SBL Integration, Capabilities, and Enablement in Defence
|
|
|
- May Skinner
- 10 years ago
- Views:
Transcription
1 SBL Integration, Capabilities, and Enablement in Defence
2 Contents Page 3 SBL Company Overview 4 SBL in Justice 5 SBL Apple Authorised Reseller 5 SBL Apple Authorised Reseller Events 6 SBL, Apple Authorised Reseller in Justice 7 SBL Package Capabilities for Justice Diagram
3 SBL Company Overview Expertise in IT Solutions since 1987 SBL is a vendor independent, enterprise level specialist in the supply of hardware, software solutions and professional services including training and consultancy. Recognised as a market leader in Information Assurance (IA), SBL plays a key role in supporting government through IA initiatives and services. Vendor independence and our commitment to the highest levels of customer service have ensured SBL s continued success since Our vendor independence policy is designed to ensure that our customers get the product or service that best suits their needs, regardless of other considerations. Operation of this policy enables us to offer positive advice and make recommendations with confidence that they are informed by a thorough analysis of the customer s requirements and a comprehensive knowledge of the marketplace. Public Sector SBL has over 25 years experience in delivering value, expertise and excellence of service to the UK Public Sector. Dedicated teams look after Local Government, Health Services, Ministry of Defence and Central Government & Criminal Justice customers. SBL Scotland, provides a dedicated resource for our customers in Scotland and our Education division OLC (On Line Computers) provides a complete range of ICT services to the Education sector. Over the course of our 25 years serving the UK Public Sector SBL has developed and invested in sophisticated and mature business processes which have been purpose-built to accommodate the pattern of Public Sector procurement. SBL holds places on major Public Sector frameworks including GPS, G-Cloud and the DE&S framework. SBL provide dedicated support services to the DII (Defence Information Infrastructure) for some of the largest Software Enterprise Agreements in Europe. These services include an online managed system which enables the secure download of software updates, service packs, patches and fixes.
4 SBL in Justice Overview SBL s Justice Team has been a trusted advisor and significant Vendor Independent Supplier to the Police for over 13 years for security solutions, COTS, hardware and consultancy. SBL are also the leading security advisor & supplier to the Police for restricted and top secret projects. SBL have historically been a leading supplier for the ACPO Framework and currently sits on the following framework and purchasing routes: CITHS DE&S G-Cloud ProcServe Recent News Recent Projects & Hot Topics Include: Confidential Network Technology Supply MDM Sandbox App Centre IPS & Advanced Malware Protection VPN & Laptop Encryption IL3-6 Surveillance Solutions IL4 DOBUS Patch Delivery Managed Service IL3-IL4 Document Scanning Projects Regional Force Vendor Consolidation Services Desktop Virtualisation Server, SAN & Virtualisation Projects Digital Certificates & PKI Master Data Management Open Source Solutions CESG Desktop Encryption and Gateway Encryption Security
5 SBL Apple Authorised Reseller SBL is an Apple Authorised Reseller with expertise in ipad and the Classic Mac products (imac and the Apple Notebook offering). SBL has been able to work with our partners and Apple to ensure a service for our customers that enables the secure use and deployment of ipad and Apple products. SBL offers a range of proprietary software, services and training to assist users to integrate Apple products into their enterprise as well as associated peripherals and accessories. SBL Apple Authorised Reseller Training & Events Since becoming an Apple Authorised Reseller SBL have held ipad events that aim to ensure delegates gain a greater understanding of how to secure and integrate ipad in to a secure network. Events held at Apple headquarters, have taken place for our NHS and Defence customers since 2012 and included presentations from SBL s own Public Sector Business Development Director, Colin Williams, relevant partners who have aided facilitation of Apple products as well as Apple and CESG presentations. SBL have a dedicated Events Management Team, who organise specific IT Security Events comprising exhibition and seminar programs for customers. The Events Team, alongside SBL s dedicated Apple Authorised Reseller Team are utilised to ensure all ipad Events include the latest and most relevant information available to the relevant Sector. SBL working with Apple can offer a range of training that can aid the use and integration of Apple products within your network, as simple and easy to use as most Apple products are, the importance of ensuring the right software and user s capabilities is key to really creating an effective and efficient deployment. SBL also offers various Security and Software training, specialising in Information Assurance and Quality Standards training which is delivered either at our training facility in York, or on a customer s site. Consultants will design and deliver tailored courses to suit the needs of your organisation.
