Gss Company Profile
Upcoming SlideShare
Loading in...5
×
 

Gss Company Profile

on

  • 419 views

GSS corporate presentation

GSS corporate presentation

Statistics

Views

Total Views
419
Views on SlideShare
418
Embed Views
1

Actions

Likes
0
Downloads
0
Comments
0

1 Embed 1

http://www.slideshare.net 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Gss Company Profile Gss Company Profile Presentation Transcript

    • Company Profile
    • May 2009
  • Brief History
    • GSS merged with Peapod (UK) in Sep ’07
    • GSS started infosecurity business in 1997
    • Peapod started infosecurity business in 1995
    • Both businesses of similar size: turnover and people
    • Very similar technology profiles
    • Peapod had a separate consulting division
    • Both businesses:
    • - strong in public sector
    • - strong in SME space
    • - had significant number of enterprise clients
  • Company Fact-file
    • £11.5M turnover in 2008
    • £9.5M technology-based: £2M consulting-based
    • 55 staff
    • Offices in Bracknell and Worthing
    • Over 1,000 current buying clients
    • 500+ public sector organisations
    • - central government, education, LA’s, NHS, police
    • 200+ consulting-only clients (no product)
    • In top 10 information security specialists in UK
  • GSS Company Structure
    • Two operating divisions
    • - Technology
    • - Information Risk Management (IRM)
    • 55 staff
    • - 4 directors
    • - 13 product-based engineers
    • - 11 consultants/testers
    • - 20 sales & marketing
    • - 7 administration
  • IRM Division
    • Gap analysis & risk assessments
    • Security architecture reviews
    • ISO-27001 lead auditors
    • DPA-DSS & PCI-DSS specialists
    • Policy reviews and production
    • Code of Connection specialists – GCSx (CoCo) & N3
    • Microsoft Infrastructure & security services
    • - Certified Gold Partner
    • Certified penetration and application testers
    • - CESG CHECK Green Accredited & CREST member
  • Technology Division
    • Portfolio covers the majority of infosecurity requirements
    • Partner a number leading brand vendors
    • Introduce innovative technologies to the market
    • Fully accredited with key vendors
    • Maintain accreditations via on-going training programs
    • Provide help desk service for key products
    • Building range of managed services in partnership
    • with QinetiQ (information available on request)
  • Key Vendor Partnerships
    • Firewalls
    • - Juniper, Check Point, Secure Computing, GTA
    • Secure Remote Access (SSL/SSH VPN’s)
    • - Juniper SA, appGATE, Microsoft IAG
    • Strong Authentication
    • - RSA, Swivel, Signify
    • Encryption, Device & Application control
    • - Lumension, Utimaco
  • Key Vendor Partnerships
    • Email, Web, IM Security/Management & DLP
    • - Websense, Trend, Finjan, BorderWare, Facetime
    • Intrusion detection & prevention (IDP)
    • - Juniper, Radware
    • Application delivery
    • - Blue Coat, Radware, Juniper
    • Policy deployment & management
    • - NETconsent
  • Other Vendor Partnerships
    • Cyber-Ark: digital vaults & identity access management, password and intra/inter-business security
    • Imprivata: single sign-on/strong authentication
    • Palo Alto: application layer/aware UTM firewall
    • Breach: web application firewall
    • Mimecast: ‘in the cloud’ email security and archiving
  • Other Vendor Partnerships
    • Voltage: email & file encryption
    • Tier 3: application layer behavioural intelligence
    • Lancope: network behavioural analysis & intrusion prevention, and NetFlow analysis
    • exaprotect: network threat detection, remediation and log management
    • Protegrity: database & file encryption
  • Today’s Key Issues
    • Business & regulatory compliance
    • Protection of share value & key business assets
    • Standards: ISO 9001/27001, SOX, PCI-DSS
    • Protection of personally identifiable data: DPA-DSS
    • Policy management
    • Network connectivity: GCSx, N3
    • Data loss prevention
    • Improving return on investment
    • Reducing cost of ownership
  • Information Security
  • information assurance. delivered
  • Secure Infrastructure Secure Infrastructure Firewalls Patch Management VPN IDS Content Active Directory High Availability Email
  • Secure Data Secure Data Encryption Email Archiving Penetration Testing Application Testing Data Leakage Email
  • Secure People Secure People ISO 27001 NETconsent Policy Data Protection Act Security Training
  • Information assurance. delivered
    • GSS solves today’s problems with:
    • Solutions that meet the need within budget
    • Leading brand & innovative technologies
    • Full range of value-added technical services
    • Unique managed services partnership with QinetiQ
    • Portfolio of accredited security & compliance consulting services