OCSL MANAGED SERVICES LIMITED

Network and Security Services

CANCOM UK’s 'Network and Security Services' consists of several modular network and security offerings, that when combined provide a fully managed Protective Monitoring, Detection and Response Service for clients, helping them define a clear security strategy.

Features

  • Protection against the latest vulnerabilities and exploits
  • Strong defence against DOS, DDOS, Exploits, Worms and Viruses
  • Anti-Bot And Anti-Virus Zero hour protection
  • Gather, inspect and present information from network and security devices
  • Detect covert or malicious communications and encrypted traffic
  • Detect inside threats, that aren’t visible from IPS solutions
  • GEO-Location Banning
  • Prevent malicious double file extensions used to hide malware
  • Control what sites your employees view

Benefits

  • Protects networks, from inside threats as well as outside
  • Highlights security misconfigurations in network and applications
  • Increase internal security not just external
  • Immediately stop propagating attacks and prevent potential security breaches
  • Reports can be tailored to the customers requirements
  • 24/7 alerting and UK SOC support to help resolve issues
  • Patching control and insight into organisation security patch levels
  • Unified view of organisation security status
  • Informative reporting, log collection analysis and retention
  • Helps IT meet compliance security requirements

Pricing

£3.51 to £1014.09 per device per month

Service documents

Framework

G-Cloud 11

Service ID

2 0 6 5 3 3 0 2 5 5 7 3 1 5 4

Contact

OCSL MANAGED SERVICES LIMITED

Mark Skelton

0845 605 2100

gcloud@cancom.co.uk

Service scope

Service constraints
For protective monitoring, management and alerting services, these will require a permanent VPN or physical connectivity between customer and CANCOM UK.
For firewalling and Advanced Inspection Services such as IDS/IDP these may require connectivity such as national ethernet or MPLS etc as well as internet breakout.
System requirements
System requirements depend upon security service chosen

User support

Email or online ticketing support
Email or online ticketing
Support response times
Response times dependent on priority level of issue logged and whether via telephone or email.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Response up to minimum 30 minutes, max 8 hours depending on priority severity of support request and service level.
*P1 calls must be logged by telephone to ensure a more immediate response
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Service inception is via several methods dependent on security service selected and based upon customer requirements, but would typically consist of provision of site to site VPN or dedicated link, before chosen security services can then be provided.
Dependent on service(s) selected, as they are a fully managed service no user level documentation is required, however certain services may permit users to access a web portal for status and reporting purposes.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
Depends on which security service has been consumed.
In the case of SIEM, CANCOM UK can provide customer a raw export of the logs.
End-of-contract process
Upon receiving notification of termination, if data extract has been requested - CANCOM UK can first provide a raw export of logs (where appropriate).
CANCOM UK will on a mutually agreed date, simply delete the customer’s data securely from the security platform and disable the customer’s access.

Using the service

Web browser interface
Yes
Using the web interface
A web interface is provided for SIEM, however this is a read only access portal for customers to be able to monitor security status themselves but not to administer. CANCOM UK provide as a service and fully manage the solution.
Web interface accessibility standard
None or don’t know
How the web interface is accessible
Private URL via VPN or dedicated connectivity.
Web interface accessibility testing
Unknown
API
No
Command line interface
No

Scaling

Scaling available
No
Independence of resources
CANCOM UK centrally provided security services are built upon a multi tenant design and strictly capacity planned to ensure sufficient performance and capacity is always available to the services.
The various security services are provided across multiple resilient systems and networking backbone across multiple sites.
Usage notifications
Yes
Usage reporting
  • Email
  • Other

Analytics

Infrastructure or application metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Yes
What’s backed up
Virtual Machines
Backup controls
User access not applicable to the service.
CANCOM UK provide backups and replication of our security services platform in order to provide the resilient service. Backups are not a customer facing service but part of the protection of the CANCOM UK platforms.
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
CANCOM UK have SLA’s and Penalties (service credits) as standard offerings for each of our managed services.

Dependent on the provided service, services shall be deemed available when the customer is able to access and use the services hosted or provided by CANCOM UK. This may include periods where the customer is unable to access applications and services, where it is demonstrated by CANCOM UK to the customer’s satisfaction, or where any inability to access the customer’s applications and services is the result of permitted downtime.

Any reduced charges under this Service Level Agreement will be confirmed by credit note issued by CANCOM UK to our customers, confirming any adjustment to be made to the following monthly charge.

