Gss Company Profile

Preview:

DESCRIPTION

GSS corporate presentation

Citation preview

Company ProfileMay 2009

Brief History

• GSS merged with Peapod (UK) in Sep ’07• GSS started infosecurity business in 1997• Peapod started infosecurity business in 1995• Both businesses of similar size: turnover and people• Very similar technology profiles• Peapod had a separate consulting division• Both businesses:

- strong in public sector - strong in SME space

- had significant number of enterprise clients

Company Fact-file

• £11.5M turnover in 2008• £9.5M technology-based: £2M consulting-based• 55 staff• Offices in Bracknell and Worthing• Over 1,000 current buying clients• 500+ public sector organisations

- central government, education, LA’s, NHS, police

• 200+ consulting-only clients (no product)• In top 10 information security specialists in UK

GSS Company Structure

• Two operating divisions - Technology - Information Risk Management (IRM)

• 55 staff - 4 directors - 13 product-based engineers - 11 consultants/testers - 20 sales & marketing - 7 administration

IRM Division

• Gap analysis & risk assessments• Security architecture reviews• ISO-27001 lead auditors• DPA-DSS & PCI-DSS specialists• Policy reviews and production• Code of Connection specialists – GCSx (CoCo) & N3• Microsoft Infrastructure & security services

- Certified Gold Partner• Certified penetration and application testers

- CESG CHECK Green Accredited & CREST member

Technology Division

• Portfolio covers the majority of infosecurity requirements

• Partner a number leading brand vendors• Introduce innovative technologies to the market• Fully accredited with key vendors• Maintain accreditations via on-going training

programs• Provide help desk service for key products• Building range of managed services in partnership

with QinetiQ (information available on request)

Key Vendor Partnerships

• Firewalls - Juniper, Check Point, Secure Computing, GTA

• Secure Remote Access (SSL/SSH VPN’s) - Juniper SA, appGATE, Microsoft IAG

• Strong Authentication - RSA, Swivel, Signify

• Encryption, Device & Application control- Lumension, Utimaco

Key Vendor Partnerships

• Email, Web, IM Security/Management & DLP- Websense, Trend, Finjan, BorderWare, Facetime

• Intrusion detection & prevention (IDP) - Juniper, Radware

• Application delivery - Blue Coat, Radware, Juniper

• Policy deployment & management - NETconsent

Other Vendor Partnerships

• Cyber-Ark: digital vaults & identity access management, password and intra/inter-business security

• Imprivata: single sign-on/strong authentication

• Palo Alto: application layer/aware UTM firewall

• Breach: web application firewall

• Mimecast: ‘in the cloud’ email security and archiving

Other Vendor Partnerships

• Voltage: email & file encryption

• Tier 3: application layer behavioural intelligence

• Lancope: network behavioural analysis & intrusion prevention, and NetFlow analysis

• exaprotect: network threat detection, remediation and log management

• Protegrity: database & file encryption

Today’s Key Issues

• Business & regulatory compliance• Protection of share value & key business assets • Standards: ISO 9001/27001, SOX, PCI-DSS • Protection of personally identifiable

data: DPA-DSS• Policy management• Network connectivity: GCSx, N3• Data loss prevention• Improving return on investment• Reducing cost of ownership

Information Security

information assurance. delivered

Secure Infrastructure

Secure Infrastructure

Firewalls

Patch Management

VPN

IDS

Content

Active Directory

High Availability

Email

Secure Data

Secure Data

Encryption

Email Archiving

Penetration Testing

Application Testing

Data Leakage Email

Secure People

Secure People

ISO 27001 NETconsent

Policy

Data Protection Act

Security Training

Information assurance. delivered

GSS solves today’s problems with:

• Solutions that meet the need within budget

• Leading brand & innovative technologies

• Full range of value-added technical services

• Unique managed services partnership with QinetiQ

• Portfolio of accredited security & compliance consulting services

Recommended