ADVANCED THREAT DETECTION G-CLOUD SERVICE DEFINITION

Size: px
Start display at page:

Download "ADVANCED THREAT DETECTION G-CLOUD SERVICE DEFINITION"

Transcription

1 ADVANCED THREAT DETECTION G-CLOUD SERVICE DEFINITION 14

2 Table of contents 1 Introduction Service Overview Advanced Threat Detection Service Service Description Scenario: Basis for price Technical Requirements Customer Requirements Optional Additional Services Associated BAE Systems Managed Security Services Service Delivery Service management Service constraints Service Levels Information assurance Backup/Restore & Disaster Recovery Data restoration / service migration Trial Services On-boarding Training Commercial Arrangements Pricing Ordering and invoicing process Customer responsibilities BAE Systems Managed Security Advanced Threat Detection Terms and Conditions Termination terms Financial recompense model for not meeting service levels Intellectual Property Integrated G-Cloud Service Delivery Applied Intelligence: Information Intelligence Advanced Threat Detection Service Page 1 of 13

3 1 Introduction BAE Systems Applied Intelligence (formerly known as Detica) Cyber Security capabilities within G-Cloud are drawn from our portfolio of services and solutions which are designed to assist organisations in making cyber space safe for business and governments. Our capabilities are organised into the four principal areas of Prepare, Protect, Monitor and Respond as shown in Figure 1 below. Business and technical services that help our customers understand and manage their cyber risk, make informed investment decisions and drive through improvements. Repeatable products and solution integration to protect business critical information from cyber attack and enable secure collaboration with partners, clients and employees Products and services that monitor networks to identify malicious behaviour, understand its intent and prevent it from achieving its goal. Consulting services which minimise the business impact of a successful cyber security attack through remediation and crisis management Figure 1 - BAE Systems Cyber Security Services BAE Systems Cyber Security offering to G-Cloud is based on elements from the Prepare and Monitor capability areas as described in the following Service Description documents: BAE Systems Managed Security - Protective Monitoring BAE Systems Managed Security - Advanced Threat Detection (this document) BAE Systems Managed Security Security Device Management BAE Systems Managed Information Assurance Services BAE Systems Security and Information Risk Services Advanced Threat Detection Service Page 2 of 13

4 2 Service Overview 2.1 Advanced Threat Detection Service The Advanced Threat Detection service provides customers with protection against under-the-radar targeted threats which may be deep rooted and have lain dormant for many years, and are often of a complexity that is possible only through organised criminal teams and nation states. Although the number of such threats are lower than day-to-day operational security incidents, the damage of such attacks often results in irreparable reputational damage or irreversible loss of IPR causing business closure. BAE Systems service is underpinned by UK-built CyberReveal TM technology which provides unique defence against both common-place attacks and targeted attacks, also known as Advanced Targeted Threats (ATTs) and Advanced Persistent Threats (APTs) perpetrated by sophisticated and well-resourced attackers. BAE Systems Advanced Threat Detection service is depicted in the figure below and comprises the Protective Monitoring service in addition to a number of supporting services which enable this service, such as, Service Desk, Service Management, Threat Co-ordination and Technology Support Data is collected from clients networks using devices which cannot be detected by attackers located at the Internet gateways, which capture meta-data from traffic flows without impacting network performance. The device which is not easily detected by attackers also supports full packet capture to enable more data for attack investigation. The BAE Systems Host Agent software is installed on endpoint devices within the network (e.g. laptops and other thick client devices) and supports various forms of tasking. Advanced Threat Detection Service Page 3 of 13

5 Security alerts are triaged by our analysts and on detection of a security incident, analysts have access to threat information and empirical knowledge to prioritise incidents and reduce false positive rates. 2.2 Service Description In the delivery of this Service BAE Systems shall: Advanced Threat Detection Collect Security Data from CyberReveal TM Probes and/or CyberReveal TM Host Agents (where applicable) deployed as BAE Systems Customer Premises Equipment (CPE) on the Customer environment. The details of deployment are provided within the Deployment Plan; Transfer collected Security Data by batch transfer from the Customer monitoring environment to the storage Solution in compliance with an agreed Code of Connection (CoCo); Generate Security Alerts by processing Security Data using CyberReveal TM behavioural analytics on the CyberReveal TM Analytics Platform. Deploy new or modified behavioural analytics that have been confirmed by BAE Systems to accurately identify cyber threats, to continually improve the generation of Security Alerts; Security Incident Triage, Investigation and Diagnosis Analyse the Security Alerts raised by the Security Monitoring Devices, to identify potential cyber attacks. Identify potential Security Incidents based on Security Alerts, and create a suspected Security Incident; Prioritise and categorise each Security Incident raised by the Service according to a Prioritisation Schema. The Prioritisation Schema shall be agreed during the Service Transition phase; Conduct an initial investigation into a suspected Security Incident where the Priority is 1 or 2; Check for any existing incidents raised by the Protective Monitoring Service. If an existing Security Incident record exists, the new record shall be internally linked to provide enriched intelligence; The Security Incident, for example where it is a repeat incident. Where known remediation instructions are identified these shall be attached to the incident to aid the Customer in Incident Resolution. Make a recommendation where root cause is not known as to the subsequent investigation required. This may require a request for further information in order to determine if the Incident is genuine, during which time the Security Incident shall be placed On Hold. Access the BAE Systems knowledge base to check for any known remediation instructions related to Client Service Desk Communicate to the Customer the details of Security Incidents that conform to the reporting criteria (according to the timescales defined in the agreed Service Levels); Advanced Threat Detection Service Page 4 of 13

