SlideShare a Scribd company logo
1 of 22
Escrow Solutions Presentation NCC Group Plc Manchester Technology Centre Oxford Road Manchester M1 7EF www.nccgroup.com Simon Greaves  Key Account Manager  Tel:  +44 (0) 161 209 5190 e-mail:  [email_address]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
About NCC Group ,[object Object],[object Object],[object Object],[object Object],[object Object],NCC Group is the world’s largest Software escrow provider
Our services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The need for software escrow  ,[object Object],[object Object],[object Object],[object Object],[object Object],Source: Vision One Research 2007
What is software escrow? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Benefits for the licensee ,[object Object],[object Object],[object Object],[object Object],[object Object]
NCC Group Escrow Solutions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Primary Components of Escrow Agreement ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Primary Components of Escrow Agreement ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What can YOU do if a release is triggered?   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why is testing important?  ,[object Object],[object Object],[object Object],[object Object],[object Object],All escrow deposits are integrity tested as standard to ensure accessible and virus free
NCC Group Verification Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
NCC Group Verification Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Effect Of Current Economic Climate ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Act on Escrow NOW ,[object Object],[object Object],[object Object],[object Object]
Risk assessment & escrow policy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Escrow Clause ,[object Object]
Questions and Answers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
Your Account Manager ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

What's hot (20)

ICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber security
 
Smart grid in the Critical National Infrastructure
Smart grid in the Critical National InfrastructureSmart grid in the Critical National Infrastructure
Smart grid in the Critical National Infrastructure
 
Digital Ethical Risk Assessment
Digital Ethical Risk AssessmentDigital Ethical Risk Assessment
Digital Ethical Risk Assessment
 
CompTIA network+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new examCompTIA network+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new exam
 
Broadening Your Cybersecurity Mindset
Broadening Your Cybersecurity MindsetBroadening Your Cybersecurity Mindset
Broadening Your Cybersecurity Mindset
 
Security in Mergers and Acquisitions - NTT Security - Miriam Levenstein
Security in Mergers and Acquisitions  - NTT Security - Miriam LevensteinSecurity in Mergers and Acquisitions  - NTT Security - Miriam Levenstein
Security in Mergers and Acquisitions - NTT Security - Miriam Levenstein
 
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec MattersWebinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
 
Information Security Seminar
Information Security SeminarInformation Security Seminar
Information Security Seminar
 
Software Licensing & Compliance: Two Strategies, One Goal
Software Licensing & Compliance: Two Strategies, One GoalSoftware Licensing & Compliance: Two Strategies, One Goal
Software Licensing & Compliance: Two Strategies, One Goal
 
Webinar–Why All Open Source Scans Aren't Created Equal
Webinar–Why All Open Source Scans Aren't Created EqualWebinar–Why All Open Source Scans Aren't Created Equal
Webinar–Why All Open Source Scans Aren't Created Equal
 
Assuring the Security of the Supply Chain - Designing best practices for cybe...
Assuring the Security of the Supply Chain - Designing best practices for cybe...Assuring the Security of the Supply Chain - Designing best practices for cybe...
Assuring the Security of the Supply Chain - Designing best practices for cybe...
 
Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What? Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What?
 
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
 
Webinar–Open Source Risk in M&A by the Numbers
Webinar–Open Source Risk in M&A by the NumbersWebinar–Open Source Risk in M&A by the Numbers
Webinar–Open Source Risk in M&A by the Numbers
 
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software AssetsWebinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
 
Insights into your IT Service Management - Middle East
Insights into your IT Service Management - Middle EastInsights into your IT Service Management - Middle East
Insights into your IT Service Management - Middle East
 
Isaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industryIsaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industry
 
Webinar–The State of Open Source in M&A Transactions
Webinar–The State of Open Source in M&A Transactions Webinar–The State of Open Source in M&A Transactions
Webinar–The State of Open Source in M&A Transactions
 
Webinar–Delivering a Next Generation Vulnerability Feed
Webinar–Delivering a Next Generation Vulnerability FeedWebinar–Delivering a Next Generation Vulnerability Feed
Webinar–Delivering a Next Generation Vulnerability Feed
 
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
 

Similar to Escrow Presentation2010

Escrow Presentation
Escrow PresentationEscrow Presentation
Escrow Presentation
ejervis
 
NCC Group Software Escrow Services
NCC Group Software Escrow ServicesNCC Group Software Escrow Services
NCC Group Software Escrow Services
philomole
 