6 SBL Apple Authorised Reseller in Justice As an Apple Authorised Reseller SBL has the capability to enable the use and deployment of ipad and other Apple products in to a secure network, whilst enabling the security of these products to varying levels dependant on your requirement. SBL also offers a range of proprietary software, services and training to assist users to integrate Apple products into their enterprise as well as associated peripherals and accessories. Services: Support Experienced & Expert Team Partners and Solution Providers Bespoke Packages High level Deployment Relevant Defence Frameworks Accessories: Ruggedized Cases & Covers Cables, Keyboards and Power Packs Associated peripherals and accessories Mobile Device Management Best of Breed Solutions Enablement, Enhancement & Expertise Access Control and Identity Management Solutions Data Loss Prevention (DLP) VPN Technologies Encryption & Security Solutions In-House Etching Facility Defence Specific Industry Advice & Support Cyber Security and Information Security Training & Events Training & Consultancy Apple Training Security Training Cyber Training Security Consultancy Training Security UK Safe Harbour Secure Applications Centre Secure Network updates Guidelines & Mandate (GPG13) DOBUS DOBUS To Go
7 SBL in Justice Capabilities Assessment Consideration Expert Advice Secure Enable Support Educate SBL ensure the buying process is as easy and understandable as possible; being available to support customers through each step is integral to ensuring the right solution is implemented. What works for one customer may not for the next, therefore SBL understands the importance of assessment and evaluation, the importance of education and enablement and of course the ability to deploy and facilitate solutions in to a Justice network. Deploy Facilitate For more information about SBL Justice capabilities and how SBL can enable your deployment please contact your Justice Account Manager Decision Evaluation Evaluate Analyse [email protected] Tel: Web:
8 East Moor House, Green Park Business Centre, Goose Lane, Sutton-on-the-Forest, York, North Yorkshire, YO61 1ET
Secure Mobile Solutions
Secure Mobile Solutions Manage workloads securely on the move [email protected] 01347 812100 www.softbox.co.uk Contents Secure Mobile Solutions Key Features and Benefits Integration and Management
DOBUS And SBL Cloud Services Brochure
01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure [email protected] DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted
DOBUS And SBL Cloud Services Brochure
01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure [email protected] DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted managed
Clear Innovation Sectors & Divisions
Clear Innovation Sectors & Divisions An Introduction to Centerprise International Centerprise International Ltd, Hampshire International Business Park, Lime Tree Way, Basingstoke, Hampshire, RG24 8GQ 01256
Service Definition MMaaS Mobile Device Management. G- Cloud VII. Service Definition Nine23 MMaaS Mobile Device Management
Service Definition MMaaS Mobile Device Management G- Cloud VII 1 Table of Contents 1 SERVICE MMAAS MOBILE DEVICE MANAGEMENT... 3 1.1 OVERVIEW NINE23... 3 1.2 SERVICE SUMMARY MMAAS MOBILE DEVICE MANAGEMENT...
HNOLOGY IN POLICING SECURITY & CYBERSPACE SITUATION
S e c u r i t y & D e f e n c e Bringing The Digital Edge To Your Operations ITY & CYBERSPACE SITUATIONAL AWARENESS CRITICAL COM S CRITICAL COMMUNICATIONS TECHNOLOGY IN POLICING SE ITUATIONAL AWARENESS
Thales Service Definition for PSN Secure Email Gateway Service for Cloud Services
Thales Definition for PSN Secure Email Gateway Thales Definition for PSN Secure Email Gateway for Cloud s April 2014 Page 1 of 12 Thales Definition for PSN Secure Email Gateway CONTENT Page No. Introduction...