6 The communication will be via with a confirmatory phone call for P1 level incidents; Where further information is identified by the Service which relates to an existing Security Incident, BAE Systems shall communicate, to a single destination within the Customer an update to the Security Incident. 2.3 Scenario: Basis for price Security data relating to the following devices will be monitored: o 10Mb/s utilised Internet connection at a single UK data centre o Assumption of approximately 95 user laptops/workstations in the estate 2.4 Technical Requirements BAE Systems will deploy a collection probe within the customer s data centre. This probe should be deployed at the edge of the network, ideally adjacent to customer s proxy devices, and must be remotely accessible to BAE Systems staff via a VPN connection connecting the BAE Systems data centre environments to the customer estate. 2.5 Customer Requirements The Customer shall: Manage all remediation activity associated with a notified Security Incident; Provide an appropriately secure single point of channel for receiving notification of Security Incidents; Provide a single point of contact and suitably secure communication channel for notification of Priority 1 Security Incidents Provision of connectivity to Customer site for transfer of Security Data. 2.6 Optional Additional Services BAE Systems have not scoped the following services into the above scenario. If these services are required, BAE Systems will discuss your requirements and propose a suitable service and associated prices. Response services: BAE Systems Cyber Response services are one of only four CESG Cyber Incident Response Scheme providers and we have responded to many varied and complex targeted attacks, insider attacks and more over several years and have a proven methodology. Services include forensics (including s, servers, network data and logs) and incident management services. These services are available as per-incident services or on an annual retention basis. Threat Intelligence: BAE Systems Managed Security services are built upon and continuously improved by our Threat Intelligence research and collaboration. Elements of this service are also available as an advisory service to further help UK Government customers prepare for and response to cyber security incidents. Protective Monitoring Service: see below for more information Advanced Threat Detection Service Page 5 of 13

7 2.7 Associated BAE Systems Managed Security Services The Advanced Threat Detection Service is part of the wider BAE Systems Managed Security service portfolio, and compliments the Protective Monitoring service. Advanced Threat Detection compliments and extends your security monitoring by focussing on network and application behaviour from collected data, providing deep insight into sophisticated threats using metadata gathered from network traffic, s, web traffic and DNS lookups. Protective Monitoring provides holistic protection through the ingest and analysis of live log data, and delivers real time alert of security incidents leveraged from data available from existing security infrastructure and known threat signatures and likely indicators of compromise. Our Protective Monitoring service provides real time protection against all day-to-day security threats, which are often overlooked as irrelevant compared to the complex targeted threats that are prevalent in the media. However, without ensuring that the estate security posture is understood and controlled, the impact of seemingly lower priority issues will cause catastrophic business and reputational damage, especially as the likelihood of such security incidents is very high for all IT environments. Together, the BAE Systems Managed Security monitoring services offer unparalleled confidence in security posture and on-going protection against the full spectrum of cyber security threats. When taken together, there are also operational benefits and overlaps that lead to operational cost reductions please contact BAE Systems for more information on procuring a combined service as opposed to individual lots. Advanced Threat Detection Service Page 6 of 13

8 3 Service Delivery 3.1 Service management BAE Systems manages the delivery of Services to the Customer using ITIL v3 aligned Service Management practices. This includes Service governance, escalation and continual Service improvement. Standard Service Reports will be provided as part of the Operational Services. Standard Service Reports are flexible and the format, the structure and the content of these reports can be amended, all changes shall be subject to Change Control. Name Format Recipient/Participant Due Service Delivery Management Report Monthly/Quarterly Service Review Annual Service Review PDF report via (encrypted) Slide deck for discussion at Customer or BAE Systems offices Slide deck for discussion at Customer or BAE Systems offices Customer Cyber Security Delivery Manager, Customer Account Manager BAE Systems Service Delivery Manager, Customer Cyber Security Delivery Manager, Account Manager, Customer Account Manager BAE Systems Service Delivery Manager, Customer Cyber Security Delivery Manager, Account Manager, Customer Account Manager, Head of Service Delivery, Customer Director Monthly Monthly / Quarterly Annually The pricing assumes customer site visits within the M25 or BAE Systems Guildford office. 3.2 Service constraints The service and corresponding pricing has been sized to the scenario contained in section 2.3 in order to offer a representative price for comparison purposes. BAE Systems can however operate the Protective Monitoring Service for larger estates, monitoring many thousands of devices and a wide variety of devices and applications. 3.3 Service Levels The scenario and corresponding pricing has been based on the scenario contained in section 2.3 and on the following indicative service levels: Service Measure Channel Threshold P1 Security Incident Notification P2 Security Incident Notification sent to Customer Report sent to Customer 75 minutes (95% within Target Incident Notification Time if 20 or more incidents or no more than one failure if less than 20 incidents) Included within the Monthly Security Incident Report Advanced Threat Detection Service Page 7 of 13

9 P3 Security Incident Notification P4 Security Incident Notification Availability of Protective Monitoring Report sent to Customer Report sent to Customer P1 Service Incident duration Included within the Monthly Security Incident Report Included within the Monthly Security Incident Report 97% Availability The service Levels above a subset of the standard set of measures. 3.4 Information assurance This service must be able to connect to the Internet and as such is only available for customer estates assured to IL3 and below. 3.5 Backup/Restore & Disaster Recovery Disaster Recovery is out of scope of this proposed solution but is available upon request. 3.6 Data restoration / service migration Not applicable. 3.7 Trial Services Trial options are possible with this service, upon request to BAE Systems, under a service called Active Attack Assessment. 3.8 On-boarding During the Transition phase BAE Systems will work closely with the Customer to align the processes delivered by BAE Systems with the Customer business processes required to deliver the Operational Service. BAE Systems will deliver the following deliverables as part of transition phase: Protective Monitoring Policy; Deployment Plan; Operational Service Pack, During the transition phase there will be two key delivery milestones: Interim Operational Capability (IOC): The point at which there is an operational service executing and service charges become effective. Full Operational Capability (FOC): The point at which the service is fully operational and has completed Operational Acceptance Test (OAT) and all SLAs become effective. The Customer shall: Make available suitable security and network architects to work with BAE Systems and attend workshops and to work with BAE Systems to define and agree the Operating Policy. Advanced Threat Detection Service Page 8 of 13

10 Provide required Customer IP addresses to enable BAE Systems to pre-configure all CPE prior to deployment on the Customer estate; Deploy the BAE Systems provided CPE; Establish, maintain and support routing and connectivity to transfer Security Data from the Customer estate to BAE Systems site; Deploy, if specified with the Deployment Plan, Advanced Threat Detection Host Agents onto the endpoints on their estate; Allow site access to BAE Systems engineers as required to carry out break fix processes;; 3.9 Training Transition is dependent on individual customer requirements; it is estimated that the transition will be approximately 2-4 weeks duration. Not applicable. Advanced Threat Detection Service Page 9 of 13

