3. Business and government institutions around the globe are
operating in a new world—one defined by a wellspring of data, characterized by an accelerating
pace of change and influenced by an “always-on” culture that demands information connectivity for a
dizzying array of devices. This new world creates new considerations for IT departments that support
daily operations.
• What must be done to connect disparate devices to shared • How do you construct resilient defense strategies to protect
resources that display collections of structured and personal or proprietary data from prying eyes … including
unstructured data? state-sponsored terror networks, financially motivated cyber
thieves and mischievous teenage hackers?
• How do you manage exponentially expanding data stores on
consistently shrinking budgets? • How do you manage a global resource network containing
myriad devices and integrating wide-ranging applications for
• How do you create an environment that can respond to the
optimum performance and cost-efficiency?
changing user demands (internal and external) who want access
to newer ways of conducting business … now?
Some companies see these questions as challenges.
We see them as opportunities. Opportunities to grow, evolve and adapt.
Opportunities to become smarter, nimbler and more effective.
Some companies see these opportunities as too vague.
We see them as real, here and now.
We are not some companies.
We … are NJVC.
3
5. NJVC is an IT and security services company. Founded in 2001, we deliver a portfolio of managed
and subscription services to help customers better utilize their IT infrastructure, while enhancing governance, risk
management and regulatory compliance.
The NJVC global workforce includes Relentless Automation. Relentless Innovation.
more than 1,300 dedicated and talented Our offerings focus on mission-critical services needed to
employees located around the globe— support required IT transformations in organizations whose
wherever our customers need us—with operations depend on high performance, agility and advanced
more than 90 percent holding security information security.
clearances. We operate in the very real
world of continually evolving cyber We help secure and optimize diverse
threats and complex hybrid computing device environments, application portfolios
strategies, requiring us to maintain and data center assets through relentless
forward-thinking technology strategies and automation, with a focus on documented,
specific emphasis on situational awareness structured and repeatable processes. To
and resilient defense. Our integrated help drive next-generation effectiveness
management methodology guides project and long-term strategic operational
implementation and helps ensure delivery alignment, we apply innovation to help
of successful, high-performance solutions. organizations integrate new capabilities—
such as dynamically deployed, secure,
managed cloud services and advanced
analytics systems.
5
7. Facing a long and expanding list of demands with a continually pressured budget,
the old rules of IT management no longer apply. We understand that successful commercial
enterprises view information technology as a strategic asset, and that effective federal organizations recognize IT
as an integrated component of mission delivery.
NJVC services encompass a range of greater responsiveness, performance and development of proprietary innovations for
IT disciplines and service categories, all transparency within an intelligent security use in customer engagements.
focused on helping customers create structure.
We offer our services to customers
high-performance IT operations that can
Underpinning all NJVC technology through a flexible delivery model that
support optimum operational performance
operations is the NJVC Center for includes consulting and implementation,
and breakthrough innovation. From the
Technology Integration (CTI), our internal comprehensive outsourcing/managed
device and desktop to the cloud, NJVC
research and development facility. CTI services and staff augmentation. All
helps government and commercial entities
affords customer implementation teams programs are custom fit to specific
strategize, operationalize and optimize an
access to advanced integration and testing operational needs, budget considerations
agile IT supply chain that delivers
facilities, and is responsible for leading the and long-term operating objectives.
NJVC Offerings Portfolio
Cloudcuity™
IT Services Cyber Security Data Center Services Secure Cloud Computing
Print Solutions
Enterprise Management Security Consulting Co-Lo Hosting Advisory and Secure Print Production
and Assessments Assessment Services
Computing Services Managed Hosting Large-Format Printing
Managed Security Services Infrastructure, Platform
Unified Communications Migration and and Software Solutions Media Packaging
Cyber Analytics/ Optimization
Professional Engineering NJVC Cyber Dashboard™ Cloud Cyber Point-of-Purchase/
Security Services Point-of-Sale
Big Data/Analytics
Secure Hybrid Hosting Packaging
Large Scale Program
Management & Integration
Center for Technology Integration (R&D)
7
8. IT Services: Creating High-Performance IT
NJVC IT Services is a leader in the • Unified Communications (enterprise Reflecting changing information access
deployment of IT process automation data networks, telephony, video and demands in the enterprise, one key offering
solutions that deliver increased return on Web conferencing, communication plant is the innovative NJVC Managed Device
investment and an improved quality-of- design and installation) Environment (MDE). MDE delivers the
service experience. We help customers mobility that organizations increasingly
• Computing Services (enterprise
achieve breakthrough efficiency through a require, while ensuring greater information
computing infrastructure management,
relentless focus on process automation and security, scalability and improved return on
storage management, virtualization,
optimization while helping better align IT investment through integration of
consolidation, identity services)
services with dynamic business strategies. traditional thick clients and virtual desktop
• Professional Engineering Services infrastructure with image, software and
Our practices divide into two main
(life-cycle planning, vendor engagement, persona management across desktop and
categories: Core Infrastructure Services
system engineering and design, mobile devices.
