Nexus Managed Email Security Services
Nexus partner with the best of breed in Cloud Security to deliver a fully Managed Email Security Service. This gives you a critical defence to protect against advanced threats and data loss. With our comprehensive enterprise-grade email protection, you and your organisation can breathe easier.
Features
- Advanced Threat protection for your organisation
- Anti-Phishing protection for your users
- AI for Real-Time Spear Phishing & Cyber Fraud Defence
- Malware Protection & Spam Filtering
- Link Protection & Typosquatting protection
- Block Email-Borne Viruses
- Denial of Service (DOS) Attack Prevention
- Secure Communication with Email Encryption
- Data Leak Protection
- Ongoing 8-6 Support
Benefits
- Complete, simple and affordable protection for business emails
- Award winning email security with tamper proof email archives
- Powered by global 24x7 threat operations centre
- Scalable cloud and prioritised filtering technology
- 100% cloud based, no hardware or software or updates
- Spam and multi layered malware protection
- Simple per user cost model
- No set up or upfront costs
- No hardware or software to buy or maintain
- Multi-layered security services help with GDPR compliance
Service scope
Software add-on or extension | No |
Cloud deployment model |
|
Service constraints |
Our service is designed based upon the end users environment including the size of their organisation and internet connection to ensure the service can operate optimally. Onsite consultancy is required to implement the service based upon the end users specific requirements and security policies. |
System requirements | Use Office 365, Gmail or Exchange email solutions |
User support
Email or online ticketing support | Email or online ticketing |
Support response times | Standard SLA is for 2 hours response for Critical issues; 4 hours response for Major issues and 8 hours response for Minor issues. |
User can manage status and priority of support tickets | Yes |
Online ticketing support accessibility | None or don’t know |
Phone support | Yes |
Phone support availability | 9 to 5 (UK time), Monday to Friday |
Web chat support | Web chat |
Web chat support availability | 9 to 5 (UK time), Monday to Friday |
Web chat support accessibility standard | None or don’t know |
How the web chat support is accessible | Users can interact with our Technical, Sales and Training teams. Raising questions which are dealt with there and then. Alternatively we will take enquiries away and respond direct to users through email. |
Web chat accessibility testing | None as yet |
Onsite support | Yes, at extra cost |
Support levels | Pricing: No Set-up Costs; No Annual Upgrade or Re-licencing Costs; Simple Pricing Model - Support: Ongoing 8-6 Support; Email-borne Virus Protection; Spam Protection; Email Based Malware Protection; Advanced Threat Detection - Dedicated Account Manager |
Support available to third parties | Yes |
Onboarding and offboarding
Getting started | We follow a defined process for on-boarding new clients to ensure that they have the assurance of our help, whilst at the same time remain in control of the cloud services which are often at the core of their business. Through the on-boarding process Nexus will complete a detailed assessment of: • Client’s strategic vision • Organisational culture • Current and future objectives • Desire business outcomes • Potential improvements to existing business processes • Project and programme delivery resources • Current governance and programmes. We can provide onsite training to our clients as well as instruction at our own training centre. User documentation is provided by way of client portal guide |
Service documentation | No |
End-of-contract data extraction | The customer can extract their data in PST format, which is something that the professional services team will assist with, during the contract expiry period. |
End-of-contract process | Should the customer decide not to renew the contract once the initial agreement has ended our in-house professional services team will assist the customer redirect their MX records and retrieve their data OR assist the new supplier in extracting the data into the new solution. This is included in the overall price of the solution as a remote service. |
Using the service
Web browser interface | Yes |
Supported browsers |
|
Application to install | No |
Designed for use on mobile devices | Yes |
Differences between the mobile and desktop service | None |
Accessibility standards | WCAG 2.1 A |
Accessibility testing | Barracuda strives to make products that are accessible to users with disabilities. |
API | No |
Customisation available | Yes |
Description of customisation | Users can customise the user interface to enable the real-time reporting element to be more effective. There are also many elements in the solution which can be customised, including Spam Scoring, Quarantine and Attachment analysis |
