Get Better Protected... Secure data sharing made possible with Updata s Encryption Overlay Service.

Size: px
Start display at page:

Download "Get Better Protected... Secure data sharing made possible with Updata s Encryption Overlay Service."

Transcription

1 i Compliant Fully managed Encryption Overlay service enabling data sharing across secure networks. Provides operational efficiencies and cost savings through simplified procurement

2 Get Better Protected... Secure data sharing made possible with Updata s Encryption Overlay Service. Many Public Sector organisations handle sensitive data which needs to be protected. Updata are accredited to provide a fully managed PSN Encryption Overlay service that is suitable for all Public Sector organisations including Central Government, Local Authorities, UK Polices Forces and the Healthcare sector. The Encryption Overlay services is a layered solution which sits on top of an ASSURED PSN Wide Area Network (WAN), and uplifts it to a PROTECTED network service that transparently encrypts and protects all transmitted data. The Updata Encryption Overlay service is suitable for all data classified as OFFICIAL or OFFICIAL-SENSITIVE and data classified as IL3 RESTRICTED under the previous government protective marking scheme. It uses the existing PSN accredited core network for the transport of the IPsec packets and provides availability guarantees through the CAS(T) assurance. The Updata Encryption Overlay service enables customers to access ASSURED and PROTECTED PSN compliant network services, which are designed and optimised to meet the strict information assurance requirements of UK public sector organisations. This service utilises IPsec encryption to provide a strong guarantee of confidentiality for customers who are concerned about their data being intercepted. Why include an Encryption Overlay on your network? Your organisation needs to exchange sensitive data across networks which requires additional security protection There is a requirement to share information with other PSN Accredited organisations The organisation needs to meet the pressures of being compliant Organisations want to simplify procurement and project management overheads via access to a pre-approved compliant managed service. 2

3 Sharing classified data across secured networks Most organisations handle classified data as part of their daily work. Sharing any level of classified data with other offices involves a secure network and infrastructure setup to enable secure sharing. Public Sector organisations are able to securely share data across the Public Services Network PSN. The PSN acts as a foundation that facilitates data sharing across various groups such as Health, Police and Local & Central Government. This infrastructure ensures information can be securely and easily accessed by Public Sector providers, eliminating high costs and inefficiencies of multiple, incompatible networks. The Inter Provide Encryption Domain (IPED) enables the Encryption Overlay service to be extended via the Government Communications Network (GCN) through an Updata Encryption gateway. It allows information classified as OFFICIAL, OFFICIAL SENSITIVE or classified as IL3 RESTRICTED within Government Departments, Police and Local Authorities to be shared securely with other PSN network providers. Updata also adhere to supplementary controls (Enhanced Regime) required by Policing organisations when utilising the IPED service. Organisations such as the Police require additional security overlays on top of their Assured network, due to the nature of the data they handle. The Updata Encryption Overlay service enables Police to securely share protected data with Force s across the region and with other organisations such as the Home Office via the IPED. Updata Assured NOC Management Updata Protected NOC Management, threat mitigation & analysis Customer LAN PKI RA Portal PKI CA GCN Key: Encryption Endpoint (CPA Assured) Endpoint (CPA Assured) Management IPSec VPN (Protected) Customer IPSec VPN (Protected) PSN Accredited Network (Assured) 3

4 Features and Benefits Secure IPsec site-to-site encryption Accredited CESG and PSN approved service simplifying the procurement process Security Cleared Support Dedicated support staff are security cleared by National Security Vetting - Security Check (SC) and Non Police Personnel Vetting Level 2 (NPPV2) cleared In addition to Updata WAN features: Fully Managed Service Managed and supported via a dedicated and secure UK Network Operations Centre (NOC) Choice EFM, FTTC and Ethernet Fibre; a choice of scalable and flexible connectivity bandwidth options from 2Mbps 1000Mbps Resilience Resilient access options with availability SLA s of up to 99.99% QoS Prioritise specific application types that require strict delivery guarantees, such as VoIP Monitoring UK based support team 24/7/365, with 85% first time fix record. Proactive monitoring process whereby 85% of network faults are proactively monitored by Updata. Includes customer defined options 4

5 Case Study Cheshire Constabulary connects to Updata s regional PSN In January 2014 Cheshire Constabulary signed up to the Cheshire and Merseyside Public Services Network (PSN). The Cheshire and Merseyside PSN connects Public Sector partners across the region, including Councils, Schools, Police Forces, Hospitals, and Fire & Rescue services. The network facilitates greater collaborative working, shared services and service transformation throughout Cheshire and Merseyside. Cheshire Constabulary joins partners Cheshire East Council, Cheshire West & Chester Council and Schools in the region which have already signed up to Updata s fully-managed Wide Area Network (WAN). The new communication infrastructure will help to provide a more streamlined and flexible way of working not only for the Constabulary but for our partner agencies as well. In these times of austerity it s vital that we can save money where we can, which we can then put to good use on the frontline, providing an efficient and effective police service. John Dwyer, Police & Crime Commissioner for Cheshire 5

