MDS Technologies Limited

Content Threat Removal Cloud Platform (Assured)

The Content Threat Removal Cloud Service provides information exchange control when data is moved between security domains or across perimeter gateways.
It protects a range of file transfer, Web browsing and machine-to-machine use cases. Service tailoring meets an organisation’s specific sharing needs, supporting user compliance and addresses organisational security risks.


  • Self-defending security architecture complies with CESG architecture patterns AP4/AP14
  • Securely share: structured data, Chat, email and content download/uploads
  • Content threat removal renders traffic safe using content transform technology
  • Separate policies for inbound and outbound information
  • Protects Tier 1, 2 and 3 information with inline deployment
  • Provides secure cross domain gateway or web proxy integration
  • Integrates with an existing Web Gateway or Web Application Firewall
  • Two-way configurations for request/response or pull/push exchanges
  • File transfer utilities and applications simplify service integration
  • Service helpdesk support and named account manager provided


  • Secure cross domain or perimeter information sharing with customers/ partners
  • Deal with less trusted organisations without compromising your sensitive data
  • Option for a resilient secure zone gateway provides breach avoidance
  • Option for integration at a web perimeter for portal protection
  • Content transform technology defeats zero-day attacks, steganography, fileless malware
  • Complies with CESG’s cross domain sharing architecture patterns AP4/AP14
  • Enhanced security operations for remediation and response to attack/compromise
  • Enhanced defence for your critical systems and sensitive information
  • Demonstrable compliance with policy, standards and legislation
  • Users held to account for their information sharing actions


£11700 per instance per month

Service documents

G-Cloud 10


MDS Technologies Limited

Nigel Sumner

01225 816280

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints Customer responsibilities include:
• Responding to policy conflict alerts
• Control and management of access and responsibilities for end users
• Ensuring only OFFICIAL or OFFICIAL-SENSITIVE data is passed to the service.
Customers not taking up a third party day-to-day management service, or professional services management, are also responsible for:
• Backing up configuration and syslog data
• Recovery from back-up
• day-to-day administration tasks
Support is available: Monday-Friday, 08.30-17.30, UK time, excluding bank & public holidays (unless additional support is purchased though our Secure Guard Management service.
System requirements
  • IX service requires 2 host platforms (low/high software hosts)
  • GX service requires single host platform
  • Host platform must have minimum 2 processors / 2 cores
  • Host platform must have minimum 32 GBytes RAM
  • Host platform must have minimum 50GBytes storage
  • Host platform must have minimum 3 x 1Gbit NIC ports
  • Virtual host platform must have VMWare ESXi 5 or 6.0
  • Must have a DVD/CDRW
  • Management machine with compatible browser required

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Response times are based on the priority assigned to the incident:
P1 - 15 minute response, 4 working hour resolution (6 hours if logged outside of working hours)
P2 - 15 minute response, 6 working hour resolution
P3 - 30 minute response, 3 working day resolution
P4 - 60 minute response, 7 working day resolution
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels MDS Support is based on the priority assigned to the incident:
P1 - 15 minute response, 4 working hour resolution (6 hours if logged outside of working hours)
P2 - 15 minute response, 6 working hour resolution
P3 - 30 minute response, 3 working day resolution
P4 - 60 minute response, 7 working day resolution
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We operate a Service Implementation process to ensure we take on the support and management of the cloud-based platform in a controlled manner. This encompasses:
• Setup of monitoring, alerting and anti-virus utilising the MDS management toolset
• Establishing the key customer service interfaces and information reporting framework
• Providing access and interfaces to our Service Desk
• Establishing maintenance and patching regimes and schedules
• Ensuring the IaaS, PaaS or SaaS platform is fully documented and baselined
• Understanding the security and assurance requirements
• Formal acceptance by our Customer Service team
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction The only customer data held within the service is the configured policy data and the Diode log data. If the customer requires Deep Secure to make this data available then Deep Secure charge a single day at our professional services rates (see Pricing) for off-boarding activities.
End-of-contract process Our off-boarding process is focused on ensuring the controlled shutdown of our service and, where appropriate, facilitating the transition to an alternative provider. This encompasses:
• Facilitating the removal of your data and content from the cloud platform
• Securely, and permanently, deleting all data, accounts and access such that they cannot be recovered
We can support the successful transfer of your services to another provider if requested. To support this we may:
• Appoint an Exit Manager
• Appoint a Project team for seamless handover to a new supplier or back to you to ensure service continuity
• Develop an Exit plan with your Exit Manager to identify all tasks and activities, for example:
• Transfer of all data to the new destination and provide backups as required
• Secure removal process for all data, user security, software etc.
• Acceptance and signoff of successful data and system transfer. This will include access by a nominated security cleared client representative or team to verify all data and systems have been successfully transferred and removed
The Exit team will be charged using our SFIA rates.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Firefox
  • Chrome
Application to install Yes
Compatible operating systems Linux or Unix
Designed for use on mobile devices No
Accessibility standards None or don’t know
Description of accessibility Users interact with the service using their standard desktop capabilities. As such no specific accessibility capabilities are provided by the service.
Accessibility testing None.
What users can and can't do using the API Service managers can manage the transformation policy or content policy applied to information transiting the service.
Ordinary users can pass data to the service and receive data from it.
API documentation Yes
API documentation formats PDF
API sandbox or test environment No
Customisation available Yes
Description of customisation Using the web management interface, administrators can define what data types are allowed across the Diode and what transformations are applied to them.


Independence of resources This service is deployed as a single tenant solution using UKCloud's secure Cloud platform.


