njvc brochure
TRANSCRIPT
•What must be done to connect disparate devices to shared
resources that display collections of structured and
unstructured data?
•How do you manage exponentially expanding data stores on
consistently shrinking budgets?
•How do you create an environment that can respond to the
changing user demands (internal and external) who want access
to newer ways of conducting business … now?
•How do you construct resilient defense strategies to protect
personal or proprietary data from prying eyes … including
state-sponsored terror networks, financially motivated cyber
thieves and mischievous teenage hackers?
•How do you manage a global resource network containing
myriad devices and integrating wide-ranging applications for
optimum performance and cost-efficiency?
Business and government institutions around the globe are operating in a new world —one defined by a wellspring of data, characterized by an accelerating
pace of change and influenced by an “always-on” culture that demands information connectivity for a
dizzying array of devices. This new world creates new considerations for IT departments that support
daily operations.
Some companies see these questions as challenges. We see them as opportunities. Opportunities to grow, evolve and adapt.
Opportunities to become smarter, nimbler and more effective.
Some companies see these opportunities as too vague. We see them as real, here and now.
We are not some companies.
We … are NJVC.
3
The NJVC global workforce includes
more than 1,300 dedicated and talented
employees located around the globe—
wherever our customers need us—with
more than 90 percent holding security
clearances. We operate in the very real
world of continually evolving cyber
threats and complex hybrid computing
strategies, requiring us to maintain
forward-thinking technology strategies and
specific emphasis on situational awareness
and resilient defense. Our integrated
management methodology guides project
implementation and helps ensure delivery
of successful, high-performance solutions.
We help secure and optimize diverse
device environments, application portfolios
and data center assets through relentless
automation, with a focus on documented,
structured and repeatable processes. To
help drive next-generation effectiveness
and long-term strategic operational
alignment, we apply innovation to help
organizations integrate new capabilities—
such as dynamically deployed, secure,
managed cloud services and advanced
analytics systems.
Relentless Automation. Relentless Innovation.Our offerings focus on mission-critical services needed to support required IT transformations in organizations whose operations depend on high performance, agility and advanced information security.
NJVC is an IT and security services company. Founded in 2001, we deliver a portfolio of managed
and subscription services to help customers better utilize their IT infrastructure, while enhancing governance, risk
management and regulatory compliance.
5
NJVC services encompass a range of
IT disciplines and service categories, all
focused on helping customers create
high-performance IT operations that can
support optimum operational performance
and breakthrough innovation. From the
device and desktop to the cloud, NJVC
helps government and commercial entities
strategize, operationalize and optimize an
agile IT supply chain that delivers
greater responsiveness, performance and
transparency within an intelligent security
structure.
Underpinning all NJVC technology
operations is the NJVC Center for
Technology Integration (CTI), our internal
research and development facility. CTI
affords customer implementation teams
access to advanced integration and testing
facilities, and is responsible for leading the
development of proprietary innovations for
use in customer engagements.
We offer our services to customers
through a flexible delivery model that
includes consulting and implementation,
comprehensive outsourcing/managed
services and staff augmentation. All
programs are custom fit to specific
operational needs, budget considerations
and long-term operating objectives.
Facing a long and expanding list of demands with a continually pressured budget, the old rules of IT management no longer apply. We understand that successful commercial
enterprises view information technology as a strategic asset, and that effective federal organizations recognize IT
as an integrated component of mission delivery.
IT Services Cyber Security Data Center Services Cloudcuity™ Secure Cloud Computing Print Solutions
Enterprise Management
Computing Services
Unified Communications
Professional Engineering
Big Data/Analytics
Large Scale Program Management & Integration
Advisory and Assessment Services
Infrastructure, Platform and Software Solutions
Cloud Cyber Security Services
Secure Hybrid Hosting
Security Consulting and Assessments
Managed Security Services
Cyber Analytics/ NJVC Cyber Dashboard™
Co-Lo Hosting
Managed Hosting
Migration and Optimization
Secure Print Production
Large-Format Printing
Media Packaging
Point-of-Purchase/ Point-of-Sale
Packaging
Center for Technology Integration (R&D)
NJVC Offerings Portfolio
7
NJVC IT Services is a leader in the
deployment of IT process automation
solutions that deliver increased return on
investment and an improved quality-of-
service experience. We help customers
achieve breakthrough efficiency through a
relentless focus on process automation and
optimization while helping better align IT
services with dynamic business strategies.
Our practices divide into two main
categories: Core Infrastructure Services
and Converged IT Services.
