Thales UK Ltd

Thales Connect - Assured connectivity for business critical applications

Thales’ Connect offer is a safe, secure and affordable choice allowing organisations to maximise benefits from internet connectivity and cloud services without taking undue risks associated with data in transit. Connect is a service designed to support business needs using a modular approach to connectivity, security, resilience and SLAs.


  • Develop plans and strategies for implementation and transition
  • Guidance on security compliance and policy requirements
  • Modular approach to connectivity
  • MPLS Connect service. Connectivity to MPLS WAN or hybrid network
  • ExpressRoute service between on-premises infrastructure and Microsoft cloud services
  • VPN Cloud Connect provides networking services and security at perimeter/edge
  • ISO27001, ISO20000, Cyber Essentials and Public Sector certifications
  • Accredited secure solution using NCSC CPA approved Foundation Grade cryptography
  • Fully managed service, patching and security updates
  • Proactive monitoring. Detects issues before they become problems


  • Appropriate connectivity and protection, only paying for what you need
  • Peace of mind. The world’s largest supplier of digital security
  • Resilient. Confidence that the system offers the best available security
  • Affordable. Traffic routing over lowest cost route according to security/bandwidth/criticality
  • Flexible Resilience options. High availability options for business critical applications
  • Detect issues before they become problem. Proactive monitoring 24x7x365
  • Technology independent. Integrates with existing systems and architectures
  • Cost effective. No investment in new circuits, IaaS, etc.
  • Less disruptive. Nothing to acquire/learn/maintain, as fully supported managed service
  • Scalable flexible solution that evolves with your business needs


£1,024 a person a day

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

2 7 2 7 6 5 9 0 1 7 7 9 2 6 6


Thales UK Ltd Anne Francis
Telephone: 07815636634

Service scope

Service constraints
Customers will be required to comply with security policies when consuming services at OFFICIAL, OFFICIAL SENSTIVIE or PSN PROTECTED levels. Thales offer consultancy for customers to the current status against the compliance required and detail approaches to mitigation against any shortfalls in that compliance.
System requirements
  • Customer will maintain PSN Code-of-Connection for their Data Centres
  • Customer will support accreditation and assurance activities

User support

Email or online ticketing support
Email or online ticketing
Support response times
Response is based on SLAs and service requirements agreed with the client.
User can manage status and priority of support tickets
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
Support is provided in line with customer specific SLAa.

Service Delivery Managers are assigned to each client.

Support is available via phone, e-mail or face-to-face meetings when required. Typically, the contract of work shall specify the required frequency of meetings, and further arrangements can be made as appropriate. We work closely with our customers to ensure that they have the support they require throughout the project; the basis of the support will depend on the specific needs of the project, the services procured, and the customer.
Support available to third parties

Onboarding and offboarding

Getting started
Thales provide assistance to customers for the design of their services which provides an assured / accredited and secure way of accessing information over different classifications of networks, and bearers of opportunity.
Thales offers assistance with implementation and transition to new services. This can be provided for green field sites where no previous solution is in place. Thales can:
• Carry out Site Surveys.
• Develop Transition Plans / Strategies.
• Develop Implementation Plans against previously developed designs.
Service documentation
Documentation formats
End-of-contract data extraction
We will provide an extract of the data held by Thales to the customer in an agreed format.
End-of-contract process
At the end of the contract the data is provided to the customer in an agreed format (CSV or xml) and then deleted from Thales systems.
For an additional fee, Thales can return the data in alternative formats or retain the data for an extended period if required.

Using the service

Web browser interface
Command line interface


Scaling available
Scaling type
Independence of resources
Infrastructure is monitored 24x7 for availability and capacity, in line with ISO27001 and ISO20000.
Usage notifications
Usage reporting


Infrastructure or application metrics
Metrics types
Other metrics
  • User logins
  • Usage
  • Availability of the service
  • Capacity reports
Reporting types
Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Hardware containing data is completely destroyed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection between networks
Encrypted traffic, authenticated users
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection within supplier network
Access restrictions

Availability and resilience

Guaranteed availability
SLAs for availability are agreed with the customer dependant on needs and services procured.
Thales Services are delivered as a geo-graphically diverse high availability service designed to exceed 99.95% availability.
Approach to resilience
Available on request
Outage reporting
Thales provides 24x7 monitoring at UK Network Monitoring Centre.
In the event of an outage, a Service Delivery Manager will inform customers, and a Major Incident Manager will be appointed. Outages will also be reported in the Service Delivery Management report.

