njvc brochure

16
IT Transformed. Business Evolved.

Upload: spencer-nelson

Post on 05-Aug-2015

56 views

Category:

Documents


0 download

TRANSCRIPT

IT Transformed. Business Evolved.

New Solutions in a New World of Opportunities

2

•What must be done to connect disparate devices to shared

resources that display collections of structured and

unstructured data?

•How do you manage exponentially expanding data stores on

consistently shrinking budgets?

•How do you create an environment that can respond to the

changing user demands (internal and external) who want access

to newer ways of conducting business … now?

•How do you construct resilient defense strategies to protect

personal or proprietary data from prying eyes … including

state-sponsored terror networks, financially motivated cyber

thieves and mischievous teenage hackers?

•How do you manage a global resource network containing

myriad devices and integrating wide-ranging applications for

optimum performance and cost-efficiency?

Business and government institutions around the globe are operating in a new world —one defined by a wellspring of data, characterized by an accelerating

pace of change and influenced by an “always-on” culture that demands information connectivity for a

dizzying array of devices. This new world creates new considerations for IT departments that support

daily operations.

Some companies see these questions as challenges. We see them as opportunities. Opportunities to grow, evolve and adapt.

Opportunities to become smarter, nimbler and more effective.

Some companies see these opportunities as too vague. We see them as real, here and now.

We are not some companies.

We … are NJVC.

3

Driven by Your Mission®

4

The NJVC global workforce includes

more than 1,300 dedicated and talented

employees located around the globe—

wherever our customers need us—with

more than 90 percent holding security

clearances. We operate in the very real

world of continually evolving cyber

threats and complex hybrid computing

strategies, requiring us to maintain

forward-thinking technology strategies and

specific emphasis on situational awareness

and resilient defense. Our integrated

management methodology guides project

implementation and helps ensure delivery

of successful, high-performance solutions.

We help secure and optimize diverse

device environments, application portfolios

and data center assets through relentless

automation, with a focus on documented,

structured and repeatable processes. To

help drive next-generation effectiveness

and long-term strategic operational

alignment, we apply innovation to help

organizations integrate new capabilities—

such as dynamically deployed, secure,

managed cloud services and advanced

analytics systems.

Relentless Automation. Relentless Innovation.Our offerings focus on mission-critical services needed to support required IT transformations in organizations whose operations depend on high performance, agility and advanced information security.

NJVC is an IT and security services company. Founded in 2001, we deliver a portfolio of managed

and subscription services to help customers better utilize their IT infrastructure, while enhancing governance, risk

management and regulatory compliance.

5

Transformation Starts Here

6

NJVC services encompass a range of

IT disciplines and service categories, all

focused on helping customers create

high-performance IT operations that can

support optimum operational performance

and breakthrough innovation. From the

device and desktop to the cloud, NJVC

helps government and commercial entities

strategize, operationalize and optimize an

agile IT supply chain that delivers

greater responsiveness, performance and

transparency within an intelligent security

structure.

Underpinning all NJVC technology

operations is the NJVC Center for

Technology Integration (CTI), our internal

research and development facility. CTI

affords customer implementation teams

access to advanced integration and testing

facilities, and is responsible for leading the

development of proprietary innovations for

use in customer engagements.

We offer our services to customers

through a flexible delivery model that

includes consulting and implementation,

comprehensive outsourcing/managed

services and staff augmentation. All

programs are custom fit to specific

operational needs, budget considerations

and long-term operating objectives.

Facing a long and expanding list of demands with a continually pressured budget, the old rules of IT management no longer apply. We understand that successful commercial

enterprises view information technology as a strategic asset, and that effective federal organizations recognize IT

as an integrated component of mission delivery.

IT Services Cyber Security Data Center Services Cloudcuity™ Secure Cloud Computing Print Solutions

Enterprise Management

Computing Services

Unified Communications

Professional Engineering

Big Data/Analytics

Large Scale Program Management & Integration

Advisory and Assessment Services

Infrastructure, Platform and Software Solutions

Cloud Cyber Security Services

Secure Hybrid Hosting

Security Consulting and Assessments

Managed Security Services

Cyber Analytics/ NJVC Cyber Dashboard™

Co-Lo Hosting

Managed Hosting

Migration and Optimization

Secure Print Production

Large-Format Printing

Media Packaging

Point-of-Purchase/ Point-of-Sale

Packaging

Center for Technology Integration (R&D)

NJVC Offerings Portfolio

7

NJVC IT Services is a leader in the

deployment of IT process automation

solutions that deliver increased return on

investment and an improved quality-of-

service experience. We help customers

achieve breakthrough efficiency through a

relentless focus on process automation and

optimization while helping better align IT

services with dynamic business strategies.

Our practices divide into two main

categories: Core Infrastructure Services

and Converged IT Services.

