Truststream Security Solutions

CyberArk Managed Operations Service

CyberArk provides class-leading Privileged Access Security (PAS) software which can deliver huge benefits to your business if implemented and managed properly. This Truststream managed service takes away the burden of operating your CyberArk system and frees your staff to concentrate on bringing your business applications under the control of CyberArk.

Features

  • Enterprise Password Vault (EPV)
  • Secure and tamper proof digital vault with multiple security layers.
  • Privileged Session Manager (PSM)
  • Single-sign-on control point that isolates, records and audits privileged access
  • Application Access Manager
  • On-Demand Privileges Manager
  • CyberArk License Reseller and CyberArk Support & Maintenance Reseller
  • Proactive monitoring/optimisation of your Cyber Ark platform
  • Fully managed Cyber Ark platform
  • 24/7/365 Truststream engineer support

Benefits

  • Manage Privilege at an Enterprise level through policy driven rules
  • Protect all privileged Accounts and SSH Keys
  • Control Access to Privileged Accounts
  • Manage application and service credentials
  • Comply with audit and regulatory requirements
  • System health checks and quarterly service reviews
  • Continual platform development
  • Reduce operational head count
  • Reduce staff attrition/skills concern
  • Fixed fee model

Pricing

£9000 to £20000 per instance per month

  • Education pricing available

Service documents

G-Cloud 11

184106666588764

Truststream Security Solutions

Bryan Thomson

07827 327320‬

bryan.thomson@truststream.co.uk

Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to Application Access Manager (AAM)
Secrets management for DevOps and automation processes, prevent hardcoded credentials
On-Demand Privileges Manager (OPM)
Control and monitor super users commands and replacement of SUDO
Endpoint Privilege Manager (EPM & EPM SaaS)
Server and Workstation least privilege, application control, credential theft protection
Cloud deployment model
  • Private cloud
  • Hybrid cloud
Service constraints Supplied upon request, contact Truststream to arrange an initial needs assessment session to capture your service specific requirements
System requirements
  • Windows 2012 R2 SP1, Windows 2016
  • .Net Framework 4.5.2
  • IIS 8.5, 10.0
  • Internet Explorer 11.0, Chrome 56 and Higher
  • Microsoft Remote Desktop Services
  • Microsoft Remote Desktop Services Gateway
  • SUSE Linux Enterprise Server 11 SP4 or 12
  • CentOS Linux 5.6 +, 6.4 + and 7.x versions
  • Red Hat Enterprise Linux 5.6+, 6.4+ and 7.x versions

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Customers cases will be assessed and graded on receipt. The customer can also request an escalation to a case. Truststream operates 24x7 support so response times are the same at weekends.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels 24x7 telephone support is provided by fully-certified Truststream staff, accredited as CyberArk Certified Delivery Engineers (CDE).

All customers are provided with a Technical Account Manager and a Customer Service Manager who are committed to helping you achieve the highest value, performance and results.

The latest system enhancements, updates, and alert announcements are included
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started All customers are provided with operational guides, network design documents and customised training can be provided upon request.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction We do not hold any client data
End-of-contract process If your maintenance contract expires then all users within your company will no longer be able to directly contact Support. All active Support cases will be put on hold until maintenance has been paid. Once maintenance is paid Support assistance will resume.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install Yes
Compatible operating systems Windows
Designed for use on mobile devices No
Service interface No
API Yes
What users can and can't do using the API The PAS Web Services is a RESTful API that enables users to create, list, modify and delete entities in Privileged Access Security solution from within programs and scripts. The main purpose of the PAS Web Services is to automate tasks that are usually performed manually using the UI, and to incorporate them into system and account-provisioning scripts.
API documentation Yes
API documentation formats PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation The PAS Web Services SDK is a RESTful API that can be invoked by any RESTful client for various programming and scripting environments, including Java, C#, Perl, PHP, Python and Ruby.

Scaling

Scaling
Independence of resources Customer environments are logically segregated to prevent users and customers from accessing resources not assigned to them

Analytics

Analytics
Service usage metrics Yes
Metrics types Metrics include: transactions per second, number of users, average queue time, number of successful changes/verifications/reconciliations , number of failed change/verifications/reconciliations.
Reporting types
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Reseller providing extra features and support
Organisation whose services are being resold CyberArk Software Limited

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach In-house
Protecting data at rest Other
Other data at rest protection approach We do not hold customer data
Data sanitisation process No
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Users can export metadata, but not passwords from the solution. Users are able to produce reports on activity using the web portal.
Data export formats
  • CSV
  • Other
Other data export formats SIEM API
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Private network or public sector network
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability SLA's will be defined once the target operating model with the buyer is agreed. This will include service credits for non-performance.
Approach to resilience Available on request
Outage reporting Public Dashboard & Email

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication 2-factor authentication
Access restrictions in management interfaces and support channels Available upon request
Access restriction testing frequency At least every 6 months
Management access authentication 2-factor authentication

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for Between 1 month and 6 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for Between 1 month and 6 months
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification Yes
Who accredited the PCI DSS certification Comsec Consulting
PCI DSS accreditation date 14/01/2019
What the PCI DSS doesn’t cover All covered.
Other security certifications Yes
Any other security certifications
  • We are looking into FEDRAMP for the coming year
  • On top of our PCI, SOC and ISO 27001 program
  • Truststream is Cyber Essentials Plus certified

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards
  • CSA CCM version 3.0
  • ISO/IEC 27001
Information security policies and processes Available on request

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Available on request
Vulnerability management type Undisclosed
Vulnerability management approach Truststream is both ISO27001 and Cyber Essentials + certified. Part of this requires us to ensure that all Critical/High rated vulnerabilities are detected and remediated within 14 days. To detect we use continual vulnerability scanning on all corporate assets via our in house Tenable platform.
Protective monitoring type Undisclosed
Protective monitoring approach Available upon request - Proactive monitoring and response is required as part of our ISO27001 and Cyber Essentials plus requirements
Incident management type Undisclosed
Incident management approach Available upon request - A robust incident management process is required as part of our ISO27001 compliance

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £9000 to £20000 per instance per month
Discount for educational organisations Yes
Free trial available No

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