Router and Vetting G-Cloud Service Definition
|
|
- Laurence Green
- 8 years ago
- Views:
Transcription
1 Router and Vetting G-Cloud Service Definition 2013 General Dynamics Information Technology. All rights reserved
2 1 In partnership with Government and industry-leading technology partners, General Dynamics Information Technology (GDIT) has selected a next-generation, cloud-based Router and Vetting Service solution tailored to accommodate specific requirements of the Public Sector. The solution enables organisations to route and provide gateway and relay services for multiple disparate systems and domains. The solution keeps malicious content out of a customers environment, prevents theft or inadvertent loss of sensitive data, ensure regulatory data protection mandates by ensuring that Personal and Sensitive Personal Data are handled properly without end user interaction; and securely communicate and collaborate with customers, partners and suppliers. Service Includes Router/Gateway/Relay Service provides the capability to route traffic to, from, and amongst multiple disparate systems. The ability to manage multiple domains and addresses enforcing the use of address display name policies as defined by the organisation. Anti-virus/Anti-spam solution (ProofPoint Enterprise Protection) provides a comprehensive security threat classification and security management solution against phishing, virus, spam s, and other borne malware. Powerful sender reputation management service combines a global sender IP reputation with local sender IP reputation data, analysed by powerful machine learning algorithms to block connections from malicious IP addresses. The patented MLX Threat Classification Engine ensures s are classified based on the level of threat posed and are managed accordingly, whether it s valid , nuisance spam, or malicious, low-volume phishing attacks. security threat protection solution uses real-time message tracing and other security techniques to triage security threats - backed by expert technical support staff focused on supporting the customer s mission-critical communications. Enterprise data security solution, ProofPoint Enterprise Privacy, provides policy-based (as opposed to user-driven) encryption, to enable the enforcement of enterprise rules for consistent and transparent Data Loss Prevention (DLP) between senders and recipients. Customised DLP rules to accommodate the varying needs of any Government agency. Support for administrator-driven workflows and policies enable any identified s to contain sensitive content to be quarantined for investigation, passed through without action, or automatically encrypted and sent to the recipient. Real-time message tracing, dashboards, and audit capabilities provide the necessary tools to triage data loss incidents or warnings. For More information g-cloud@gdit.com +44 (0)
3 2 Features and Benefits Router Supports numerous addressing formats and domains enhancing the capability to support multiple enterprise environments simultaneously. relay and Transport Layer Security (TLS) encryption can be configured in a variety of ways to serve each organisation s specific needs. Security Performs contextual, lexical, and image-based analysis to examine messages content/context to detect and stop spam, phishing, and viruses from entering the customer s environment, effectively blocking the majority of inbound SMTP connections with a very low false positive rate. Data Loss Prevention, Encryption, and Policy Enforcement Enables encryption and decryption across desktops, laptops, and mobile devices with a seamless user experience that encourages usage and discourages circumvention of security controls. Messages can be released, encrypted, blocked, or quarantined depending on the organisation s policies. Privacy Workflow Incident Manager Provides tracking against each data loss incident. The solution removes complexity associated with key management, workflows, and data loss prevention over to a increase incident response team s focus and efficiency. Pricing The solution is priced at 1.84 per month per mailbox Pricing may vary subject to initial order volume and the buying organisation s required security and service levels. The above prices assume: GDIT s Government Community Cloud Security Impact Level 2 Service Availability of 99.9%. Pricing is subject to VAT General Dynamics is a 20 Billion/year, publicly listed corporation with almost 100,000 employees. We have been nominated by Forbes in their List of Best Managed Companies every year since the list s inception in General Dynamics is a leader in cloud computing, virtualisation, migration, and systems support for government agencies worldwide. We develop highly secure cloud solutions integrating industry leading technologies innovating, improving and delivering meaningful results.
