Security. Trusted solutions from the independent experts. Plan Design Enable



Similar documents
Surveillance and Security Systems

Integrated Physical Security and Incident Management

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1

Experts who understand security, integration and great project delivery. Leading Security Through Innovation

MANAGE THIRD PARTY RISKS

A guide to access control for manufacturing sites

Remote Monitoring offers a comprehensive range of services, which are continually

Beyond security: ATEC s contribution to Birmingham Airport s management systems

Understanding Sage CRM Cloud

Protecting Malaysia in the Connected world

Physical Security Services

Cisco Advanced Services for Network Security

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

A GOOD PRACTICE GUIDE FOR EMPLOYERS

HNOLOGY IN POLICING SECURITY & CYBERSPACE SITUATION

CYBER SECURITY Audit, Test & Compliance

SUPPORTING THE RAIL INDUSTRY UNIQUE SOLUTIONS FOR UNIQUE SITUATIONS

Cyber security. Ideal logo position here

Corporate Overview NEC Australia

Command and Control Integrated Solutions. Transforming security needs into unique custom-made solutions. Building Technologies

ICT Security. High-Quality Information and Know How Protection. Design and implementation of security. Covering almost all of ICT security

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Bio-inspired cyber security for your enterprise

Implanting Large Security Systems in Seaports

CyberSecurity Solutions. Delivering

Secure by design: taking a strategic approach to cybersecurity

THE STRATEGIC POLICING REQUIREMENT. July 2012

Advanced automation and real-time business intelligence Solutions for the Energy & Utilities markets M A N A G I N G T H E E S S E N T I A L S

Enterprise Risk Management taking on new dimensions

Procuring Penetration Testing Services

Practitioner Certificate in Information Assurance Architecture (PCiIAA)

IT Security. Securing Your Business Investments

Central Sponsor for Information Assurance. A National Information Assurance Strategy

Remote control. With RVR you can be sure you ll never be alone. Remote control

Critec Consult. Independent Security Consultants. Critec Consult provide totally independent advice on all physical security disciplines, including:

Data Security Concerns for the Electric Grid

ata ports & harbours airports railways roads & highways info@ata-recruitment.co.uk

Compliance Guide: ASD ISM OVERVIEW

MANAGING THE SOFTWARE PUBLISHER AUDIT PROCESS

Payment Card Industry Data Security Standard

FM & SECURITY SOLUTIONS. SSS Managed Services. Impartial, innovative, involved

Asset Management. Enabling effective estates strategies >

Cybersecurity Delivering Confidence in the Cyber Domain

The Next Generation of Broadband

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

HMG Security Policy Framework

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.

developing your potential Cyber Security Training

Technology applied to the most innovative and demanding sectors of the market.

Committees Date: Subject: Public Report of: For Information Summary

How To Help Your Business Succeed

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions

System Security. Your data security is always our top priority

DATA SECURITY POLICY. Data Security Policy

CONTENTS. PCI DSS Compliance Guide

IBM Connections Cloud Security

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Aon Risk Solutions Aon Crisis Management. Crisis Management Consulting Terrorism Probable Maximum Loss (PML) Studies

Business continuity management

MSc Cyber Security. identity. hacker. virus. network. information

The Protection Mission a constant endeavor

Cisco Security Optimization Service

Oil & Gas Industry Towards Global Security. A Holistic Security Risk Management Approach.

MANAGEMENT SYSTEMS CERTIFICATION FROM AUTOMOTIVE SPECIALISTS

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Network Assessment Services

Transforming. Source & Deploy Solutions from Computacenter

Application management services that power business transformation

WHITE PAPER. An Introduction to Network- Vulnerability Testing

Cyber Essentials Scheme

MANAGEMENT SYSTEMS CERTIFICATION

Introduction. Industry Changes

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

Datacentre London 1. Dedicated managed environment for mission critical services. Six Degrees Group

A Decision Maker s Guide to Securing an IT Infrastructure

D-G4-L4-126 Police contact management and demand reduction review Deloitte LLP Service for G-Cloud IV

A Guide to the Cyber Essentials Scheme

Expert. Trusted. Effective. IT managed services tailored to you. From Modern Networks.

