Daisy Corporate Services Trading Limited

LAN, Firewall and IPS Managed Services

LAN, Firewall and IPS Managed Service, based on cloud monitoring technology. Essentials For customers to manage their own environment with access to skilled technical resource for ad-hoc assistance where required Enterprise For customers to co-manage their environment, adding monitoring and event management Enterprise Plus For customers requiring fully managed service.


  • Service Desk
  • Remote Technical Advice
  • Remote Security Advice
  • Event Monitoring
  • Incident Resolution
  • Change Implementation
  • Security Patching
  • Health Check
  • Advanced WiFi Monitoring
  • Security Reporting and Policy Tuning


  • Highest levels of accreditation with the world’s leading vendors
  • Support from hundreds of skilled engineers throughout the UK
  • Take control of the cost of your infrastructure
  • Streamline your internal team’s processes
  • Expert Assistance from our dedicated team of experts
  • On-going support 365 days-of-the-year
  • incorporates LogicMonitor industry leading software


£282 a unit a month

Service documents


G-Cloud 12

Service ID

2 9 2 6 9 3 5 9 1 4 4 0 0 8 1


Daisy Corporate Services Trading Limited Andy Riley
Telephone: 07540 203 303
Email: publictenders@daisygroup.com

Service scope

Software add-on or extension
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
System requirements

User support

Email or online ticketing support
Email or online ticketing
Support response times
According to priority
User can manage status and priority of support tickets
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
Designed for customers who want to manage their own environment yet have access to skilled technical resource for ad-hoc assistance where required
Designed for customers wishing to co-manage their environment with Daisy, adding monitoring and event management
Enterprise Plus
Designed for customers requiring a fully managed service, safe in the knowledge that their environment is being monitored and managed by Daisy’s experienced engineers. Includes incident and problem handling, plus change and patch implementation
Support available to third parties

Onboarding and offboarding

Getting started
This is a managed services
Service documentation
Documentation formats
End-of-contract data extraction
Using the API - all data stored in a time series database
End-of-contract process
Full support and upgrades to the core product

Additional costs for
-Cloud monitoring
-Config backup
-Complex application monitoring

Using the service

Web browser interface
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Compatible operating systems
  • Linux or Unix
  • Windows
Designed for use on mobile devices
Service interface
Customisation available


Independence of resources
Hosted by a global provider


Service usage metrics
Metrics types
Monitoring Metrics are available
Reporting types
Real-time dashboards


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Data is exported using the API
Data export formats
  • CSV
  • Other
Other data export formats
  • PDF
  • HTML
  • JSON
Data import formats
  • CSV
  • Other
Other data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Approach to resilience
Daisy operates its own 100Gb low-latency Core network and resilient MPLS network, with all data centres on-net Daisy’s Internet feeds into the data centres are delivered over our resilient core 10Gb MPLS network into peering points at Harbour Exchange and Telehouse Points Of Presence (POPs). Where applicable all customer data stored by Daisy is resilient across 3 DC sites.
Outage reporting
Email alerts are provided

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Where access to customer infrastructure is required, Daisy uses a secure backup and admin connection to components for monitoring, support and backups. All traffic across this connection is secure and segregated. For remote access requirements for support services, Daisy can provide two-factor authenticated remote access via the internet to administer the server infrastructure using SSL-VPN access
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
ISO/IEC 27001 accreditation date
13/09/2013 original certification
What the ISO/IEC 27001 doesn’t cover
Scope is all Daisy sites and services requiring security certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Through the establishment of a comprehensive security framework, Daisy shall demonstrate a commitment to protect all assets that support the delivery of business objectives and address all legal, regulatory and contractual obligations. The following ISO27001 Group clause & objectives are referenced within this document: Clause 5, & Control objectives: A6, A9, A11, A13.2, and A14 Data Protection Policy Site Security Policy CCTV Policy

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Daisy’s ITIL v3 aligned service management tool meets ISO 27001 guidelines, governing core ITIL processes including, but not limited to, incident, problem, change, release, configuration, service level management and service catalogue function
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Vulnerability scanning is included in the Daisy security framework, to help monitor the effectiveness of existing security controls and identify any weaknesses. The IT security Manager in consultation with Head of Compliance shall coordinate vulnerability scanning activities including: • identifying the scope of testing • monitor manufacturer and vendor sites for information updates regarding vulnerabilities Should the vulnerabilities be assessed as not posing an immediate threat to operations, security patches or code fixes shall be subject to change control requirements ( testing etc.) prior to deployment. Daisy support record activities in a service management ticket for tracking and audit purposes
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Monitoring of our platforms is done from our segregated and ISO27001 compliant management platforms, we protect the platform itself and its perimeter edge with Daisy owned and operated solutions, not in any way tied to logical customer implementations within these platforms. Each customer as part of a Managed Service has our standard security and monitoring products deployed with pre-agreed alert classifications and thresholds set as part of our typical managed service. Potential compromises are identified in our centralised monitoring solution, with accompanying detailed information of the platform and customer which auto generates an incident in our ticketing systems
Incident management type
Supplier-defined controls
Incident management approach
Predefined processes are in place for common events Users can report incidents via the web portal or email in the event of an incident Daisy will Issue customer updates as per the agreed frequency on the progress of a resolution or workaround. This may include initiating and leading conference calls, bridges or meetings. Create MI reports where required, validating content is customer appropriate. Issue to service delivery management. Publish the MI report to the customer as defined by the customer SLA.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
Connected networks
  • Public Services Network (PSN)
  • NHS Network (N3)
  • Health and Social Care Network (HSCN)


£282 a unit a month
Discount for educational organisations
Free trial available

Service documents