Standard Version 0.2 Crown Copyright 2015 All Rights Reserved Page 1 of 13 Contents 1. Overview... 3 2. Assessment approach... 4 3. Requirements... 5 3.1 Service description...
More informationSpecialist Cloud Services. Acumin Cloud Security Resourcing
Specialist Cloud Services Acumin Cloud Security Resourcing DOCUMENT: FRAMEWORK: STATUS Cloud Security Resourcing Service Definition G-Cloud Released VERSION: 1.0 CLASSIFICATION: CloudStore Acumin Consulting
More informationG-Cloud III Services Service Definition Accenture Cloud Security Services
G-Cloud III Services Service Definition Accenture Cloud Security Services 1 Table of contents 1. Scope of our services... 3 2. Approach... 3 3. Assets and tools... 4 4. Outcomes... 5 5. Pricing... 5 6.
More informationISO 27001 Information Security Management Services (Lot 4)
ISO 27001 Information Security Management Services (Lot 4) CONTENTS 1. WHY LEICESTERSHIRE HEALTH INFORMATICS SERVICE?... 3 2. LHIS TECHNICAL ASSURANCE SERVICES... 3 3. SERVICE OVERVIEW... 4 4. EXPERIENCE...
More informationLot 1 Service Specification MANAGED SECURITY SERVICES
Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services
More informationService Definition. IBM Kenexa Learning Management and Learning Content Management Systems 1
IBM Kenexa Learning Management and Learning Content Management Systems Service Definition IBM Kenexa Learning Management and Learning Content Management Systems 1 1. Summary 1.1 Service Description The
More informationIBM Managed Security Services (Cloud Computing) hosted mobile device security management
IBM Managed Security Services (Cloud Computing) hosted mobile device security management Z125-8855-00 11-2011 Page 1 of 15 Table of Contents 1. Scope of Services... 3 2. Definitions... 3 3. Services...
More informationIBM Smartcloud Managed Backup
IBM Smartcloud Managed Backup Service Definition 1 1. Summary 1.1 Service Description The IBM SmartCloud Managed Backup service provides public, private and hybrid cloudbased data protection solutions
More informationServices Description. IBM Managed Security Services (Cloud Computing) - Hosted Vulnerability Management
Services Description IBM United Kingdom Limited Registered in England: 741598 Registered Office: PO Box 41, North Harbour, Portsmouth, PO6 3AU (hereinafter IBM ) IBM Managed Security Services (Cloud Computing)
More informationChoosing Ascentor as your cyber security partner. Secure your information Strengthen your business
Secure your information Strengthen your business Choosing Ascentor as your cyber security partner www.ascentor.co.uk Ascentor Ltd 5 Wheatstone Court, Davy Way Waterwells Business Park Quedgeley, Gloucester
More informationPractitioner Certificate in Information Assurance Architecture (PCiIAA)
Practitioner Certificate in Information Assurance Architecture (PCiIAA) 15 th August, 2015 v2.1 Course Introduction 1.1. Overview A Security Architect (SA) is a senior-level enterprise architect role,
More informationService Definition Document
Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)
More informationG-Cloud Service Definition. Atos Business Intelligence Dashboards and Analytics SCS
G-Cloud Service Definition Atos Business Intelligence Dashboards and Analytics SCS Atos Business Intelligence Dashboards and Analytics SCS The Atos approach to Business Intelligence (BI) Dashboards and
More informationFirewall Managed Service. I.T. Security Specialists. Firewall Managed Service 1
Firewall Managed Service I.T. Security Specialists Firewall Managed Service 1 BACKGROUND Caretower Managed Security Service provides remote managed security services for customers. We have extensive experience
More informationG-Cloud Service Definition. Atos Security Professional Services SCS
G-Cloud Service Definition Atos Security Professional Services SCS Atos Security Professional Services SCS Security Professional Services delivered by experienced certified professionals empowered by market