Software Licence Audits - Facts Survival Benefits
Software Licence Audits - Facts Survival BenefitsSoftware Licence Audits - Facts Survival Benefits
Software Licence Audits - Facts Survival Benefits
Eric Chiu
 
Insurance_Brochure_NextGen-Underwriting-Solution_06_2011
Insurance_Brochure_NextGen-Underwriting-Solution_06_2011Insurance_Brochure_NextGen-Underwriting-Solution_06_2011
Insurance_Brochure_NextGen-Underwriting-Solution_06_2011
Arun Rama Krishna
 
Procurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesProcurement Of Software And Information Technology Services
Procurement Of Software And Information Technology Services
Peister
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
EY
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docx
dewhirstichabod
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelines
amburyj3c9
 
Technology Services RM1058 Customer Guidance
Technology Services RM1058 Customer GuidanceTechnology Services RM1058 Customer Guidance
Technology Services RM1058 Customer Guidance
Ben Morrison
 
Iaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems usingIaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems using
Iaetsd Iaetsd
 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013
Turvallisuus2013
 

Similar to Escrow Presentation2010 (20)

Escrow Presentation
Escrow PresentationEscrow Presentation
Escrow Presentation
 
Ncc Group Escrow Overview 2010
Ncc Group Escrow Overview 2010Ncc Group Escrow Overview 2010
Ncc Group Escrow Overview 2010
 
NCC Group Software Escrow Services
NCC Group Software Escrow ServicesNCC Group Software Escrow Services
NCC Group Software Escrow Services
 
Software Outsourcing
Software OutsourcingSoftware Outsourcing
Software Outsourcing
 
Anajli_Synopsis
Anajli_SynopsisAnajli_Synopsis
Anajli_Synopsis
 
Build and Package Lightning Components for Lightning Exchange
Build and Package Lightning Components for Lightning ExchangeBuild and Package Lightning Components for Lightning Exchange
Build and Package Lightning Components for Lightning Exchange
 
Software Licence Audits - Facts Survival Benefits
Software Licence Audits - Facts Survival BenefitsSoftware Licence Audits - Facts Survival Benefits
Software Licence Audits - Facts Survival Benefits
 
Insurance_Brochure_NextGen-Underwriting-Solution_06_2011
Insurance_Brochure_NextGen-Underwriting-Solution_06_2011Insurance_Brochure_NextGen-Underwriting-Solution_06_2011
Insurance_Brochure_NextGen-Underwriting-Solution_06_2011
 
Procurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesProcurement Of Software And Information Technology Services
Procurement Of Software And Information Technology Services
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Tools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
Tools & Techniques for Addressing Component Vulnerabilities for PCI ComplianceTools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
Tools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
 
OBA Presentation on Warranties
OBA Presentation on WarrantiesOBA Presentation on Warranties
OBA Presentation on Warranties
 
Financial Services-ready Public Cloud white paper [march 9, 2020]
Financial Services-ready Public Cloud white paper [march 9, 2020]Financial Services-ready Public Cloud white paper [march 9, 2020]
Financial Services-ready Public Cloud white paper [march 9, 2020]
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docx
 
Genie for the asset financier
Genie for the asset financierGenie for the asset financier
Genie for the asset financier
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelines
 
VendorRisk - Vendor Management Software
VendorRisk - Vendor Management SoftwareVendorRisk - Vendor Management Software
VendorRisk - Vendor Management Software
 
Technology Services RM1058 Customer Guidance
Technology Services RM1058 Customer GuidanceTechnology Services RM1058 Customer Guidance
Technology Services RM1058 Customer Guidance
 
Iaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems usingIaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems using
 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013
 

Escrow Presentation2010

  • 1. Escrow Solutions Presentation NCC Group Plc Manchester Technology Centre Oxford Road Manchester M1 7EF www.nccgroup.com Simon Greaves Key Account Manager Tel: +44 (0) 161 209 5190 e-mail: [email_address]
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.  
  • 21.  
  • 22.

Editor's Notes

  1. Assurance testing – Ethical hacking worldwide Consultancy – Provided at all levels regarding security and advice – UK only
  2. BUT - object code provides you with a executable application and in order to maintain that you would need the source code 82% - Most organisations have a lot of there critical applications covered but a lot get missed because there is no organisation wide process covering critical apps
  3. Failure to Meet – Most important and less understood in the market. Breach of contractually obligations which result in material loss IPR – Maintenance goes up etc