Company Profile May 2009
Brief History GSS merged with Peapod (UK) in Sep ’07 GSS started infosecurity business in 1997 Peapod started infosecurity business in 1995 Both businesses of similar size: turnover and people Very similar technology profiles Peapod had a separate consulting division Both businesses:   - strong in public sector   - strong in SME space   - had significant number of enterprise clients
Company Fact-file £11.5M turnover in 2008 £9.5M technology-based: £2M consulting-based 55 staff Offices in Bracknell and Worthing Over 1,000 current buying clients 500+ public sector organisations   - central government, education, LA’s, NHS, police 200+ consulting-only clients (no product) In top 10 information security specialists in UK
GSS Company Structure Two operating divisions    - Technology   - Information Risk Management (IRM) 55 staff   - 4 directors   - 13 product-based engineers   - 11 consultants/testers   - 20 sales & marketing   - 7 administration
IRM Division Gap analysis & risk assessments Security architecture reviews ISO-27001 lead auditors DPA-DSS & PCI-DSS specialists Policy reviews and production Code of Connection specialists – GCSx (CoCo) & N3 Microsoft Infrastructure & security services   - Certified Gold Partner Certified penetration and application testers - CESG CHECK Green Accredited & CREST member
Technology Division Portfolio covers the majority of infosecurity requirements Partner a number leading brand vendors Introduce innovative technologies to the market Fully accredited with key vendors Maintain accreditations via on-going training programs Provide help desk service for key products Building range of managed services in partnership with QinetiQ (information available on request)
Key Vendor Partnerships Firewalls   - Juniper, Check Point, Secure Computing, GTA   Secure Remote Access (SSL/SSH VPN’s)   - Juniper SA, appGATE, Microsoft IAG Strong Authentication   - RSA, Swivel, Signify Encryption, Device & Application control - Lumension, Utimaco
Key Vendor Partnerships Email, Web, IM Security/Management & DLP - Websense, Trend, Finjan, BorderWare, Facetime  Intrusion detection & prevention (IDP)   - Juniper, Radware Application delivery   - Blue Coat, Radware, Juniper Policy deployment & management   - NETconsent
Other Vendor Partnerships Cyber-Ark:  digital vaults & identity access management, password and intra/inter-business security Imprivata:  single sign-on/strong authentication Palo Alto:  application layer/aware UTM firewall Breach:  web application firewall Mimecast:  ‘in the cloud’ email security and archiving
Other Vendor Partnerships Voltage:  email & file encryption Tier 3:  application layer behavioural intelligence Lancope:  network behavioural analysis & intrusion prevention, and NetFlow analysis exaprotect:  network threat detection, remediation and log management Protegrity:  database & file encryption
Today’s Key Issues Business & regulatory compliance Protection of share value & key business assets  Standards: ISO 9001/27001, SOX, PCI-DSS  Protection of personally identifiable data: DPA-DSS Policy management Network connectivity: GCSx, N3 Data loss prevention Improving return on investment Reducing cost of ownership
Information Security
information assurance. delivered
Secure Infrastructure Secure Infrastructure Firewalls Patch Management VPN IDS Content Active Directory High Availability  Email
Secure Data Secure Data Encryption Email Archiving Penetration Testing Application Testing Data Leakage Email
Secure People Secure People ISO 27001 NETconsent Policy Data Protection Act Security Training
Information assurance. delivered GSS solves today’s problems with:   Solutions that meet the need within budget Leading brand & innovative technologies Full range of value-added technical services Unique managed services partnership with QinetiQ Portfolio of accredited security & compliance consulting services

More Related Content

PPTX
Identity privacy and data protection in the cloud – what is being done is it ...
PDF
Jisc cloud services: helping our members deliver their cloud strategies
PDF
How privacy by design can be the key of your success at the time of the digit...
PDF
N-able webinar:Build recurring revenue in 45 days
PDF
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
PDF
Finsec innov-acts-open banking-london080319-4web
PPT
3 oraclex evento reg puglia_v2017-09-14-2
PDF
Boldon James - How Data Classification can harness the power of Big Data
Identity privacy and data protection in the cloud – what is being done is it ...
Jisc cloud services: helping our members deliver their cloud strategies
How privacy by design can be the key of your success at the time of the digit...
N-able webinar:Build recurring revenue in 45 days
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Finsec innov-acts-open banking-london080319-4web
3 oraclex evento reg puglia_v2017-09-14-2
Boldon James - How Data Classification can harness the power of Big Data

What's hot (20)