and Converged IT Services.
implementation and performance
Converged IT Services focuses on two
Core Infrastructure Services support IT optimization)
major challenges facing IT today: business
tasks common to all organizations:
• Enterprise Resource Planning Services, optimization and analytics, and mobile/
• Enterprise Management (operations including application configuration and pervasive computing. We are pioneering
center, service desk, service-level support for SAP, Oracle and PeopleSoft secure solutions for performance analytics,
management, enterprise IT operational predictive modeling and validation,
• Portfolio, program and project
status and dashboarding) profitability analytics, fraud detection
management with a focus on customer and cyber security risk detection and
needs, agility and efficiency predictive metrics. Our mobile/pervasive
computing team supports provisioning and
management of complex, heterogeneous
operating environments, including secure
support for bring-your-own-device
environments.
8
9. Cloudcuity: Accelerating Business Innovation through Agile IT
Cloud computing can help ensure that Cloudcuity services help IT teams to: The foundation for Cloudcuity solutions
enterprises achieve strategic value through is the Cloudcuity Broker Management
• Identify cloud integration opportunities
the use of IT, independent of where Portal, which simplifies IT provisioning and
through comprehensive assessment and
technology assets reside and who owns governance and allows IT teams to deliver
advisory services
them. NJVC Cloudcuity™ Cloud Solutions on-demand resources through repeatable,
puts cloud technology to work to achieve • Migrate resources and applications into rules-driven processes. Cloudcuity Broker
the seemingly incompatible goals of: the cloud provides enterprise users a single toolset
for managing a portfolio of federated
• Improving cost containment and shifting • Manage and optimize cloud resources virtual data centers, supplied either by the
IT costs from capex to opex across multiple public/private cloud world’s leading cloud services providers or
providers and internal data centers
• Reducing time to market for new through internally managed or third-party
application deployments • Integrate world-class strategies for private cloud resources.
resilient cyber defense
• Improving security posture across the full
enterprise technology portfolio • Access world-class cloud solutions like
AppDeployer platform as a service
• Increasing quality of service to all IT
that can help enterprises revolutionize
consumers in the enterprise
software development processes
Cloudcuity is a portfolio of consultative
services and applications that support IT
supply chain innovation and optimization
through the integration and management
of cloud services in a secure, hybrid
computing environment.
9
10. Cyber Security: Resilient Defense in a Dynamic Threat Environment
No challenge resonates more consistently 2. Defend: Applications, services and Unifying these stages, and supporting
in the halls of government and executive training to provide robust defense them with historical, real-time and
business suites than defending against against external and internal threats predictive analytics, is the NJVC Cyber
cyber attacks. NJVC Cyber Security helps Analytics Infrastructure and NJVC Cyber
3. Contain: Scalable, self-defending
design, implement and manage resilient Dashboard™, which transforms raw data
information and infrastructure systems
information security programs that into real-time, actionable information.
to effectively react to a successful attack
integrate proactive defense, rapid response
NJVC provides security engineering
to any security breach and organizational 4. Adapt: Continuous improvement
that complies with critical government
learning to maximize defense effectiveness. methodology to improve overall cyber
directives and guidelines, including the
Recognizing that impenetrable network security posture
United States Cyber Command, Federal
defense is not feasible, our programs
Information Security Management Act,
emphasize situational awareness and
Unified Cyber Defense Framework Federal Information Processing Standard
early detection, applying a defense-in-
201-1, Homeland Security Presidential
depth strategy to analyze governance,
Directive-12, DoD 8500.1, DoD 8500.2,
policies and practices and technology
Predict Defend DoD 8420.01 and the National Security
infrastructure.
Agency Information Assurance Technical
Our Cyber Security programs are guided Framework.
Visualize
by the NJVC Unified Cyber Defense
All Cyber Security engagements
Framework which defines a four-stage
acknowledge client-specific security
process for resilient cyber security: Adapt Contain infrastructure and assets, compliance
1. Predict: Services to anticipate and ▲ requirements, risk management processes
▲
model future threats and potential and appropriate adherence to applicable
impacts security frameworks, including ISO/IEC
27002, Gramm-Leach-Bliley, Sarbanes-
Oxley and Payment Card Industry Data
Security Standards.