4 3 Information Assurance GDIT s Router and Vetting Service solution is provided as an IL2 service to deliver the optimum balance of comprehensive security and cost-efficiency for a customer s specific needs. Reporting Customer reports/notifications include system capacity and performance reports, anti-spam and anti-virus reports, incident and SLA reports, outage/problem notifications, growth projections, and outage status reporting. Detailed reports are provided to allow compliance officers to quickly analyse details such as specific end users that frequently trigger policies, and the number of encrypted messages that have been sent and the type of content that triggered the encryption. Additional reporting requirements can be finalised and agreed either pre or post contract. On-boarding Process GDIT leverages a proven approach to ensure seamless transition. Our methodology ensures shared stakeholder understanding, increased business value, and low development risk. It consists of five phases, Kickoff, Assessment, Implementation, Pilot Migration, and Enterprise Migration. The phases encompass activities such as requirements identification, communications planning, risk identification, technical evaluation and planning, training, testing, and finally, production migration to the service. An ITIL change management process is established early on and followed throughout. Onboarding and migration to GDIT s Router and Vetting Services does not involve a data migration but implementations can range widely in complexity depending upon the level of rule customisation desired. Consequently, on-boarding times vary on an organisational basis depending on the complexity of the effort. Off-boarding Process GDIT understands the importance of a smooth and managed exit strategy. We cooperate with customers and incoming contractors to coordinate schedules to meet transition goals and mitigate service disruption. Knowledge and procedures are shared to ensure transition of on-going efforts in a logical fashion according to plans agreed between all parties, while maintaining continuity of operations during transition. GDIT provides a phased approach to accomplish transitions, considering service levels, virtualisation architecture, network integration/operation with the receiving infrastructure/site, and security concerns during site evacuation and transition.
5 4 Data Extraction The only data stored on the platforms would be messages contained in quarantine folders, however, GDIT will purge and destroy (as defined in security accreditation for different ILs) consumer data from any computers, storage devices and storage media that are to be retained after the end of the subscription period and the subsequent extraction of consumer data (if requested by the consumer). Service Management, Service Levels, and Customer Service The GDIT solution ensures greater than 99.9% service availability, as measured over a rolling 1-month (720-hour) period. GDIT s helpdesk and engineering staff support our system from client connectivity to the edge where the message enters/leaves the service. Supporting the solution is GDIT s customer service/help desk located at our, 24x7 call centre in the UK, which already handles more than 2 million annual customer enquiries for UK government agencies. The standard service provides for a Tier 3 help desk and technical support of the infrastructure to the Government administrators. Tier 1 and Tier 2 are typically handled by customers or their contractors. GDIT can support additional levels of support to the ordering agency. These services can be priced once additional requirements are known. The help desk and technical support is available 24x365 and will be accessible by phone and through electronic submission via . Action will be initiated based on severity level and Government administrators can elect to receive alerts directly if an event is detected. GDIT uses an industry-leading, best-of-breed service management toolset, which combines ITIL based process driven incident management, customer support, ticket assignment, service levels, escalation and notification. The toolset also includes mature change and problem management workflows which dovetail seamlessly into the security advice and help line management process. Training GDIT offers comprehensive training support for all of our system integration programmes. This helps ensure that users are able to gain the full potential of our products and services, with the minimum delay and disruption to normal business. GDIT can provide training for administrators prior to service initiation, and also for end-users, where applicable. The standard offering provides training material to users in the form of online brochures and FAQs. Webinars, forums, and classroom/instructor led training models can be tailored for any specific needs. One-on-one executive level training for desktop and mobile device access can be provided with follow-on support and incident response. Ordering and Invoice Process GDIT will require an authorised Call-Off Agreement or work order from the customer covering the full value of the services required. GDIT will invoice as agreed in the Call-Off Agreement, this may be based on volume consumed, the achievement of key deliverables, at regular intervals or stages in the service or upon completion of the service to be determined with the customer on a service by service basis. All invoices will be issued in electronic or paper format to the address designated by the customer. Payment of invoices must be made within 30 days of issue and by BACS.
6 Cottons Centre Cottons Lane London, SE1 2QG Tel. +44 (0)
Email as a Service - Microsoft Exchange G-Cloud Service Definition
Email as a Service - Microsoft Exchange G-Cloud Service Definition 2013 General Dynamics Information Technology. All rights reserved In partnership with Government, General Dynamics Information Technology
More informationDigital Forensics G-Cloud Service Definition
Digital Forensics G-Cloud Service Definition 2013 General Dynamics Information Technology Limited. All rights 1 GDIT Team Clients Metropolitan Police Service The General Dynamics Information Technology
More informationEuropean developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules
Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution
More informationLot 1 Service Specification MANAGED SECURITY SERVICES
Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services
More informationDeploying Layered Email Security. What is Layered Email Security?
Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review
More informationLog and Refer Service Desk IL0. September 2013
Log and Refer Service Desk IL0 September 2013 TABLE OF CONTENTS 1 Service Overview... 3 2 Why Capgemini?... 5 3 The Capgemini Proposition... 6 3.1 Approach... 7 4 Benefits... 9 4.1 Summary of Proposition...
More informationService Definition Document
Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)
More informationCisco Cloud Email Security Interoperability with Microsoft Office 365
White Paper Cisco Cloud Email Security Interoperability with Microsoft Office 365 We ve all been witness to the cloud evolution and the technologies that have been driven by moving operations and resources
More informationOpen Source Sales Force Automation (SFA) in the Cloud SaaS
Open Source Sales Force Automation (SFA) in the Cloud SaaS Service Overview Our open source Sales Force Automation (SFA) in the cloud service allows customers to perform marketing automation through multi
More informationK7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete
More informationCustomer Relationship Management Software Package G-Cloud Service Definition
Customer Relationship Management Software Package G-Cloud Service Definition 2014 General Dynamics Information Technology. All rights reserved 1 Delivering consistent multi-channel (telephony, e-mail,
More informationEMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST
EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST Enabling user efficiency with a cloud-based email platform With productivity, revenues and reputation at stake, an
More informationData Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control
Award-winning messaging security for inbound protection and outbound control Overview The delivers inbound and outbound messaging security for email and IM, with effective and accurate antispam and antivirus
More informationServices Description IBM Managed Security Services (Cloud Computing) - hosted e-mail and Web security - express managed e-mail security
IBM United Kingdom Limited Registered in England: 741598 Registered Office: PO Box 41, North Harbour, Portsmouth, PO6 3AU (hereinafter IBM ) Services Description IBM Managed Security Services (Cloud Computing)
More informationanomaly, thus reported to our central servers.
Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution
More informationPanda Cloud Email Protection
Panda Cloud Email Protection 1. Introduction a) What is spam? Spam is the term used to describe unsolicited messages or messages sent from unknown senders. They are usually sent in large (even massive)
More informationMailwall Remote Features Tour Datasheet
Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for
More informationTrend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading
More informationAlwaysMail. Sector 5. Cloud E-Mail
AlwaysMail Sector 5 Cloud E-Mail INDEX INDEX 2 SECTOR 5 COMPANY PROFILE 3 Background Company Name & Address 3 1. SECTOR 5 HOSTED E-MAIL OFFERING 4 2. MICROSOFT HOSTED EXCHANGE 5 3. HOW WE MIGRATE COMPANIES?
More informationBusiness Intelligence as a Service for the G-Cloud
Service Definition The name of the Service is: Business Intelligence as a Service An overview of Business Intelligence (BI) as a Service The BI service supports intelligent decisions by business users
More informationWHAT S NEW IN WEBSENSE TRITON RELEASE 7.8
WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8 Overview Global organizations are constantly battling with advanced persistent threats (APTs) and targeted attacks focused on extracting intellectual property
More informationG-Cloud Managed Exchange SaaS. Service Description
G-Cloud Managed Exchange SaaS Service Description G-Cloud Managed Exchange SaaS Service Description 2 INDEX TO SUNGARD MANAGED EXCHANGE SAAS SUNGARD CLOUD SERVICES... 3 Managed Exchange SaaS Overview...
More informationMXSweep Hosted Email Protection
ANTI SPAM SOLUTIONS TECHNOLOGY REPORT MXSweep Hosted Email Protection JANUARY 2007 www.westcoastlabs.org 2 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT CONTENTS MXSweep www.mxsweep.com Tel: +44 (0)870 389 2740
More informationSample Data Security Policies
This document provides three example data security policies that cover key areas of concern. They should not be considered an exhaustive list but rather each organization should identify any additional
More informationitg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.
Web Filtering Email Filtering Mail Archiving Cloud Backup Disaster Recovery Virtual Machines Private Cloud itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your
More informationSonicWALL Email Security Quick Start Guide. Version 4.6
SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more
More informationDIGITAL MARKETPLACE (G-CLOUD 7) OFFERING. Sopra Steria OneMobile SaaS Service. Introduction. Service Definition. Sopra Steria in the public sector
DIGITAL MARKETPLACE (G-CLOUD 7) OFFERING Sopra Steria OneMobile SaaS Service Sopra Steria in the public sector Organisations across the public sector choose Sopra Steria to deliver transformation programmes
More informationWebFOCUS Cloud Express. The WebFOCUS Cloud Express service is delivered as a managed G-Cloud service by Amtex Solutions Ltd.