Identity and authentication

User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Access to management interfaces is restricted to appropriately security cleared and authorised Thales staff members. Network segmentation is in place to secure management interfaces, located within secure processing facilities. These configurations are subject to CHECK ITHC. Management interfaces are not exposed to the internet. All event logs are sent to the Thales SOC for protective monitoring and retained for 12 months. Thales systems are also subject to internal and external audit.
Support – No 3rd parties are provided with remote access to the Thales SOC network. Only trusted suppliers are used, with contractual and NDA clauses used to protect information.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
Devices users manage the service through
Dedicated device on a segregated network (providers own provision)

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
The Thales UK Information Security Management System (ISMS) incorporates the people, processes and technologies supporting the portfolio of network services.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
  • PSNSP certifications up to OFFICIAL SENSITIVE
  • Police Enhanced Regime
  • ISO27001 and ISO20000 Accreditation
  • Cyber Essentials Plus

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
ISO 20000
PSN services at OFFICIAL
Police Enhanced Regime
Cyber Essentials Plus
NCSC CCSC (Certified Cyber Security Consultancy)
NCSC CCP (Certified Cyber Professional)
Sector specific accreditation
List X
Information security policies and processes
The service is certified to a number of different standards, including ISO 27001:2013. This is based on an ISMS (Information Security Management System) which consists of Thales UK policy, process and procedures in addition to ISO 27001 clauses. The ISMS is audited by independent 3rd parties annually.
An annual IA (Information Assurance) schedule ensures that policies are implemented, assessed and effective. This includes internal audits, external audits, Security Working Groups, Security Awareness campaigns.
The reporting structure is defined in the Thales IA Management Plan, along with incident management processes and RACI matrix.
The service assurance is also achieved through additional certifications and accreditations, which include audit reports being submitted to the Cabinet Office, NCSC and the National Police Information Risk Management Team (NPIRMT).

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
All Requests for Change (RFC)’s are presented to a Thales’ Change Board (CAB). The CAB is attended by Business, Technical, Service Delivery and Information Assurance stakeholders along with the owner of the RFC’s. On receipt of a request to make changes to the service; an RFC will be generated and submitted to CAB prior to delivery. Changes will be notified to customer CABs where there is a change to the device(s) which may impact service.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
As part of the Thales compliance requirements, Thales has a requirement to be able to adequately respond to Low to Critical level patches and vulnerabilities.

The Thales SOC utilise an IBM vulnerability management module to prioritise vulnerabilities. The SOC also utilise various threat intelligence and vulnerability feeds to stay informed of the latest vulnerabilities. The SOC then advise on recommended activity and mitigations.

Thales Change Management is then used to apply patches in a managed and timely manner – to prevent disruption to customer services.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
The Thales SOC provides protective monitoring and threat intelligence to identify potential compromises, cyber-attacks and non-compliance.
The SOC follow processes and escalation paths in response to potential compromises and security incidents. A severity matrix is used to assign a priority to each incident. The priority determines the response for the incident. Agreed stakeholders and contacts are contacted depending on the severity.
Incidents are responded to within SLA – in accordance with the assigned priority.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Thales operates a 24 hour a day 365 days a year UK Network Operations Centre which utilises a monitoring platform and trouble ticketing platform for Incident and Problem Management. The Service desk is accredited to ISO 20000, ISO27001 and all processes are aligned to ITIL.
Thales adopts a tiered approach to incident management. Tier 1 has the technical knowledge to triage all incidents, and will categorise and prioritise in line with agreed Customer priorities. The team is skilled to offer technical and product knowledge to resolve incidents, respond and deploy remote teams or involve third parties if required.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Who implements virtualisation
Virtualisation technologies used
How shared infrastructure is kept separate
The environment has been built in line with NCSC security procedures and managed through appropriate policies. It is also subject to annual ITHC in line with maintaining GDS-A accreditation for operation.
Segregation of traffic is achieved using secure tunnels and vlans.
Separate appliances where required

Energy efficiency

Energy-efficient datacentres


£1,024 a person a day
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.