SlideShare a Scribd company logo
1 of 2
Download to read offline
Secure Hosting Service

QinetiQ’s Secure Hosting Service is for customers
who want to outsource the proactive analysis,
protection and management of their secure digital
data to a trusted third party.
• Optimal availability,
integrity and security
• Geographically diverse
Secure Hosting Sites
• Additional protection
provided by QinetiQ
digital security services
• Service Desk Support
• Operated and
administered by
security-cleared
personnel
The security challenges faced by
organisations are well known. Threats
to networks and systems include theft
of proprietary information, financial
fraud, insider and outsider system
penetration and sabotage of data
networks.
Implementing an in-house function to
mitigate and protect against these
threats around the clock is a major
undertaking with considerable cost
implications.
Outsourcing to a trusted 3rd party,
experienced and capable of providing

seamless round the clock protection is
the preferred option of many global
organisations.
QinetiQ’s Secure Hosting Service is for
businesses and organisations that
value the availability and integrity of
their data assets and who need to
ensure maximum protection against
hacking and defacement.
The service can provide a complete
website or application solution which
combines the functionality customers
expect with the security and resilience
needed.
Best of Breed Deployment
Choosing QinetiQ to provide your
secure hosting solution means
choosing a company with a
technological heritage and reputation
for providing innovative solutions to
exacting problems. Whichever hosting
service you select we can provide
unexcelled levels of performance and
resilience to conduct online business
with confidence, security and total
peace of mind.
QinetiQ Proprietary Methodology
The service is designed, managed and
monitored by information assurance
and security specialists, trained and
experienced in providing a range of
information security services to highprofile government departments,
where the availability and protection
of sensitive information is a crucial
balancing act.
QinetiQ sites are physically secure to
List X standards. The hosting
equipment is housed within an access
controlled building compliant to the
stringent requirements of the MoD to
security standard JSP 440.
The security of the service is ensured
through the use of hardened Linux or
Windows® operating systems and
protection is supplemented by regular
penetration testing. We further ensure
the security of the service by deploying
our Managed Intrusion Detection
Service which is provided in
compliance with CESG Memo 37.
QinetiQ can also provide a number of
supplementary services such as email,
mail forwarders, Domain Name Server
(DNS) registration, SSL (Secure Socket
Layer) Certificate Management, antivirus and anti-spam.
Maintaining ownership and control of
site content is very important to
customers and our infrastructure
allows customers to upload their own

content using our staging server
application and to view their site or
information prior to release. The
success of a web site can be
determined by demand and the
QinetiQ service allows the customer to
have easy access to online statistics
and reports, which can help in future
planning or help predict peaks of
traffic to a web site. The flexible design
of the infrastructure means that
scalability is easy and it supports
burstable bandwidth to sustain those
peaks of traffic.
Scalable Solutions
We provide customers with three
choices of hosting.
Virtual hosting which is a keenly priced
and easily set up service, perfect for
customers who require availability and
security, but whose information is not
particularly sensitive.
Dedicated hosting can be deployed
when security is key and physical
separation is essential. This service
provides the physical separation
customers require and does not
compromise availability or reliability.

Total Support
QinetiQ is the UK’s leading
international defence and security
technology company developing
innovative technology-based solutions
and products and providing
technology-rich support services for
major government organisations, such
as the UK MoD, the US DoD and for
commercial customers around the
world.
We provide our customers with
proactive analysis, protection and
management of their digital data
assets and achieve this with the
application of a range of offerings:
• Information Security and Assurance
Consultancy
• Management Intrusion Detection
Service
• Managed Vulnerability Assessment
and Alerting Service
• Penetration Testing Service
• Secure Hosting Service
• Digital Forensics Service

High availability is an extra special
service and provides protection for
extremely sensitive and valuable
information. It ensures that the service
is robust with no single points of
failure. This service can still function
effectively even with a loss of up to
50% of the hardware.
Customer Integration
This service seamlessly integrates with
customers existing business operation.
Availability and integrity are important
to the customers in the protection of
their digital data assets and this
service ensures that customers have
an uninterrupted business presence
with high levels of performance,
reliability, resilience and availability.