More informationNeocol E-Discovery Consulting Services
Neocol E-Discovery Consulting Services Service Definition Neocol Reference: 1.0 Version: 1.0 Date: 1 March 2013 1. Service Definition 1.1. Service Overview The E-Discovery Consulting Services address needs
More informationQuestions and answers relating to Restricted tender procedure EMA/2012/19/IS Provision of Security Consultancy Services
30 October 2012 EMA/702274/2012 Questions and answers relating to Restricted tender procedure EMA/2012/19/IS Provision of Security Consultancy Services Table of contents Questions and answers... 2 Document
More informationRAPTER Rapid Automated Pen TestER for web applications (Lot 4)
RAPTER Rapid Automated Pen TestER for web applications (Lot 4) CONTENTS 1. WHY LEICESTERSHIRE HEALTH INFORMATICS SERVICE?... 3 2. LHIS TECHNICAL ASSURANCE SERVICES... 3 3. SERVICE OVERVIEW... 4 4. OUR
More informationG-Cloud Service Definition. Atos Data Quality Audit SCS
G-Cloud Service Definition Atos Data Quality Audit SCS Atos Data Quality Audit SCS As organisations increasingly utilise a hybrid of Legacy and Cloud based technology platforms, it becomes increasingly
More informationOverview. Service Description: BCP & DR Strategy (L6)
Service Description: BCP & DR Strategy (L6) Government Enterprise Architecture Specialists T: 07966 457 571 E: peter@vision-ist.net Overview Visionist will help your organisation develop a Business Continuity
More informationIBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security
IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security INTC-8608-01 CE 12-2010 Page 1 of 8 Table of Contents 1. Scope of Services...3 2. Definitions...3
More informationCareer Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88
Career Survey 1. In which country are you based? 88 answered question 88 skipped question 0 2. What is your job title? 88 answered question 88 skipped question 0 3. Travel budget not at all 21.0% 17 somewhat
More informationSCOTTISH CENSUS INDEPENDENT SECURITY REVIEW REPORT
SCOTTISH CENSUS INDEPENDENT SECURITY REVIEW REPORT Issue 1.0 Date 24/03/2011 Logica is a business and technology service company, employing 39,000 people. It provides business consulting, systems integration
More informationShmeisani: Al-Hussary Street Anshasi Sq P.O. Box 940314 Amman 11194 Jordan Telephone: +962-65007335
itil.org Service Management Essentials ITIL V3 Study Guide v1.0.0 Shmeisani: Al-Hussary Street Anshasi Sq P.O. Box 940314 Amman 11194 Jordan Telephone: +962-65007335 Fax: +962-65007300 Email: info@saadehgroup.com
More informationCyber Security and Data Privacy Acumin Specialist Cloud Services
Cyber Security and Data Privacy Acumin Specialist Cloud Services Cloud Security Resourcing Information Assurance and Cyber Security Governance, Risk and Compliance Traditional Security and Business Continuity
More informationInformation Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications
Thomas K. Lee, Executive Director/CIO Human Resources Department (518) 447-2906 Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) The New York State
More informationDigital Forensics G-Cloud Service Definition
Digital Forensics G-Cloud Service Definition 2013 General Dynamics Information Technology Limited. All rights 1 GDIT Team Clients Metropolitan Police Service The General Dynamics Information Technology
More informationApril 2015 Issue No:1.0. Application Guidance - CCP Security and Information Risk Advisor Role, Practitioner Level
April 2015 Issue No:1.0 Application Guidance - CCP Security and Information Risk Advisor Role, Practitioner Level Application Guidance CCP Security and Information Risk Advisor Role, Practitioner Level
More informationThis document includes information about the role for which you are applying and the information you will need to provide with the application.