11 4 Commercial Arrangements 4.1 Pricing Price to Operate The price (excluding VAT) for the service as scoped in section 2 is 219/day with a minimum 1 year term, this equates to approximately 80,000 per annum. For a price which meets your specific requirements please contact BAE Systems. Exit costs are not included in this price. 4.2 Ordering and invoicing process The Customer shall pay Supplier for the G-Cloud Services in the amount or at the rates set out in section 4.1 together with all reasonable travel and subsistence expenses and any other direct, non-labour charges as may be applicable. Supplier will invoice the Customer quarterly in advance i.e. for the depicted scenario 12.5k on the contract start date, and each quarter thereafter. All sums payable by the Customer to Supplier shall be paid, without discount, set-off, counterclaim or other deduction within 30 days from the date of Supplier s invoice. Applicable taxes (including value added tax) shall be payable additionally by the Customer at the prescribed rate at the time of invoicing. The Customer shall notify Supplier in writing within 7 days of receipt of an invoice if the Customer considers all or part of such invoice incorrect or invalid for any reason and the reasons for disputing payment failing which the Customer will raise no objection to any such invoice and will make full payment in accordance with it. 4.3 Customer responsibilities The Customer shall provide to Supplier at no charge and in a timely manner, all such documents information, materials, facilities, support, services and co-operation relating to the G-Cloud Services including (without limitation) computer programs, data, reports and specifications and other information (together Customer Material ) as Supplier may reasonably require for the proper performance of the G-Cloud Services and within sufficient time to enable Supplier to perform those G-Cloud Services and the Customer shall ensure that such are accurate and complete, and Supplier shall be entitled to rely upon such as being accurate and complete without seeking to verify or check it. The Customer shall provide Supplier, its agents, subcontractors, consultants and employees, in a timely manner and at no charge, with access to any of the Customer's premises, office accommodation, equipment, systems, networks, software, data and other facilities as reasonably required by Supplier. 4.4 BAE Systems Managed Security Advanced Threat Detection Terms and Conditions The full terms and conditions for this service can be found in BAE Systems Applied Intelligence MSS MSA. 4.5 Termination terms Not Applicable Advanced Threat Detection Service Page 10 of 13

12 4.6 Financial recompense model for not meeting service levels Not Applicable 4.7 Intellectual Property Details of the terms and conditions of the foreground IPR, please see the BAE SYSTEMS BAE Systems Cyber MSA v1. The proposed service in this document encompasses some elements of the Threat Intelligence service; in addition to the standard IPR terms and conditions please be aware of the following additional IPR restrictions: Ownership of copyright and all other intellectual property in the Threat Intelligence Deliverables and Services shall remain with BAE Systems at all times. Subject to payment in full of each instalment of the fees for the Services Customer is granted a nonexclusive, non sub-licensable, non-transferable, non-assignable, limited royalty free license to use and copy the Threat Intelligence Deliverables solely for the Customer s internal business purposes. The Customer shall expressly not: (i) sublicense, distribute, publicly perform or display, or otherwise share or make accessible any Threat Intelligence Deliverables, data-feed, signatures, metadata, analysis, tools or results from the Services or portions thereof to a third party; (ii) export the Threat Intelligence Deliverables, data-feed, signatures, metadata, analysis, tools or results from the Services, in whole or in part, in violation of applicable laws or regulations or; (iii) use the Services to offer products and services competitive with those of BAE Systems, as reasonably determined by BAE Systems. All rights pertaining to Threat Intelligence, in all materials created by BAE Systems during its performance of the Services shall vest in and be the sole property of BAE Systems. 4.8 Integrated G-Cloud Service Delivery We have many G-Cloud Service offerings. As required by the Customer, we will integrate, manage and deliver complimentary G-Cloud Service offerings to form part of this G-Cloud Service to meet Customer service requirements. Advanced Threat Detection Service Page 11 of 13

13 5 Applied Intelligence: Information Intelligence BAE Systems Applied Intelligence is an information intelligence specialist. We help government and commercial organisations exploit information to deliver critical business services more effectively and economically. We also develop solutions to strengthen national security and resilience, enabling citizens to go about their lives freely and with confidence. By combining technical innovation and domain knowledge, we integrate and deliver world-class solutions often based on our own unique intellectual property to our customers most complex operational problems. We recognise the importance of Cloud services to the realisation of HMG s IT Strategy and have optimised many of our most compelling IT service offerings for Government on G-Cloud. Through these offerings we are at the forefront of realising the full benefits of Information Technology for our customers. Below is a summary of our G-Cloud services. G-Cloud Service Consultancy Service Integration and Management (SIAM) Information Security Agile Design and Delivery Architecture Data Services Service Description Providing Business and IT strategy and transformation consultancy services, including requirements management, organisational change, and business case & benefits management. Covering all aspects of SIAM services, from target operating model design, to service integration, supplier management, architecture and transition and transformation management. Cyber security assessments, architecture and testing services; Threat detection, protective monitoring and security management services; Cyber incident response, and Industrial Protection, Secure Web Gateway and Cross domain services. Services delivered using the Agile method for design and development, including Secure-by-Design services. The design of end-to-end architecture solutions, including infrastructure, operations, applications and service, as well as enterprise architecture. Data management, protection and exploitation services covering people, process, data and technologies. Includes maturity assessments, organisation design and provision of data analytics services. Programme Management Digital Media Secure Mobility & MobileProtect Provision of programme management and support experts to provide delivery and/or assurance of internal and external programmes. Digital transformation, media development, including user experience, social business and mobile media. From mobile strategy, through to development of your secure mobile proposition for your user base; Cloud based protection for your user base portfolio of mobile devices. NetReveal OnDemand Cl Cloud based delivery of the global leader in counter fraud software. For more details on our G-Cloud services for G-Cloud, visit or send us an at gcloud@baesystems.com. Applied Intelligence is part of BAE Systems, the premier global defence, security and aerospace company. BAE Systems delivers a full range of products and services for air, land and naval forces, as well as advanced electronics, security, information technology solutions and customer support services. Advanced Threat Detection Service Page 12 of 13