For more information please contact:
Customer Contact Team
QinetiQ
Cody Technology Park
Ively Road Farnborough
Hampshire GU14 0LX
United Kingdom
Tel +44 (0) 8700 100942
www.QinetiQ.com
Copyright © QinetiQ ltd 2008
QinetiQ/AT/DS/PUB0800751

More Related Content

What's hot

Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceFinancial Poise
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?Ulf Mattsson
 
Introduction to PCI DSS
Introduction to PCI DSSIntroduction to PCI DSS
Introduction to PCI DSSSaumya Vishnoi
 
The Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and PrivacyThe Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and PrivacyCharles Mok
 
PCI Descoping: How to Reduce Controls and Streamline Compliance
PCI Descoping: How to Reduce Controls and Streamline CompliancePCI Descoping: How to Reduce Controls and Streamline Compliance
PCI Descoping: How to Reduce Controls and Streamline ComplianceTokenEx
 
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)TokenEx
 
PCI DSS 2.0 Detailed Introduction
PCI DSS 2.0 Detailed IntroductionPCI DSS 2.0 Detailed Introduction
PCI DSS 2.0 Detailed IntroductionControlCase
 
Best Practices for PCI Scope Reduction - TokenEx & Kyte
Best Practices for PCI Scope Reduction - TokenEx & KyteBest Practices for PCI Scope Reduction - TokenEx & Kyte
Best Practices for PCI Scope Reduction - TokenEx & KyteTokenEx
 
1. PCI Compliance Overview
1. PCI Compliance Overview1. PCI Compliance Overview
1. PCI Compliance Overviewokrantz
 
Document security & firewall
Document security & firewallDocument security & firewall
Document security & firewallSanjay Singh
 
Seattle Tech4Good meetup: Data Security and Privacy
Seattle Tech4Good meetup: Data Security and PrivacySeattle Tech4Good meetup: Data Security and Privacy
Seattle Tech4Good meetup: Data Security and PrivacySabra Goldick
 
Taming the compliance beast in cloud
Taming the compliance beast in cloudTaming the compliance beast in cloud
Taming the compliance beast in cloudSaumya Vishnoi
 
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAINING
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAININGPCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAINING
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAININGhimalya sharma
 
Secure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationSecure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationRichard Blech
 
Privacy frameworks 101
Privacy frameworks 101Privacy frameworks 101
Privacy frameworks 101Saumya Vishnoi
 
Security and Trust for Digital Transactions : Dictao presentation during the ...
Security and Trust for Digital Transactions : Dictao presentation during the ...Security and Trust for Digital Transactions : Dictao presentation during the ...
Security and Trust for Digital Transactions : Dictao presentation during the ...Dictao
 
Webinar - pci dss 4.0 updates
Webinar - pci dss 4.0 updates Webinar - pci dss 4.0 updates
Webinar - pci dss 4.0 updates VISTA InfoSec
 

What's hot (20)

Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 
Q radar pci-v2-matrix
Q radar pci-v2-matrixQ radar pci-v2-matrix
Q radar pci-v2-matrix
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?
 
Introduction to PCI DSS
Introduction to PCI DSSIntroduction to PCI DSS
Introduction to PCI DSS
 
The Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and PrivacyThe Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and Privacy
 
PCI Descoping: How to Reduce Controls and Streamline Compliance
PCI Descoping: How to Reduce Controls and Streamline CompliancePCI Descoping: How to Reduce Controls and Streamline Compliance
PCI Descoping: How to Reduce Controls and Streamline Compliance
 
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
 
Informed consent and cloud computing
Informed consent and cloud computingInformed consent and cloud computing
Informed consent and cloud computing
 
PCI DSS 2.0 Detailed Introduction
PCI DSS 2.0 Detailed IntroductionPCI DSS 2.0 Detailed Introduction
PCI DSS 2.0 Detailed Introduction
 