Growth Through Excellence

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

DORSET & WILTSHIRE FIRE AND RESCUE AUTHORITY Performance, Risk and Business Continuity Management Policy

Information security controls. Briefing for clients on Experian information security controls

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Network Systems Integration

GoodData Corporation Security White Paper

Embrace the G-Cloud. Ultra Secure Colocation Services for the Public Sector. thebunker.net Phone: Fax:

National Surface Transport Security Strategy. September Transport and Infrastructure Senior Officials Committee. Transport Security Committee

Am I safe traveling home?

University of Brighton School and Departmental Information Security Policy

Appendix 1a: Facilities Management Guide elements of FM Soft FM

Section A: Introduction, Definitions and Principles of Infrastructure Resilience

DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES

ESKISP Conduct security testing, under supervision

UK SBS Physical Security Policy

CPNI VIEWPOINT 02/2010 PROTECTION OF DATA CENTRES

JE PANEL/BENCHMARKING REF NO: 867/4 EVALUATION DATE:

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES

Global Information Security Survey 2002

integrated fire and security solutions Maximum protection for buildings

Transcription:

Security Trusted solutions from the independent experts Plan Design Enable

Atkins overview Atkins provides comprehensive security services and solutions that are not tied to specific vendors or technologies. With independence as our hallmark, our services incorporate all aspects, from concept masterplanning of an entire security network, through detailed design, to equipment specification and implementation. Regardless of project size and complexity, our aim is to provide a fully integrated solution, that is innovative yet proven in its approach to emerging technologies and threats. We deliver an extensive range of services for clients across the private and public sectors. By utilising our well-honed project lifecycle process, our highly skilled consulting teams can provide both breadth and depth of capability, tackling security projects in any geography. Atkins Group at a glance l l l l 1,250M revenue 17,000 people The largest multi-disciplinary consultancy in Europe The world s fifth-largest international design firm

Four cornerstones of security Using a holistic approach, Atkins delivers specialist consultancy around the four cornerstones of security Strategy Our work includes strategic security advice for major projects, ranging from threat assessments and risk analyses, to defining and auditing security plans. Our projects span major international sporting events, identity management for key government departments, and transportation infrastructures. Procedure We design and develop the essential security procedures and processes which are core to securing government, defence and large corporate programmes. Technology Our design engineers analyse the requirements, evaluate options, create and implement innovative technical solutions that safeguard critical national infrastructure, city centres, buildings and transport systems. Physical protection Drawing on our in-depth engineering skills, we analyse and design hardened physical structures, access control systems and security perimeters for a wide range of global clients. For any security challenge international or local, complex or simple ask Atkins. We can plan, build and enable the right solution for you. 3

Define the strategy Atkins will help you to understand the main threats to your business and develop an appropriate strategy supported by the best procedures, technical design and physical response Analysis and strategy development Our consultants have extensive experience in the planning and development of security strategies that will protect the value of your assets and instil confidence across your workforce. These strategies are underpinned by established methodologies for generating impact assessments that support decision making and inform the degree of protection needed in each case. Our threat assessments and detailed risk analyses are balanced against value, to ensure that budget and effort are prioritised effectively. Embracing a holistic approach, we consistently deliver a coherent, balanced and co-ordinated approach to security planning, and ensure effective integration with any existing security systems. Within the transport sector, for example, our security analysis and planning helps to ensure the safe movement of passengers, creating resilient, robust and sustainable transport networks. Secure-by-Design: delivering long-term value The Atkins approach to security is based on the Secure-by-Design model, from original concept through to detailed drawings. This key methodology ensures that buildings, transport infrastructure and systems are fully and reliably protected against the identified threats. Whole life value and cost-efficiency, including environmental impacts, are included in all our assessments and designs, as part of an integrated security programme. Adhering to Secure by Design principles, Atkins offers genuine and long lasting value for security projects over the total lifecycle.