Further Particulars This document includes information about the role for which you are applying and the information you will need to provide with the application. 1. Role details Vacancy reference: 7770
More informationDeloitte Service Code: D-G6-L4-543 December 2014
Managed Cyber Security Cyber Intelligence Centre Deloitte LLP Service Deloitte Service Code: D-G6-L4-543 December 2014 Contents 1 Service Overview 1 2 Detailed Service Definition 2 3 Pricing 6 4 Ordering
More informationSTL Microsoft SharePoint Consulting and Support Services
STL Microsoft SharePoint Consulting and Support Services STL Technologies Equis House Eastern Way Bury St Edmunds Suffolk IP32 7AB Service Description and Pricing Specialist Cloud Services www.stl.co.uk
More informationWhy compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards
Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards Cyber Security CESG Certified Training // 2 Contents 3
More informationHow To Help Your Business Succeed
G Cloud III Framework Lot 4 (SCS) CHECK Accredited Penetration Testing Services Contents Executive Summary 3 CHECK Accredited Penetration Testing Services 4 Why Deloitte? 5 Package Cost 7 Contact 9 Service
More informationAN OVERVIEW OF INFORMATION SECURITY STANDARDS
AN OVERVIEW OF INFORMATION SECURITY STANDARDS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
More informationCareer Analysis into Cyber Security: New & Evolving Occupations
Alderbridge Specialists in Info Security Specialist Recruitment Knowledge for e-skills UK s Cyber Security Learning Pathways Programme Career Analysis into Cyber Security: New & Evolving Occupations e-skills
More informationConsultants Alliance LLC. Professional Development Programs
Consultants Alliance LLC Professional Development Programs About CA: Consultants Alliance (CA) is a local organization dedicated to promote the culture of Service Excellence in public and private sectors.
More informationMarval Software Limited. G Cloud iii Framework Service Definition
1 Marval Software Limited G Cloud iii Framework Service Definition Page 1 of 9 2 Contents An overview of the Marval Service Management (MSM) Software Solution... 3 Information assurance Impact Level (IL)
More informationCaretower s SIEM Managed Security Services
Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During
More informationSTL Microsoft Dynamics CRM Consulting and Support Services
STL Microsoft Dynamics CRM Consulting and Support Services STL Technologies Equis House Eastern Way Bury St Edmunds Suffolk IP32 7AB Service Description and Pricing Specialist Cloud Services www.stl.co.uk
More informationIRAP Policy and Procedures up to date as of 16 September 2014.
Australian Signals Directorate Cyber and Information Security Division Information Security Registered Assessors Program Policy and Procedures 09/2014 IRAP Policy and Procedures 09/2014 1 IRAP Policy and
More informationIBM IT Service Management. Service Definition
Service Definition 1 1. Summary 1.1 Service Description IBM SmartCloud Control Desk (SaaS) is a service management solution that includes or supports the following processes: Knowledge Management Service
More informationG-Cloud Service Definition. Atos Information Security Wireless Scanning Service
G-Cloud Service Definition Atos Information Security Wireless Scanning Service Keeping your wireless networks secure Atos Information Security Wireless Scanning Service The Atos Wireless Scanning Service
More informationIT Audit in the Cloud
IT Audit in the Cloud Pavlina Ivanova, CISM ISACA-Sofia Chapter Content: o 1. Introduction o 2. Cloud Computing o 3. IT Audit in the Cloud o 4. Residual Risks o Used Resources o Questions 1. ISACA Trust
More informationDirector, IT Security District Office Kern Community College District JOB DESCRIPTION
Director, IT Security District Office Kern Community College District JOB DESCRIPTION Definition Reporting to the Chief Information Officer, the Director of IT Security develops and implements procedures,
More informationIBM Cloud Builder Professional Services. and Remote Managed Services
Government Efficiency through Innovative Reform IBM Cloud Builder Professional Services and Remote Managed Services Service Definition Copyright IBM Corporation 2014 Table of Contents Overview... 1 Major
More informationDCA metrics for the approval of Auditing Firms for Certifications Scheme VERSION 1.0
DCA metrics for the approval of Auditing Firms for Certifications Scheme VERSION 1.0 2013, Data Centre Alliance Limited (www.datacentrealliance.org). All rights reserved. This publication may not be reproduced
More informationG-Cloud IV Services Service Definition Accenture Cloud Security Services
G-Cloud IV Services Service Definition Accenture Cloud Security Services 1 Table of contents 1. Scope of our services... 3 2. Approach... 3 3. Assets and tools... 4 4. Capabilities... 5 5. Expected Outcomes...
