SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
Secure Hosting Service

QinetiQ’s Secure Hosting Service is for customers
who want to outsource the proactive analysis,
protection and management of their secure digital
data to a trusted third party.
• Optimal availability,
integrity and security
• Geographically diverse
Secure Hosting Sites
• Additional protection
provided by QinetiQ
digital security services
• Service Desk Support
• Operated and
administered by
security-cleared
personnel
The security challenges faced by
organisations are well known. Threats
to networks and systems include theft
of proprietary information, financial
fraud, insider and outsider system
penetration and sabotage of data
networks.
Implementing an in-house function to
mitigate and protect against these
threats around the clock is a major
undertaking with considerable cost
implications.
Outsourcing to a trusted 3rd party,
experienced and capable of providing

seamless round the clock protection is
the preferred option of many global
organisations.
QinetiQ’s Secure Hosting Service is for
businesses and organisations that
value the availability and integrity of
their data assets and who need to
ensure maximum protection against
hacking and defacement.
The service can provide a complete
website or application solution which
combines the functionality customers
expect with the security and resilience
needed.
Best of Breed Deployment
Choosing QinetiQ to provide your
secure hosting solution means
choosing a company with a
technological heritage and reputation
for providing innovative solutions to
exacting problems. Whichever hosting
service you select we can provide
unexcelled levels of performance and
resilience to conduct online business
with confidence, security and total
peace of mind.
QinetiQ Proprietary Methodology
The service is designed, managed and
monitored by information assurance
and security specialists, trained and
experienced in providing a range of
information security services to highprofile government departments,
where the availability and protection
of sensitive information is a crucial
balancing act.
QinetiQ sites are physically secure to
List X standards. The hosting
equipment is housed within an access
controlled building compliant to the
stringent requirements of the MoD to
security standard JSP 440.
The security of the service is ensured
through the use of hardened Linux or
Windows® operating systems and
protection is supplemented by regular
penetration testing. We further ensure
the security of the service by deploying
our Managed Intrusion Detection
Service which is provided in
compliance with CESG Memo 37.
QinetiQ can also provide a number of
supplementary services such as email,
mail forwarders, Domain Name Server
(DNS) registration, SSL (Secure Socket
Layer) Certificate Management, antivirus and anti-spam.
Maintaining ownership and control of
site content is very important to
customers and our infrastructure
allows customers to upload their own

content using our staging server
application and to view their site or
information prior to release. The
success of a web site can be
determined by demand and the
QinetiQ service allows the customer to
have easy access to online statistics
and reports, which can help in future
planning or help predict peaks of
traffic to a web site. The flexible design
of the infrastructure means that
scalability is easy and it supports
burstable bandwidth to sustain those
peaks of traffic.
Scalable Solutions
We provide customers with three
choices of hosting.
Virtual hosting which is a keenly priced
and easily set up service, perfect for
customers who require availability and
security, but whose information is not
particularly sensitive.
Dedicated hosting can be deployed
when security is key and physical
separation is essential. This service
provides the physical separation
customers require and does not
compromise availability or reliability.

Total Support
QinetiQ is the UK’s leading
international defence and security
technology company developing
innovative technology-based solutions
and products and providing
technology-rich support services for
major government organisations, such
as the UK MoD, the US DoD and for
commercial customers around the
world.
We provide our customers with
proactive analysis, protection and
management of their digital data
assets and achieve this with the
application of a range of offerings:
• Information Security and Assurance
Consultancy
• Management Intrusion Detection
Service
• Managed Vulnerability Assessment
and Alerting Service
• Penetration Testing Service
• Secure Hosting Service
• Digital Forensics Service

High availability is an extra special
service and provides protection for
extremely sensitive and valuable
information. It ensures that the service
is robust with no single points of
failure. This service can still function
effectively even with a loss of up to
50% of the hardware.
Customer Integration
This service seamlessly integrates with
customers existing business operation.
Availability and integrity are important
to the customers in the protection of
their digital data assets and this
service ensures that customers have
an uninterrupted business presence
with high levels of performance,
reliability, resilience and availability.