PPTX
Company profile supreme ng
PDF
TechWiseTV Workshop: Operational Insights
PDF
ETIS Information Security Benchmark Successful Practices in telco security
PPTX
Smoothwall and Ampliphae - Networkshop46
PDF
Smart OmniEdge ソリューションテクニカルハイライト(1)
PPTX
Seclore Advantage Channel Program
PDF
The Definitive GDPR Guide for Event Professionals
PPTX
Privacy preserving computing and secure multi-party computation ISACA Atlanta
PPTX
Le soluzioni tecnologiche a supporto della normativa GDPR
PDF
BA Company Presentation
PDF
Cisco Connect 2018 Philippines - An innovation journey to a smarter network
PPTX
2015 Data Security Solutions @SFK - Working and living in digital work of future
PDF
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
PPTX
The EU General Protection Regulation and how Oracle can help
PDF
PPTX
Continuous Compliance 14.9.2016
PPTX
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
PPTX
Unlock the potential of data security 2020
PPTX
Business Continuity and app Security
PDF
7.Trust Management
Company profile supreme ng
TechWiseTV Workshop: Operational Insights
ETIS Information Security Benchmark Successful Practices in telco security
Smoothwall and Ampliphae - Networkshop46
Smart OmniEdge ソリューションテクニカルハイライト(1)
Seclore Advantage Channel Program
The Definitive GDPR Guide for Event Professionals
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Le soluzioni tecnologiche a supporto della normativa GDPR
BA Company Presentation
Cisco Connect 2018 Philippines - An innovation journey to a smarter network
2015 Data Security Solutions @SFK - Working and living in digital work of future
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
The EU General Protection Regulation and how Oracle can help
Continuous Compliance 14.9.2016
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
Unlock the potential of data security 2020
Business Continuity and app Security
7.Trust Management
Ad

Viewers also liked (20)

PDF
Social Media: The Web Wide World
PDF
BIO-DATA OF Pro.R.S. Chaturvedi
PPSX
HERRAMIENTAS TECNOLOGICAS
PDF
Poster Session 18 ESTEC - Lunar Sample Return Workshop - February 2014
PDF
Tecnología actual de tv parejo carrascal
PDF
Verde es-vida
PDF
Method and apparatus for live streaming media replication in a communication ...
PPTX
Go mobile with Windows Phone
PDF
Tetuán 30 días diciembre 2012
PDF
Ley de creacion distrito los chankas
DOCX
Vida de javier alfonso tenorio maureira
PDF
Investor Presentation Walkabout Resources (ASX:WKT) May 2013
PDF
Text message marketingx
PPTX
Voleibol licenal
PDF
Contactos
PDF
Inscritos liga vasca master 2014
PDF
Equipos para sauna mayo 2012
PPTX
Mi proyecto janeth
PPTX
He shall be like a tree
Social Media: The Web Wide World
BIO-DATA OF Pro.R.S. Chaturvedi
HERRAMIENTAS TECNOLOGICAS
Poster Session 18 ESTEC - Lunar Sample Return Workshop - February 2014
Tecnología actual de tv parejo carrascal
Verde es-vida
Method and apparatus for live streaming media replication in a communication ...
Go mobile with Windows Phone
Tetuán 30 días diciembre 2012
Ley de creacion distrito los chankas
Vida de javier alfonso tenorio maureira
Investor Presentation Walkabout Resources (ASX:WKT) May 2013
Text message marketingx
Voleibol licenal
Contactos
Inscritos liga vasca master 2014
Equipos para sauna mayo 2012
Mi proyecto janeth
He shall be like a tree
Ad

Similar to Gss Company Profile (20)

PPT
Achieving Data Privacy in the Enterprise
PPT
Life After Compliance march 2010 v2
PDF
Decision group company_profile_2017
PDF
ScienceSoft Corporate Profile
PPS
NSC presentation
PPT
Proteus OCM Company Profile
PPT
Netarx Introductory Presentation
PDF
Mark Sudan Non-ATS Resume / Curriculum Vitae
PDF
IT Security Services
PPTX
Panorama IT Introduction V1.2
DOC
Varun - Enterprise Solution Architect
PPTX
Building cybersecurity transparency with clients using compliance automation...
PDF
Ektron London Conference: Consultix - High Availability Data Center and Hosti...
PPTX
Forecast deploy2 100_eb
PPTX
What affects security program confidence? - may2014 - bill burns
PPTX
Huwei Cyber Security Presentation
PPTX
Paetec Company Story 2011
PPTX
W030app Application Security for SD-WAN.pptx
PDF
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
PPTX
Security Consulting and Management by CGC - www.cgcsas.com
Achieving Data Privacy in the Enterprise
Life After Compliance march 2010 v2
Decision group company_profile_2017
ScienceSoft Corporate Profile
NSC presentation
Proteus OCM Company Profile
Netarx Introductory Presentation
Mark Sudan Non-ATS Resume / Curriculum Vitae
IT Security Services
Panorama IT Introduction V1.2
Varun - Enterprise Solution Architect
Building cybersecurity transparency with clients using compliance automation...
Ektron London Conference: Consultix - High Availability Data Center and Hosti...
Forecast deploy2 100_eb
What affects security program confidence? - may2014 - bill burns
Huwei Cyber Security Presentation
Paetec Company Story 2011
W030app Application Security for SD-WAN.pptx
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Security Consulting and Management by CGC - www.cgcsas.com

