ITI Network Services

ITI Network design, installation, commissioning & project management inc Meraki and Cisco

A complete solution to provide web and network access wirelessly, or hard wired. The service delivers a complete end to end service with design, analysis, implementation, commissioning and project management. Cyber Security Services Solutions and Consultancy including GDPR.

Features

  • Expertise across all major vendor technologies
  • Track record of delivery to cost, quality and timescales
  • Highly accredited and experienced personnel
  • Comprehensive design to ensure coverage and service experience is maximised
  • Complete electrical services delivery to complement networking resources

Benefits

  • Allows secure access to web services
  • Provides public and private wifi networking
  • Completely managed service delivery

Pricing

£300 per person per day

Service documents

G-Cloud 9

197133033292547

ITI Network Services

Dave Walker

07885345865

david.walker@itinetworkservices.com

Service scope

Service scope
Service constraints Any service constraints would be identified during the design phase, fully documented and considered prior to implementation.
System requirements Structured cabling but this can be provided by ITI

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Typically 24 hours response Monday to Friday, high priority or escalation support at weekends
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels We provide a project manager and a technical support manager as part of the service at no extra charge for a typical deployment. If there are specific requirements outside of the typical service, this would be subject to negotiation.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started A full service documentation pack is delivered, training is not a frequent requirement but can be provided.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction The service is for a specific set of agreed project deliverables. As such, once service has been delivered satisfactorily the project ends. Any relevant data developed during the process will be handed over.
End-of-contract process This depends upon the client requirements. The price will be determined from the hardware requirements and the delivery resources to complete the project. Project management and technical management are included in the price model.

Using the service

Using the service
Web browser interface No
API No
Command line interface No

Scaling

Scaling
Scaling available No
Independence of resources Detailed design will ensure that adequate bandwidth is in place for the service requirements.
Usage notifications No

Analytics

Analytics
Infrastructure or application metrics No

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency Never
Protecting data at rest Other
Other data at rest protection approach Third party managed service responsible for all aspects of data
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Backup and recovery

Backup and recovery
Backup and recovery No

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Other
Other protection between networks This can vary, we would comply with client requirements.
Data protection within supplier network IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability ITI are able to operate different shift patterns to deliver the solution within agreed timescales. The timescale is determined during the design and survey stages and are agreed with the client. Any penalties for late delivery are subject to development into contract and are agreed prior to implementation.
Approach to resilience This data is available on request and is supplied by the 3rd party service provider.
Outage reporting This is not a managed service hence ITI do not provide reports for aspect of hardware failure.

Identity and authentication

Identity and authentication
User authentication Other
Other user authentication Authentication rules are determined by the client and will be implemented to their specification.
Access restrictions in management interfaces and support channels A predefined and restricted list of management users will be allocated at design stage according to client requirements. A variety of methods can be deployed such as password protection to restrict access.
Access restriction testing frequency At least every 6 months
Management access authentication Username or password
Devices users manage the service through Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Audit information for users
Access to user activity audit information No audit information available
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security No
Security governance accreditation No
Security governance approach Our security governance is managed by a 3rd part managed service provider.
Information security policies and processes ITI utilise a password protected VPN solution ti prevent unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information to its network.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach The processes will be defined through the customer requirements and an agreed service delivery model. The security consideration is established as an output of the design.
Vulnerability management type Supplier-defined controls
Vulnerability management approach These requirements are not relevant to the service offering.
Protective monitoring type Supplier-defined controls
Protective monitoring approach This determined by the client and their own procedures rather than during the implementation stage.
Incident management type Undisclosed
Incident management approach The installation service does not have ongoing maintenance provisions therefore this section isn't relevant to the offer. Any incidents occurring during the installation will be dealt with by the project manager.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart Yes
Who implements virtualisation Third-party
Third-party virtualisation provider Affinity IT Ltd
How shared infrastructure is kept separate A dedicated server is in place.

Energy efficiency

Energy efficiency
Energy-efficient datacentres No

Pricing

Pricing
Price £300 per person per day
Discount for educational organisations No
Free trial available No

Documents

Documents
Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