Core Infrastructure Services support IT
tasks common to all organizations:
•Enterprise Management (operations
center, service desk, service-level
management, enterprise IT operational
status and dashboarding)
•Unified Communications (enterprise
data networks, telephony, video and
Web conferencing, communication plant
design and installation)
•Computing Services (enterprise
computing infrastructure management,
storage management, virtualization,
consolidation, identity services)
•Professional Engineering Services
(life-cycle planning, vendor engagement,
system engineering and design,
implementation and performance
optimization)
•Enterprise Resource Planning Services,
including application configuration and
support for SAP, Oracle and PeopleSoft
•Portfolio, program and project
management with a focus on customer
needs, agility and efficiency
Reflecting changing information access
demands in the enterprise, one key offering
is the innovative NJVC Managed Device
Environment (MDE). MDE delivers the
mobility that organizations increasingly
require, while ensuring greater information
security, scalability and improved return on
investment through integration of
traditional thick clients and virtual desktop
infrastructure with image, software and
persona management across desktop and
mobile devices.
Converged IT Services focuses on two
major challenges facing IT today: business
optimization and analytics, and mobile/
pervasive computing. We are pioneering
secure solutions for performance analytics,
predictive modeling and validation,
profitability analytics, fraud detection
and cyber security risk detection and
predictive metrics. Our mobile/pervasive
computing team supports provisioning and
management of complex, heterogeneous
operating environments, including secure
support for bring-your-own-device
environments.
IT Services: Creating High-Performance IT
8
Cloud computing can help ensure that
enterprises achieve strategic value through
the use of IT, independent of where
technology assets reside and who owns
them. NJVC Cloudcuity™ Cloud Solutions
puts cloud technology to work to achieve
the seemingly incompatible goals of:
• Improving cost containment and shifting
IT costs from capex to opex
•Reducing time to market for new
application deployments
• Improving security posture across the full
enterprise technology portfolio
• Increasing quality of service to all IT
consumers in the enterprise
Cloudcuity is a portfolio of consultative
services and applications that support IT
supply chain innovation and optimization
through the integration and management
of cloud services in a secure, hybrid
computing environment.
Cloudcuity services help IT teams to:
• Identify cloud integration opportunities
through comprehensive assessment and
advisory services
•Migrate resources and applications into
the cloud
•Manage and optimize cloud resources
across multiple public/private cloud
providers and internal data centers
• Integrate world-class strategies for
resilient cyber defense
•Access world-class cloud solutions like
AppDeployer platform as a service
that can help enterprises revolutionize
software development processes
The foundation for Cloudcuity solutions
is the Cloudcuity Broker Management
Portal, which simplifies IT provisioning and
governance and allows IT teams to deliver
on-demand resources through repeatable,
rules-driven processes. Cloudcuity Broker
provides enterprise users a single toolset
for managing a portfolio of federated
virtual data centers, supplied either by the
world’s leading cloud services providers or
through internally managed or third-party
private cloud resources.
Cloudcuity: Accelerating Business Innovation through Agile IT
9
No challenge resonates more consistently
in the halls of government and executive
business suites than defending against
cyber attacks. NJVC Cyber Security helps
design, implement and manage resilient
information security programs that
integrate proactive defense, rapid response
to any security breach and organizational
learning to maximize defense effectiveness.
Recognizing that impenetrable network
defense is not feasible, our programs
emphasize situational awareness and
early detection, applying a defense-in-
depth strategy to analyze governance,
policies and practices and technology
infrastructure.
Our Cyber Security programs are guided
by the NJVC Unified Cyber Defense
Framework which defines a four-stage
process for resilient cyber security:
1. Predict: Services to anticipate and
model future threats and potential
impacts
2. Defend: Applications, services and
training to provide robust defense
against external and internal threats
3. Contain: Scalable, self-defending
information and infrastructure systems
to effectively react to a successful attack
4. Adapt: Continuous improvement
methodology to improve overall cyber
security posture
Unifying these stages, and supporting
them with historical, real-time and
predictive analytics, is the NJVC Cyber
Analytics Infrastructure and NJVC Cyber
Dashboard™, which transforms raw data
into real-time, actionable information.
NJVC provides security engineering
that complies with critical government
directives and guidelines, including the
United States Cyber Command, Federal
Information Security Management Act,
Federal Information Processing Standard
201-1, Homeland Security Presidential
Directive-12, DoD 8500.1, DoD 8500.2,
DoD 8420.01 and the National Security
Agency Information Assurance Technical
Framework.
All Cyber Security engagements
acknowledge client-specific security
infrastructure and assets, compliance
requirements, risk management processes
and appropriate adherence to applicable
security frameworks, including ISO/IEC
27002, Gramm-Leach-Bliley, Sarbanes-
Oxley and Payment Card Industry Data
Security Standards.
Cyber Security: Resilient Defense in a Dynamic Threat Environment
Unified Cyber Defense Framework
Predict
ContainAdapt
Defend
▲
▲
Visualize
10
Across all organizations—commercial,
academic, or public sector—IT is core to
operations, and the data center remains
the foundation of any IT infrastructure. But
the definition of data center has evolved
as rapidly as the demands on it. In place of
traditional, monolithic data center designs
and singular approaches to best practices,
today’s data centers reflect a hybrid
infrastructure, created around design-for-
demand goals. More critically, successful
data center strategies acknowledge the
new role of IT as a services broker, focused
on the delivery of strategic value from IT
assets—instead of the ownership of those
assets.