6 Service Excellence How we support you At Updata we are dedicated in building and maintaining good relationships with our clients. Our Encryption Overlay service is supported by a dedicated team who are both National Security Vetting - Security Check (SC) and Non Police Personnel Vetting Level 2 (NPPV2) cleared. They are on hand 24/7/365, ensuring everything is running smoothly. Our emphasis on transparency, both in terms of the service and the information available to you, enables us to deliver a consistently outstanding support experience. Updata establishes your needs very early on in the engagement process, enabling us to tailor a service programme which meets your individual needs and requirements. Larger network customers also have access to an innovative self-service portal. The portal gives you the flexibility to request quotes, view service catalogues and contact our service desk. Our service excellence and support packages are at the core of every solution we create. 6

7 Technical Overview The Updata Encryption Overlay service is a fully compliant PSN catalogue service (SRV_0201) which has undergone rigorous assessments by CESG s PAN Government Accreditor. It ensures information classified up to OFFICIAL under the current Government Classification Policy is protected by an IPsec cryptographic security overlay that is designed, managed and operated to comply with the following standards, controls and assurances: This allows us to deliver a fully compliant Encryption Overlay service that protects your data and ensures peace of mind. SO27001 CAS(CA) the PSN and CESG assurance scheme for PSN Certificate Authorities PSN Certificate Policy v1.4 PSN Interim IPSec Profile o Encryption - AES128_ CBC o PRF - SHA-1 o Diffie-Hellman Group - Group 5 (1536 bits) HMG Baseline controls Deter CAS(T) the PSN assurance scheme for telecommunications networks CPA Security Characteristics: IPsec Gateway, Software Disk Encryption and IPsec for Remote Working Software Client v2.3 PSN Interim IPsec Profile Additionally, the Encryption Overlay Service uses: Products certified under the CESG Commercial Product Assurance (CPA) scheme and configured to the requirements of the CPA security characteristics PSN and CESG approved IPsec configuration X509 certificates for network authentication, from our PSN accredited certificate authority A fully segregated management infrastructure providing protection against advanced targeted attacks 7

8 Why Updata? We specialise in large, complex, fully managed Wide Area Networks that are built with the future in mind. Our solutions are completely flexible and scalable to suit your commercial, technological and business needs. Updata Infrastructure is a part of Capita IT Enterprise Services, one of the largest IT services providers in the UK and a Tier 1 partner of industry leading technology vendors. Our heritage, combined with the capabilities of Capita, means we understand business, technology and processes. We place the customer at the heart of everything we do and have a proven track record in transforming businesses through intelligent IT. All of our networks and solutions are proactively monitored 24/7/365 from our UK based support centre giving you peace of mind from start to finish. Delivering more As one of the UK s leading service integrators we offer more than just a connection. The breadth of our capability means that we can deliver a host of value-added services that you can pick-and-mix to suit your own, or shared, needs. With the ability to add more services as needed you can transform the way you work, securely share information and deliver value to your customers. We have designed and implemented some of the most robust and complex network solutions which have vastly transformed businesses by driving wider organisational initiatives such as mobile and flexible working and property rationalisation. Updata s outstanding engineering saves our biggest Public Sector client 5.1 million annually in property costs, as well as supporting 20,000 remote workers a day through their Virtual Private Network (VPN). As an Updata customer you will experience a seamless journey from initial consultation through to project delivery. At the core of this is an innovative network design that meets all of your business critical needs. One supplier brings simplicity... Why research, specify and buy individual elements of a service when you can buy it all from one supplier? Updata can: Bring the experience gained from over 20 years of delivering projects across the UK for public and private sector clients Design, build, supply and manage network solutions Deliver a robust, scalable and flexible network service that enables access to an extensive value added portfolio - such as Voice & Collaboration and Security Supply the network access service which is a gateway to a range of additional services - these can be shared internally, regionally or nationally Help you reduce costs through price leadership and service excellence Delivering Want to learn more? Contact us on TellMeMore@Updata.net or call to arrange a meeting.

Networks that Support Modern Policing

Networks that Support Modern Policing Networks that Support Modern Policing 1 Embrace new ways of working that meet the need to increase efficiency and drive down costs. How can technology help you to be more effective in the field and in

More information

Thales Service Definition for IL3 Encrypted Overlay for Cloud Services

Thales Service Definition for IL3 Encrypted Overlay for Cloud Services Thales Service Definition for UK IL3 Encrypted Overlay Thales Service Definition for IL3 Encrypted Overlay for Cloud Services April 2014 Page 1 of 11 Thales Service Definition for UK IL3 Encrypted Overlay

More information

Thales Service Definition for NOC Services for Cloud

Thales Service Definition for NOC Services for Cloud Thales Service Definition for UK NOC Services Thales Service Definition for NOC Services for Cloud April 2014 Page 1 of 13 Thales Service Definition for UK NOC Services CONTENT Page No. Introduction...