Core Infrastructure Services support IT

tasks common to all organizations:

•Enterprise Management (operations

center, service desk, service-level

management, enterprise IT operational

status and dashboarding)

•Unified Communications (enterprise

data networks, telephony, video and

Web conferencing, communication plant

design and installation)

•Computing Services (enterprise

computing infrastructure management,

storage management, virtualization,

consolidation, identity services)

•Professional Engineering Services

(life-cycle planning, vendor engagement,

system engineering and design,

implementation and performance

optimization)

•Enterprise Resource Planning Services,

including application configuration and

support for SAP, Oracle and PeopleSoft

•Portfolio, program and project

management with a focus on customer

needs, agility and efficiency

Reflecting changing information access

demands in the enterprise, one key offering

is the innovative NJVC Managed Device

Environment (MDE). MDE delivers the

mobility that organizations increasingly

require, while ensuring greater information

security, scalability and improved return on

investment through integration of

traditional thick clients and virtual desktop

infrastructure with image, software and

persona management across desktop and

mobile devices.

Converged IT Services focuses on two

major challenges facing IT today: business

optimization and analytics, and mobile/

pervasive computing. We are pioneering

secure solutions for performance analytics,

predictive modeling and validation,

profitability analytics, fraud detection

and cyber security risk detection and

predictive metrics. Our mobile/pervasive

computing team supports provisioning and

management of complex, heterogeneous

operating environments, including secure

support for bring-your-own-device

environments.

IT Services: Creating High-Performance IT

8

Cloud computing can help ensure that

enterprises achieve strategic value through

the use of IT, independent of where

technology assets reside and who owns

them. NJVC Cloudcuity™ Cloud Solutions

puts cloud technology to work to achieve

the seemingly incompatible goals of:

• Improving cost containment and shifting

IT costs from capex to opex

•Reducing time to market for new

application deployments

• Improving security posture across the full

enterprise technology portfolio

• Increasing quality of service to all IT

consumers in the enterprise

Cloudcuity is a portfolio of consultative

services and applications that support IT

supply chain innovation and optimization

through the integration and management

of cloud services in a secure, hybrid

computing environment.

Cloudcuity services help IT teams to:

• Identify cloud integration opportunities

through comprehensive assessment and

advisory services

•Migrate resources and applications into

the cloud

•Manage and optimize cloud resources

across multiple public/private cloud

providers and internal data centers

• Integrate world-class strategies for

resilient cyber defense

•Access world-class cloud solutions like

AppDeployer platform as a service

that can help enterprises revolutionize

software development processes

The foundation for Cloudcuity solutions

is the Cloudcuity Broker Management

Portal, which simplifies IT provisioning and

governance and allows IT teams to deliver

on-demand resources through repeatable,

rules-driven processes. Cloudcuity Broker

provides enterprise users a single toolset

for managing a portfolio of federated

virtual data centers, supplied either by the

world’s leading cloud services providers or

through internally managed or third-party

private cloud resources.

Cloudcuity: Accelerating Business Innovation through Agile IT

9

No challenge resonates more consistently

in the halls of government and executive

business suites than defending against

cyber attacks. NJVC Cyber Security helps

design, implement and manage resilient

information security programs that

integrate proactive defense, rapid response

to any security breach and organizational

learning to maximize defense effectiveness.

Recognizing that impenetrable network

defense is not feasible, our programs

emphasize situational awareness and

early detection, applying a defense-in-

depth strategy to analyze governance,

policies and practices and technology

infrastructure.

Our Cyber Security programs are guided

by the NJVC Unified Cyber Defense

Framework which defines a four-stage

process for resilient cyber security:

1. Predict: Services to anticipate and

model future threats and potential

impacts

2. Defend: Applications, services and

training to provide robust defense

against external and internal threats

3. Contain: Scalable, self-defending

information and infrastructure systems

to effectively react to a successful attack

4. Adapt: Continuous improvement

methodology to improve overall cyber

security posture

Unifying these stages, and supporting

them with historical, real-time and

predictive analytics, is the NJVC Cyber

Analytics Infrastructure and NJVC Cyber

Dashboard™, which transforms raw data

into real-time, actionable information.

NJVC provides security engineering

that complies with critical government

directives and guidelines, including the

United States Cyber Command, Federal

Information Security Management Act,

Federal Information Processing Standard

201-1, Homeland Security Presidential

Directive-12, DoD 8500.1, DoD 8500.2,

DoD 8420.01 and the National Security

Agency Information Assurance Technical

Framework.

All Cyber Security engagements

acknowledge client-specific security

infrastructure and assets, compliance

requirements, risk management processes

and appropriate adherence to applicable

security frameworks, including ISO/IEC

27002, Gramm-Leach-Bliley, Sarbanes-

Oxley and Payment Card Industry Data

Security Standards.

Cyber Security: Resilient Defense in a Dynamic Threat Environment

Unified Cyber Defense Framework

Predict

ContainAdapt

Defend

Visualize

10

Across all organizations—commercial,

academic, or public sector—IT is core to

operations, and the data center remains

the foundation of any IT infrastructure. But

the definition of data center has evolved

as rapidly as the demands on it. In place of

traditional, monolithic data center designs

and singular approaches to best practices,

today’s data centers reflect a hybrid

infrastructure, created around design-for-

demand goals. More critically, successful

data center strategies acknowledge the

new role of IT as a services broker, focused

on the delivery of strategic value from IT

assets—instead of the ownership of those

assets.