Mobile Device Management. Simplified centralised Mobile Device Management solutions for the UK education sector.
Mobile Device Management. Simplified centralised Mobile Device Management solutions for the UK education sector. Mobile Device Management. The use of mobile technology in the classroom has increased exponentially
Embrace the G-Cloud. Ultra Secure Colocation Services for the Public Sector. thebunker.net Phone: 01304 814800 Fax: 01304 814899 info@thebunker.
Embrace the G-Cloud Ultra Secure Colocation Services for the Public Sector 1 Phone: 01304 814800 Fax: 01304 814899 info@ Contents Introduction What is G-Cloud? Types of accreditation: Business Impact Levels
FRAMEWORK BRIEF. Information Communication Technology (ICT) Solutions
FRAMEWORK BRIEF Information Communication Technology (ICT) Solutions FRAMEWORK OVERVIEW The HealthTrust Europe (HTE) Information Communication Technology (ICT) Solutions framework for the provision of
TECHNICAL VULNERABILITY & PATCH MANAGEMENT
INFORMATION SECURITY POLICY TECHNICAL VULNERABILITY & PATCH MANAGEMENT ISO 27002 12.6.1 Author: Owner: Organisation: Document No: Chris Stone Ruskwig TruePersona Ltd SP-12.6.1 Version No: 1.1 Date: 1 st
Secure Systems & Technologies Ltd. Capabilities Overview
Secure Systems & Technologies Ltd. Capabilities Overview SST TM Credentials Secure Systems & Technologies Ltd. (SST TM ) designs and manufactures TEMPEST (NATO SDIP-27), EMC-rated, rugged, encryption,
Accessing and sending data securely across security domains
In this White Paper Connectivity is good. Secure connectivity is essential. This white paper by Thales UK explains how Thales Gateway Services protect the exchange of data across security domains. It discusses
Corporate Overview NEC Australia
Corporate Overview NEC Australia NEC Australia au.nec.com Company facts Strong history in Australia - Forty six years local expertise combined with global reach as part of NEC Corporation, a global leader
ICT and Information Security Resources
Methods GCloud Service Definition ICT and Information Security Resources HEAD OFFICE: 125 Shaftesbury Avenue, London WC2H 8AD Scottish Office: Exchange Place 2, 5 Semple Street, Edinburgh, EH3 8BL t: +44
IT Heath Check Scoping guidance ALPHA DRAFT
IT Heath Check Scoping guidance ALPHA DRAFT Version 0.1 November 2014 Document Information Project Name: ITHC Guidance Prepared By: Mark Brett CLAS Consultant Document Version No: 0.1 Title: ITHC Guidance
Secure by design: taking a strategic approach to cybersecurity
Secure by design: taking a strategic approach to cybersecurity The cybersecurity market is overly focused on auditing policy compliance and performing vulnerability testing when the level of business risk
G-CLOUD FRAMEWORK RM1557-vi 5DRIVE PROFESSIONAL STORAGE (PRO)
Commercial in Confidence 1 G-CLOUD FRAMEWORK RM1557-vi SERVICE DEFINITION 5DRIVE PROFESSIONAL STORAGE (PRO) 5NINES 5NINES Data Centre Services Service Offered 5DRIVE PERSONAL CLOUD STORAGE with remote
Best value security report
Best value security report Getting the balance right between cost and quality Do more with less IT security for Local Government and the Emergency Services Thank you for downloading the best value security
We are XMA in Education.
