Internet usage monitoring & Website Blocking
Our Web Protect service provides the ability to set policies to protect your organisation and your users.
This service gives the ability to completely block illegal and untrustworthy sites. It also secures against the many websites which may push harmful programs including malware, phishing, proxies, spyware, botnets and spam.
- Schedule the blocking and unblocking of websites
- Alerts so bandwidth usage kept in line with thresholds/policies
- Set individual or group based web viewing policies
- Protection from potential internet derived cyber security problems
- Increase productivity levels
- Reduce downtime due to virus fixing
- Increased network protection
- Managed by PCS with service desk liaison for your business
£2 per device per month
- Free trial available
PCS BUSINESS SYSTEMS
0845 373 5006
|Software add-on or extension||Yes, but can also be used as a standalone service|
|What software services is the service an extension to||
PCS Mail Control
PCS Patch Management
PCS Web Filtering
|Cloud deployment model||Private cloud|
|System requirements||No known limitations|
|Email or online ticketing support||Email or online ticketing|
|Support response times||Average call closure time 45 minutes|
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
In the first instance any requirement for support would be logged through our servicedesk for remote advice and assistance.
If the issue cannot be fixed quickly (our average call closure time is 45 minutes) the issue would be escalated and where necessary on site support would be given.
We provide technical account managers who can assist with queries.
|Support available to third parties||No|
Onboarding and offboarding
We roll out the service silently.
There is no training required.
|End-of-contract data extraction||We can send/provide users with any data that may be required.|
|End-of-contract process||We offboard the service silently. This is included in the cost of the contract.|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||No|
|Accessibility standards||None or don’t know|
|Description of accessibility||N/A|
|Description of customisation||Policies can be amended to suit specific customers.|
|Independence of resources||The service does not require any significant resource to run.|
|Service usage metrics||Yes|
|Metrics types||We can provide details as to how the service is performing.|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||None|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||
|User control over data storage and processing locations||No|
|Datacentre security standards||Supplier-defined controls|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||In-house|
|Protecting data at rest||Physical access control, complying with another standard|
|Data sanitisation process||No|
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||There is no data to export.|
|Data export formats||Other|
|Other data export formats||No data to export.|
|Data import formats||Other|
|Other data import formats||No data to export.|
|Data protection between buyer and supplier networks||Private network or public sector network|
|Data protection within supplier network||IPsec or TLS VPN gateway|
Availability and resilience
|Guaranteed availability||99.99% uptime.|
|Approach to resilience||It's cloud based. The service gives anti virus protection. Latest definitions are automatically downloaded to allow for maximum protection.|
|Outage reporting||Public Dashboard.|
Identity and authentication
|User authentication needed||No|
|Access restrictions in management interfaces and support channels||We lock down areas of our network so information is only available on a "need to know" basis.|
|Access restriction testing frequency||At least once a year|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||Alcumus ISOQAR - Certificate number 13441|
|ISO/IEC 27001 accreditation date||December 2015 - Last audited December 2018|
|What the ISO/IEC 27001 doesn’t cover||Our ISO27001:2013 certification is granted to us inline with that of our Statement of Applicability - which is available upon request.|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Who accredited the PCI DSS certification||Sysnet Global Solutions|
|PCI DSS accreditation date||31st January 2018|
|What the PCI DSS doesn’t cover||Certification is inline with SAS70|
|Other security certifications||Yes|
|Any other security certifications||Cyber Essentials|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||
Reporting is to a member of board level senior management.
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||
Services are reviewed regularly.
Change management is controlled and documented to allow for good business continuity.
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||Patching is carried out at least weekly to ensure critical and important updates are installed on our systems. We comply with the requirements set out by ISO27001 and Cyber Essentials We have systems/services which alert us to various vulnerabilities. Such as Cyber Threats/Patches/Software updates.|
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||
Internally we monitor our system using an automated server monitoring solution which we can also roll out to customers where necessary.
We respond to incidents immediately
|Incident management type||Supplier-defined controls|
|Incident management approach||
Common IT events would be picked up by our Technical Services Team
Users can report incidents to members of the senior leadership team where necessary.
We document all incidents and discuss at management review.
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||No|
|Price||£2 per device per month|
|Discount for educational organisations||No|
|Free trial available||Yes|
|Description of free trial||
Trial/Demo for one device to show how the service works.
Trial limited to one month.