Scaling
Independence of resources | The currently is designed as a global resource and has therefore been designed to accommodate a significant number of users. As a fully cloud based application the resource at the infrastructure level has been created by Barracuda and does not have any restrictions on individual users. |
Analytics
Service usage metrics | Yes |
Metrics types |
User on the system Spam & Virus email results (How many blocked) |
Reporting types |
|
Resellers
Supplier type | Reseller providing extra support |
Organisation whose services are being resold | Barracuda |
Staff security
Staff security clearance | Conforms to BS7858:2012 |
Government security clearance | Up to Security Clearance (SC) |
Asset protection
Knowledge of data storage and processing locations | Yes |
Data storage and processing locations |
|
User control over data storage and processing locations | Yes |
Datacentre security standards | Supplier-defined controls |
Penetration testing frequency | At least every 6 months |
Penetration testing approach | ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider |
Protecting data at rest |
|
Data sanitisation process | No |
Equipment disposal approach | A third-party destruction service |
Data importing and exporting
Data export approach | If required this would be through the .pst format |
Data export formats | Other |
Other data export formats | .pst file |
Data import formats | Other |
Other data import formats | .pst file |
Data-in-transit protection
Data protection between buyer and supplier networks |
|
Data protection within supplier network | TLS (version 1.2 or above) |
Availability and resilience
Guaranteed availability | Barracuda do not offer SLA's on any solutions |
Approach to resilience |
Barracuda use a dual data centre configuration, with internal built in resilience in both data centres. The data centre includes the latest in data centre technology, benefitting from Rittal cold aisle containment pods, advanced building management systems, carrier grade Cisco ASR9000 routers and Cisco Nexus 7000 switches, Riello/Perkins generators (N+1) and Weatherite BTR45EC air handling units. Our systems monitor over 200 metrics - everything you'd expect from a next generation data centre and much more. |
Outage reporting | Through the customers user interface, Barracuda online campus and also via email. |
Identity and authentication
User authentication needed | Yes |
User authentication |
|
Access restrictions in management interfaces and support channels | Access management controls are available through the portal with admin users enabling additional controls for other areas. As the service will only need to be accessed by the IT Admin team there is less of a requirment to give end users access. |
Access restriction testing frequency | At least every 6 months |
Management access authentication |
|
Audit information for users
Access to user activity audit information | Users have access to real-time audit information |
How long user audit data is stored for | At least 12 months |
Access to supplier activity audit information | Users have access to real-time audit information |
How long supplier audit data is stored for | At least 12 months |
How long system logs are stored for | At least 12 months |
Standards and certifications
ISO/IEC 27001 certification | No |
ISO 28000:2007 certification | No |
CSA STAR certification | No |
PCI certification | No |
Other security certifications | No |
Security governance
Named board-level person responsible for service security | Yes |
Security governance certified | Yes |
Security governance standards | ISO/IEC 27001 |
Information security policies and processes | Barracuda uses a defense-in-depth strategy and proprietary hardened software and operating systems to protect data and services. Barracuda conducts regular inspections to ensure the security of its systems. |
Operational security
Configuration and change management standard | Supplier-defined controls |
Configuration and change management approach | Available upon request |
Vulnerability management type | Supplier-defined controls |
Vulnerability management approach | Available upon request |
Protective monitoring type | Supplier-defined controls |
Protective monitoring approach | Available upon request |
Incident management type | Supplier-defined controls |
Incident management approach | Available upon request |
Secure development
Approach to secure software development best practice | Supplier-defined process |
Public sector networks
Connection to public sector networks | No |
Pricing
Price | £3 per user per month |
Discount for educational organisations | Yes |
Free trial available | Yes |
Description of free trial | Barracuda offer free of charge 30 days evaluations for unlimited users |