14 Applied intelligence Limited is a BAE Systems company, trading as BAE Systems Applied Intelligence. Applied Intelligence Limited is registered in England (No ) with its registered office at Surrey Research Park, Guildford, England, GU2 7YP. Copyright BAE Systems plc All Rights Reserved. BAE SYSTEMS, APPLIED INTELLIGENCE and the names of the BAE Systems Applied Intelligence products referenced herein are trademarks of BAE Systems plc and are registered in certain jurisdictions. Advanced Threat Detection Service Page 13 of 13

PROTECTIVE MONITORING SERVICE G-CLOUD SERVICE DEFINITION

PROTECTIVE MONITORING SERVICE G-CLOUD SERVICE DEFINITION PROTECTIVE MONITORING SERVICE G-CLOUD SERVICE DEFINITION 15 Table of contents 1 Introduction...2 2 Service Overview...3 2.1 Protective Monitoring...3 2.2 Service Description...4 2.3 Scenario: Basis for

More information

DATA ANALYTICS SERVICES. G-CLOUD SERVICE DEFINITION.

DATA ANALYTICS SERVICES. G-CLOUD SERVICE DEFINITION. DATA ANALYTICS SERVICES. G-CLOUD SERVICE DEFINITION. Table of contents 1 Introduction...3 2 Services Overview...4 2.1 Rapid KPI Reporting Delivery Services...4 2.2 Data Discovery & Exploitation Services...5

More information

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. Table of contents 1 Introduction...3 2 Architecture Services...4 2.1 Enterprise Architecture Services...5 2.2 Solution Architecture Services...6 2.3 Service

More information

DATA ANALYTICS SERVICES G-CLOUD SERVICE DEFINITION

DATA ANALYTICS SERVICES G-CLOUD SERVICE DEFINITION DATA ANALYTICS SERVICES G-CLOUD SERVICE DEFINITION 3 Table of contents 1 Introduction...2 2 Service Overview...3 2.1 Rapid Reporting Delivery Services...3 2.2 Data Discovery & Exploitation Services...4

More information

BAE SYSTEMS CYBERREVEAL G-CLOUD SERVICE DEFINITION

BAE SYSTEMS CYBERREVEAL G-CLOUD SERVICE DEFINITION BAE SYSTEMS CYBERREVEAL G-CLOUD SERVICE DEFINITION 20 Table of contents 1 Introduction...2 2 CyberReveal Overview...3 2.1 CyberReveal Platform...3 2.2 CyberReveal Analytics...5 2.3 CyberReveal Investigator...7

More information

Lot 1 Service Specification MANAGED SECURITY SERVICES

Lot 1 Service Specification MANAGED SECURITY SERVICES Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services

More information

Protecting Malaysia in the Connected world

Protecting Malaysia in the Connected world Protecting Malaysia in the Connected world cyber Security Company of the Year (Cybersecurity Malaysia, 2014) Most innovative information security company in Malaysia (Cybersecurity Malaysia, 2012) BAE

More information

Service Definition Document

Service Definition Document Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)

More information

SERVICE DEFINITION G-CLOUD 7 SECURE FILE TRANSFER DIODE. Classification: Open

SERVICE DEFINITION G-CLOUD 7 SECURE FILE TRANSFER DIODE. Classification: Open SERVICE DEFINITION G-CLOUD 7 SECURE FILE TRANSFER DIODE Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this

More information

GPS G-Cloud Lot 4: Oracle Business Intelligence Cloud Consultancy Service Definition

GPS G-Cloud Lot 4: Oracle Business Intelligence Cloud Consultancy Service Definition GPS G-Cloud Lot 4: Contents 1 Introduction... 3 2 Service... 4 2.1 Cloud Consultancy Overview... 4 2.2 Information assurance... 5 2.3 Backup/Restore and Disaster Recovery... 6 2.4 On-boarding and Off-boarding...

More information

Ubertas Cloud Services: Service Definition

Ubertas Cloud Services: Service Definition Ubertas Cloud Services: Service Definition February 2013 Innovation. Power. Trust. Contents 1. About Ubertas... 2 Our Company... 2 Our Approach to Service Delivery... 2 Our Partner Network & the UK Cloud

More information

GPG13 Protective Monitoring. Service Definition

GPG13 Protective Monitoring. Service Definition GPG13 Protective Monitoring Service Definition Issue Number V1.3 Document Date 27 November 2014 Author: D.M.Woodcock Classification UNCLASSIFIED Version G-Cloud 6 2014 Copyright Assuria Limited. All rights

More information

G-Cloud 7 Service Definition. Atos Oracle Cloud ERP Implementation Services

G-Cloud 7 Service Definition. Atos Oracle Cloud ERP Implementation Services G-Cloud 7 Service Definition Atos Oracle Cloud ERP Implementation Services Atos Oracle Cloud ERP Implementation Services Customers need adaptive and agile Enterprise Resource Planning (ERP) systems to

More information

PSN Protective Monitoring. Service Definition

PSN Protective Monitoring. Service Definition PSN Protective Monitoring Service Definition Issue Number V3.0 Document Date 29 September 2015 Author: R.N. Connor Classification UNCLASSIFIED Version G-Cloud 7 2015 Copyright Tenian Limited. All rights

More information

CASSIDIAN CYBERSECURITY

CASSIDIAN CYBERSECURITY CASSIDIAN CYBERSECURITY ADVANCED PERSISTENT THREAT (APT) SERVICE In a world where cyber threats are emerging daily, often from unknown sources, information security is something no organisation can afford

More information

CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES

CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES PROTECTIVE MONITORING SERVICE In a world where cyber threats are emerging daily, often from unknown sources, information security is something

More information

Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services

Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services Page 1 1 Contents 1 Contents... 2 2 Transcend360 Introduction... 3 3 Service overview... 4 3.1 Service introduction... 4

More information

AGILE DESIGN AND DELIVERY SERVICES. G-CLOUD SERVICE DEFINITION.