Best Practices for PCI Scope Reduction - TokenEx & Kyte
Best Practices for PCI Scope Reduction - TokenEx & KyteBest Practices for PCI Scope Reduction - TokenEx & Kyte
Best Practices for PCI Scope Reduction - TokenEx & Kyte
 
1. PCI Compliance Overview
1. PCI Compliance Overview1. PCI Compliance Overview
1. PCI Compliance Overview
 
Document security & firewall
Document security & firewallDocument security & firewall
Document security & firewall
 
Forecast odcau6 100_eb
Forecast odcau6 100_ebForecast odcau6 100_eb
Forecast odcau6 100_eb
 
Seattle Tech4Good meetup: Data Security and Privacy
Seattle Tech4Good meetup: Data Security and PrivacySeattle Tech4Good meetup: Data Security and Privacy
Seattle Tech4Good meetup: Data Security and Privacy
 
Taming the compliance beast in cloud
Taming the compliance beast in cloudTaming the compliance beast in cloud
Taming the compliance beast in cloud
 
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAINING
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAININGPCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAINING
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAINING
 
Secure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationSecure Channels Financal Institution Presentation
Secure Channels Financal Institution Presentation
 
Privacy frameworks 101
Privacy frameworks 101Privacy frameworks 101
Privacy frameworks 101
 
Security and Trust for Digital Transactions : Dictao presentation during the ...
Security and Trust for Digital Transactions : Dictao presentation during the ...Security and Trust for Digital Transactions : Dictao presentation during the ...
Security and Trust for Digital Transactions : Dictao presentation during the ...
 
Webinar - pci dss 4.0 updates
Webinar - pci dss 4.0 updates Webinar - pci dss 4.0 updates
Webinar - pci dss 4.0 updates
 

Viewers also liked

AWSome Day London January 2016 Intro
AWSome Day London January 2016 IntroAWSome Day London January 2016 Intro
AWSome Day London January 2016 IntroIan Massingham
 
Comparing Various SDLC Models On The Basis Of Available Methodology
Comparing Various SDLC Models On The Basis Of Available MethodologyComparing Various SDLC Models On The Basis Of Available Methodology
Comparing Various SDLC Models On The Basis Of Available MethodologyIJMER
 
Brunilda Tejada Ureña
Brunilda Tejada UreñaBrunilda Tejada Ureña
Brunilda Tejada Ureñabrunildatejada
 
ESAMC - 3 Sem - Identidade + sociedade
ESAMC - 3 Sem - Identidade + sociedadeESAMC - 3 Sem - Identidade + sociedade
ESAMC - 3 Sem - Identidade + sociedadeThiago Martins
 
A Novel Approach for Interference Suppression Using a Improved LMS Based Adap...
A Novel Approach for Interference Suppression Using a Improved LMS Based Adap...A Novel Approach for Interference Suppression Using a Improved LMS Based Adap...
A Novel Approach for Interference Suppression Using a Improved LMS Based Adap...IJRST Journal
 
Job roles in the film industry by fateha
Job roles in the film industry by fatehaJob roles in the film industry by fateha
Job roles in the film industry by fatehahaverstockmedia
 
一小時可以打造什麼服務Plus twMVC#18
一小時可以打造什麼服務Plus twMVC#18一小時可以打造什麼服務Plus twMVC#18
一小時可以打造什麼服務Plus twMVC#18twMVC
 
ESAMC - 3 Sem - Starbuckss
ESAMC - 3 Sem - StarbuckssESAMC - 3 Sem - Starbuckss
ESAMC - 3 Sem - StarbuckssThiago Martins
 
Giuramento dello Psicoterapeuta
Giuramento dello Psicoterapeuta Giuramento dello Psicoterapeuta
Giuramento dello Psicoterapeuta Gerlando Lo Savio
 