We are XMA in Education. Call 0115 846 4900 Visit www.xma.co.uk/alllearn Email [email protected] Follow us @WeareXMA We are XMA. We are XMA in Education We deliver innovative IT solutions that enhance
INFRASTRUCTURE ARCHITECTURE BLUEPRINT
INFRASTRUCTURE ARCHITECTURE BLUEPRINT MESYUARAT PENGURUS-PENGURUS ICT SEKTOR AWAM BIL.3 TAHUN 2010 26 Oktober 2010 BERSAMA MELAKSANA TRANSFORMASI Table of Content Introduction Current Environment Overview
Data Access Request Service
Data Access Request Service Guidance Notes on Security Version: 4.0 Date: 01/04/2015 1 Copyright 2014, Health and Social Care Information Centre. Introduction This security guidance is for organisations
Managed IT Services. Maintain, manage and report
Managed IT Services Maintain, manage and report 1 2 Comunet was established in 1995 to provide professional Information Technology services to Australian businesses and organisations. Its vision now, as
UK Government IA Recent Changes and Update
UK Government IA Recent Changes and Update INTRODUCTION Agenda Part 1 Government IA and Cyber Security Background Quick Threat Update UK Government Cyber Security Initiative Government Asset Control in
I.T. Security Specialists. Cyber Security Solutions and Services. Caretower Corporate Brochure 2015 1
I.T. Security Specialists Cyber Security Solutions and Services Caretower Corporate Brochure 2015 1 about us As an independent IT security specialist, with over 17 years experience, we provide tailored
Assurance in the Cloud: Outsourcing Risk in a Shifting Landscape
by SCC We make IT work Assurance in the Cloud: Outsourcing Risk in a Shifting Landscape 02 CONTENTS You hold sensitive public sector data Sentinel protects it. Sentinel by SCC not only provides faster
Digital Forensics G-Cloud Service Definition
Digital Forensics G-Cloud Service Definition 2013 General Dynamics Information Technology Limited. All rights 1 GDIT Team Clients Metropolitan Police Service The General Dynamics Information Technology
UK Government ICT Storyboard July 2010
UK Government ICT Storyboard July 2010 1 SOME BASICS: ICT across the Public Sector has key challenges that have arisen through the silo d and individual development of ICT Today s Challenge ICT costs and
IT Security Testing Services
Context Information Security T +44 (0)207 537 7515 W www.contextis.com E [email protected] IT Security Testing Services Context Information Security Contents 1 Introduction to Context Information
HEALTHCARE SOLUTIONS
HEALTHCARE SOLUTIONS Healthcare solutions HEALTHCARE COMMUNICATIONS THE CHALLENGES The organisation is asking for improved communications, but resources and budget will not extend to a huge IP communications
Meeting the challenge
Meeting the challenge Working with you to ensure your IT infrastructure delivers Infrastructure Management Services Overview Real solutions to tough challenges Infrastructure Management Services Overview
Ubertas Cloud Services: Service Definition
Ubertas Cloud Services: Service Definition February 2013 Innovation. Power. Trust. Contents 1. About Ubertas... 2 Our Company... 2 Our Approach to Service Delivery... 2 Our Partner Network & the UK Cloud
TECHNICAL & ENGINEERING INSURANCE ACE TECHNICAL LINES
TECHNICAL & ENGINEERING INSURANCE ACE TECHNICAL LINES Companies today are looking for an insurer who can cater for their whole range of technical or engineering insurance requirements, from machinery breakdown,
e2e Secure Cloud Connect Service - Service Definition Document
e2e Secure Cloud Connect Service - Service Definition Document Overview A cloud connectivity service that connects users, devices, offices and clouds together over the Internet. Organisations can choose
Security and Services
Written by Maxine Holt, May 2005 TA000824SAS Technology Infrastructure Butler Group Subscription Services Security and Services TECHNOLOGY AUDIT Symantec Corporation Managed Security Service (MSS) Abstract
Cyber Essentials Scheme
Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these
D-G4-L4-253 Data Loss Prevention Risk Assessment Deloitte LLP Service for G-Cloud IV
D-G4-L4-253 Data Loss Prevention Risk Assessment Deloitte LLP Service for G-Cloud IV September 2013 Contents 1 Service Overview 1 2 Detailed Service Description 3 3 Commercials 6 4 Our G-Cloud Services
REDCENTRIC HEALTHCARE SOLUTIONS
REDCENTRIC HEALTHCARE SOLUTIONS REDCENTRIC AT A GLANCE Redcentric is an accredited N3 service provider with over a decades experience of delivering NHS network services. DEDICATED N3 INFORMATION GOVERNANCE