For more information please contact:
Customer Contact Team
QinetiQ
Cody Technology Park
Ively Road Farnborough
Hampshire GU14 0LX
United Kingdom
Tel +44 (0) 8700 100942
www.QinetiQ.com
Copyright © QinetiQ ltd 2008
QinetiQ/AT/DS/PUB0800751

Mais conteúdo relacionado

Mais procurados

Security and Trust for Digital Transactions : Dictao presentation during the ...
Security and Trust for Digital Transactions : Dictao presentation during the ...Security and Trust for Digital Transactions : Dictao presentation during the ...
Security and Trust for Digital Transactions : Dictao presentation during the ...
Dictao
 

Mais procurados (20)

Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 
Q radar pci-v2-matrix
Q radar pci-v2-matrixQ radar pci-v2-matrix
Q radar pci-v2-matrix
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?
 
Introduction to PCI DSS
Introduction to PCI DSSIntroduction to PCI DSS
Introduction to PCI DSS
 
The Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and PrivacyThe Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and Privacy
 
PCI Descoping: How to Reduce Controls and Streamline Compliance
PCI Descoping: How to Reduce Controls and Streamline CompliancePCI Descoping: How to Reduce Controls and Streamline Compliance
PCI Descoping: How to Reduce Controls and Streamline Compliance
 
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
 
Informed consent and cloud computing
Informed consent and cloud computingInformed consent and cloud computing
Informed consent and cloud computing
 
PCI DSS 2.0 Detailed Introduction
PCI DSS 2.0 Detailed IntroductionPCI DSS 2.0 Detailed Introduction
PCI DSS 2.0 Detailed Introduction
 
Best Practices for PCI Scope Reduction - TokenEx & Kyte
Best Practices for PCI Scope Reduction - TokenEx & KyteBest Practices for PCI Scope Reduction - TokenEx & Kyte
Best Practices for PCI Scope Reduction - TokenEx & Kyte
 
1. PCI Compliance Overview
1. PCI Compliance Overview1. PCI Compliance Overview
1. PCI Compliance Overview
 
Document security & firewall
Document security & firewallDocument security & firewall
Document security & firewall
 
Forecast odcau6 100_eb
Forecast odcau6 100_ebForecast odcau6 100_eb
Forecast odcau6 100_eb
 
Seattle Tech4Good meetup: Data Security and Privacy
Seattle Tech4Good meetup: Data Security and PrivacySeattle Tech4Good meetup: Data Security and Privacy
Seattle Tech4Good meetup: Data Security and Privacy
 
Taming the compliance beast in cloud
Taming the compliance beast in cloudTaming the compliance beast in cloud
Taming the compliance beast in cloud
 
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAINING
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAININGPCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAINING
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAINING
 
Secure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationSecure Channels Financal Institution Presentation
Secure Channels Financal Institution Presentation
 
Privacy frameworks 101
Privacy frameworks 101Privacy frameworks 101
Privacy frameworks 101
 
Security and Trust for Digital Transactions : Dictao presentation during the ...
Security and Trust for Digital Transactions : Dictao presentation during the ...Security and Trust for Digital Transactions : Dictao presentation during the ...
Security and Trust for Digital Transactions : Dictao presentation during the ...
 
Webinar - pci dss 4.0 updates
Webinar - pci dss 4.0 updates Webinar - pci dss 4.0 updates
Webinar - pci dss 4.0 updates
 

Destaque

Job roles in the film industry by fateha
Job roles in the film industry by fatehaJob roles in the film industry by fateha
Job roles in the film industry by fateha
haverstockmedia
 
FoodTechnolChemContam_Nov issue
FoodTechnolChemContam_Nov issueFoodTechnolChemContam_Nov issue
FoodTechnolChemContam_Nov issue
Christina Chase
 
Performance Evaluation of Computationally Efficient Energy Detection Based Sp...
Performance Evaluation of Computationally Efficient Energy Detection Based Sp...Performance Evaluation of Computationally Efficient Energy Detection Based Sp...
Performance Evaluation of Computationally Efficient Energy Detection Based Sp...
IJRST Journal
 

Destaque (15)

AWSome Day London January 2016 Intro
AWSome Day London January 2016 IntroAWSome Day London January 2016 Intro
AWSome Day London January 2016 Intro
 