AGILE DESIGN AND DELIVERY SERVICES. G-CLOUD SERVICE DEFINITION. AGILE DESIGN AND DELIVERY SERVICES. G-CLOUD SERVICE DEFINITION. Table of contents 1 Introduction...3 1.1 Agile Lifecycle Services...3 1.2 Secure by Design (SbD)...4 2 Services Overview...5 2.1 Agile Delivery

More information

G-Cloud Service Definition. Atos Information Security Wireless Scanning Service

G-Cloud Service Definition. Atos Information Security Wireless Scanning Service G-Cloud Service Definition Atos Information Security Wireless Scanning Service Keeping your wireless networks secure Atos Information Security Wireless Scanning Service The Atos Wireless Scanning Service

More information

Growth Through Excellence

Growth Through Excellence Growth Through Excellence Public/Private Cloud Services Service Definition Document G- Cloud 5 REFERENCE NUMBER RM1557v Table of Contents Table of Contents... 3 Executive Summary... 4 About the Company...

More information

e2e Secure Cloud Connect Service - Service Definition Document

e2e Secure Cloud Connect Service - Service Definition Document e2e Secure Cloud Connect Service - Service Definition Document Overview A cloud connectivity service that connects users, devices, offices and clouds together over the Internet. Organisations can choose

More information

Service Management and ICT Monitoring and Reporting Advisory and Implementation Services

Service Management and ICT Monitoring and Reporting Advisory and Implementation Services Service Management and ICT Monitoring and Reporting Advisory and Implementation Services G-Cloud Service 1 1. An overview of the G-Cloud Service Arcus can assist you with a review and advice on the effectiveness

More information

Master Data Management

Master Data Management 1 3 Master Data Management Support Services Service Definition MASTER DATA MANAGEMENT SUPPORT SERVICES Service Description The Master Data Management Support Services are part of the Cognizant Information

More information

G-Cloud Service Definition. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS

G-Cloud Service Definition. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS G-Cloud Service Definition Atos infrastructure Vulnerability Scanning (Outpost24) SaaS Atos Infrastructure Vulnerability Scanning (Outpost24) SaaS Atos Infrastructure Vulnerability Scanning SaaS powered

More information

Thales Service Definition for NOC Services for Cloud

Thales Service Definition for NOC Services for Cloud Thales Service Definition for UK NOC Services Thales Service Definition for NOC Services for Cloud April 2014 Page 1 of 13 Thales Service Definition for UK NOC Services CONTENT Page No. Introduction...

More information

G-Cloud Service Definition. Atos Oracle Cloud ERP Implementation Services

G-Cloud Service Definition. Atos Oracle Cloud ERP Implementation Services G-Cloud Service Definition Atos Oracle Cloud ERP Implementation Services Atos Oracle Cloud ERP Implementation Services Customers need adaptive and agile Enterprise Resource Planning (ERP) systems to support

More information

Security Consultants / Security Managed Services

Security Consultants / Security Managed Services Security Consultants / Security Managed Services Service Definition Document for G-Cloudv7 Services October 2015 Table of Contents Service Overview...3 Our Approach... 3 Features... 3 Benefits... 4 ON-BOARDING

More information

Informed Solutions InformedINSIGHT Big Data G-Cloud5 Service Definition

Informed Solutions InformedINSIGHT Big Data G-Cloud5 Service Definition Informed Solutions InformedINSIGHT Big Data V1.0.0 **PROTECT COMMERCIAL** London 11 Old Queen Street, Westminster, London, SW1H 9JA, UK Tel: +44(0)20 3042 2000 Fax: +44(0)20 3042 2015 www.informed.com

More information

Software as a Service (SaaS) Online HR

Software as a Service (SaaS) Online HR Software as a Service (SaaS) Online HR Contents Service Definition... 3 An overview of the G-Cloud Service... 3 Key Service Attributes... 4 Information assurance... 4 Details of the level of backup/restore

More information

Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services

Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services Page 1 1 Contents 1 Contents... 2 2 Transcend360 Introduction... 3 3 Service overview... 4 3.1 Service introduction... 4 3.2 Service description...

More information

G-Cloud Service Definition. Atos SharePoint Development Service

G-Cloud Service Definition. Atos SharePoint Development Service G-Cloud Service Definition Atos SharePoint Development Service SharePoint Development Services SCS A comprehensive electronic document and records management, collaboration or web content management solution

More information

Cloud Brokerage. G-Cloud Service. Arcus Global 2014 1

Cloud Brokerage. G-Cloud Service. Arcus Global 2014 1 Cloud Brokerage G-Cloud Service 1 An overview of the G-Cloud Service Information assurance Backup/restore and disaster recovery On-boarding and Off-boarding processes/scope etc. Pricing Service management

More information

Introduction to Centerprise International Limited

Introduction to Centerprise International Limited RM1557vi Introduction to Centerprise International Limited Centerprise International Limited was established in 1983 as an engineering and manufacturing company, specialising in designing and building

More information

Big Data Support Services. Service Definition

Big Data Support Services. Service Definition 1 3 Big Data Support Services Service Definition BIG DATA SUPPORT SERVICES Service Description The Big Data Support Services are part of the Cognizant Information Management service family. Providing a

More information

Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 1.0, Issue Date: 05/02/201405/02/2014. Classification: Open

Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 1.0, Issue Date: 05/02/201405/02/2014. Classification: Open Protective Monitoring as a Service Version: 1.0, Issue Date: 05/02/201405/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 2014. Other than for the sole purpose of evaluating this

More information

Agilisys G-Cloud Service V

Agilisys G-Cloud Service V Agilisys G-Cloud Service V Service Definition Endpoint Management Lot 1 Infrastructure as a Service (IaaS) April 2014 At Agilisys we deliver success through innovation working with our clients to transform

More information

Integrated windows authentication for customers based on Probation GSI network

Integrated windows authentication for customers based on Probation GSI network Product Overview Victims Tracker (VT) is a software application, which was developed by London Probation Trust (LPT) to effectively manage the engagement / contact with victims of crime and the management