Service usage metrics Yes
Metrics types We provide log data which the customer can use to determine loading and usage.
Reporting types API access


Supplier type Reseller providing extra features and support
Organisation whose services are being resold Deep Secure

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency Less than once a year
Penetration testing approach In-house
Protecting data at rest Other
Other data at rest protection approach Under normal circumstances the service has no customer data at rest. The exceptions are logs and swap files. These are protected by the physical access controls applicable in the infrastructure hosting environment.
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach We can provide users with an export of their platform database in a JSON format or similar.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • Transformation of PDF, .txt, GIF, JPEG, BMP, RTF, Office X
  • Transformation of PNG, XML, JSON, ZIP, RAR, GZIP, HTMLX,
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • Transformation of PDF, .txt, GIF, JPEG, BMP, RTF, Office X
  • Transformation of PNG, XML, JSON, ZIP, RAR, GZIP, HTML

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Bonded fibre optic connections
  • Other
Other protection between networks We offer the choice of connecting:
• Via the internet using additional encryption such as TLS 1.2
• IPSec VPN tunnels
• Via private networks such as leased lines or MPLS
• Via public sector networks such as PSN, N3, Janet
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network We use dedicated CAS-T circuits between each of our sites to ensure the protection of customer data in-flight. We additionally encrypt this data within our Elevated OFFICIAL platform. All data flows are also subject to our protective monitoring service.

Availability and resilience

Availability and resilience
Guaranteed availability Where the service is unavailable during the normal working day (0830-1700, Monday to Friday excluding Public Holidays and Bank Holidays) outside of scheduled maintenance periods, and the root cause preventing availability is solely due to Deep Secure’s software, a service credit will be allocated to the customer. The service credit will entitle the customer to utilise the service for the same period of time for which the service was unavailable without incurring the Deep Secure service charge.
Approach to resilience Additional instances of the boundary control components can be purchased to provide the desired level of resilience.
Outage reporting Outages are reported in syslog and/or SNMP data provided to customers.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Public key authentication (including by TLS client certificate)
Access restrictions in management interfaces and support channels Administrator access is authenticated using username and password over TLS . Support channel access is authenticated when a contact is made by checking customer details align with Deep Secure's records for supported customers.
Access restriction testing frequency At least once a year
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for Less than 1 month
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for Less than 1 month
How long system logs are stored for Less than 1 month

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 LRQA
ISO/IEC 27001 accreditation date 03/11/2017
What the ISO/IEC 27001 doesn’t cover MDS' risk assessment process has highlighted that the following area of ISO27001 is out of scope:
14.2.7 Information Systems: Outsourced Development
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications
  • Cyber Essentials Plus
  • PSN Connection Certificate

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes We follow the policies and procedures laid down in ISO 27001:2013 standard. In particular, our Information Security Management System contains all of the policies that support our security management approach. Our Information Security Policy provides the highest level policy statements which is supported by a comprehensive Acceptable Use Policy which all staff must sign before being granted any system/Network access. Additional policies cover key areas including Security Incident Management, Management Review, Document Control, Data Protection, Access Control, Business Continuity, Encryption, Patch Management and Auditing.

As part of our Service Implementation Process we carry out a pre-handover security audit to ensure that we have met the required MDS Security standards as well as any specific customer security requirements which have been agreed.

All of the above is supported by an extensive internal and external (UKAS accredited) Audit programme which ensures that we maintain the high level of security standards laid down in our processes.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach Configuration and Change management processes are fully aligned to ITIL best practise and documented within our Information Security Management System.

New customer environments are deployed using our scripted deployment tools to ensure a consistent and reliable build. Configuration changes to these environments are closely managed throughout the project to ensure that configuration records are maintained.

All changes to customer environments require both MDS and customer approval. This ensures that customers are fully aware and agree to any work being implemented within their environment.

The MDS Change Advisory Board meets weekly although Emergency Changes can be processed at short notice.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Our vulnerability management processes are compliant with ISO27001:2013 and supported by a comprehensive Patch Management policy. We undergo regular vulnerability assessments and also continually monitor a number of recognised sources of new vulnerability and threat information as well as any known exploits for them.

Our Patch Management process includes the regular and timely application of patches to software whilst minimising the potential impact of problem updates through testing and evaluation.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach MDS can implement a GPG-13 compliant Protective Monitoring solution through our relationship with Assuria. The Assuria Log Manager (ALM) application is a CESG CCTM accredited Forensic SIEM/Log Management Solution. ALM is cloud ready, Scalable, Flexible and provides analysis and real time alerting as well as full compliance reporting.

The ALM architecture allows the collection and management of almost any format and supports a wide range of log standards. Although ALM can work agentless, the installation of an ALM Agent (available for a wide range of platforms) enhances the service with automated log collection, rotation, digital signing and forwarding.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach MDS’ Information Security Incident Management Policy fully complies with ISO27001:2013 and includes:
• Potential or actual breaches of confidentiality of a company or supported customer information asset, or potential or actual breaches of confidentiality of a supporting asset
• Potential or actual breaches of integrity of a company or supported customer information asset, or potential or actual breaches of integrity of a supporting asset
• Potential or actual interruptions to the availability of a company or supported customer information asset

The Policy applies to all employees, contractors and third party users of MDS information systems, and other related infrastructure.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks Yes
Connected networks
  • Public Services Network (PSN)
  • New NHS Network (N3)
  • Joint Academic Network (JANET)
  • Other


Price £11700 per instance per month
Discount for educational organisations No
Free trial available No

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