Comparing Various SDLC Models On The Basis Of Available Methodology
Comparing Various SDLC Models On The Basis Of Available MethodologyComparing Various SDLC Models On The Basis Of Available Methodology
Comparing Various SDLC Models On The Basis Of Available Methodology
 
Brunilda Tejada Ureña
Brunilda Tejada UreñaBrunilda Tejada Ureña
Brunilda Tejada Ureña
 
ESAMC - 3 Sem - Identidade + sociedade
ESAMC - 3 Sem - Identidade + sociedadeESAMC - 3 Sem - Identidade + sociedade
ESAMC - 3 Sem - Identidade + sociedade
 
A Novel Approach for Interference Suppression Using a Improved LMS Based Adap...
A Novel Approach for Interference Suppression Using a Improved LMS Based Adap...A Novel Approach for Interference Suppression Using a Improved LMS Based Adap...
A Novel Approach for Interference Suppression Using a Improved LMS Based Adap...
 
Job roles in the film industry by fateha
Job roles in the film industry by fatehaJob roles in the film industry by fateha
Job roles in the film industry by fateha
 
一小時可以打造什麼服務Plus twMVC#18
一小時可以打造什麼服務Plus twMVC#18一小時可以打造什麼服務Plus twMVC#18
一小時可以打造什麼服務Plus twMVC#18
 
ESAMC - 3 Sem - Starbuckss
ESAMC - 3 Sem - StarbuckssESAMC - 3 Sem - Starbuckss
ESAMC - 3 Sem - Starbuckss
 
Crear un juego
Crear un juegoCrear un juego
Crear un juego
 
Giuramento dello Psicoterapeuta
Giuramento dello Psicoterapeuta Giuramento dello Psicoterapeuta
Giuramento dello Psicoterapeuta
 
Rymdstyrelsen (Rumfartsbestyrelse) er et statsligt svensk agentur
Rymdstyrelsen (Rumfartsbestyrelse) er et statsligt svensk agenturRymdstyrelsen (Rumfartsbestyrelse) er et statsligt svensk agentur
Rymdstyrelsen (Rumfartsbestyrelse) er et statsligt svensk agentur
 
Η ζωή στο νερό
Η ζωή στο νερόΗ ζωή στο νερό
Η ζωή στο νερό
 
FoodTechnolChemContam_Nov issue
FoodTechnolChemContam_Nov issueFoodTechnolChemContam_Nov issue
FoodTechnolChemContam_Nov issue
 
Performance Evaluation of Computationally Efficient Energy Detection Based Sp...
Performance Evaluation of Computationally Efficient Energy Detection Based Sp...Performance Evaluation of Computationally Efficient Energy Detection Based Sp...
Performance Evaluation of Computationally Efficient Energy Detection Based Sp...
 
Axillary tasks
Axillary tasksAxillary tasks
Axillary tasks
 

Semelhante a Protective Monitoring

Highstreet Overview
Highstreet OverviewHighstreet Overview
Highstreet Overview
Debbie Lovis
 
imtechspherebrochure
imtechspherebrochureimtechspherebrochure
imtechspherebrochure
Steve Tester
 
Brochure Security
Brochure SecurityBrochure Security
Brochure Security
bryanpsu
 
GPS - Corporate Overview
GPS - Corporate OverviewGPS - Corporate Overview
GPS - Corporate Overview
Tawnia Beckwith
 
Scc soft token datasheet
Scc soft token datasheetScc soft token datasheet
Scc soft token datasheet
Hai Nguyen
 
Invictait-Business_Technology_Intelligently_Applied
Invictait-Business_Technology_Intelligently_AppliedInvictait-Business_Technology_Intelligently_Applied
Invictait-Business_Technology_Intelligently_Applied
Richard Hunter-Rice
 
RS_corporate_ovrvw_Revise60816_ƒemail
RS_corporate_ovrvw_Revise60816_ƒemailRS_corporate_ovrvw_Revise60816_ƒemail
RS_corporate_ovrvw_Revise60816_ƒemail
Joe Zuramski
 
Managed services web
Managed services webManaged services web
Managed services web
Dean North
 
Managed services web
Managed services webManaged services web
Managed services web
Mark Howie
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
Muhammad Mudassar
 
