Bridgeway Security Solutions

Accellion Mobile Productivity and Collaboration (kiteworks)

The Accellion kiteworks solution enables secure inter-and-intra agency collaboration, secure remote access to files and documents, as well as easy collaboration with contractors and constituents, from any device, ensuring today’s government employees are productive and agile.

Features

  • Secured collaboration workspaces with role-based access controls
  • File and document synchronisation across approved devices
  • Integrates with existing file repositories (CIFS, DFS, SharePoint)
  • Integrates with leading document management systems
  • Secure, integrated mobile Microsoft Office editor
  • Integration with Microsoft Outlook and Lync/Skype for secure file sending
  • Managed and audited file sharing with trusted third-parties
  • Public, private, hybrid cloud and on-premise deployment options
  • FIPS 140-2 certified private cloud file sharing
  • APIs for workflow automation and integration

Benefits

  • Access remote file repositories securely from mobile devices
  • Prevent data duplication by synchronising content repositories automatically
  • Flexible access to existing document stores to improve productivity
  • Control who has and what access to files by role
  • Visibility of file access from users & third-parties (audit logs)
  • Simplify large file sending with download/receipt confirmation
  • Download, edit and upload Office documents securely from mobile devices
  • Versatile and scalable deployment options to meet security/infrastructure needs
  • Expand IT services by integrating into existing systems and workflows

Pricing

£45 per user per year

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 9

264276739582390

Bridgeway Security Solutions

Jason Holloway

01223 979 090

g-cloud@bridgeway.co.uk

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Hybrid cloud
Service constraints None
System requirements None

User support

User support
Email or online ticketing support Yes, at extra cost
Support response times Our SLAs guarantee a first considered response within 1 hour from initial ticket being logged, and progress updates start from within 3 hours from receipt of all relevant information. Different SLAs apply according to mutually-agreed priority level.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels Our Bridge Support services are flexible: we can augment your existing support arrangements, or provide a complete outsourced support function. Standard support is available during UK office hours and can be extended to include full 24x7 and/or onsite consultancy visits.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Bridgeway provides installation and configuration consultancy services, as well as end-to-end project management to ensure overall project success. Documentation services, whether from high-level design (HLD) to low-level design (LLD), as well as project management and end-user training material can also be provided, subject to scope and cost.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Backups of the live servers can be extracted through the GUI. Files can be downloaded through the GUI or synchronised to the desktop (if policy allows).
End-of-contract process Service is switched off and remaining server/service data destroyed.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10+
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Integration options with EEM systems for the mobile device app on iOS and Android.
Accessibility standards None or don’t know
Description of accessibility Not known
Accessibility testing None
API Yes
What users can and can't do using the API API provides programmatic access to authentication, file management and user management. APIs are extensively documented and example code is provides for most common programming languages
API documentation Yes
API documentation formats PDF
API sandbox or test environment No
Customisation available Yes
Description of customisation The Accellion solution can be customer branded and customised to meet customer's preferred file and folder structures, user rights assigned by groups, authentication integrated into existing directory services (e.g. AD, LDAP) and Single Sign-On (SSO) solutions. Bridgeway's consultancy and training services are highly customisable according to a jointly-agreed statement of work and corresponding success criteria.

Scaling

Scaling
Independence of resources Customers can choose between a public cloud, private cloud or on-premises deployment, according to risk appetite, server integration and service management preferences.
Services are covered by availability guarantees, which vary from option to option. Contact us for further details.

Analytics

Analytics
Service usage metrics Yes
Metrics types Accellion can provide the most comprehensive usage and compliance reporting on the market, including a variety of system, administration and management reporting. Details available on request.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Reseller providing extra features and support
Organisation whose services are being resold Accellion

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Users can export the relevant files and folders via API, the native synchronisation app, or through a GUI-initiated export process.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats Any file type
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats Any file type

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Service part-refund for non-performance.
Approach to resilience Available on request.
Outage reporting Email alerts and system dashboards

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels Access restricted by Role Based Access Control (RBAC). Devices authenticate with centrally managed (and issued) digital certificates.
Access restriction testing frequency At least once a year
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 Details upon request
ISO/IEC 27001 accreditation date Details upon request
What the ISO/IEC 27001 doesn’t cover Details upon request
ISO 28000:2007 certification No
CSA STAR certification Yes
CSA STAR accreditation date 14/12/2016
CSA STAR certification level Level 1: CSA STAR Self-Assessment
What the CSA STAR doesn’t cover None known
PCI certification No
Other security accreditations Yes
Any other security accreditations SOC I & II

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation Yes
Security governance standards
  • CSA CCM version 3.0
  • ISO/IEC 27001
Information security policies and processes Contact details and reporting structure available on request.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach Security and risk teams assess potential impact before implementation. Peer and security team code review, automated testing and audited code tracking allow for the services to be tracked throughout their lifetime.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Available on request
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach Available on request
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach Available on request

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £45 per user per year
Discount for educational organisations Yes
Free trial available Yes
Description of free trial Time limited trials available

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