Rymdstyrelsen (Rumfartsbestyrelse) er et statsligt svensk agentur
Rymdstyrelsen (Rumfartsbestyrelse) er et statsligt svensk agenturRymdstyrelsen (Rumfartsbestyrelse) er et statsligt svensk agentur
Rymdstyrelsen (Rumfartsbestyrelse) er et statsligt svensk agenturevelyn9gilbert9
 
FoodTechnolChemContam_Nov issue
FoodTechnolChemContam_Nov issueFoodTechnolChemContam_Nov issue
FoodTechnolChemContam_Nov issueChristina Chase
 
Performance Evaluation of Computationally Efficient Energy Detection Based Sp...
Performance Evaluation of Computationally Efficient Energy Detection Based Sp...Performance Evaluation of Computationally Efficient Energy Detection Based Sp...
Performance Evaluation of Computationally Efficient Energy Detection Based Sp...IJRST Journal
 

Viewers also liked (15)

AWSome Day London January 2016 Intro
AWSome Day London January 2016 IntroAWSome Day London January 2016 Intro
AWSome Day London January 2016 Intro
 
Comparing Various SDLC Models On The Basis Of Available Methodology
Comparing Various SDLC Models On The Basis Of Available MethodologyComparing Various SDLC Models On The Basis Of Available Methodology
Comparing Various SDLC Models On The Basis Of Available Methodology
 
Brunilda Tejada Ureña
Brunilda Tejada UreñaBrunilda Tejada Ureña
Brunilda Tejada Ureña
 
ESAMC - 3 Sem - Identidade + sociedade
ESAMC - 3 Sem - Identidade + sociedadeESAMC - 3 Sem - Identidade + sociedade
ESAMC - 3 Sem - Identidade + sociedade
 
A Novel Approach for Interference Suppression Using a Improved LMS Based Adap...
A Novel Approach for Interference Suppression Using a Improved LMS Based Adap...A Novel Approach for Interference Suppression Using a Improved LMS Based Adap...
A Novel Approach for Interference Suppression Using a Improved LMS Based Adap...
 
Job roles in the film industry by fateha
Job roles in the film industry by fatehaJob roles in the film industry by fateha
Job roles in the film industry by fateha
 
一小時可以打造什麼服務Plus twMVC#18
一小時可以打造什麼服務Plus twMVC#18一小時可以打造什麼服務Plus twMVC#18
一小時可以打造什麼服務Plus twMVC#18
 
ESAMC - 3 Sem - Starbuckss
ESAMC - 3 Sem - StarbuckssESAMC - 3 Sem - Starbuckss
ESAMC - 3 Sem - Starbuckss
 
Crear un juego
Crear un juegoCrear un juego
Crear un juego
 
Giuramento dello Psicoterapeuta
Giuramento dello Psicoterapeuta Giuramento dello Psicoterapeuta
Giuramento dello Psicoterapeuta
 
Rymdstyrelsen (Rumfartsbestyrelse) er et statsligt svensk agentur
Rymdstyrelsen (Rumfartsbestyrelse) er et statsligt svensk agenturRymdstyrelsen (Rumfartsbestyrelse) er et statsligt svensk agentur
Rymdstyrelsen (Rumfartsbestyrelse) er et statsligt svensk agentur
 
Η ζωή στο νερό
Η ζωή στο νερόΗ ζωή στο νερό
Η ζωή στο νερό
 
FoodTechnolChemContam_Nov issue
FoodTechnolChemContam_Nov issueFoodTechnolChemContam_Nov issue
FoodTechnolChemContam_Nov issue
 
Performance Evaluation of Computationally Efficient Energy Detection Based Sp...
Performance Evaluation of Computationally Efficient Energy Detection Based Sp...Performance Evaluation of Computationally Efficient Energy Detection Based Sp...
Performance Evaluation of Computationally Efficient Energy Detection Based Sp...
 