Signify Overview
Signify OverviewSignify Overview
Signify Overview
pjpallen
 
Signify Overview
Signify OverviewSignify Overview
Signify Overview
kate_holden
 

Semelhante a Protective Monitoring (20)

Highstreet Overview
Highstreet OverviewHighstreet Overview
Highstreet Overview
 
___2360_SP_RBR_4pp_FINAL---Screen
___2360_SP_RBR_4pp_FINAL---Screen___2360_SP_RBR_4pp_FINAL---Screen
___2360_SP_RBR_4pp_FINAL---Screen
 
Ukraine Dedicated Server Hosting is Good for Business by Onlive Server
Ukraine Dedicated Server Hosting is Good for Business by Onlive ServerUkraine Dedicated Server Hosting is Good for Business by Onlive Server
Ukraine Dedicated Server Hosting is Good for Business by Onlive Server
 
imtechspherebrochure
imtechspherebrochureimtechspherebrochure
imtechspherebrochure
 
SecureWorks
SecureWorksSecureWorks
SecureWorks
 
Brochure Security
Brochure SecurityBrochure Security
Brochure Security
 
GPS - Corporate Overview
GPS - Corporate OverviewGPS - Corporate Overview
GPS - Corporate Overview
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
 
Scc soft token datasheet
Scc soft token datasheetScc soft token datasheet
Scc soft token datasheet
 
Invictait-Business_Technology_Intelligently_Applied
Invictait-Business_Technology_Intelligently_AppliedInvictait-Business_Technology_Intelligently_Applied
Invictait-Business_Technology_Intelligently_Applied
 
RS_corporate_ovrvw_Revise60816_ƒemail
RS_corporate_ovrvw_Revise60816_ƒemailRS_corporate_ovrvw_Revise60816_ƒemail
RS_corporate_ovrvw_Revise60816_ƒemail
 
Confisio Datacenter
Confisio DatacenterConfisio Datacenter
Confisio Datacenter
 
Managed services web
Managed services webManaged services web
Managed services web
 
Managed servoes 2mb
Managed servoes 2mbManaged servoes 2mb
Managed servoes 2mb
 
Managed services web
Managed services webManaged services web
Managed services web
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
 
Company Profile Managemenyt company.pptx
Company Profile Managemenyt company.pptxCompany Profile Managemenyt company.pptx
Company Profile Managemenyt company.pptx
 
On-Site Computer Solutions
On-Site Computer SolutionsOn-Site Computer Solutions
On-Site Computer Solutions
 
Signify Overview
Signify OverviewSignify Overview
Signify Overview
 
Signify Overview
Signify OverviewSignify Overview
Signify Overview
 

Mais de johandev

Mais de johandev (13)

Aviation Airworthiness
Aviation AirworthinessAviation Airworthiness
Aviation Airworthiness
 
QinetiQ-AR13-11
QinetiQ-AR13-11QinetiQ-AR13-11
QinetiQ-AR13-11
 
QinetiQ-AR13-9
QinetiQ-AR13-9QinetiQ-AR13-9
QinetiQ-AR13-9
 
QinetiQ-AR13-8
QinetiQ-AR13-8QinetiQ-AR13-8
QinetiQ-AR13-8
 
QinetiQ-AR13-7
QinetiQ-AR13-7QinetiQ-AR13-7
QinetiQ-AR13-7
 
QinetiQ-AR13-6
QinetiQ-AR13-6QinetiQ-AR13-6
QinetiQ-AR13-6
 
QinetiQ-AR13-5
QinetiQ-AR13-5QinetiQ-AR13-5
QinetiQ-AR13-5
 
QinetiQ-AR13-4
QinetiQ-AR13-4QinetiQ-AR13-4
QinetiQ-AR13-4
 
QinetiQ-AR13-3
QinetiQ-AR13-3QinetiQ-AR13-3
QinetiQ-AR13-3
 
QinetiQ
QinetiQQinetiQ
QinetiQ
 
Qineti q annual report 2009
Qineti q annual report 2009Qineti q annual report 2009
Qineti q annual report 2009
 
Qineti q annual report 2008
Qineti q annual report 2008Qineti q annual report 2008
Qineti q annual report 2008
 