Service Definition The name of the Service is: WebFOCUS Cloud Express An overview of WebFOCUS Cloud Express The WebFOCUS Cloud Express service is delivered as a managed G-Cloud service by Amtex Solutions
More informationService Description Email Filtering
Service Description Email Filtering Table of Contents Overview iomart Email Filtering... 3 iomart Email Filtering Features... 3 Technical Features... 3 Anti-Spam... 3 Cost Reduction... 4 Anti-Virus...
More informationGlobal Support Services
Global Support Services Supporting your investment in Sophos Technical Support has the highest priority within Sophos. Our comprehensive support service delivers the full range of benefits you would expect
More informationWATCHGUARD IRONPORT KEY SALES PITCH TRUTH BEHIND THE PITCH
KEY SALES PITCH First and only true unified security provider for protection bidirectional threats and data loss prevention across email and web in a single solution. XCS leverages ReputationAuthority
More informationV1.4. Spambrella Email Continuity SaaS. August 2
V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable
More informationArchiving Technical Overview. A Technical Overview Paper Describing Key Functions And Capabilities Of The Managed Archiving Service
A Technical Overview Paper Describing Key Functions And Capabilities Of The Managed Archiving Service Contents Introduction....................................................................................
More informationData Warehousing, Systems Integration and Data Migrations (Lot 3)
Data Warehousing, Systems Integration and Data Migrations (Lot 3) CONTENTS 1. WHY LEICESTERSHIRE HEALTH INFORMATICS SERVICE?... 2 2. SERVICE OVERVIEW... 3 3. SERVICE FEATURES... 4 4. ON-BOARDING AND SERVICE
More informationSelecting Your Essential Cloud Services
DATASHEET Selecting Your Essential Cloud Services Mimecast s flexible and scalable suite of essential cloud services for Microsoft Exchange removes the risks and complexities of business email management
More informationIBM Data Security Services for endpoint data protection endpoint data loss prevention solution
Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Facilitate policy-based expertise and
More informationStop Spam. Save Time.
Stop Spam. Save Time. A Trend Micro White Paper I January 2015 Stop Spam. Save Time. Hosted Email Security: How It Works» A Trend Micro White Paper January 2015 TABLE OF CONTENTS Introduction 3 Solution
More informationAVG AntiVirus. How does this benefit you?
AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to
More informationQuick Heal Exchange Protection 4.0
Quick Heal Exchange Protection 4.0 Customizable Spam Filter. Uninterrupted Antivirus Security. Product Highlights Built-in defense keeps your business communications and sensitive information secure from
More informationIBM G-Cloud Microsoft Windows Active Directory as a Service
IBM G-Cloud Microsoft Windows Active Directory as a Service Service Definition IBM G-Cloud Windows AD as a Service 1 1. Summary 1.1 Service Description This offering is provided by IBM Global Business
More informationTop Ten Technology Risks Facing Colleges and Universities
Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services cwatson@schneiderdowns.com April 23, 2012 Overview Technology
More informationUbertas Cloud Services: Service Definition
Ubertas Cloud Services: Service Definition February 2013 Innovation. Power. Trust. Contents 1. About Ubertas... 2 Our Company... 2 Our Approach to Service Delivery... 2 Our Partner Network & the UK Cloud
More informationService Schedule for Business Email Lite powered by Microsoft Office 365
Service Schedule for Business Email Lite powered by Microsoft Office 365 1. SERVICE DESCRIPTION Service Overview 1.1 The Service is a hosted messaging service that delivers the capabilities of Microsoft
More informationWhat security and compliance challenges exist with the move to Microsoft Office 365?
