OCSL MANAGED SERVICES LIMITED

Network and Security Services

CANCOM UK’s 'Network and Security Services' consists of several modular network and security offerings, that when combined provide a fully managed Protective Monitoring, Detection and Response Service for clients, helping them define a clear security strategy.

Features

  • Protection against the latest vulnerabilities and exploits
  • Strong defence against DOS, DDOS, Exploits, Worms and Viruses
  • Anti-Bot And Anti-Virus Zero hour protection
  • Gather, inspect and present information from network and security devices
  • Detect covert or malicious communications and encrypted traffic
  • Detect inside threats, that aren’t visible from IPS solutions
  • GEO-Location Banning
  • Prevent malicious double file extensions used to hide malware
  • Control what sites your employees view

Benefits

  • Protects networks, from inside threats as well as outside
  • Highlights security misconfigurations in network and applications
  • Increase internal security not just external
  • Immediately stop propagating attacks and prevent potential security breaches
  • Reports can be tailored to the customers requirements
  • 24/7 alerting and UK SOC support to help resolve issues
  • Patching control and insight into organisation security patch levels
  • Unified view of organisation security status
  • Informative reporting, log collection analysis and retention
  • Helps IT meet compliance security requirements

Pricing

£3.51 to £1014.09 per device per month

Service documents

G-Cloud 11

206533025573154

OCSL MANAGED SERVICES LIMITED

Mark Skelton

0845 605 2100

gcloud@cancom.co.uk

Service scope

Service scope
Service constraints For protective monitoring, management and alerting services, these will require a permanent VPN or physical connectivity between customer and CANCOM UK.
For firewalling and Advanced Inspection Services such as IDS/IDP these may require connectivity such as national ethernet or MPLS etc as well as internet breakout.
System requirements System requirements depend upon security service chosen

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Response times dependent on priority level of issue logged and whether via telephone or email.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels Response up to minimum 30 minutes, max 8 hours depending on priority severity of support request and service level.
*P1 calls must be logged by telephone to ensure a more immediate response
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Service inception is via several methods dependent on security service selected and based upon customer requirements, but would typically consist of provision of site to site VPN or dedicated link, before chosen security services can then be provided.
Dependent on service(s) selected, as they are a fully managed service no user level documentation is required, however certain services may permit users to access a web portal for status and reporting purposes.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Depends on which security service has been consumed.
In the case of SIEM, CANCOM UK can provide customer a raw export of the logs.
End-of-contract process Upon receiving notification of termination, if data extract has been requested - CANCOM UK can first provide a raw export of logs (where appropriate).
CANCOM UK will on a mutually agreed date, simply delete the customer’s data securely from the security platform and disable the customer’s access.

Using the service

Using the service
Web browser interface Yes
Using the web interface A web interface is provided for SIEM, however this is a read only access portal for customers to be able to monitor security status themselves but not to administer. CANCOM UK provide as a service and fully manage the solution.
Web interface accessibility standard None or don’t know
How the web interface is accessible Private URL via VPN or dedicated connectivity.
Web interface accessibility testing Unknown
API No
Command line interface No

Scaling

Scaling
Scaling available No
Independence of resources CANCOM UK centrally provided security services are built upon a multi tenant design and strictly capacity planned to ensure sufficient performance and capacity is always available to the services.
The various security services are provided across multiple resilient systems and networking backbone across multiple sites.
Usage notifications Yes
Usage reporting
  • Email
  • Other

Analytics

Analytics
Infrastructure or application metrics No

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach ‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Backup and recovery Yes
What’s backed up Virtual Machines
Backup controls User access not applicable to the service.
CANCOM UK provide backups and replication of our security services platform in order to provide the resilient service. Backups are not a customer facing service but part of the protection of the CANCOM UK platforms.
Datacentre setup Multiple datacentres with disaster recovery
Scheduling backups Supplier controls the whole backup schedule
Backup recovery Users contact the support team

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability CANCOM UK have SLA’s and Penalties (service credits) as standard offerings for each of our managed services.

Dependent on the provided service, services shall be deemed available when the customer is able to access and use the services hosted or provided by CANCOM UK. This may include periods where the customer is unable to access applications and services, where it is demonstrated by CANCOM UK to the customer’s satisfaction, or where any inability to access the customer’s applications and services is the result of permitted downtime.

Any reduced charges under this Service Level Agreement will be confirmed by credit note issued by CANCOM UK to our customers, confirming any adjustment to be made to the following monthly charge.