Axillary tasks
Axillary tasksAxillary tasks
Axillary tasks
 

Similar to Protective Monitoring

Highstreet Overview
Highstreet OverviewHighstreet Overview
Highstreet OverviewDebbie Lovis
 
Ukraine Dedicated Server Hosting is Good for Business by Onlive Server
Ukraine Dedicated Server Hosting is Good for Business by Onlive ServerUkraine Dedicated Server Hosting is Good for Business by Onlive Server
Ukraine Dedicated Server Hosting is Good for Business by Onlive ServerAnnu Dixit
 
imtechspherebrochure
imtechspherebrochureimtechspherebrochure
imtechspherebrochureSteve Tester
 
SecureWorks
SecureWorksSecureWorks
SecureWorksjduhaime
 
Brochure Security
Brochure SecurityBrochure Security
Brochure Securitybryanpsu
 
GPS - Corporate Overview
GPS - Corporate OverviewGPS - Corporate Overview
GPS - Corporate OverviewTawnia Beckwith
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabiltiesSneha .
 
Scc soft token datasheet
Scc soft token datasheetScc soft token datasheet
Scc soft token datasheetHai Nguyen
 
Invictait-Business_Technology_Intelligently_Applied
Invictait-Business_Technology_Intelligently_AppliedInvictait-Business_Technology_Intelligently_Applied
Invictait-Business_Technology_Intelligently_AppliedRichard Hunter-Rice
 
RS_corporate_ovrvw_Revise60816_ƒemail
RS_corporate_ovrvw_Revise60816_ƒemailRS_corporate_ovrvw_Revise60816_ƒemail
RS_corporate_ovrvw_Revise60816_ƒemailJoe Zuramski
 
Managed services web
Managed services webManaged services web
Managed services webDean North
 
Managed services web
Managed services webManaged services web
Managed services webMark Howie
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesMuhammad Mudassar
 
Company Profile Managemenyt company.pptx
Company Profile Managemenyt company.pptxCompany Profile Managemenyt company.pptx
Company Profile Managemenyt company.pptxhendrik441443
 
On-Site Computer Solutions
On-Site Computer SolutionsOn-Site Computer Solutions
On-Site Computer Solutionsyourocs
 
Signify Overview
Signify OverviewSignify Overview
Signify Overviewkate_holden
 
Signify Overview
Signify OverviewSignify Overview
Signify Overviewpjpallen
 

Similar to Protective Monitoring (20)

Highstreet Overview
Highstreet OverviewHighstreet Overview
Highstreet Overview
 
___2360_SP_RBR_4pp_FINAL---Screen
___2360_SP_RBR_4pp_FINAL---Screen___2360_SP_RBR_4pp_FINAL---Screen
___2360_SP_RBR_4pp_FINAL---Screen
 
Ukraine Dedicated Server Hosting is Good for Business by Onlive Server
Ukraine Dedicated Server Hosting is Good for Business by Onlive ServerUkraine Dedicated Server Hosting is Good for Business by Onlive Server
Ukraine Dedicated Server Hosting is Good for Business by Onlive Server
 
imtechspherebrochure
imtechspherebrochureimtechspherebrochure
imtechspherebrochure
 
SecureWorks
SecureWorksSecureWorks
SecureWorks
 
Brochure Security
Brochure SecurityBrochure Security
Brochure Security
 
GPS - Corporate Overview
GPS - Corporate OverviewGPS - Corporate Overview
GPS - Corporate Overview
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
 
Scc soft token datasheet
Scc soft token datasheetScc soft token datasheet
Scc soft token datasheet
 
Invictait-Business_Technology_Intelligently_Applied
Invictait-Business_Technology_Intelligently_AppliedInvictait-Business_Technology_Intelligently_Applied
Invictait-Business_Technology_Intelligently_Applied
 
RS_corporate_ovrvw_Revise60816_ƒemail
RS_corporate_ovrvw_Revise60816_ƒemailRS_corporate_ovrvw_Revise60816_ƒemail
RS_corporate_ovrvw_Revise60816_ƒemail
 
Confisio Datacenter
Confisio DatacenterConfisio Datacenter
Confisio Datacenter
 
Managed services web
Managed services webManaged services web
Managed services web
 