PROOFPOINT FOR OFFICE 365: ENABLES ADVANCED SECURITY AND COMPLIANCE FOR YOUR ENTERPRISE UNDERSTAND THE SOLUTION BY ROLE: IT & SECURITY What security and compliance challenges exist with the move to Microsoft
More informationG Cloud 6. Service Definition: Platform as a Service (PaaS)
G Cloud 6 Service Definition: Platform as a Service (PaaS) Introduction to Centerprise International Limited Centerprise International Limited was established in 1983 as an engineering and manufacturing
More informationService Schedule for BT Business Lite Web Hosting and Business Email Lite powered by Microsoft Office 365
1. SERVICE DESCRIPTION 1.1 The Service enables the Customer to: set up a web site(s); create a sub-domain name associated with the web site; create email addresses. 1.2 The email element of the Service
More informationWhitelist Management
Whitelist Management Overview The ExchangeDefender Admin Site is a powerful tool that gives you access to all of the benefits ExchangeDefender has to offer, from the safety and convenience of your web
More informationEmail Migration Project Plan for Cisco Cloud Email Security
Sales Tool Email Migration Project Plan for Cisco Cloud Email Security 2014 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Conf idential. For Channel Partner use only. Not f
More informationG-CLOUD FRAMEWORK RM1557-vi 5DRIVE PERSONAL CLOUD BACKUP
Commercial in Confidence 1 G-CLOUD FRAMEWORK RM1557-vi SERVICE DEFINITION 5DRIVE PERSONAL CLOUD BACKUP 5NINES 5NINES Data Centres Services Service Offered 5DRIVE - CLOUD BACKUP SERVICE with remote access
More informationMod 08: Exchange Online FOPE
Office 365 for SMB Jump Start Mod 08: Exchange Online FOPE Chris Oakman Managing Partner Infrastructure Team Eastridge Technology Stephen Hall Owner & IT Consultant District Computers 1 Jump Start Schedule
More informationemail management solutions
Safeguard business continuity and productivity with Mimecast email management solutions Computacenter and Mimecast in partnership Expert software solutions Computacenter and Mimecast help organisations
More informationIPL Service Definition - Data Quality
IPL Proposal V1 April 2014 Project: Date: 10 April 2014 Issue Number: V1 Customer: Crown Commercial Service Page 1 of 11 IPL Information Processing Limited 2014 Contents 1. Service - Data Quality 3 1.1.
More informationRemote Access Service (RAS)
Remote Access Service (RAS) Contents 1 Introduction to Remote Access Service...2 2 Service Definition...3 2.1 Functionality & Features... 3 2.2 Access Methods... 3 3 Differentiators...4 4 Commercials...5
More informationDocumentum Document Management in the Cloud Service Definition
Documentum Document Management in the Cloud Service Definition Service Overview Working together with its Cloud Services Partner, Skyscape, SynApps Solutions (SynApps) has developed its Documentum Document
More informationVODAFONE G-CLOUD SMS-SERVICE
VODAFONE G-CLOUD SMS-SERVICE Version Content Owner Date 1.1 Robert Hotchkiss 27 August 2013 Page 1 of 13 TABLE OF CONTENTS 1. The G-Cloud SMS-Service... 3 1.1 Overview of the G-Cloud SMS-Service... 3 1.2
More informationFeatures and benefits guide for partners and their customers
and benefits guide for partners and their customers Version 3.0 and Guide for Partners and their customers Security Anti Virus Proofpoint s own threat detection technology enables our email Anti-Virus
More informationSecuring enterprise collaboration through email and file sharing on a unified platform
Axway MailGate SC Securing enterprise collaboration through email and file sharing on a unified platform Email is the primary collaboration tool employees use to share information and send large files.
More informationTop 10 Features: Clearswift SECURE Email Gateway
Top 10 Features: Clearswift SECURE Email Gateway Top 10 Features: Clearswift SECURE Email Gateway Modern business simply couldn t function without email. However, both incoming and outgoing messages can
More informationSecuring enterprise collaboration through email and file sharing on a unified platform
Axway MailGate SC Securing enterprise collaboration through email and file sharing on a unified platform Email is the primary collaboration tool employees use to share information and send large files.