More information

Thales Service Definition for PSN Secure Email Gateway Service for Cloud Services

Thales Service Definition for PSN Secure Email Gateway Service for Cloud Services Thales Definition for PSN Secure Email Gateway Thales Definition for PSN Secure Email Gateway for Cloud s April 2014 Page 1 of 12 Thales Definition for PSN Secure Email Gateway CONTENT Page No. Introduction...

More information

Service Definition Document

Service Definition Document Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)

More information

Connecting to the Cloud. Lot 4 - Specialist Cloud Services. Version: 3.0, Issue Date: 01/12/2014. Classification: Open

Connecting to the Cloud. Lot 4 - Specialist Cloud Services. Version: 3.0, Issue Date: 01/12/2014. Classification: Open Connecting to the Cloud Version: 3.0, Issue Date: 01/12/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 201415/12/2014. Other than for the sole purpose of evaluating this Response,

More information

Expert. Trusted. Effective. IT managed services tailored to you. From Modern Networks.

Expert. Trusted. Effective. IT managed services tailored to you. From Modern Networks. Expert. Trusted. Effective. IT managed services tailored to you. From Modern Networks. A Complete End-to-End Portfolio Established in 1999, Modern Networks is a managed service provider helping clients

More information

Primary Storage in the Cloud. Lot 1 - Infrastructure as a Service. Version: 5.0, Issue Date: 07/12/2014. Classification: Open

Primary Storage in the Cloud. Lot 1 - Infrastructure as a Service. Version: 5.0, Issue Date: 07/12/2014. Classification: Open Primary Storage in the Cloud Version: 5.0, Issue Date: 07/12/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 2014. Other than for the sole purpose of evaluating this Response, no

More information

The Public Services Network (PSN) Delivering together

The Public Services Network (PSN) Delivering together The Public Services Network (PSN) Delivering together The PSN will... drive efficiencies in procurement, through a range of technical and service standards, which will lead to an open, collaborative environment

More information

IT Enterprise Services

IT Enterprise Services IT Enterprise Services Enterprise Sync & Share Unleash productivity with Enterprise Sync & Share Secure file share on any device, any time, anywhere Meeting the challenges of a digital world Digital assets

More information

Dedicated Compute Cloud. Lot 1 - Infrastructure as a Service. Version: 1.0, Issue Date: 09/12/2014. Classification: Open

Dedicated Compute Cloud. Lot 1 - Infrastructure as a Service. Version: 1.0, Issue Date: 09/12/2014. Classification: Open Dedicated Compute Cloud Version: 1.0, Issue Date: 09/12/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 201416/12/2014. Other than for the sole purpose of evaluating this Response,

More information

Remote Access Service (RAS)

Remote Access Service (RAS) Remote Access Service (RAS) Contents 1 Introduction to Remote Access Service...2 2 Service Definition...3 2.1 Functionality & Features... 3 2.2 Access Methods... 3 3 Differentiators...4 4 Commercials...5

More information

School Connectivity Services Updata

School Connectivity Services Updata Schools Connectivity Services Updata is a leading provider of IT services, support and solutions for schools, working in partnership with over 3000 schools, academies and local authorities to support their

More information

easy to adopt, easy to use, easy to leave service description API accessible Cloud Storage IaaS version 5.1

easy to adopt, easy to use, easy to leave service description API accessible Cloud Storage IaaS version 5.1 easy to adopt, easy to use, easy to leave service description API accessible Cloud Storage IaaS version 5.1 Contents Highlights... 3 Overview... 3 Example use cases... 4 Trial service... 4 Information

More information

IBM G-Cloud Microsoft Windows Active Directory as a Service

IBM G-Cloud Microsoft Windows Active Directory as a Service IBM G-Cloud Microsoft Windows Active Directory as a Service Service Definition IBM G-Cloud Windows AD as a Service 1 1. Summary 1.1 Service Description This offering is provided by IBM Global Business

More information

Capita Productivity Hub Combining secure private cloud with familiar Microsoft tools

Capita Productivity Hub Combining secure private cloud with familiar Microsoft tools IT Enterprise Services Capita Productivity Hub Combining secure private cloud with familiar Microsoft tools The freedom and agility which cloud unleashes directly impacts business performance. Cloud productivity

More information

Converged Private Networks. Supporting voice and business-critical applications across multiple sites

Converged Private Networks. Supporting voice and business-critical applications across multiple sites Converged Private Networks Supporting voice and business-critical applications across multiple sites Harness converged voice and high-speed data connectivity MPLS-based WAN solution that supports voice

More information

Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 2.1, Issue Date: 05/02/201405/02/2014. Classification: Open

Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 2.1, Issue Date: 05/02/201405/02/2014. Classification: Open Protective Monitoring as a Service Version: 2.1, Issue Date: 05/02/201405/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 201416/12/2014. Other than for the sole purpose of evaluating

More information

SCC Information Assurance Practice, CLAS Consulting, Check Testing and Accreditation Services