99.95% availability is guaranteed.
Approach to resilience The CANCOM UK datacentres and the services provided from within have been architected in meticulous detail from the ground up, built upon enterprise class best of breed hardware and technology, ensuring services are provided from a fully resilient infrastructure of at least N+1 with no single points of failure, across geographically-diverse Tier 3+ datacentres.
From the power feeds from separate power grids, multiple generators and UPS's all tested weekly, to the fire suppression systems, resilient networking and WAN links, storage and compute clusters, all aspects have been carefully considered using best of breed technology with no single points of failure.
Outage reporting CANCOM UK MUST follow our Corrective action of Events & Incidents policy, which is in scope of our ISO27001, ISO9001, ISO20000, ISO27018 and ISO22301 certifications, following standard ITIL conformant Major Incident Management processes.
This includes informing stakeholders immediately without delay.

Identity and authentication

Identity and authentication
User authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Web portal access is controlled by unique credentials dependent on security service provided.
CANCOM UK Managed Services uses unique user IDs to enable users to be linked to and held responsible for their actions.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for Between 6 months and 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for Between 6 months and 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 Registrar of Standards (Holdings) Ltd
ISO/IEC 27001 accreditation date 21/06/2011
What the ISO/IEC 27001 doesn’t cover There are 114 controls within ISO 27001:2013. CANCOM UK Managed Services has currently adopted 111 of the controls. The remaining 3 controls have not been adopted at this stage. A.14.1.3 (CANCOM UK Managed Services do not use application transactions). A.14.2.1 (CANCOM UK Managed Services do not develop software). A.14.2.7 (CANCOM UK Managed Services do not outsource software development).
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications
  • ISO27018 Protection of Personally Identifiable Information in the Cloud
  • Government OFFICIAL Classification Supplier
  • Approved Commercial N3 Aggregator transitioning to a HSCN Supplier
  • Health & Social Care Network (HSCN) Compliant
  • Cyber Essentials Certificate of Assurance
  • IASME Information Security Standard Certificate of Assurance
  • CEH (Certified Ethical Hacker)
  • CND (The Certified Network Defender)

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards ISO22301 (Business Continuity Management System)
ISO20000 (ITIL Service Management)
ISO9001 (Quality)
ISO27018 Code of Practise (Protection of Personally Identifiable Information in the Cloud)
Health & Social Care Network (HSCN) Compliant
Cyber Essentials Certificate of Assurance
IASME Information Security Standard Certificate of Assurance
CEH (Certified Ethical Hacker)
CND (Certified Network Defender)
Information security policies and processes A full-time compliance team is employed to manage and maintain our certifications and accreditations. Staff are fully trained and competent to work within our management systems, which are mature and continually improved, as proven in regular internal and external audits.

An overview of the diverse set of the externally assessed ISO standards and best practice accreditations CANCOM UK adheres to are as follows
ISO27001 (Information Security)
ISO22301 (Business Continuity Management System)
ISO20000 (ITIL Service Management)
ISO9001 (Quality)
ISO27018 Code of Practise (Protection of Personally Identifiable Information in the Cloud)
Government OFFICIAL Classification Supplier
Approved G Cloud Supplier
Approved Commercial N3 Aggregator transitioning to a HSCN Supplier
Health & Social Care Network (HSCN) Compliant
Cyber Essentials Certificate of Assurance
IASME Information Security Standard Certificate of Assurance
CEH (Certified Ethical Hacker)
CND (The Certified Network Defender)

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach CANCOM UK uses a strict ITIL aligned change control process through which all changes are managed. The change requestor would initially submit the change via the CANCOM UK service desk portal, this will log a unique ticket reference that will be used to reference the change throughout its life cycle.
Once submitted, the change process is used to assess the change correctly. This includes identification of all affected assets, resource requirements, risk assessment, install plan, back out plan, test and acceptance criteria.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Annual IT Health Checks are completed by a CHECK accredited independent organisation under the CHECK Scheme. The CHECK scheme enables penetration testing by CESG approved companies, employing penetration testing personnel, qualified to assess HMG and other public and private sector bodies.
The testing personnel are CHECK Team Leaders who have proven their technical competency through lab examinations and written exams, they are skilled in application and infrastructure testing. They have also undergone thorough background checking.
This technical compliance review is an extensive internal and external examination of operational systems to ensure that hardware and software controls have been correctly implemented.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach User activities, exceptions, and information security events are recorded and kept for an agreed period to assist in future investigations and access control monitoring. Software is used to monitor system use. As per the ‘Systems Monitoring policy’.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach CANCOM UK achieves a highly structured approach to meeting clients' support requirements through a combination of CANCOM UK's 24x7x365 technical support function and the client service team.
CANCOM UK's approach to Service Management is based on a framework of ITIL processes, this includes on-going assessments of CANCOM UK's current ability to deliver client services to a market leading standard, in turn, this feeds into a program of continuous service improvement.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart No

Energy efficiency

Energy efficiency
Energy-efficient datacentres No

Pricing

Pricing
Price £3.51 to £1014.09 per device per month
Discount for educational organisations No
Free trial available No

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Service definition document pdf document: Terms and conditions pdf document: Modern Slavery statement
Service documents
Return to top ↑