More informationMail Hosting Services Terms and Conditions
MAIL HOSTING SERVICES TERMS AND CONDITIONS In addition to the General, your use of the Mail Services is subject to the following additional terms and conditions: 1. ADDITIONAL DEFINED TERMS Some words
More informationSmall Business Protection Guide. Don t Leave Your Business at Risk Protect it Completely
Small Business Protection Guide Don t Leave Your Business at Risk Protect it Completely Changing risks, rising costs Information is fundamental to your business: You and your employees constantly exchange,
More informationVodafone Private Cloud
Vodafone Private Cloud Overview Vodafone Private Cloud is our dedicated public sector cloud service that connects you to your own private IL2/IL3 network and / or core government networks, including the
More informationPlatform as a Service
Platform as a Service Service Definition Version: 1.0 Version date: October 2015 Classification: Public Backup-as-a-Service Systems Monitoring DR-as-a-Service Storage-as-a-Service Hosted Exchange Colocation
More informationMimecast Unified Email Management
DATA SHEET Mimecast Unified Email Management An always-on, cloud-based email security solution that reduces the complexity of protecting your organization from malware, spam and data leakage. Mimecast
More informationMimecast Email Security
DATA SHEET Mimecast Email Security A fully integrated email security, continuity and archiving cloud based solution that delivers total end-to-end control of your email, mitigating email risks and reducing
More informationSelecting Your Essential Cloud Services
DATASHEET Selecting Your Essential Cloud Services Mimecast s flexible and scalable suite of essential cloud services for Microsoft Exchange removes the risks and complexities of business email management
More informationIronPort C10 for Small and Medium Businesses
I r o n P o r t A p p l i a n c e s S I M P L E I N S TA L L AT I O N, E A S Y M A N A G E M E N T, A N D P O W E R F U L P R O T E C T I O N F O R Y O U R E M A I L I N F R A S T R U C T U R E. IronPort
More informationRTS Communications G-Cloud Service Definition Video Conferencing as a Service (VAAS)
RTS Communications G-Cloud Service Definition Video Conferencing as a Service (VAAS) Video Conferencing Endpoint Services September 2013 RTS G-Cloud Service Definition Page 1 CONTENTS 1. Executive Summary
More informationAudit Management. service definition document
Audit Management service definition document Contents Introduction... 3 Service Description... 3 Features and Benefits... 4 Architecture... 5 Service Delivery... 6 Service Provisioning Time... 7 Service
More informationdxw s WordPress Platform
dxw s WordPress Platform G-Cloud lot 2 (PaaS) service definition Version 2 4th July 2012 Page 1 of 12 Overview dxw s WordPress Platform is a highly managed Platform as a Service for hosting WordPress websites.
More informationSecurity Consultants / Security Managed Services
Security Consultants / Security Managed Services Service Definition Document for G-Cloudv7 Services October 2015 Table of Contents Service Overview...3 Our Approach... 3 Features... 3 Benefits... 4 ON-BOARDING
More informationG-Cloud Service Definition. Canopy Remote Backup for Cloud SaaS
G-Cloud Service Definition Canopy Remote Backup for Cloud SaaS Canopy Remote Backup for Cloud SaaS Canopy, an Atos company provides a highly secure, cloud backup and file management service for Internet-connected
More informationDOBUS And SBL Cloud Services Brochure
01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure enquiries@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted
More informationExchange 2010 migration guide
HOW-TO GUIDE Exchange 2010 migration guide This guide details the best practices to follow when migrating from Microsoft Exchange 2003 to Microsoft Exchange 2010. The guidelines provided explain how to
More informationare some of the key drivers behind mandates from executives to move IT infrastructure from on-premises to the cloud.
W H I T E PA P E R Public Network External Application MTA Moving to the Cloud Important Things to Consider Before Migrating Your Messaging Infrastructure to the Cloud Fallback MTA External Corporate MTAs
More informationTechnology Blueprint. Protect Your Email. Get strong security despite increasing email volumes, threats, and green requirements
Technology Blueprint Protect Your Email Get strong security despite increasing email volumes, threats, and green requirements LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
More informationUnleash the Full Value of Identity Data with an Identity-Aware Business Service Management Approach
Unleash the Full Value of Identity Data with an Identity-Aware Business Service Approach best practices WHITE PAPER Table of Contents Executive Summary...1 The Evolution of Identity...2 > From User Account...2
More informationOffice 365 Exchange Online Protection Administration Guide
Chapter 10 Office 365 Exchange Online Protection Administration Guide Office 365 version 2013 is a suite of software products: Software as a Service (SaaS). Customers can purchase Office 365 in many ways,
More informationConfiguration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
More informationOverview An Evolution. Improving Trust, Confidence & Safety working together to fight the e-mail beast. Microsoft's online safety strategy
Overview An Evolution Improving Trust, Confidence & Safety working together to fight the e-mail beast Holistic strategy Prescriptive guidance and user education, collaboration & technology Evolution of
More informationRTS Communications G-Cloud Service Definition Video Conferencing as a Service (VAAS)
RTS Communications G-Cloud Service Definition Video Conferencing as a Service (VAAS) Video Conferencing Single Screen Service September 2013 RTS G-Cloud Service Definition Page 1 CONTENTS 1. Executive
More informationSymantec Messaging Gateway 10.5
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
More informationService Desk Triage for Cloud Support (Lot 4) Service: 5.G5.1414.001
Service Desk Triage for Cloud Support (Lot 4) Service: 5.G5.1414.001 CONTENTS 1. WHY LEICESTERSHIRE HEALTH INFORMATICS SERVICE?... 3 2. SERVICE OVERVIEW... 3 3. ON-BOARDING... 8 4. OFF-BOARDING SERVICES/TERMINATION...