More informationThe Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
More informationProtective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 1.0, Issue Date: 05/02/201405/02/2014. Classification: Open
Protective Monitoring as a Service Version: 1.0, Issue Date: 05/02/201405/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 2014. Other than for the sole purpose of evaluating this
More informationApplication Guidance CCP Penetration Tester Role, Practitioner Level
August 2014 Issue No: 1.0 Application Guidance CCP Penetration Tester Role, Practitioner Level Application Guidance CCP Penetration Tester Role, Practitioner Level Issue No: 1.0 August 2014 This document
More informationServices Description. IBM Managed Security Services (Cloud Computing) - Hosted Security Event and Log Management - Select
Services Description IBM United Kingdom Limited Registered in England: 741598 Registered Office: PO Box 41, North Harbour, Portsmouth, PO6 3AU (hereinafter IBM ) IBM Managed Security Services (Cloud Computing)
More informationIBM Emptoris Procurement SaaS Service
IBM Emptoris Procurement SaaS Service Service Definition IBM Emptoris Procurement SaaS Service 1 1. Summary 1.1 Service Description IBM is focused on providing Best in Class Supply and Contract Management
More informationTHALES. www.thalesgroup. corn
THALES www.thalesgroup. corn c Understanding cyber security is a challenge faced by all businesses and organisations around the world. New threats emerge on a daily basis and it can be difficult to understand
More informationG-Cloud Service Definition. Atos Business Intelligence Dashboards and Analytics SCS
G-Cloud Service Definition Atos Business Intelligence Dashboards and Analytics SCS Atos Business Intelligence Dashboards and Analytics SCS The Atos approach to Business Intelligence (BI) Dashboards and
More informationDomenico Raguseo. IT Governance e Business Technology (approfondimenti su ITIL)
IT Governance e Business Technology (approfondimenti su ITIL) Domenico Raguseo Italy Client Technical Professional Manager SW Europe Service Management Solution Architect Leader http://www.linkedin.com/in/dragus
More informationINFORMATION SECURITY STRATEGIC PLAN
INFORMATION SECURITY STRATEGIC PLAN UNIVERSITY OF CONNECTICUT INFORMATION SECURITY OFFICE 4/20/10 University of Connecticut / Jason Pufahl, CISSP, CISM 1 1 MISSION STATEMENT The mission of the Information
More informationCloud Hosted Back Office and Services
Cleartone Telecoms Ltd Pricing Schedule Cloud Hosted Back Office and Services Version 1.3.2 Contents Introduction... 1 Why Cleartone?... 1 Service Purchasing... 2 For Cleartone Hosted Systems... 2 For
More informationG-Cloud 7 Service Definition. Atos Oracle Cloud ERP Implementation Services
G-Cloud 7 Service Definition Atos Oracle Cloud ERP Implementation Services Atos Oracle Cloud ERP Implementation Services Customers need adaptive and agile Enterprise Resource Planning (ERP) systems to
More informationDepartment of Veterans Affairs VA Directive 6004 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS
Department of Veterans Affairs VA Directive 6004 Washington, DC 20420 Transmittal Sheet September 28, 2009 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS 1. REASON FOR ISSUE: This Directive establishes
More informationSecuring business data. CNS White Paper. Cloud for Enterprise. Effective Management of Data Security
Securing business data CNS White Paper Cloud for Enterprise Effective Management of Data Security Jeff Finch, Head of Business Development, CNS Mosaic 2nd July 2015 Contents 1 Non-Disclosure Statement...