More information

Tactical Cost Reduction

Tactical Cost Reduction Tactical Cost Reduction G-Cloud Service 1 An overview of the G-Cloud Service Information assurance Backup/restore and disaster recovery On-boarding and Off-boarding processes/scope etc. Pricing Service

More information

G-Cloud Service Definition. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS

G-Cloud Service Definition. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS G-Cloud Service Definition Atos infrastructure Vulnerability Scanning (Outpost24) SaaS Atos Infrastructure Vulnerability Scanning (Outpost24) SaaS Atos Infrastructure Vulnerability Scanning SaaS is powered

More information

G - Cloud Service Definition IT Infrastructure Monitoring And Helpdesk

G - Cloud Service Definition IT Infrastructure Monitoring And Helpdesk IT Professional Services G - Cloud Service Definition IT Infrastructure Monitoring And Helpdesk Registered Office: Technium Springboard Centre, Llantarnam Park Cwmbran Newport, South Wales. NP44 3AW Registered

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

G-CLOUD 7 - VIRTUAL ASSET MANAGER (VAM) SPECIALIST CLOUD SERVICES (SCS)

G-CLOUD 7 - VIRTUAL ASSET MANAGER (VAM) SPECIALIST CLOUD SERVICES (SCS) G-CLOUD 7 - VIRTUAL ASSET MANAGER (VAM) SPECIALIST CLOUD SERVICES (SCS) Service Definition 6th October 2015 TABLE OF CONTENTS VIRTUAL ASSET MANAGER (VAM) SPECIALIST CLOUD SERVICES (SCS) 3 SERVICE SUMMARY

More information

Address C-level Cybersecurity issues to enable and secure Digital transformation

Address C-level Cybersecurity issues to enable and secure Digital transformation Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,

More information

G Cloud III Framework Lot 4 (SCS) Project Management

G Cloud III Framework Lot 4 (SCS) Project Management G Cloud III Framework Lot 4 (SCS) Project Management Contents Executive Summary 3 Project Management 4 Why Deloitte? 6 SFIA Rate Card 7 Contact 8 Service Definition (a) to (p) 9 Executive Summary PROJECT

More information

G-Cloud Service Definition. Atos SI Oracle CRM and CX Services

G-Cloud Service Definition. Atos SI Oracle CRM and CX Services G-Cloud Service Definition Atos SI Oracle CRM and CX Services Atos SI Oracle CRM and CX Services SCS Atos provides a range of expert Customer Relationship Management (CRM) and Customer Experience (CX)

More information

Protecting against cyber threats and security breaches

Protecting against cyber threats and security breaches Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez abenaventem@es.ibm.com IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So

More information

Secure Remote Backup (IL3) G-Cloud Lot3 IaaS

Secure Remote Backup (IL3) G-Cloud Lot3 IaaS Secure Remote Backup (IL3) G-Cloud Lot3 IaaS Contents Service Definition... 3 An overview of the Remote Backup as a Service... 3 Key Service Attributes... 4 Information assurance... 5 Details of the level

More information

PAAS Public Sector Managed Services

PAAS Public Sector Managed Services Meritec Limited Meritec House, Acorn Business Park, Skipton, North Yorkshire, BD23 2UE 0845 3451155 servicepoint@meritec.co.uk www.meritec.co.uk Registered In England & Wales No. 3224622 Table of Contents

More information

North American Electric Reliability Corporation (NERC) Cyber Security Standard

North American Electric Reliability Corporation (NERC) Cyber Security Standard North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation

More information

Digital Forensics G-Cloud Service Definition

Digital Forensics G-Cloud Service Definition Digital Forensics G-Cloud Service Definition 2013 General Dynamics Information Technology Limited. All rights 1 GDIT Team Clients Metropolitan Police Service The General Dynamics Information Technology

More information

G Cloud 6. Service Definition: Platform as a Service (PaaS)

G Cloud 6. Service Definition: Platform as a Service (PaaS) G Cloud 6 Service Definition: Platform as a Service (PaaS) Introduction to Centerprise International Limited Centerprise International Limited was established in 1983 as an engineering and manufacturing

More information

G-Cloud Service Definition. Atos Business Intelligence Dashboards and Analytics SCS

G-Cloud Service Definition. Atos Business Intelligence Dashboards and Analytics SCS G-Cloud Service Definition Atos Business Intelligence Dashboards and Analytics SCS Atos Business Intelligence Dashboards and Analytics SCS The Atos approach to Business Intelligence (BI) Dashboards and

More information

Cloud Enablement. Lot 4 - Specialist Cloud Services. Version: 3.0, Issue Date: 05/02/2014. Classification: Open

Cloud Enablement. Lot 4 - Specialist Cloud Services. Version: 3.0, Issue Date: 05/02/2014. Classification: Open Cloud Enablement Version: 3.0, Issue Date: 05/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 201415/12/2014. Other than for the sole purpose of evaluating this Response, no part

More information

G-Cloud Service Definition. Atos Accredited Oracle Business Intelligence Solutions SCS

G-Cloud Service Definition. Atos Accredited Oracle Business Intelligence Solutions SCS G-Cloud Service Definition Atos Accredited Oracle Business Intelligence Solutions SCS Atos Accredited Oracle Business Intelligence Solutions SCS Robust, scalable Cloud computing and consumption-based reporting

More information

MDM & ENTERPRISE MOBILITY SERVICE DESCRIPTION G-CLOUD 7 OCTOBER 3, 2015

MDM & ENTERPRISE MOBILITY SERVICE DESCRIPTION G-CLOUD 7 OCTOBER 3, 2015 OCTOBER 3, 2015 MDM & ENTERPRISE MOBILITY SERVICE DESCRIPTION G-CLOUD 7 607 Milton Keynes Business Centre Hayley Court, Linford Wood, Milton Keynes. MK14 6gD Table of Contents 1 Introduction 4 1.1 Executive

More information

G-Cloud Service Definition. Atos Data Quality Audit SCS

G-Cloud Service Definition. Atos Data Quality Audit SCS G-Cloud Service Definition Atos Data Quality Audit SCS Atos Data Quality Audit SCS As organisations increasingly utilise a hybrid of Legacy and Cloud based technology platforms, it becomes increasingly