Qualification Specification. Level 4 Certificate in Cyber Security and Intrusion For Business
Qualification Specification Level 4 Certificate in Cyber Security and Intrusion For Business ProQual 2015 Contents Page Introduction 3 Qualification profile 3 Centre requirements 4 Support for candidates
Service Definition Nine23 MDM
Service Definition Nine23 MDM G-Cloud iv Contents 1 Service Nine23 Mobile Device Management System.....4 1.1 Overview Nine23 MDM...... 4 1.2 Open Standards. 5 1.3 User requirements.....5 1.3.1 Client Browser....5
BlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
G-Cloud Service Definition. Atos Security Professional Services SCS
G-Cloud Service Definition Atos Security Professional Services SCS Atos Security Professional Services SCS Security Professional Services delivered by experienced certified professionals empowered by market
CYBER SECURITY Audit, Test & Compliance
www.thalescyberassurance.com CYBER SECURITY Audit, Test & Compliance 02 The Threat 03 About Thales 03 Our Approach 04 Cyber Consulting 05 Vulnerability Assessment 06 Penetration Testing 07 Holistic Audit
secure For the ultimate in Cyber Defence TRL Technology
//Government secure Grade Network Security For the ultimate in Cyber Defence // CATAPAN Government Grade Network Security L-3 TRL has over a decade of experience in developing and supporting sophisticated
Central Technology. Seamless IT & Communication Solutions
Central Technology Seamless IT & Communication Solutions Our client base is built on reputation for service and quick response times WELCOME Our Business Services It support Cloud Solutions Unified Communications
Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services
Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services Page 1 1 Contents 1 Contents... 2 2 Transcend360 Introduction... 3 3 Service overview... 4 3.1 Service introduction... 4
Cloud Computing. What does it really mean for your business?
Cloud Computing What does it really mean for your business? Technology transforming business The IDC survey, conducted with 696 IT executives and CIOs said that 41 percent are either evaluating cloud solutions
ICT Manager Support. Complementing the skillset of your schools internal ICT function.
ICT Manager Support. Complementing the skillset of your schools internal ICT function. Introducing ICT Manager Support. Our ICT continues to work in partnership with a growing number of schools that require
PROGRAMME OVERVIEW: G-CLOUD APPLICATIONS STORE FOR GOVERNMENT DATA CENTRE CONSOLIDATION
PROGRAMME OVERVIEW: G-CLOUD APPLICATIONS STORE FOR GOVERNMENT DATA CENTRE CONSOLIDATION 1. Introduction This document has been written for all those interested in the future approach for delivering ICT
School Admin Network Support. Specialist telephone, remote and scheduled onsite support for the school admin network.
School Admin Network Support. Specialist telephone, remote and scheduled onsite support for the school admin network. Introducing school admin network support. In addition to our scheduled onsite technical
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware
How to Execute Your Next Generation of Mobile Initiatives Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware Company Facts 12000 1,800 employees 150 countries 17 languages 11 global
Secondary School 1/04/2015. ICT Service Specification by: Andrea Warburton ONE IT SERVICES AND SOLUTIONS
1/04/2015 Secondary School ICT Service Specification by: 1 Andrea Warburton ONE IT SERVICES AND SOLUTIONS SERVICE SPECIFICATION One IT Services and Solutions offer a one stop shop ICT support service,
What are the benefits of Cloud Computing for Small Business?
Cloud Computing A Small Business Guide. Whilst more and more small businesses are adopting Cloud Computing services, it is fair to say that most small businesses are still unsure of what Cloud Computing
How To Protect Your Data From Being Hacked
Data Security and the Cloud TABLE OF CONTENTS DATA SECURITY AND THE CLOUD EXECUTIVE SUMMARY PAGE 3 CHAPTER 1 CHAPTER 2 CHAPTER 3 CHAPTER 4 CHAPTER 5 PAGE 4 PAGE 5 PAGE 6 PAGE 8 PAGE 9 DATA SECURITY: HOW
USING GENIE REMOTELY
USING GENIE REMOTELY This document outlines the available options for using Genie in offsite logging mode (Genie single user) or remotely in real-time via a remote desktop (terminal services) connection.
