A solid foundation for workload protection and compliance is isolation and segmentation of network applications and their components. Micro-segmentation solution enables deep application dependencies mapping and policy enforcement ensuring an ongoing management process of your micro-segmentation policy. Our solution delivers the industry’s most complete and flexible solution for micro-segmentation.
- Comprehensive Protection at Cloud Scale.
- Enterprise Scalability and Performance.
- Scalable to meet performance and security requirements
- Simplify security management with one platform.
- Any environment - Physical, Virtual or Cloud.
- Effortlessly separate environments such as Development and Production
- Enhance compliance posture and keep sensitive data protected.
- Ring-fence critical applications so they are safe.
- Enforce granular tier-level segmentation within the same application.
- Reduce risk by enforcing policy at the process level.
£20000 per transaction
- Education pricing available
- Free trial available
2 1 7 4 7 4 4 0 0 1 0 8 2 1 9
Axial Systems Limited
|Software add-on or extension||No|
|Cloud deployment model||
|Email or online ticketing support||Email or online ticketing|
|Support response times||
SLA-1 2 hour ‘business hours’ response for example, "Failure to boot"
SLA-2 Severity Level 1– Best endeavors for incident resolution within one business day including incident investigation, customer acknowledgement, execution of standard triage processes and escalation to manufacturer where necessary, within same period.
SLA-3 Severity Level 2 - Best endeavors for incident resolution within 48 hours including incident investigation, customer acknowledgement, execution of standard triage processes and escalation to manufacturer where necessary, within 48 hours.
SLA-4 Severity Level 3 & Severity Level 4 - Incident escalation to manufacturer within 2 business days
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
Support Level 9:00am - 5:30pm Mon-Fri - Included.
24/7 support also available - cost based upon size and complexity.
Technical account manager can be provided at additional cost.
|Support available to third parties||No|
Onboarding and offboarding
|Getting started||Provide onsite training, online training, or user documentation.|
|End-of-contract data extraction||Axial offer lifetime support (best endevours) in the event of termination, written request is required and Axial can provide relevant information in line with GDPR.|
|End-of-contract process||Axial offer lifetime support (best endevours) in the event of termination, written request is required and Axial can provide relevant information in line with our GDPR.|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||No|
|Independence of resources||NA|
|Service usage metrics||Yes|
|Metrics types||Infrastructure and application usage|
|Supplier type||Reseller providing extra features and support|
|Organisation whose services are being resold||Guardicore, Gigamon, Riverbed, IXIA, Demisto, Vectra, AlgoSec, Netwrix|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Security Clearance (SC)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||No|
|Datacentre security standards||Supplier-defined controls|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||Another external penetration testing organisation|
|Protecting data at rest||Physical access control, complying with another standard|
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||They cannot|
|Data export formats||Other|
|Other data export formats||Na|
|Data import formats||CSV|
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||
Availability and resilience
Support Level (9:00am - 5:30pm) (24/7 support also available at an additional cost) SLA-1 2 hour ‘business hours’ response SLA-2 Severity Level 1– Best endeavours for incident resolution within one business day including incident investigation, customer acknowledgement, execution of standard triage processes and escalation to manufacturer where necessary, within same period. SLA-3 Severity Level 2 - Best endeavours for incident resolution within 48 hours including incident investigation, customer acknowledgement, execution of standard triage processes and escalation to manufacturer where necessary, within 48 hours. SLA-4 Severity Level 3 & Severity Level 4 - Incident escalation to manufacturer within 2 business days
User can manage status and priority of support tickets
|Approach to resilience||Highly available, disaster recovery solution support|
|Outage reporting||Email alerts|
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||Role based/Account based privileges.|
|Access restriction testing frequency||At least once a year|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||Yes|
|Any other security certifications||Cyber Essential Plus|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||Other|
|Other security governance standards||Cyber Essential Plus|
|Information security policies and processes||Cyber Essentials PLus|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||Policy and Procedure available on request.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||Policy and Procedure available on request.|
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||Policy and Procedure available on request.|
|Incident management type||Supplier-defined controls|
|Incident management approach||Policy and Procedure available on request.|
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||No|
|Price||£20000 per transaction|
|Discount for educational organisations||Yes|
|Free trial available||Yes|
|Description of free trial||Proof of concept|