SCC Information Assurance Practice, CLAS Consulting, Check Testing and Accreditation Services SCC Information Assurance Practice, CLAS Consulting, Check Testing and Accreditation Services Contents 1 Introduction...2 2 IA, CLAS Consulting and CHECK Testing...3 3 Information Assurance...4 4 Accreditation...5

More information

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA

More information

Converged Private Networks. Supporting voice and business-critical applications across multiple sites

Converged Private Networks. Supporting voice and business-critical applications across multiple sites Converged Private Networks Supporting voice and business-critical applications across multiple sites Harness converged Converged Private Networks voice and high-speed data connectivity Reliable, highly

More information

Desktop Services (Production) Lot 2 - Platform as a Service. Version: 2.0, Issue Date: 05/02/2014. Classification: Open

Desktop Services (Production) Lot 2 - Platform as a Service. Version: 2.0, Issue Date: 05/02/2014. Classification: Open Desktop Services (Production) Lot 2 - Platform as a Service Version: 2.0, Issue Date: 05/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 2014. Other than for the sole purpose

More information

IT Enterprise Services

IT Enterprise Services IT Enterprise Services Local government Empowering people through technology Your drive to transform Your drive to transform Modernising local government services is high on everyone s agenda. Innovation

More information

Microsoft Dynamics CRM Case Management Pricing

Microsoft Dynamics CRM Case Management Pricing Microsoft Dynamics CRM Case Management Pricing Version: 7.0 Date: 06/10/2015 Lot 3: SaaS 1 Public Cloud (Microsoft CRM Online) 1.1 Non Managed Service Monthly Charges Product Price (Per User Per Month)

More information

e2e Secure Cloud Connect Service - Service Definition Document

e2e Secure Cloud Connect Service - Service Definition Document e2e Secure Cloud Connect Service - Service Definition Document Overview A cloud connectivity service that connects users, devices, offices and clouds together over the Internet. Organisations can choose

More information

E-commerce Home Office Small Business Network Solution

E-commerce Home Office Small Business Network Solution Converged Private Networks Supporting voice and business-critical applications across multiple sites Harness converged voice and high-speed data connectivity Reliable, highly available MPLS-based WAN solution

More information

How To Secure Cloud Compute At Eduserv

How To Secure Cloud Compute At Eduserv Implementing the CESG Cloud Security Principles February 2015 Eduserv Public www.eduserv.org.uk Contents Introduction... 4 The principles... 4 About our claims... 5 1 Data in transit protection... 6 2

More information

Is increasing reliance on your enterprise network holding back business?

Is increasing reliance on your enterprise network holding back business? Vodafone IP-VPN Next-generation connectivity for enterprises Vodafone Power to you Is increasing reliance on your enterprise network holding back business? The enterprise network is critical to business

More information

Best value security report

Best value security report Best value security report Getting the balance right between cost and quality Do more with less IT security for Local Government and the Emergency Services Thank you for downloading the best value security

More information

High speed Ethernet WAN: Is encryption compromising your network?

High speed Ethernet WAN: Is encryption compromising your network? High speed Ethernet WAN: Is encryption compromising your network? Trademark: 2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet. All other product names

More information

Schools Connectivity Services

Schools Connectivity Services Schools Connectivity Services Updata is a leading provider of IT services, support and solutions for schools; working in partnership with over 3000 schools, academies and local authorities to support their

More information

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET ELITE S NEXT GENERATION MANAGED SECURITY SERVICES Security risks to business information systems are expanding at a rapid rate; often,

More information

Managed Security Services SECURING YOUR BUSINESS

Managed Security Services SECURING YOUR BUSINESS Managed Security Services SECURING YOUR BUSINESS Managed Security Services SECURING YOUR BUSINESS Nowadays, ensuring that business systems and applications function properly and are available is of crucial

More information

Onsight IntelliDefense SECURING YOUR BUSINESS

Onsight IntelliDefense SECURING YOUR BUSINESS Onsight IntelliDefense SECURING YOUR BUSINESS Onsight IntelliDefense SECURING YOUR BUSINESS Nowadays, ensuring that business systems and applications function properly and are available is of crucial importance.

More information

ESKISP6054.01 Conduct security testing, under supervision

ESKISP6054.01 Conduct security testing, under supervision Overview This standard covers the competencies required to conduct security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to

More information

Public Services Network (PSN) DRAFTv2 CoSocius Workshop Briefing for Schools (1) and Q & A

Public Services Network (PSN) DRAFTv2 CoSocius Workshop Briefing for Schools (1) and Q & A Context This document summarises the key topics and questions covered during the PSN Workshop for Schools on 2 April 2014 at Middlewich Community Church together with additional guidance notes. It is intended

More information

UK Government IA Recent Changes and Update

UK Government IA Recent Changes and Update UK Government IA Recent Changes and Update INTRODUCTION Agenda Part 1 Government IA and Cyber Security Background Quick Threat Update UK Government Cyber Security Initiative Government Asset Control in

More information

SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and

SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and Management SafeNet Network Encryption and Isolation Solution