Government Cloud, Datacentre consolidation & Apps store development A perspective. Andy Macleod. Strategy and Policy Public Sector
Government Cloud, Datacentre consolidation & Apps store development A perspective Andy Macleod Strategy and Policy Public Sector Disclaimer This information is sourced from previous presentations by the
Remote Network Monitoring. A specialist remote network infrastructure monitoring solution for the UK education sector.
Remote Network Monitoring. A specialist remote network infrastructure monitoring solution for the UK education sector. Keeping a watchful eye over your schools network infrastructure. Our ICT introduces
Tactical Cost Reduction
Tactical Cost Reduction G-Cloud Service 1 An overview of the G-Cloud Service Information assurance Backup/restore and disaster recovery On-boarding and Off-boarding processes/scope etc. Pricing Service
A practical guide to IT security
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
LIVE CHAT CLOUD SECURITY Everything you need to know about live chat and communicating with your customers securely
LIVE CHAT CLOUD SECURITY Everything you need to know about live chat and communicating with your customers securely LIVE CHAT CLOUD SECURITY Introduction Security is a top priority online it is vital that
A Guide to the Cyber Essentials Scheme
A Guide to the Cyber Essentials Scheme Published by: CREST Tel: 0845 686-5542 Email: [email protected] Web: http://www.crest-approved.org/ Principal Author Jane Frankland, Managing Director, Jane
DOCUMATION S DOCUMENT MANAGEMENT
Documation is a leading provider of document-centric workflow and content management software, delivering services and solutions to businesses and organisations in the UK, Europe and around the world.
IT Managed Services National (Cat A) Framework
IT Managed Services National (Cat A) Framework This type of framework contract is an excellent offering which combines purchasing power under one framework agreement. John F McClelland CBE Key points Available
Is your business secure in a hosted world?
Is your business secure in a hosted world? Threats to the security of business data are constantly growing and evolving - What can you do ensure your data remains secure? Introduction The safe use of computer
Managed Encryption Service
Amethyst Cryptographic Services Ltd Managed Encryption Service An Overview Chris Greengrass March 2011 Encryption and Cryptography The use of encryption/decryption is as old as the art of communication.
PROACTIS Purchase-to-Pay Upgrade Services The Rapid, Painless, Cost-Effective Route to a World of New Spend Control Capabilities
PROACTIS Purchase-to-Pay Upgrade Services The Rapid, Painless, Cost-Effective Route to a World of New Spend Control Capabilities Contents 2 Introduction 3-8 Why Upgrade? New Capabilities New Operational
SOFTWARE LICENSING AWARENESS IN DYNAMIC ENVIRONMENTS
SOFTWARE LICENSING AWARENESS IN DYNAMIC ENVIRONMENTS 3 CLOUD TECHNOLOGIES AND EMPLOYEE COLLABORATION MAY SATISFY BUSINESS FLEXIBILITY, DYNAMISM AND INSTANT DEMAND BUT THE LICENSING IMPACT AND FINANCIAL
The Attacker s Target: The Small Business
Check Point Whitepaper The Attacker s Target: The Small Business Even Small Businesses Need Enterprise-class Security to protect their Network July 2013 Contents Introduction 3 Enterprise-grade Protection
Providing a quality IT Support & Consultancy service in the South East
Providing a quality IT Support & Consultancy service in the South East At M2 Computing, we provide flexible, affordable IT consultancy and systems support across the South East. With a proven track record
White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for
White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web
Your Guide to Navigating the Cloud. www.ukcloudalliance.co.uk
Your Guide to Navigating the Cloud www.ukcloudalliance.co.uk 0800 138 4443 Sharing knowledge, ideas and innovation Welcome to the UK Cloud Alliance. Medium sized UK companies tell us they want the best