NJVC Data Center Services supports the

planning, deployment and management of

flexibly configured, high-security, mission-

critical data center solutions with specific

focus on customer environments where

information security is of vital importance.

Our solutions are delivered through a

proprietary, structured methodology

permitting us to address client-specific

needs across a variety of operating

environments, including:

•On-Premise Data Centers

•Co-Location, Managed Co-Location and

Managed Hosting Facilities

•Public and Private Cloud Providers

We offer a balanced portfolio of proven

technologies, addressing critical

operational, performance, security and

cost-management objectives in the age

of everything as a service, including data

center transformation/consolidation, cloud

computing, mobility, data proliferation and

ultra-reliability and security.

Our data center solutions are also tightly

integrated with our Cloudcuity Cloud

Solutions portfolio, providing unique

support for customers managing hybrid

computing infrastructures.

Data Center Services: Secure Support from Glass House to Cloud

NJVC Data Center Services offers a balanced portfolio of proven technologies, addressing critical operational,

performance, security and cost-management objectives in the age of everything as a service.

11

In a world dominated by digital media,

it can be easy to forget that for many

applications, print-based communications

are the preferred medium for sharing

information. Producing print for secure

applications is a specialized subset within

the print marketplace, distinguished by

unique processes for handling both source

data and final output.

For more than a decade, NJVC Print

Solutions has been a trusted provider of

highly specialized, secure printing services

to the intelligence, defense and military

communities. We began with one customer

that had very specialized requirements

for very important products. We have

been printing and finishing maps for

that defense and intelligence customer

since 2002. We produce maps to rigid

specifications, in sizes ranging from small

to large format, and perform finishing that

includes precise cutting, folding, collating,

binding, packaging and preparation for

shipment.

Today, a majority of our business is

commercial printing with a focus on:

•Large-format printing

•Packaging

•Point of purchase/point of sale

•Die-cut jobs for CD, DVD and Blu-Ray

packaging

NJVC Print Solutions production processes

are ISO 9001:2008 certified and our

proofing, printing and quality control

processes are G7 certified.

Print Solutions: Secure, Specialized Print Services

12

Maintaining leadership in both strategic

vision and technology implementation

under the market’s current pace of

innovation requires specific investment

in research and development as well as

continuous learning. At NJVC, the Center

for Technology Integration is our emerging

technology think tank—a strategically

aligned R&D facility focused on practical

applications of automation, advanced

integration strategies and forward-looking

application environments.

CTI personnel represent a blend of

strategic visionaries and practical

technologists who work together to:

•Conceptualize better ways to utilize IT

infrastructure under services-oriented

architectures

•Develop unique solutions for automating

work processes to reduce cost, enhance

service quality and enhance security

•Leverage new technologies and toolsets

to support effective design, development,

integration, testing, deployment and

maintenance of agile software solutions

• Identify opportunities to increase

productivity by analyzing gaps in delivery

of disparate IT services and bridging

those gaps by leveraging new and

emerging technology

The CTI team also provides technology

solutions support for active customer

engagements. This includes development

of custom applications, integration of

off-the-shelf solutions and development

and deployment of custom project

management and analytics/reporting

solutions.

Center for Technology Integration: Engineering Excellence

CTI is a strategically aligned R&D facility focused on practical applications of automation, advanced integration strategies and forward-looking application environments.

13

A Legacy of Success: A Vision for the Future

14

This simple philosophy has helped NJVC

establish an enviable history of more than

a decade of success in engagements in the

U.S. defense and intelligence communities.

When your job entails optimizing processes

for, and securing the assets of, some of the

most data-intensive and security-focused

agencies and departments of the U.S.

government, that is something about which

NJVC is justifiably proud.

But in the rapidly evolving world of IT,

yesterday’s accomplishments are but

a prelude to what we know we must

accomplish in the future. Technology

solutions facilitate virtually all aspects of

our personal and professional lives, and

the technology we use is evolving at an

accelerating pace. Every NJVC employee

recognizes that we are only as valuable to

our customers as our ability to help

them overcome the next hurdle they

face. Anticipating needs and remaining

ruthlessly innovative is part of the

entrepreneurial culture that is NJVC.

The NJVC corporate delivery model is founded on a belief that our customers’ objectives are our objectives. Only by visualizing each engagement through the customer’s eyes can

we ensure we provide solutions that deliver the highest quality and value.

We know that some companies would be daunted by the relentless need

to change, evolve, adapt … and learn. We view it as our mission.

Being driven by customer mission and business goals can seem overwhelming to some companies.

We view every opportunity to help a customer succeed as a privilege.

We are not some companies. We … are NJVC.

15

NJVC, LLC14295 Park Meadow Drive Chantilly, VA 20151 703.429.9000www.njvc.com

NJVC and Driven by Your Mission are registered trademarks and Cloudcuity and the NJVC Cyber Dashboard are trademarks of

NJVC, LLC. All other trademarks and registered trademarks are the property of their respective companies.

©2013 NJVC, LLC. All Rights Reserved. COM-CB_03292013