More information

Cloud Storage. Lot 1 - Infrastructure as a Service. Version: 3.0, Issue Date: 03/12/2014. Classification: Open

Cloud Storage. Lot 1 - Infrastructure as a Service. Version: 3.0, Issue Date: 03/12/2014. Classification: Open Cloud Storage Version: 3.0, Issue Date: 03/12/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 201416/12/2014. Other than for the sole purpose of evaluating this Response, no part

More information

Vodafone Total Managed Mobility

Vodafone Total Managed Mobility Vodafone Total Managed Mobility More productivity, less complexity Vodafone Power to you What s inside? What you get see how your business benefits 4 In detail find out how it all works 5 Service lifecycle

More information

Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 1.0, Issue Date: 05/02/201405/02/2014. Classification: Open

Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 1.0, Issue Date: 05/02/201405/02/2014. Classification: Open Protective Monitoring as a Service Version: 1.0, Issue Date: 05/02/201405/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 2014. Other than for the sole purpose of evaluating this

More information

GPG13 Protective Monitoring. Service Definition

GPG13 Protective Monitoring. Service Definition GPG13 Protective Monitoring Service Definition Issue Number V1.3 Document Date 27 November 2014 Author: D.M.Woodcock Classification UNCLASSIFIED Version G-Cloud 6 2014 Copyright Assuria Limited. All rights

More information

Service description RFL Virtual Data Centre

Service description RFL Virtual Data Centre Service description RFL Virtual Data Centre IaaS G-Cloud 6 1 Contents Overview... 3 Highlights... 3 Description... 3 Use cases... 3 Use cases... 5 Use cases... 5 Pricing... 5 Information assurance... 5

More information

MPLS provides multi-site solution

MPLS provides multi-site solution MPLS provides multi-site solution Executive Summary MPLS (Multi Protocol Label Switching) meets the need for a cost effective solution for voice and data connectivity across multiple sites. Spitfire s

More information

Helping you make Network Services work for you. Vodafone Power to you

Helping you make Network Services work for you. Vodafone Power to you Helping you make Network Services work for you Vodafone Power to you Introduction Here at Vodafone, we understand how crucial Digital transformation is to public sector organisations wanting to make services

More information

L2 Box. Layer 2 Network encryption Verifiably secure, simple, fast.

L2 Box. Layer 2 Network encryption Verifiably secure, simple, fast. L2 Box Layer 2 Network encryption Verifiably secure, simple, fast. reliable line encryption. Nowadays internal and confidential data is exchanged between locations or computer centres of public authorities

More information

IBM Web Server as a Service

IBM Web Server as a Service IBM Web Server as a Service Service Definition IBM G-Cloud Web Server as a Service 1 1. Summary 1.1 Service Description This offering is provided by IBM Global Business Services and provides a Web Server

More information

Energies and Advantages of an Enterprise Network

Energies and Advantages of an Enterprise Network network services / ENHANCED MPLS NETWORK / fully meshed, self-healing / 24-365 monitoring & support / access the cloud / 100M INFRAStrUCTURE / widest connectivity / 98% uk population reach / nhs n3 accreditation

More information

DIGITAL MARKETPLACE (G-CLOUD 7) OFFERING. Sopra Steria OneMobile SaaS Service. Introduction. Service Definition. Sopra Steria in the public sector

DIGITAL MARKETPLACE (G-CLOUD 7) OFFERING. Sopra Steria OneMobile SaaS Service. Introduction. Service Definition. Sopra Steria in the public sector DIGITAL MARKETPLACE (G-CLOUD 7) OFFERING Sopra Steria OneMobile SaaS Service Sopra Steria in the public sector Organisations across the public sector choose Sopra Steria to deliver transformation programmes

More information

Colt VoIP Access. 2010 Colt Technology Services Group Limited. All rights reserved.

Colt VoIP Access. 2010 Colt Technology Services Group Limited. All rights reserved. Colt VoIP Access 2010 Colt Technology Services Group Limited. All rights reserved. Business requirements Are you looking for ways to simplify management of national or even international voice services

More information

Partner with the UK s leading. Managed Security Service Provider

Partner with the UK s leading. Managed Security Service Provider Partner with the UK s leading Managed Security Service Provider The Talk Straight Advantage Established in 2007, Talk Straight is an ISP with a difference, and is at the forefront of a revolution in cloud

More information

Enterprise Broadband Customer Service Description

Enterprise Broadband Customer Service Description BT 2012 Issue 2_8 Table of Contents INTRODUCTION... 3 SERVICE OVERVIEW... 4 BENEFITS OF CHOOSING ENTERPRISE BROADBAND... 5 SERVICE DETAILS... 5 THE WORKPLACE... 5 COVERAGE... 5 ENTERPRISE BROADBAND...

More information

Accessing and sending data securely across security domains

Accessing and sending data securely across security domains In this White Paper Connectivity is good. Secure connectivity is essential. This white paper by Thales UK explains how Thales Gateway Services protect the exchange of data across security domains. It discusses

More information

Embrace the G-Cloud. Ultra Secure Colocation Services for the Public Sector. thebunker.net Phone: 01304 814800 Fax: 01304 814899 info@thebunker.