Comprehensive programme management We offer a comprehensive suite of security services including planning, design, programme management and project support. We bring expert planning skills to complex programmes, ensuring the essential change management required to maximise investment in new security systems, particularly on sensitive government projects. Security accredited consultants With nationally-accredited consultants (including personnel on the CESG Listed Advisor Scheme and BS270001 auditors), we support a wide range of Government and commercial projects including: BOWMAN, the UK military radio system Future Rapid Effects System (FRES) High-grade messaging for UK MoD (ANSON) Future cryptographic procurement programme for UK MoD Global Information Infrastructure (GII) for Network Enabled Capability Network and web servers for enterprise organisations With a combination of expertise and a wealth of domain knowledge, we can help develop systems that meet the information security needs of Government departments and the enterprise sector. Our clients include Foreign & Commonwealth Office, Department for Constitutional Affairs and Cabinet Office as well as independent health sector, international legal organisations, water and communications companies. Case study: transport threat assessment Atkins was commissioned by Kowloon- Canton Railway Corporation (KCRC) to provide, manage and deliver a Threat and Vulnerability Assessment for its key assets. We used US and UK Government Standards as the basis for the assessment. The most likely threats, including the range of attack objectives and methods that could be used were assessed, together with the vulnerabilities of each asset to such threats. 5

Design the process We help you to identify the right procedures to minimise risks, to secure your assets, and to protect your information and your people Advanced security procedures Robust procedures mean that if processes are followed and deviations and exceptions are trapped and traced, then your security system will work well and deliver real benefit. Procedures that can be avoided, bypassed or disregarded negate even the best network or physical security system, invalidate evidential trails, and can result in wasted investment and unnecessary risk. Case study: passenger and identity management Atkins designed and managed the largest biometric trial of its kind in the UK at London Heathrow Airport. Technologies included face, finger, iris and palm vein recognition for a throughput of over 12,000 passengers. The success of these trials was followed by the installation of the Atkins Passenger Authentication Scanning System (PASS) in Terminal 1, which provides the logical separation of all domestic passengers passing through the integrated departure lounges. This becomes operational at Heathrow s new Terminal 5 in early 2008, and embraces more than 450 processes.

Security audits We evaluate existing systems and procedures and provide trusted advice to meet changing threat levels. As a trusted critical friend, we will provide this service through a comprehensive security audit. As an international company, we are able to call upon support from our specialists with specific cultural, country and industry sector expertise. Maintaining standards Designing, managing and ensuring that appropriate configuration standards for ICT infrastructure are met is a core service Atkins provides to key Government Departments. Our SCIDA (Site Coordination Installation Design Authority) services support complex command and communications facilities, and ensure the maintenance of design standards for the availability, reliability, survivability and confidentiality of UK MoD and other government systems. Case study: security audit RWS, as one of the world s leading patent translation and search companies, has a heavy reliance on information technology where the security of client information paramount. RWS asked Atkins to audit its physical, network and server configurations. We proposed several enhancements to the network Intruder Prevention and Intruder Detection System (IPS/IDS) as well as other improvements to the firewalls and to the Authentication, Authorisation and Accounting (AAA) systems. The physical aspects of security surrounding the network and the servers were also examined and recommendations on improvements were made. 7

Design the technical solution Being a fully vendor-independent company, our commitment is to design the best value solution to meet your security requirements Breadth of talent Our wide range of skills offer comprehensive plan, build and operate capabilities, from feasibility studies and system design, through to project implementation. We can support your procurement process with tender preparation and vendor selection, and specify the training requirements, system operations and maintenance schedules. Security architecture design Following analysis and surveys, our experts provide detailed design and technical specifications for single projects or for large-scale systems. We cover the whole spectrum of security, producing the concepts and architecture, designing the system and specifying components. This includes detailed design of the secure communications infrastructure, and integrating detection sensors and surveillance systems with their control and monitoring rooms. Case study: oil production security To meet increased threat levels, Atkins has been retained to define and design a major security surveillance system for a Middle East oil company. This required site survey of 100 locations, including wellheads, storage areas, pipelines, and offices. Our design and comprehensive specifications include more than 3,000 cameras, with a sophisticated control and recording capability. The access control system includes perimeter detection and vehicle checks. We have designed a new resilient optical network to carry the video and data traffic, which also includes a new IP telephony system. A central control room and several satellite control rooms provide the necessary command and control facilities.