Qinetiq annual report 2008
Qinetiq annual report 2008Qinetiq annual report 2008
Qinetiq annual report 2008
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Protective Monitoring

  • 1. Secure Hosting Service QinetiQ’s Secure Hosting Service is for customers who want to outsource the proactive analysis, protection and management of their secure digital data to a trusted third party. • Optimal availability, integrity and security • Geographically diverse Secure Hosting Sites • Additional protection provided by QinetiQ digital security services • Service Desk Support • Operated and administered by security-cleared personnel The security challenges faced by organisations are well known. Threats to networks and systems include theft of proprietary information, financial fraud, insider and outsider system penetration and sabotage of data networks. Implementing an in-house function to mitigate and protect against these threats around the clock is a major undertaking with considerable cost implications. Outsourcing to a trusted 3rd party, experienced and capable of providing seamless round the clock protection is the preferred option of many global organisations. QinetiQ’s Secure Hosting Service is for businesses and organisations that value the availability and integrity of their data assets and who need to ensure maximum protection against hacking and defacement. The service can provide a complete website or application solution which combines the functionality customers expect with the security and resilience needed.
  • 2. Best of Breed Deployment Choosing QinetiQ to provide your secure hosting solution means choosing a company with a technological heritage and reputation for providing innovative solutions to exacting problems. Whichever hosting service you select we can provide unexcelled levels of performance and resilience to conduct online business with confidence, security and total peace of mind. QinetiQ Proprietary Methodology The service is designed, managed and monitored by information assurance and security specialists, trained and experienced in providing a range of information security services to highprofile government departments, where the availability and protection of sensitive information is a crucial balancing act. QinetiQ sites are physically secure to List X standards. The hosting equipment is housed within an access controlled building compliant to the stringent requirements of the MoD to security standard JSP 440. The security of the service is ensured through the use of hardened Linux or Windows® operating systems and protection is supplemented by regular penetration testing. We further ensure the security of the service by deploying our Managed Intrusion Detection Service which is provided in compliance with CESG Memo 37. QinetiQ can also provide a number of supplementary services such as email, mail forwarders, Domain Name Server (DNS) registration, SSL (Secure Socket Layer) Certificate Management, antivirus and anti-spam. Maintaining ownership and control of site content is very important to customers and our infrastructure allows customers to upload their own content using our staging server application and to view their site or information prior to release. The success of a web site can be determined by demand and the QinetiQ service allows the customer to have easy access to online statistics and reports, which can help in future planning or help predict peaks of traffic to a web site. The flexible design of the infrastructure means that scalability is easy and it supports burstable bandwidth to sustain those peaks of traffic. Scalable Solutions We provide customers with three choices of hosting. Virtual hosting which is a keenly priced and easily set up service, perfect for customers who require availability and security, but whose information is not particularly sensitive. Dedicated hosting can be deployed when security is key and physical separation is essential. This service provides the physical separation customers require and does not compromise availability or reliability. Total Support QinetiQ is the UK’s leading international defence and security technology company developing innovative technology-based solutions and products and providing technology-rich support services for major government organisations, such as the UK MoD, the US DoD and for commercial customers around the world. We provide our customers with proactive analysis, protection and management of their digital data assets and achieve this with the application of a range of offerings: • Information Security and Assurance Consultancy • Management Intrusion Detection Service • Managed Vulnerability Assessment and Alerting Service • Penetration Testing Service • Secure Hosting Service • Digital Forensics Service High availability is an extra special service and provides protection for extremely sensitive and valuable information. It ensures that the service is robust with no single points of failure. This service can still function effectively even with a loss of up to 50% of the hardware. Customer Integration This service seamlessly integrates with customers existing business operation. Availability and integrity are important to the customers in the protection of their digital data assets and this service ensures that customers have an uninterrupted business presence with high levels of performance, reliability, resilience and availability. For more information please contact: Customer Contact Team QinetiQ Cody Technology Park Ively Road Farnborough Hampshire GU14 0LX United Kingdom Tel +44 (0) 8700 100942 www.QinetiQ.com Copyright © QinetiQ ltd 2008 QinetiQ/AT/DS/PUB0800751