Aura

Software Defined WAN

Aura SD-WAN is a cloud delivered, software defined service. The solution also provides highly secure, on-net access directly to Amazon Web Services, Microsoft Azure, Office 365, Google and our own IaaS solution. The service is proactively monitored 24 hours, 7 days a week, 365 days a year.

Features

  • Fully software defined network for increased efficiency and flexiblity
  • Fully resilient central internet breakout
  • co-management of resilient firewalls can be included
  • Access to real-time monitoring and reporting dashboards
  • On-net connectivity into Azure, Google, AWS and our IaaS
  • Fully managed

Benefits

  • Rapid deployment and management of sites
  • Resilient firewall option for threat management
  • Real-time control of your WAN services
  • Separate peering with a range of transit providers for Internet
  • Connected to ISO27001 accredited Tier 3 UK Data Centres

Pricing

£20 per unit per month

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 10

267176617491399

Aura

Phil McGuinness

07779026038

Phil.McGuinness@auragroup.net

Service scope

Service scope
Service constraints N/a
System requirements N/a

User support

User support
Email or online ticketing support Email or online ticketing
Support response times 4 hour
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Support is included automatically should a fault occur, Aura will act as the conduit to the network provider to assist in troubleshooting and resolution. Further support including integration into the local area network can be provided on a case by case basis.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We provide a range of onboarding options. Standard deployments will be managed through our Service Delivery Team. Large deployments are fully managed using a dedicated Project Manager and Technical Lead.

Portal training and user documentation is provided. Onsite training is unlikely to be required but can be provided upon request.
Service documentation Yes
Documentation formats
  • PDF
  • Other
Other documentation formats
  • Word
  • Excel
  • Visio
End-of-contract data extraction N/A
End-of-contract process Customer can cancel the service at the end of the contract, by submitting a cancellation request to the Service Delivery Team. 30 days notice is required.

The network service and access to the SD-WAN dashboards will be cancelled on the pre-agreed cancellation date.

Using the service

Using the service
Web browser interface Yes
Using the web interface Users can access real time information on their infrastructure. Using our fully Software Defined service, users can control many features instantly, such as bandwidth changes, VLAN resizing, IP address changes, etc.
Web interface accessibility standard None or don’t know
How the web interface is accessible Secure access using user authentication and SSL.
Web interface accessibility testing N/a
API No
Command line interface No

Scaling

Scaling
Scaling available Yes
Scaling type Manual
Independence of resources Service is provided as dedicated resource to each customer. Users have the ability to scale within their own allocations
Usage notifications Yes
Usage reporting Email

Analytics

Analytics
Infrastructure or application metrics Yes
Metrics types
  • Network
  • Number of active instances
Reporting types Real-time dashboards

Resellers

Resellers
Supplier type Reseller providing extra features and support
Organisation whose services are being resold Virtual1, Gamma, BT, Virgin Media

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency At least every 6 months
Penetration testing approach In-house
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Backup and recovery

Backup and recovery
Backup and recovery No

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • Other
Other protection between networks MPLS services are segmented within the carriers network as standard, however should the customer purchase an internet only service no segmentation is provided as standard as it is by definition an open service. VPN's can be requested.
Data protection within supplier network
  • IPsec or TLS VPN gateway
  • Other
Other protection within supplier network Aura cloud do not control what kind of data is transmitted, therefore responsibility will be down to the customer to secure the data as they see fit. This is of course unless they ask for a VPN to be created, we can then secure using IPSEC.

Availability and resilience

Availability and resilience
Guaranteed availability Up to 99.999% depending on the chosen service.
Approach to resilience Our service uses multiple network carriers into our 3 Tier 3 UK data centres. The design also provides geographic separation of Internet connections. The service offers additional resiliency through the provision of connections via multiple different Internet transit providers and multiple separate peering Exchanges.
Outage reporting Users have access to the real time dashboard, which will show current service usage and outages. Additionally, users can request for email alerts to be sent to designated individuals or shared mailboxes. The service is proactively monitored 24/7 from the UK based NOC.

Identity and authentication

Identity and authentication
User authentication
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Usernames and Passwords are never sent together and are sent via encrypted channels. Logins are only accepted from known locations i.e. a nominated IP subnet
Access restriction testing frequency Never
Management access authentication
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes ISO 27001

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Changes follow an ITIL framework with major service affecting changes cascaded from the carriers to the end customers upon receipt.
Vulnerability management type Supplier-defined controls
Vulnerability management approach By working closely with the vendors we monitor for security vulnerabilities affected networking hardware and apply patches should they be needed. Patches will be deployed as quickly as possible depending on their severity and impact.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Device accounts are extremely limited in number therefore any incidents should be minimal. Should the proactive monitoring solution pickup a hacking attempt the passwords will be changed instantly as a pre-caution as this is non-service affecting.
Incident management type Supplier-defined controls
Incident management approach Users report incidents via email or through a portal, re-occurring incidents will be escalated to Problem tickets in accordance with ITIL guidelines to try and identify a root cause. Issues can be reported on monthly if the customer takes that service.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart No

Energy efficiency

Energy efficiency
Energy-efficient datacentres Yes

Pricing

Pricing
Price £20 per unit per month
Discount for educational organisations Yes
Free trial available Yes
Description of free trial We can provide access to the SD-WAN portal to demonstrate the functionality and features within the platform.

Documents

Documents
Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