NJVC Data Center Services supports the
planning, deployment and management of
flexibly configured, high-security, mission-
critical data center solutions with specific
focus on customer environments where
information security is of vital importance.
Our solutions are delivered through a
proprietary, structured methodology
permitting us to address client-specific
needs across a variety of operating
environments, including:
•On-Premise Data Centers
•Co-Location, Managed Co-Location and
Managed Hosting Facilities
•Public and Private Cloud Providers
We offer a balanced portfolio of proven
technologies, addressing critical
operational, performance, security and
cost-management objectives in the age
of everything as a service, including data
center transformation/consolidation, cloud
computing, mobility, data proliferation and
ultra-reliability and security.
Our data center solutions are also tightly
integrated with our Cloudcuity Cloud
Solutions portfolio, providing unique
support for customers managing hybrid
computing infrastructures.
Data Center Services: Secure Support from Glass House to Cloud
NJVC Data Center Services offers a balanced portfolio of proven technologies, addressing critical operational,
performance, security and cost-management objectives in the age of everything as a service.
11
In a world dominated by digital media,
it can be easy to forget that for many
applications, print-based communications
are the preferred medium for sharing
information. Producing print for secure
applications is a specialized subset within
the print marketplace, distinguished by
unique processes for handling both source
data and final output.
For more than a decade, NJVC Print
Solutions has been a trusted provider of
highly specialized, secure printing services
to the intelligence, defense and military
communities. We began with one customer
that had very specialized requirements
for very important products. We have
been printing and finishing maps for
that defense and intelligence customer
since 2002. We produce maps to rigid
specifications, in sizes ranging from small
to large format, and perform finishing that
includes precise cutting, folding, collating,
binding, packaging and preparation for
shipment.
Today, a majority of our business is
commercial printing with a focus on:
•Large-format printing
•Packaging
•Point of purchase/point of sale
•Die-cut jobs for CD, DVD and Blu-Ray
packaging
NJVC Print Solutions production processes
are ISO 9001:2008 certified and our
proofing, printing and quality control
processes are G7 certified.
Print Solutions: Secure, Specialized Print Services
12
Maintaining leadership in both strategic
vision and technology implementation
under the market’s current pace of
innovation requires specific investment
in research and development as well as
continuous learning. At NJVC, the Center
for Technology Integration is our emerging
technology think tank—a strategically
aligned R&D facility focused on practical
applications of automation, advanced
integration strategies and forward-looking
application environments.
CTI personnel represent a blend of
strategic visionaries and practical
technologists who work together to:
•Conceptualize better ways to utilize IT
infrastructure under services-oriented
architectures
•Develop unique solutions for automating
work processes to reduce cost, enhance
service quality and enhance security
•Leverage new technologies and toolsets
to support effective design, development,
integration, testing, deployment and
maintenance of agile software solutions
• Identify opportunities to increase
productivity by analyzing gaps in delivery
of disparate IT services and bridging
those gaps by leveraging new and
emerging technology
The CTI team also provides technology
solutions support for active customer
engagements. This includes development
of custom applications, integration of
off-the-shelf solutions and development
and deployment of custom project
management and analytics/reporting
solutions.
Center for Technology Integration: Engineering Excellence
CTI is a strategically aligned R&D facility focused on practical applications of automation, advanced integration strategies and forward-looking application environments.
13
This simple philosophy has helped NJVC
establish an enviable history of more than
a decade of success in engagements in the
U.S. defense and intelligence communities.
When your job entails optimizing processes
for, and securing the assets of, some of the
most data-intensive and security-focused
agencies and departments of the U.S.
government, that is something about which
NJVC is justifiably proud.
But in the rapidly evolving world of IT,
yesterday’s accomplishments are but
a prelude to what we know we must
accomplish in the future. Technology
solutions facilitate virtually all aspects of
our personal and professional lives, and
the technology we use is evolving at an
accelerating pace. Every NJVC employee
recognizes that we are only as valuable to
our customers as our ability to help
them overcome the next hurdle they
face. Anticipating needs and remaining
ruthlessly innovative is part of the
entrepreneurial culture that is NJVC.
The NJVC corporate delivery model is founded on a belief that our customers’ objectives are our objectives. Only by visualizing each engagement through the customer’s eyes can
we ensure we provide solutions that deliver the highest quality and value.
We know that some companies would be daunted by the relentless need
to change, evolve, adapt … and learn. We view it as our mission.
Being driven by customer mission and business goals can seem overwhelming to some companies.
We view every opportunity to help a customer succeed as a privilege.
We are not some companies. We … are NJVC.
15
NJVC, LLC14295 Park Meadow Drive Chantilly, VA 20151 703.429.9000www.njvc.com
NJVC and Driven by Your Mission are registered trademarks and Cloudcuity and the NJVC Cyber Dashboard are trademarks of
NJVC, LLC. All other trademarks and registered trademarks are the property of their respective companies.
©2013 NJVC, LLC. All Rights Reserved. COM-CB_03292013