More information

Deloitte Service Code: D-G6-L4-543 December 2014

Deloitte Service Code: D-G6-L4-543 December 2014 Managed Cyber Security Cyber Intelligence Centre Deloitte LLP Service Deloitte Service Code: D-G6-L4-543 December 2014 Contents 1 Service Overview 1 2 Detailed Service Definition 2 3 Pricing 6 4 Ordering

More information

Thales Service Definition for IL3 Encrypted Overlay for Cloud Services

Thales Service Definition for IL3 Encrypted Overlay for Cloud Services Thales Service Definition for UK IL3 Encrypted Overlay Thales Service Definition for IL3 Encrypted Overlay for Cloud Services April 2014 Page 1 of 11 Thales Service Definition for UK IL3 Encrypted Overlay

More information

Audit Management. service definition document

Audit Management. service definition document Audit Management service definition document Contents Introduction... 3 Service Description... 3 Features and Benefits... 4 Architecture... 5 Service Delivery... 6 Service Provisioning Time... 7 Service

More information

CSM-ACE 2014 Cyber Threat Intelligence Driven Environments

CSM-ACE 2014 Cyber Threat Intelligence Driven Environments CSM-ACE 2014 Cyber Threat Intelligence Driven Environments Presented by James Calder Client Services Manager, Singapore 1 CONTENTS Digital criminality Intelligence-led security Shylock case study Making

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

Thales Service Definition for PSN Secure Email Gateway Service for Cloud Services

Thales Service Definition for PSN Secure Email Gateway Service for Cloud Services Thales Definition for PSN Secure Email Gateway Thales Definition for PSN Secure Email Gateway for Cloud s April 2014 Page 1 of 12 Thales Definition for PSN Secure Email Gateway CONTENT Page No. Introduction...

More information

CYBER SECURITY Audit, Test & Compliance

CYBER SECURITY Audit, Test & Compliance www.thalescyberassurance.com CYBER SECURITY Audit, Test & Compliance 02 The Threat 03 About Thales 03 Our Approach 04 Cyber Consulting 05 Vulnerability Assessment 06 Penetration Testing 07 Holistic Audit

More information

Business Intelligence

Business Intelligence 1 3 Business Intelligence Support Services Service Definition BUSINESS INTELLIGENCE SUPPORT SERVICES Service Description The Business Intelligence Support Services are part of the Cognizant Information

More information

Cloud Enablement. Lot 4 - Specialist Cloud Services. Version: 2.0, Issue Date: 05/02/2014. Classification: Open

Cloud Enablement. Lot 4 - Specialist Cloud Services. Version: 2.0, Issue Date: 05/02/2014. Classification: Open Cloud Enablement Version: 2.0, Issue Date: 05/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 2014. Other than for the sole purpose of evaluating this Response, no part of this

More information

Open Source Sales Force Automation (SFA) in the Cloud SaaS

Open Source Sales Force Automation (SFA) in the Cloud SaaS Open Source Sales Force Automation (SFA) in the Cloud SaaS Service Overview Our open source Sales Force Automation (SFA) in the cloud service allows customers to perform marketing automation through multi

More information

Log and Refer Service Desk IL0. September 2013

Log and Refer Service Desk IL0. September 2013 Log and Refer Service Desk IL0 September 2013 TABLE OF CONTENTS 1 Service Overview... 3 2 Why Capgemini?... 5 3 The Capgemini Proposition... 6 3.1 Approach... 7 4 Benefits... 9 4.1 Summary of Proposition...

More information

Service: Contract Management (Software as a Service)

Service: Contract Management (Software as a Service) Service: Contract Management (Software as a Service) 1. Description: An overview of the G-Cloud Service (functional, non-functional) econtract Management allows for the management of a contract after award,

More information

Cloud-based Infrastructure and Application Support Service Definition

Cloud-based Infrastructure and Application Support Service Definition +44 (0) 20 3603 7830 hello@equalexperts.com www.equalexperts.com 30 Brock Street London, NW1 3FG Cloud-based Infrastructure and Application Support Service Definition Overview We provide 24/7 support to

More information

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst ESG Lab Spotlight ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst Abstract: This ESG Lab Spotlight examines the

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

CenturyLink IT Consulting Services. G-Cloud 6 - SCS. REFERENCE NUMBER RM1557vi

CenturyLink IT Consulting Services. G-Cloud 6 - SCS. REFERENCE NUMBER RM1557vi CenturyLink IT Consulting Services G-Cloud 6 - SCS REFERENCE NUMBER RM1557vi Overview of the Service (functional and non-functional) IT Consulting Services CenturyLink's Solutions Consulting delivers customised

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

D-G4-L4-231 Data Governance Assessment Design and Implementation Deloitte LLP Service for G- Cloud IV

D-G4-L4-231 Data Governance Assessment Design and Implementation Deloitte LLP Service for G- Cloud IV D-G4-L4-231 Data Governance Assessment Design and Implementation Deloitte LLP Service for G- Cloud IV September 2013 Contents 1 Service Overview 1 2 Detailed Service Description 4 3 Commercials 8 4 Our

More information

How To Help Your Business Succeed

How To Help Your Business Succeed G Cloud III Framework Lot 4 (SCS) CHECK Accredited Penetration Testing Services Contents Executive Summary 3 CHECK Accredited Penetration Testing Services 4 Why Deloitte? 5 Package Cost 7 Contact 9 Service

More information

Overview. Service Description: BCP & DR Strategy (L6)

Overview. Service Description: BCP & DR Strategy (L6) Service Description: BCP & DR Strategy (L6) Government Enterprise Architecture Specialists T: 07966 457 571 E: peter@vision-ist.net Overview Visionist will help your organisation develop a Business Continuity

More information

McAfee Security Architectures for the Public Sector

McAfee Security Architectures for the Public Sector White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed

More information

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges Accenture Intelligent Security for the Digital Enterprise Archer s important role in solving today's pressing security challenges The opportunity to improve cyber security has never been greater 229 2,287