Embrace the G-Cloud. Ultra Secure Colocation Services for the Public Sector. thebunker.net Phone: 01304 814800 Fax: 01304 814899 info@thebunker. Embrace the G-Cloud Ultra Secure Colocation Services for the Public Sector 1 Phone: 01304 814800 Fax: 01304 814899 info@ Contents Introduction What is G-Cloud? Types of accreditation: Business Impact Levels

More information

CROWN HOSTING DATA CENTRES AND THE CLEAREST ROUTE TO THE CLOUD. August 2015

CROWN HOSTING DATA CENTRES AND THE CLEAREST ROUTE TO THE CLOUD. August 2015 CROWN HOSTING DATA CENTRES AND THE CLEAREST ROUTE TO THE CLOUD August 2015 CONTENTS What is Crown Hosting Data Centres 4 Data centres of the future, today 5 Is my organisation eligible? 5 Crown Hosting

More information

Protecting your information

Protecting your information Protecting your information Secure your information Each year, governments, businesses and institutions suffer untold losses through not protecting their information. A UK government survey* puts the cost

More information

CESG ASSURED SERVICE CAS SERVICE REQUIREMENT PSN CA (IPSEC)

CESG ASSURED SERVICE CAS SERVICE REQUIREMENT PSN CA (IPSEC) CESG ASSURED SERVICE CAS SERVICE REQUIREMENT PSN CA (IPSEC) Version 1.0 Crown Copyright 2016 All Rights Reserved Page 1 Document History Version Date Description 1.0 October 2013 Initial issue Soft copy

More information

Our EFM network has double the coverage of BT.

Our EFM network has double the coverage of BT. Our EFM network has double the coverage of BT. According to BT Openreach figures, 5th December 2014 Useful inks talktalkbusiness.co.uk MPLS IPVPN /mplsipvpn Call 0808 274 0055 What is MPLS IPVPN? Supports

More information

PSN compliant remote access Whitepaper

PSN compliant remote access Whitepaper PSN compliant remote access Whitepaper March 2015 www.celestix.com/directaccess DirectAccess and IPsec connectivity in the public sector Mobile working in the public sector is nothing new but in recent

More information

IT Services. We re the IT in OrganIsaTion. Large Organisations

IT Services. We re the IT in OrganIsaTion. Large Organisations IT Services. We re the IT in OrganIsaTion Large Organisations IT for Large Organisations. As the world of business technology has changed, so have we. From designing, building and optimising tailored

More information

Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer

Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer Layer 2 Network Encryption where safety is not an optical illusion Todays Agenda Fibre is safe

More information

The trusted technology partner in the Public Sector

The trusted technology partner in the Public Sector The trusted technology partner in the Public Sector www.exponential-e.com/public-sector About Exponential-e Market Leaders in Technical Innovation GovConnect: The Exponential-e public sector service portfolio

More information

Site to Site Virtual Private Networks (VPNs):

Site to Site Virtual Private Networks (VPNs): Site to Site Virtual Private Networks Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0002.01 Prog. Director Mark Ferrar Owner Tim Davis Version 1.0

More information

Transforming public services in Scotland Value Added Services

Transforming public services in Scotland Value Added Services Transforming public services in Scotland Value Added Services Maximising your investment in SWAN Dedicated to connecting Scotland The Scottish Wide Area Network (SWAN) is the only secure network available

More information

G Cloud Service Description Premier SIP Trunk Software as a Service October 2015

G Cloud Service Description Premier SIP Trunk Software as a Service October 2015 G Cloud Service Description Premier SIP Trunk Software as a Service October 2015 Premier Choice Telecom has been a trusted provider of communications solutions for businesses for over 15 years. Our clients

More information

Integrated windows authentication for customers based on Probation GSI network

Integrated windows authentication for customers based on Probation GSI network Product Overview Victims Tracker (VT) is a software application, which was developed by London Probation Trust (LPT) to effectively manage the engagement / contact with victims of crime and the management

More information

GOVERNMENT HOSTING. Cloud Service Security Principles Memset Statement. www.memset.com

GOVERNMENT HOSTING. Cloud Service Security Principles Memset Statement. www.memset.com GOVERNMENT HOSTING Cloud Service Security Principles Memset Statement Summary - March 2014 The Cabinet Office has produced a set of fourteen Cloud Service Security Principles to be considered when purchasers

More information

Network Services Internet VPN

Network Services Internet VPN Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order

More information

PSN Protective Monitoring. Service Definition

PSN Protective Monitoring. Service Definition PSN Protective Monitoring Service Definition Issue Number V3.0 Document Date 29 September 2015 Author: R.N. Connor Classification UNCLASSIFIED Version G-Cloud 7 2015 Copyright Tenian Limited. All rights