10
11. Data Center Services: Secure Support from Glass House to Cloud
Across all organizations—commercial, needs across a variety of operating of everything as a service, including data
academic, or public sector—IT is core to environments, including: center transformation/consolidation, cloud
operations, and the data center remains computing, mobility, data proliferation and
• On-Premise Data Centers
the foundation of any IT infrastructure. But ultra-reliability and security.
the definition of data center has evolved • Co-Location, Managed Co-Location and
Our data center solutions are also tightly
as rapidly as the demands on it. In place of Managed Hosting Facilities
integrated with our Cloudcuity Cloud
traditional, monolithic data center designs
• Public and Private Cloud Providers Solutions portfolio, providing unique
and singular approaches to best practices,
support for customers managing hybrid
today’s data centers reflect a hybrid We offer a balanced portfolio of proven computing infrastructures.
infrastructure, created around design-for- technologies, addressing critical
demand goals. More critically, successful operational, performance, security and
data center strategies acknowledge the cost-management objectives in the age
new role of IT as a services broker, focused
on the delivery of strategic value from IT
assets—instead of the ownership of those
assets. NJVC Data Center Services offers a balanced portfolio
of proven technologies, addressing critical operational,
NJVC Data Center Services supports the
planning, deployment and management of
performance, security and cost-management
flexibly configured, high-security, mission- objectives in the age of everything as a service.
critical data center solutions with specific
focus on customer environments where
information security is of vital importance.
Our solutions are delivered through a
proprietary, structured methodology
permitting us to address client-specific
11
12. Print Solutions: Secure, Specialized Print Services
In a world dominated by digital media, For more than a decade, NJVC Print Today, a majority of our business is
it can be easy to forget that for many Solutions has been a trusted provider of commercial printing with a focus on:
applications, print-based communications highly specialized, secure printing services
• Large-format printing
are the preferred medium for sharing to the intelligence, defense and military
information. Producing print for secure communities. We began with one customer • Packaging
applications is a specialized subset within that had very specialized requirements
• Point of purchase/point of sale
the print marketplace, distinguished by for very important products. We have
unique processes for handling both source been printing and finishing maps for • Die-cut jobs for CD, DVD and Blu-Ray
data and final output. that defense and intelligence customer packaging
since 2002. We produce maps to rigid
specifications, in sizes ranging from small NJVC Print Solutions production processes
to large format, and perform finishing that are ISO 9001:2008 certified and our
includes precise cutting, folding, collating, proofing, printing and quality control
binding, packaging and preparation for processes are G7 certified.
shipment.
12
13. Center for Technology Integration: Engineering Excellence
Maintaining leadership in both strategic CTI personnel represent a blend of • Identify opportunities to increase
vision and technology implementation strategic visionaries and practical productivity by analyzing gaps in delivery
under the market’s current pace of technologists who work together to: of disparate IT services and bridging
innovation requires specific investment those gaps by leveraging new and
• Conceptualize better ways to utilize IT
in research and development as well as emerging technology
infrastructure under services-oriented
continuous learning. At NJVC, the Center
architectures The CTI team also provides technology
for Technology Integration is our emerging
solutions support for active customer
technology think tank—a strategically • Develop unique solutions for automating
engagements. This includes development
aligned R&D facility focused on practical work processes to reduce cost, enhance
of custom applications, integration of
applications of automation, advanced service quality and enhance security
off-the-shelf solutions and development
integration strategies and forward-looking
• Leverage new technologies and toolsets and deployment of custom project
application environments.
to support effective design, development, management and analytics/reporting
integration, testing, deployment and solutions.
maintenance of agile software solutions
CTI is a strategically aligned R&D facility focused
on practical applications of automation,
advanced integration strategies and
forward-looking application environments.
13
14. A Legacy of Success: A Vision for the Future
14
15. The NJVC corporate delivery model is founded on a belief that our customers’
objectives are our objectives. Only by visualizing each engagement through the customer’s eyes can
we ensure we provide solutions that deliver the highest quality and value.
This simple philosophy has helped NJVC But in the rapidly evolving world of IT, our customers as our ability to help
establish an enviable history of more than yesterday’s accomplishments are but them overcome the next hurdle they
a decade of success in engagements in the a prelude to what we know we must face. Anticipating needs and remaining
U.S. defense and intelligence communities. accomplish in the future. Technology ruthlessly innovative is part of the
When your job entails optimizing processes solutions facilitate virtually all aspects of entrepreneurial culture that is NJVC.
for, and securing the assets of, some of the our personal and professional lives, and
most data-intensive and security-focused the technology we use is evolving at an
agencies and departments of the U.S. accelerating pace. Every NJVC employee
government, that is something about which recognizes that we are only as valuable to
NJVC is justifiably proud.
We know that some companies would be daunted by the relentless need
to change, evolve, adapt … and learn. We view it as our mission.
Being driven by customer mission and business goals can seem overwhelming to some companies.
We view every opportunity to help a
customer succeed as a privilege.
We are not some companies.
We … are NJVC.
15