More information

Specialist Cloud Services. Acumin Cloud Security Resourcing

Specialist Cloud Services. Acumin Cloud Security Resourcing Specialist Cloud Services Acumin Cloud Security Resourcing DOCUMENT: FRAMEWORK: STATUS Cloud Security Resourcing Service Definition G-Cloud Released VERSION: 1.0 CLASSIFICATION: CloudStore Acumin Consulting

More information

G-Cloud Service Definition. Atos Call Centre Services SCS

G-Cloud Service Definition. Atos Call Centre Services SCS G-Cloud Service Definition Atos Call Centre Services SCS Atos Call Centre Services SCS Summary Atos SIAM Service Desk is designed to provide a core part of the SIAM Tower model for ICT delivery. This service

More information

D-G4-L4-126 Police contact management and demand reduction review Deloitte LLP Service for G-Cloud IV

D-G4-L4-126 Police contact management and demand reduction review Deloitte LLP Service for G-Cloud IV D-G4-L4-126 Police contact management and demand reduction review Deloitte LLP Service for G-Cloud IV September 2013 Contents 1 Service Overview 1 2 Detailed Service Description 2 3 Commercials 6 4 Our

More information

IBM Smartcloud Managed Backup

IBM Smartcloud Managed Backup IBM Smartcloud Managed Backup Service Definition 1 1. Summary 1.1 Service Description The IBM SmartCloud Managed Backup service provides public, private and hybrid cloudbased data protection solutions

More information

Amazon Compute - EC2 and Related Services

Amazon Compute - EC2 and Related Services Amazon Compute - EC2 and Related Services G-Cloud Service 1 1.An overview of the G-Cloud Service Arcus Global are approved to sell to the UK Public Sector as official Amazon Web Services resellers. Amazon

More information

Xerox Remote Infrastructure Monitoring (XRIM)

Xerox Remote Infrastructure Monitoring (XRIM) Xerox Remote Infrastructure Monitoring (XRIM) Service Description G-Cloud : Lot 3 : Software as a Service (SaaS) April 2014 Version 1.0 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and

More information

Solution Overview. Our Solution employs two tiers of storage aligning costs of storage with the changing value of data over time.

Solution Overview. Our Solution employs two tiers of storage aligning costs of storage with the changing value of data over time. Service Solution Overview Online Backup per TB model Databarracks fully managed online backup solution uses the Asigra software to back up and protect both physical and virtual environments. Housed in

More information

Roles within ITIL V3. Contents

Roles within ITIL V3. Contents Roles within ITIL V3 Roles are employed in order to define responsibilities. In particular, they are used to assign Process Owners to the various ITIL V3 processes, and to illustrate responsibilities for

More information

Marval Software Limited. G Cloud iii Framework Service Definition

Marval Software Limited. G Cloud iii Framework Service Definition 1 Marval Software Limited G Cloud iii Framework Service Definition Page 1 of 9 2 Contents An overview of the Marval Service Management (MSM) Software Solution... 3 Information assurance Impact Level (IL)

More information

Cybersecurity The role of Internal Audit

Cybersecurity The role of Internal Audit Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government

More information

Xerox Print Monitoring Service (XPMS)

Xerox Print Monitoring Service (XPMS) Xerox Print Monitoring Service (XPMS) Service Description G-Cloud : Lot 3 : Software as a Service (SaaS) April 2014 Version 1.0 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are

More information

How To Protect Your Network From Attack From A Network Security Threat

How To Protect Your Network From Attack From A Network Security Threat Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your

More information

ITIL 2011 Lifecycle Roles and Responsibilities UXC Consulting

ITIL 2011 Lifecycle Roles and Responsibilities UXC Consulting ITIL 2011 Lifecycle Roles and Responsibilities UXC Consulting Date November 2011 Company UXC Consulting Version Version 1.5 Contact info@uxcconsulting.com.au http://www.uxcconsulting.com.au This summary

More information

Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 2.1, Issue Date: 05/02/201405/02/2014. Classification: Open

Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 2.1, Issue Date: 05/02/201405/02/2014. Classification: Open Protective Monitoring as a Service Version: 2.1, Issue Date: 05/02/201405/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 201416/12/2014. Other than for the sole purpose of evaluating

More information

G-Cloud Service Definition. Atos Rapid Pilot Mobile Application Development Service SCS

G-Cloud Service Definition. Atos Rapid Pilot Mobile Application Development Service SCS G-Cloud Service Definition Atos Rapid Pilot Mobile Application Development Service SCS Atos Rapid Pilot Mobile Applications Development Service SCS Designed to provide rapid development and deployment

More information

Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document

Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document Microsoft Services - GCloud 7 Catalogue Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document 1 Overview of the Service 1.1 Service Objectives The 2

More information

WHITE PAPER IT SERVICE MANAGEMENT IT SERVICE DESIGN 101

WHITE PAPER IT SERVICE MANAGEMENT IT SERVICE DESIGN 101 WHITE PAPER IT SERVICE MANAGEMENT IT SERVICE DESIGN 101 Prepared by: Phillip Bailey, Service Management Consultant Steve Ingall, Head of Service Management Consultancy 60 Lombard Street London EC3V 9EA

More information

End-User Remote Support and Helpdesk Services

End-User Remote Support and Helpdesk Services End-User Remote Support and Helpdesk Services A single contact point for support needs G-Cloud 5 Service Definition CONTENTS Overview of Service... 2 Contacting the Service Desk... 3 Management Reports...

More information

Threat analytics solution

Threat analytics solution Threat analytics solution Comprehensive protection against all cyber threats Why do so many companies still find themselves the victims of successful cyber attacks, in spite of all the layers of protection

More information

IPL Service Definition - Master Data Management for Cloud Related Services

IPL Service Definition - Master Data Management for Cloud Related Services IPL Proposal April 2014 IPL Service Definition - Master Data Management for Cloud Related Services Project: Date: 10 April 2014 Issue Number: Customer: Crown Commercial Service Page 1 of 11 IPL Information

More information

The rise of the hybrid network model

The rise of the hybrid network model The rise of the hybrid network model Hybrid networks offer the promise of greater flexibility and capacity, improved application performance and cheaper price points than traditional Wide Area Networks

More information