99.95% availability is guaranteed.
Approach to resilience
The CANCOM UK datacentres and the services provided from within have been architected in meticulous detail from the ground up, built upon enterprise class best of breed hardware and technology, ensuring services are provided from a fully resilient infrastructure of at least N+1 with no single points of failure, across geographically-diverse Tier 3+ datacentres.
From the power feeds from separate power grids, multiple generators and UPS's all tested weekly, to the fire suppression systems, resilient networking and WAN links, storage and compute clusters, all aspects have been carefully considered using best of breed technology with no single points of failure.
Outage reporting
CANCOM UK MUST follow our Corrective action of Events & Incidents policy, which is in scope of our ISO27001, ISO9001, ISO20000, ISO27018 and ISO22301 certifications, following standard ITIL conformant Major Incident Management processes.
This includes informing stakeholders immediately without delay.

Identity and authentication

User authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Web portal access is controlled by unique credentials dependent on security service provided.
CANCOM UK Managed Services uses unique user IDs to enable users to be linked to and held responsible for their actions.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Registrar of Standards (Holdings) Ltd
ISO/IEC 27001 accreditation date
21/06/2011
What the ISO/IEC 27001 doesn’t cover
There are 114 controls within ISO 27001:2013. CANCOM UK Managed Services has currently adopted 111 of the controls. The remaining 3 controls have not been adopted at this stage. A.14.1.3 (CANCOM UK Managed Services do not use application transactions). A.14.2.1 (CANCOM UK Managed Services do not develop software). A.14.2.7 (CANCOM UK Managed Services do not outsource software development).
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
Yes
Any other security certifications
  • ISO27018 Protection of Personally Identifiable Information in the Cloud
  • Government OFFICIAL Classification Supplier
  • Approved Commercial N3 Aggregator transitioning to a HSCN Supplier
  • Health & Social Care Network (HSCN) Compliant
  • Cyber Essentials Certificate of Assurance
  • IASME Information Security Standard Certificate of Assurance
  • CEH (Certified Ethical Hacker)
  • CND (The Certified Network Defender)

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
ISO22301 (Business Continuity Management System)
ISO20000 (ITIL Service Management)
ISO9001 (Quality)
ISO27018 Code of Practise (Protection of Personally Identifiable Information in the Cloud)
Health & Social Care Network (HSCN) Compliant
Cyber Essentials Certificate of Assurance
IASME Information Security Standard Certificate of Assurance
CEH (Certified Ethical Hacker)
CND (Certified Network Defender)
Information security policies and processes
A full-time compliance team is employed to manage and maintain our certifications and accreditations. Staff are fully trained and competent to work within our management systems, which are mature and continually improved, as proven in regular internal and external audits.

An overview of the diverse set of the externally assessed ISO standards and best practice accreditations CANCOM UK adheres to are as follows
ISO27001 (Information Security)
ISO22301 (Business Continuity Management System)
ISO20000 (ITIL Service Management)
ISO9001 (Quality)
ISO27018 Code of Practise (Protection of Personally Identifiable Information in the Cloud)
Government OFFICIAL Classification Supplier
Approved G Cloud Supplier
Approved Commercial N3 Aggregator transitioning to a HSCN Supplier
Health & Social Care Network (HSCN) Compliant
Cyber Essentials Certificate of Assurance
IASME Information Security Standard Certificate of Assurance
CEH (Certified Ethical Hacker)
CND (The Certified Network Defender)

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
CANCOM UK uses a strict ITIL aligned change control process through which all changes are managed. The change requestor would initially submit the change via the CANCOM UK service desk portal, this will log a unique ticket reference that will be used to reference the change throughout its life cycle.
Once submitted, the change process is used to assess the change correctly. This includes identification of all affected assets, resource requirements, risk assessment, install plan, back out plan, test and acceptance criteria.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Annual IT Health Checks are completed by a CHECK accredited independent organisation under the CHECK Scheme. The CHECK scheme enables penetration testing by CESG approved companies, employing penetration testing personnel, qualified to assess HMG and other public and private sector bodies.
The testing personnel are CHECK Team Leaders who have proven their technical competency through lab examinations and written exams, they are skilled in application and infrastructure testing. They have also undergone thorough background checking.
This technical compliance review is an extensive internal and external examination of operational systems to ensure that hardware and software controls have been correctly implemented.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
User activities, exceptions, and information security events are recorded and kept for an agreed period to assist in future investigations and access control monitoring. Software is used to monitor system use. As per the ‘Systems Monitoring policy’.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
CANCOM UK achieves a highly structured approach to meeting clients' support requirements through a combination of CANCOM UK's 24x7x365 technical support function and the client service team.
CANCOM UK's approach to Service Management is based on a framework of ITIL processes, this includes on-going assessments of CANCOM UK's current ability to deliver client services to a market leading standard, in turn, this feeds into a program of continuous service improvement.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
No

Energy efficiency

Energy-efficient datacentres
No

Pricing

Price
£3.51 to £1014.09 per device per month
Discount for educational organisations
No
Free trial available
No

Service documents

Return to top ↑