Managed servoes 2mb
Managed servoes 2mbManaged servoes 2mb
Managed servoes 2mb
 
Managed services web
Managed services webManaged services web
Managed services web
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
 
Company Profile Managemenyt company.pptx
Company Profile Managemenyt company.pptxCompany Profile Managemenyt company.pptx
Company Profile Managemenyt company.pptx
 
On-Site Computer Solutions
On-Site Computer SolutionsOn-Site Computer Solutions
On-Site Computer Solutions
 
Signify Overview
Signify OverviewSignify Overview
Signify Overview
 
Signify Overview
Signify OverviewSignify Overview
Signify Overview
 

More from johandev

Aviation Airworthiness
Aviation AirworthinessAviation Airworthiness
Aviation Airworthinessjohandev
 
QinetiQ-AR13-11
QinetiQ-AR13-11QinetiQ-AR13-11
QinetiQ-AR13-11johandev
 
QinetiQ-AR13-9
QinetiQ-AR13-9QinetiQ-AR13-9
QinetiQ-AR13-9johandev
 
QinetiQ-AR13-8
QinetiQ-AR13-8QinetiQ-AR13-8
QinetiQ-AR13-8johandev
 
QinetiQ-AR13-7
QinetiQ-AR13-7QinetiQ-AR13-7
QinetiQ-AR13-7johandev
 
QinetiQ-AR13-6
QinetiQ-AR13-6QinetiQ-AR13-6
QinetiQ-AR13-6johandev
 
QinetiQ-AR13-5
QinetiQ-AR13-5QinetiQ-AR13-5
QinetiQ-AR13-5johandev
 
QinetiQ-AR13-4
QinetiQ-AR13-4QinetiQ-AR13-4
QinetiQ-AR13-4johandev
 
QinetiQ-AR13-3
QinetiQ-AR13-3QinetiQ-AR13-3
QinetiQ-AR13-3johandev
 
Qineti q annual report 2009
Qineti q annual report 2009Qineti q annual report 2009
Qineti q annual report 2009johandev
 
Qineti q annual report 2008
Qineti q annual report 2008Qineti q annual report 2008
Qineti q annual report 2008johandev
 
Qinetiq annual report 2008
Qinetiq annual report 2008Qinetiq annual report 2008
Qinetiq annual report 2008johandev
 

More from johandev (13)

Aviation Airworthiness
Aviation AirworthinessAviation Airworthiness
Aviation Airworthiness
 
QinetiQ-AR13-11
QinetiQ-AR13-11QinetiQ-AR13-11
QinetiQ-AR13-11
 
QinetiQ-AR13-9
QinetiQ-AR13-9QinetiQ-AR13-9
QinetiQ-AR13-9
 
QinetiQ-AR13-8
QinetiQ-AR13-8QinetiQ-AR13-8
QinetiQ-AR13-8
 
QinetiQ-AR13-7
QinetiQ-AR13-7QinetiQ-AR13-7
QinetiQ-AR13-7
 
QinetiQ-AR13-6
QinetiQ-AR13-6QinetiQ-AR13-6
QinetiQ-AR13-6
 
QinetiQ-AR13-5
QinetiQ-AR13-5QinetiQ-AR13-5
QinetiQ-AR13-5
 
QinetiQ-AR13-4
QinetiQ-AR13-4QinetiQ-AR13-4
QinetiQ-AR13-4
 
QinetiQ-AR13-3
QinetiQ-AR13-3QinetiQ-AR13-3
QinetiQ-AR13-3
 
QinetiQ
QinetiQQinetiQ
QinetiQ
 
Qineti q annual report 2009
Qineti q annual report 2009Qineti q annual report 2009
Qineti q annual report 2009
 
Qineti q annual report 2008
Qineti q annual report 2008Qineti q annual report 2008
Qineti q annual report 2008
 
Qinetiq annual report 2008
Qinetiq annual report 2008Qinetiq annual report 2008
Qinetiq annual report 2008
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Protective Monitoring