Complex surveillance systems Atkins provides the definition and design for wide-area surveillance schemes, with associated recording, Control Room design, Automatic Number Plate Recognition (ANPR) and supporting systems. Our team of experienced engineers have developed a range of skills and knowledge that places Atkins at the forefront of the planning and provision of both digital and analogue CCTV surveillance systems. Our consultants continue to play a critical and central role as Design Authority for many government and industrial projects. Advanced identity management Institutions and businesses across the globe face a growing number of national and international security challenges, including amongst others human trafficking, illegal immigration, airport passenger management and internet identity fraud. We are experts at assisting organisations in managing these security challenges. We can help you select and procure the right solutions to assist with establishing the true identity of an individual as part of a wider identity assurance programme. We are currently assisting several government departments in identity management projects where technical expertise, trusted partner status and delivery capability are core requirements. Case study: integrated sea- and airport CCTV Atkins was appointed by States of Guernsey Customs & Excise to design and project manage the installation of a new CCTV system in the commercial ferry port of St Peter Port and the new terminal building at Guernsey International Airport. The system had to monitor both airside and landside areas, including all arrivals and departures areas, car parks and approaches to both ports of entry. Atkins designed the system and specified the optical and microwave transmission network linking sensors to the control rooms. ANPR technology was deployed on all highway approaches with evidentialquality digital video recording. 9

Design security environments Our approach includes the principles of Secure-by-Design and Crime Prevention Through Environmental Design to provide an unobtrusive and effective security system Perimeter, border and barrier design Sensitive installations require effective physical perimeter security. We have extensive experience of designing physical structures, associated intrusion detection systems and sophisticated lighting. These systems can be complex, especially in environments where external triggers could create false alarms and need to be carefully specified. Our designs for vehicle access control arrangements include road blockers, chicanes and barriers with appropriate electronic controls such as ANPR identification systems. Masterplanning: from concept to delivery Our services incorporate all aspects, from concept masterplanning of an entire security network, through detailed design, to equipment specification and implementation. Atkins is vendor-independent, free to specify and select systems, hardware and software that deliver the best, total value, integrated solutions. Regardless of project size and complexity, our aim is to provide a fully integrated solution that is fully proven, innovative in its approach, and able to address current and emerging threats and technologies.

Experienced blast engineering Atkins is one of the leading specialists in the planning of critical buildings, including defence establishments. Our expertise covers blast analysis and the provision of designs to mitigate blast and weapons effects with the design of hardened structures. Our design work is based on the detailed evaluation of potential threats and includes structures resistant to accidental damage, terrorist attack, civil insurrection and acts of nature, including: Explosion and blast Seismic activity Bombs and missiles Nuclear, chemical and biological attack Major equipment damage Major structural damage Minor damage Drawing on our deep understanding of the security environment, which we have gained internationally, our skilled teams bring a breadth and enviable depth of engineering, operational and technical experience to every security project. Case study: secure military base This 900m project encompassed the replacement of almost an entire military base with modern facilities, demonstrating the full range of multi-disciplinary skills within Atkins. The design included extensive counter terrorism measures, such as advanced structural stability and integrity of beams, columns and roof rafters as well as cladding and glazing materials. Atkins reviewed the internal layout and masonry, paying particular attention to single-storey ties and struts. We also designed the fencing arrangements and perimeter protection systems. 11

Our values Dedicated to clients Atkins is independent of all contractors, service providers and suppliers. We offer unbiased advice and we are committed to obtaining the best value for money through technical excellence, innovation and execution for all our clients. Quality at the heart Atkins and each of its business groups adopts a systematic approach to quality management and maintains a documented quality system. Our integrated management system is accredited to BSN ISO 9001:2000 (Quality Management Standard) TickIT Scheme Version 5, OHSAS 18001:1999 (H&S Management Standard) and ISO 14001:2004 (Environmental Management Standard). Respecting our people Atkins is committed to attracting, training and retaining the best people. We are one of the top 20 Best Big Companies to Work For (The Times, 2007) and one of the UK s top 100 graduate employers (The Times, 2007). Valuing the environment We take environmental impact into account in the planning, design and implementation of our contracts to help prevent pollution, minimise our impacts on local communities and ensure that activities with high environmental risks are controlled effectively. We are proud of our reputation in the field. Contact Atkins: Atkins Ltd 2620 Aztec West Park Avenue Almondsbury Bristol BS32 4GQ United Kingdom Email: Web: securitygroup@atkinsglobal.com www.atkinsglobal.com The Atkins logo, the open A device and the strapline Plan Design Enable are trademarks of Atkins Limited, a WS Atkins plc company. Copyright 2008 Atkins Limited except where stated otherwise. This brochure is printed on 9Lives 80 paper, one of the new generation of eco-friendly materials, with class-leading whiteness and printability, with 80% recycled content.