More information

A guide to procuring Accredited Cloud Services

A guide to procuring Accredited Cloud Services A guide to procuring Accredited Cloud Services Contents 2 Introduction 3 Chapter 1: What are Accredited Cloud Services? 4 Chapter 2: Preparing to procure Accredited Cloud Services 6 Chapter 3: Comparing

More information

Overview TECHIS60441. Carry out security testing activities

Overview TECHIS60441. Carry out security testing activities Overview Information, services and systems can be attacked in various ways. Understanding the technical and social perspectives, how attacks work, the technologies and approaches used are key to being

More information

MyCloud Dedicated Unified Communications (UC) Transforming Business Communications

MyCloud Dedicated Unified Communications (UC) Transforming Business Communications MyCloud Dedicated Unified Communications (UC) Transforming Business Communications Businesses need communications tools that make their work easier and are available anywhere, anytime including within

More information

Information Services Strategy 2011-2013

Information Services Strategy 2011-2013 Information Services Strategy Issue 1 1 Introduction The States of Jersey public sector is facing significant pressure for efficiencies and savings. This has created the context to take a fresh look at

More information

McAfee Security Architectures for the Public Sector

McAfee Security Architectures for the Public Sector White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed

More information

How to gain accreditation for a G-Cloud Service

How to gain accreditation for a G-Cloud Service www.ascentor.co.uk How to gain accreditation for a G-Cloud Service Demystify the process As a registered supplier of G-Cloud services you will be keenly aware that getting onto the G-Cloud framework does

More information

HMG Security Policy Framework

HMG Security Policy Framework HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of

More information

Hadoop in the Cloud. Lot 2 - Platform as a Service. Version: 2.0, Issue Date: 05/12/2014. Classification: Open

Hadoop in the Cloud. Lot 2 - Platform as a Service. Version: 2.0, Issue Date: 05/12/2014. Classification: Open Hadoop in the Cloud Version: 2.0, Issue Date: 05/12/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 201415/12/2014. Other than for the sole purpose of evaluating this Response, no

More information

Configuring IPsec VPN with a FortiGate and a Cisco ASA

Configuring IPsec VPN with a FortiGate and a Cisco ASA Configuring IPsec VPN with a FortiGate and a Cisco ASA The following recipe describes how to configure a site-to-site IPsec VPN tunnel. In this example, one site is behind a FortiGate and another site

More information

SERVICE DEFINITION G-CLOUD 7 CLOUD BACKUP. Classification: Open

SERVICE DEFINITION G-CLOUD 7 CLOUD BACKUP. Classification: Open SERVICE DEFINITION G-CLOUD 7 CLOUD BACKUP Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this material may

More information

TrustWay: the high security solution

TrustWay: the high security solution TrustWay: the high security solution Industrial spying, eavesdropping, hacking... it has never been so vital to communicate securely in our networked world... and the threats have never been so great.

More information

Business Continuity and Disaster Recovery Solutions in Government

Business Continuity and Disaster Recovery Solutions in Government > Business Continuity and Disaster Recovery Solutions in Government Protecting Critical Data Flow for Uninterrupted Services WHITE PAPER January 2010 J. Asenjo, CISSP www.thalesgroup.com/iss Information

More information

Charter Business Fiber Solutions. Crucial for anything that s mission critical.

Charter Business Fiber Solutions. Crucial for anything that s mission critical. GET BIG VALUE WORK EFFICIENTLY Charter Business Fiber Solutions. Crucial for anything that s mission critical. GROW MORE QUICKLY ADAPT EASILY WORRY LESS Help your business operate at its best with customized

More information

The Information Security Specialists

The Information Security Specialists The Information Security Specialists The IPSec information shield safeguarding business success. IPSec are specialists in information asset security; technology experts who know how to mitigate risk to

More information

Colt IP VPN Services. 2010 Colt Technology Services Group Limited. All rights reserved.

Colt IP VPN Services. 2010 Colt Technology Services Group Limited. All rights reserved. Colt IP VPN Services 2010 Colt Technology Services Group Limited. All rights reserved. Agenda An introduction to IP VPN Colt IP VPN Hybrid Networking Workforce Mobility Summary 2 Drivers behind IP VPN

More information

Government Security Classifications FAQ Sheet 2: Managing Information Risk at OFFICIAL. v2.0 March 2014

Government Security Classifications FAQ Sheet 2: Managing Information Risk at OFFICIAL. v2.0 March 2014 Government Security Classifications FAQ Sheet 2: Managing Information Risk at OFFICIAL v2.0 March 2014 This FAQ describes how risk management activities should be conducted for the new OFFICIAL classification.