More informationApplication Backdoor Assessment. Complete securing of your applications
Application Backdoor Assessment Complete securing of your applications Company brief BMS Consulting is established as IT system integrator since 1997 Leading positons in Eastern Europe country Product
More informationCACI Cloud Consulting Services
Index 1. Summary... 3 2. Services provided... 3 2.1. Advisory... 3 2.2. Strategy and Architecture... 4 2.3. Cloud Application Development... 7 2.4. Cloud Service Management... 8 3. Pricing... 10 Page 2
More informationG-Cloud Service Definition. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS
G-Cloud Service Definition Atos infrastructure Vulnerability Scanning (Outpost24) SaaS Atos Infrastructure Vulnerability Scanning (Outpost24) SaaS Atos Infrastructure Vulnerability Scanning SaaS is powered
More informationCESG Certified Professional
CESG Certified Professional Verify your skills and competence in information assurance Now open to cyber security professionals working in UK industry CONTENTS 1. Introduction 2. IA in Context: Why Professionalism
More informationIBM PowerSC. Security and compliance solution designed to protect virtualised data centres. Highlights. IBM Systems and Technology Data Sheet
IBM PowerSC Security and compliance solution designed to protect virtualised data centres Highlights Simplify security management and compliance measurement Reduce administration costs of meeting compliance
More informationRoles & Grades Rate Cards and Applicable SFIA Skills
Roles & s Rate Cards and Applicable Consultant Day Rate Card Consultant Day Rate Lead 900.00 Senior 800.00 Junior 0.00 CLAS Consultant and Competencies Lead CLAS Consultant Lead CLAS Consultant IT Governance
More informationSCC Information Assurance Practice, CLAS Consulting, Check Testing and Accreditation Services
SCC Information Assurance Practice, CLAS Consulting, Check Testing and Accreditation Services Contents 1 Introduction...2 2 IA, CLAS Consulting and CHECK Testing...3 3 Information Assurance...4 4 Accreditation...5
More informationIBM's Fraud and Abuse, Analytics and Management Solution
Government Efficiency through Innovative Reform IBM's Fraud and Abuse, Analytics and Management Solution Service Definition Copyright IBM Corporation 2014 Table of Contents Overview... 1 Major differentiators...
More informationThe IaaS Server On Boarding Process
SERVICE DEFINITION G-Cloud 7 MANAGED SERVER Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this material
More informationProtective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 2.1, Issue Date: 05/02/201405/02/2014. Classification: Open
Protective Monitoring as a Service Version: 2.1, Issue Date: 05/02/201405/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 201416/12/2014. Other than for the sole purpose of evaluating
More informationG-Cloud Service Definition. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS
G-Cloud Service Definition Atos infrastructure Vulnerability Scanning (Outpost24) SaaS Atos Infrastructure Vulnerability Scanning (Outpost24) SaaS Atos Infrastructure Vulnerability Scanning SaaS powered
More informationSHAREPOINT SERVICE DEFINITION. G-CLOUD Commercial-in-Confidence. civil.lockheedmartin.co.uk
SHAREPOINT SERVICE DEFINITION G-CLOUD Commercial-in-Confidence civil.lockheedmartin.co.uk SECTION 1 LOCKHEED MARTIN S SHAREPOINT CAPABILITY Lockheed Martin offers a full end to end service, delivering
More informationCASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES
CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES PROTECTIVE MONITORING SERVICE In a world where cyber threats are emerging daily, often from unknown sources, information security is something
More informationWhite paper. Secure Cloud Services: An Integrated Approach
White paper Secure Cloud Services: An Integrated Approach Edition October 2013 Whitepaper Information Management Secure Cloud Services: An Integrated Approach Edition October 2013 Copyright 2013 EXIN All
More informationIT Security. Securing Your Business Investments
Securing Your Business Investments IT Security NCS GROUP OFFICES Australia Bahrain China Hong Kong SAR India Korea Malaysia Philippines Singapore Sri Lanka Securing Your Business Investments! Information
More informationITIL: What is it? How does ITIL link to COBIT and ISO 17799?
ITIL: What is it? How does ITIL link to COBIT and ISO 17799? 1 What is ITIL? The IT Infrastructure Library A set of books comprising an IT service management Best Practices framework An industry of products,
More informationCertified Information Security Manager (CISM)
Certified Information Security Manager (CISM) Course Introduction Course Introduction Domain 01 - Information Security Governance Lesson 1: Information Security Governance Overview Information Security
More informationdeveloping your potential Cyber Security Training
developing your potential Cyber Security Training The benefits of cyber security awareness The cost of a single cyber security incident can easily reach six-figure sums and any damage or loss to a company
More information