Gss Company Profile

  • 2. Brief History GSS merged with Peapod (UK) in Sep ’07 GSS started infosecurity business in 1997 Peapod started infosecurity business in 1995 Both businesses of similar size: turnover and people Very similar technology profiles Peapod had a separate consulting division Both businesses: - strong in public sector - strong in SME space - had significant number of enterprise clients
  • 3. Company Fact-file £11.5M turnover in 2008 £9.5M technology-based: £2M consulting-based 55 staff Offices in Bracknell and Worthing Over 1,000 current buying clients 500+ public sector organisations - central government, education, LA’s, NHS, police 200+ consulting-only clients (no product) In top 10 information security specialists in UK
  • 4. GSS Company Structure Two operating divisions - Technology - Information Risk Management (IRM) 55 staff - 4 directors - 13 product-based engineers - 11 consultants/testers - 20 sales & marketing - 7 administration
  • 5. IRM Division Gap analysis & risk assessments Security architecture reviews ISO-27001 lead auditors DPA-DSS & PCI-DSS specialists Policy reviews and production Code of Connection specialists – GCSx (CoCo) & N3 Microsoft Infrastructure & security services - Certified Gold Partner Certified penetration and application testers - CESG CHECK Green Accredited & CREST member
  • 6. Technology Division Portfolio covers the majority of infosecurity requirements Partner a number leading brand vendors Introduce innovative technologies to the market Fully accredited with key vendors Maintain accreditations via on-going training programs Provide help desk service for key products Building range of managed services in partnership with QinetiQ (information available on request)
  • 7. Key Vendor Partnerships Firewalls - Juniper, Check Point, Secure Computing, GTA Secure Remote Access (SSL/SSH VPN’s) - Juniper SA, appGATE, Microsoft IAG Strong Authentication - RSA, Swivel, Signify Encryption, Device & Application control - Lumension, Utimaco
  • 8. Key Vendor Partnerships Email, Web, IM Security/Management & DLP - Websense, Trend, Finjan, BorderWare, Facetime Intrusion detection & prevention (IDP) - Juniper, Radware Application delivery - Blue Coat, Radware, Juniper Policy deployment & management - NETconsent
  • 9. Other Vendor Partnerships Cyber-Ark: digital vaults & identity access management, password and intra/inter-business security Imprivata: single sign-on/strong authentication Palo Alto: application layer/aware UTM firewall Breach: web application firewall Mimecast: ‘in the cloud’ email security and archiving
  • 10. Other Vendor Partnerships Voltage: email & file encryption Tier 3: application layer behavioural intelligence Lancope: network behavioural analysis & intrusion prevention, and NetFlow analysis exaprotect: network threat detection, remediation and log management Protegrity: database & file encryption
  • 11. Today’s Key Issues Business & regulatory compliance Protection of share value & key business assets Standards: ISO 9001/27001, SOX, PCI-DSS Protection of personally identifiable data: DPA-DSS Policy management Network connectivity: GCSx, N3 Data loss prevention Improving return on investment Reducing cost of ownership
  • 14. Secure Infrastructure Secure Infrastructure Firewalls Patch Management VPN IDS Content Active Directory High Availability Email
  • 15. Secure Data Secure Data Encryption Email Archiving Penetration Testing Application Testing Data Leakage Email
  • 16. Secure People Secure People ISO 27001 NETconsent Policy Data Protection Act Security Training
  • 17. Information assurance. delivered GSS solves today’s problems with: Solutions that meet the need within budget Leading brand & innovative technologies Full range of value-added technical services Unique managed services partnership with QinetiQ Portfolio of accredited security & compliance consulting services