More information

UNIQUE A COMPLETE, FLEXIBLE HOSTED TELEPHONY AND UNIFIED COMMUNICATIONS SOLUTION, HELPING YOU CREATE A PROPOSITION THAT IS

UNIQUE A COMPLETE, FLEXIBLE HOSTED TELEPHONY AND UNIFIED COMMUNICATIONS SOLUTION, HELPING YOU CREATE A PROPOSITION THAT IS WE MAKE IT POSSIBLE A COMPLETE, FLEXIBLE HOSTED TELEPHONY AND UNIFIED COMMUNICATIONS SOLUTION, HELPING YOU CREATE A PROPOSITION THAT IS UNIQUE WHOLESALE HOSTED CENTREX TAKING COMMUNICATION INTO THE CLOUD

More information

service description Email, SharePoint and File Archive in the Cloud Software as a Service

service description Email, SharePoint and File Archive in the Cloud Software as a Service easy to adopt, easy to use, easy to leave service description Email, SharePoint and File Archive in the Cloud Software as a Service version 4.0 Contents Overview... 3 Example use cases... 3 Pricing...

More information

secure For the ultimate in Cyber Defence TRL Technology

secure For the ultimate in Cyber Defence TRL Technology //Government secure Grade Network Security For the ultimate in Cyber Defence // CATAPAN Government Grade Network Security L-3 TRL has over a decade of experience in developing and supporting sophisticated

More information

Assurance in the Cloud: Outsourcing Risk in a Shifting Landscape

Assurance in the Cloud: Outsourcing Risk in a Shifting Landscape by SCC We make IT work Assurance in the Cloud: Outsourcing Risk in a Shifting Landscape 02 CONTENTS You hold sensitive public sector data Sentinel protects it. Sentinel by SCC not only provides faster

More information

Reaping the Full Benefits of a Hybrid Network

Reaping the Full Benefits of a Hybrid Network Singtel Business Product Factsheet Managed Hybrid Network Reaping the Full Benefits of a Hybrid Network Singtel Managed Hybrid Network is an innovative offering that extends the enterprise s network coverage

More information

Web Conferencing and Collaboration as a Service

Web Conferencing and Collaboration as a Service Service Definition Document GCloud 7 : Product : G7 3.LAMP.008 Summary Web Conferencing and Collaboration as a Service Web Conferencing and project collaboration service designed for mobile and desktop

More information

A. Reference information. A0. G-Cloud Programme unique ID number for the service and version number of this scoping template

A. Reference information. A0. G-Cloud Programme unique ID number for the service and version number of this scoping template G-Cloud Service Pan Government Security Accreditation Scope This form is intended for Suppliers of services on the G-Cloud to complete. Upon receipt, the G-Cloud Programme will check Section A, Reference

More information

Senetas CERTIFIED network data security - For Government SENETAS CERTIFIED NETWORK DATA SECURITY - FOR GOVERNMENT

Senetas CERTIFIED network data security - For Government SENETAS CERTIFIED NETWORK DATA SECURITY - FOR GOVERNMENT Senetas CERTIFIED network data security - For Government SENETAS CERTIFIED NETWORK DATA SECURITY - FOR SENETAS CERTIFIED HARDWARE ENCRYPTORS ARE TRUSTED BY S IN MORE THAN 20 COUNTRIES TO PROTECT SENSITIVE

More information

Committees Date: Subject: Public Report of: For Information Summary

Committees Date: Subject: Public Report of: For Information Summary Committees Audit & Risk Management Committee Finance Committee Subject: Cyber Security Risks Report of: Chamberlain Date: 17 September 2015 22 September 2015 Public For Information Summary Cyber security

More information

Enterprise Cloud PBX

Enterprise Cloud PBX Enterprise Cloud PBX Pitfalls, Challenges and Benefits of Migrating to Cloud Telephony Summary This document summarizes some of the pitfalls, challenges and benefits of migrating an enterprise to a cloud

More information

Connecting your business

Connecting your business mobiles Connecting your business fixed voice & data digital & IT autovoice managed services adsi energy About us Founded in 2002, ADSI are dedicated to reducing business costs by offering high-quality

More information

Nominee: Barracuda Networks

Nominee: Barracuda Networks Nominee: Barracuda Networks Nomination title: Barracuda Next Generation Firewall The Barracuda NG (Next Generation) Firewall is much more than a traditional firewall. It is designed to protect network

More information

OFFICIAL SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT

OFFICIAL SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT Version 1.3 Crown Copyright 2015 All Rights Reserved 49358431 Page 1 of 12 About this document This document describes the features, testing and deployment

More information

Reliable, fast data connectivity

Reliable, fast data connectivity Data Reliable, fast data connectivity Discover business-grade, high speed data connectivity Harness cloud services - converge data and voice Our family of high-speed IP connectivity services connects your

More information

Digital Pathways. Harlow Enterprise Hub, Edinburgh Way, Harlow CM20 2NQ. 0844 586 0040 intouch@digitalpathways.co.uk www.digpath.co.

Digital Pathways. Harlow Enterprise Hub, Edinburgh Way, Harlow CM20 2NQ. 0844 586 0040 intouch@digitalpathways.co.uk www.digpath.co. Harlow Enterprise Hub, Edinburgh Way, Harlow CM20 2NQ 0844 586 0040 intouch@digitalpathways.co.uk Security Services Menu has a full range of Security Services, some of which are also offered as a fully

More information