  • 1. Secure Hosting Service QinetiQ’s Secure Hosting Service is for customers who want to outsource the proactive analysis, protection and management of their secure digital data to a trusted third party. • Optimal availability, integrity and security • Geographically diverse Secure Hosting Sites • Additional protection provided by QinetiQ digital security services • Service Desk Support • Operated and administered by security-cleared personnel The security challenges faced by organisations are well known. Threats to networks and systems include theft of proprietary information, financial fraud, insider and outsider system penetration and sabotage of data networks. Implementing an in-house function to mitigate and protect against these threats around the clock is a major undertaking with considerable cost implications. Outsourcing to a trusted 3rd party, experienced and capable of providing seamless round the clock protection is the preferred option of many global organisations. QinetiQ’s Secure Hosting Service is for businesses and organisations that value the availability and integrity of their data assets and who need to ensure maximum protection against hacking and defacement. The service can provide a complete website or application solution which combines the functionality customers expect with the security and resilience needed.
  • 2. Best of Breed Deployment Choosing QinetiQ to provide your secure hosting solution means choosing a company with a technological heritage and reputation for providing innovative solutions to exacting problems. Whichever hosting service you select we can provide unexcelled levels of performance and resilience to conduct online business with confidence, security and total peace of mind. QinetiQ Proprietary Methodology The service is designed, managed and monitored by information assurance and security specialists, trained and experienced in providing a range of information security services to highprofile government departments, where the availability and protection of sensitive information is a crucial balancing act. QinetiQ sites are physically secure to List X standards. The hosting equipment is housed within an access controlled building compliant to the stringent requirements of the MoD to security standard JSP 440. The security of the service is ensured through the use of hardened Linux or Windows® operating systems and protection is supplemented by regular penetration testing. We further ensure the security of the service by deploying our Managed Intrusion Detection Service which is provided in compliance with CESG Memo 37. QinetiQ can also provide a number of supplementary services such as email, mail forwarders, Domain Name Server (DNS) registration, SSL (Secure Socket Layer) Certificate Management, antivirus and anti-spam. Maintaining ownership and control of site content is very important to customers and our infrastructure allows customers to upload their own content using our staging server application and to view their site or information prior to release. The success of a web site can be determined by demand and the QinetiQ service allows the customer to have easy access to online statistics and reports, which can help in future planning or help predict peaks of traffic to a web site. The flexible design of the infrastructure means that scalability is easy and it supports burstable bandwidth to sustain those peaks of traffic. Scalable Solutions We provide customers with three choices of hosting. Virtual hosting which is a keenly priced and easily set up service, perfect for customers who require availability and security, but whose information is not particularly sensitive. Dedicated hosting can be deployed when security is key and physical separation is essential. This service provides the physical separation customers require and does not compromise availability or reliability. Total Support QinetiQ is the UK’s leading international defence and security technology company developing innovative technology-based solutions and products and providing technology-rich support services for major government organisations, such as the UK MoD, the US DoD and for commercial customers around the world. We provide our customers with proactive analysis, protection and management of their digital data assets and achieve this with the application of a range of offerings: • Information Security and Assurance Consultancy • Management Intrusion Detection Service • Managed Vulnerability Assessment and Alerting Service • Penetration Testing Service • Secure Hosting Service • Digital Forensics Service High availability is an extra special service and provides protection for extremely sensitive and valuable information. It ensures that the service is robust with no single points of failure. This service can still function effectively even with a loss of up to 50% of the hardware. Customer Integration This service seamlessly integrates with customers existing business operation. Availability and integrity are important to the customers in the protection of their digital data assets and this service ensures that customers have an uninterrupted business presence with high levels of performance, reliability, resilience and availability. For more information please contact: Customer Contact Team QinetiQ Cody Technology Park Ively Road Farnborough Hampshire GU14 0LX United Kingdom Tel +44 (0) 8700 100942 www.QinetiQ.com Copyright © QinetiQ ltd 2008 QinetiQ/AT/DS/PUB0800751