More informationHow To Help Your Business Succeed
G Cloud III Framework Lot 4 (SCS) CHECK Accredited Penetration Testing Services Contents Executive Summary 3 CHECK Accredited Penetration Testing Services 4 Why Deloitte? 5 Package Cost 7 Contact 9 Service
More informationCloud Enablement. Lot 4 - Specialist Cloud Services. Version: 3.0, Issue Date: 05/02/2014. Classification: Open
Cloud Enablement Version: 3.0, Issue Date: 05/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 201415/12/2014. Other than for the sole purpose of evaluating this Response, no part
More informationData Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex
More informationCisco Email Security Appliances
Data Sheet Cisco Email Security Appliances Product Overview Over the past 20 years, email has evolved from a tool used primarily by technical and research professionals to become the backbone of corporate
More informationCyber Security Solutions
Cyber Security Solutions Defending the Enterprise General Dynamics Information Technology defends mission-critical systems including government, health, finance, defence, large-enterprise and national
More informationDIGITAL MARKETPLACE (G CLOUD 7) OFFERING. Sopra Steria Integration Platform Support as a Service. Service Overview. Sopra Steria in the public sector
DIGITAL MARKETPLACE (G CLOUD 7) OFFERING Sopra Steria Integration Platform Support as a Service Sopra Steria in the public sector Organisations across the public sector choose Sopra Steria to deliver transformation
More informationService description RFL Virtual Data Centre
Service description RFL Virtual Data Centre IaaS G-Cloud 6 1 Contents Overview... 3 Highlights... 3 Description... 3 Use cases... 3 Use cases... 5 Use cases... 5 Pricing... 5 Information assurance... 5
More informationVIGILANCE INTERCEPTION PROTECTION
MINIMIZE CYBERTHREATS VIGILANCE INTERCEPTION PROTECTION CYBERSECURITY CDW FINANCIAL SERVICES 80 million identities were exposed by breaches in financial services in 2014. 1 1 symantec.com, Internet Security
More informationKentucky IT Infrastructure Library (ITIL) Program
2006 NASCIO Recognition Awards Nomination Category: Enterprise IT Management Initiatives Kentucky IT Infrastructure Library (ITIL) Program Commonwealth Office of Technology. KentuckyUnbridledSpirit.com
More informationTrend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How Hosted Email Security Inbound Filtering Adds Value to Your Existing Environment A Trend Micro White Paper l March 2010 1 Table of Contents Introduction...3
More informationRTS Communications G-Cloud Service Definition Video Conferencing as a Service (VAAS)
RTS Communications G-Cloud Service Definition Video Conferencing as a Service (VAAS) Video Conferencing VMR Service Virtual Meeting Rooms December 2014 RTS G-Cloud 6 Service Definition Page 1 CONTENTS
More informationDOBUS And SBL Cloud Services Brochure
01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure cloud@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted managed
More informationSERVICE DEFINITION DOCUMENT MANAGEMENT IN THE CLOUD
Commercial in Confidence 1 G-CLOUD III FRAMEWORK SERVICE DEFINITION DOCUMENT MANAGEMENT IN THE CLOUD Capita Division / Supplier: Capita Business Services Ltd powered by SkyScape Service Name: Document
More informationCloud-based Infrastructure and Application Support Service Definition
+44 (0) 20 3603 7830 hello@equalexperts.com www.equalexperts.com 30 Brock Street London, NW1 3FG Cloud-based Infrastructure and Application Support Service Definition Overview We provide 24/7 support to
More informationWebsense Messaging Security Solutions. Websense Email Security Websense Hosted Email Security Websense Hybrid Email Security
Websense Email Security Websense Hosted Email Security Websense Hybrid Email Security Websense Messaging Security Solutions The Websense Approach to Messaging Security Websense enables organizations to
More informationA Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards
A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security
More informationRetention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
More information