AIT Partnership Group Ltd

Aerohive Manager NG

Aerohive Manager is a cloud-enabled SAAS WLAN management solution. Designed to manage Aerohive Access Points it also fully integrates with Dell switches. The software uses cooperative control technology to provide all the benefits of a controller-based wireless LAN solution, without requiring a controller or an overlay network.

Features

  • WLAN
  • Cloud Management
  • 802.11n and 802.
  • Self-Registration Guest Access
  • Block Layer 7 Software Applications
  • Self-Registration Guest Access
  • Controller-less architecture
  • Eduroam and borderless roaming
  • Mobile device location and attendence monitoring
  • PPSK auto allocation

Benefits

  • Auto connection for Eduroam users across institutions
  • Allows Access Points to self configure to meet demand
  • Real Time Client event monitoring to predict and diagnose
  • Versatile RF planning tools to improve WLAN performance
  • API integrations to improve functionality
  • Dashboards and reporting to optimise WLAN performance
  • Speed up deployment with streamlined device and network configuration

Pricing

£58 per device per year

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 11

374878782570137

AIT Partnership Group Ltd

Mr Steven Bailey

8450177017

sales@ait-pg.co.uk

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints The software is designed to work with Aerohive Access Points. It also includes integrations with Dell Networking products but other networking equipment may not be compatible
System requirements
  • Internet Explorer 6 and above
  • Chrome
  • Safari

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Std SLA is Monday to Friday UK business hours - 4 hours response
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels All support contracts include Telephone support, additional support levels add in the following.
Bronze; configuration backup, monthly health check +10%
Silver; Quarterly Wireless Configuration +15%
Gold; Monthly Wireless Configuration, wireless monitoring +20%

All support is provided via a ticketed help desk
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Full onsite training is provided with additional online training and documentation provided
Service documentation No
End-of-contract data extraction The data can be provided in CSV format or for an additional cost a bespoke database can be delivered
End-of-contract process There is no formal end of contract process. Access Points continue to operate as normal and all WLAN functionality will continue.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install Yes
Compatible operating systems
  • Android
  • IOS
Designed for use on mobile devices Yes
Differences between the mobile and desktop service No feature differences
API Yes
What users can and can't do using the API The API service allows other systems to integrate with the analytics software in the cloud to make use of the meta data for other applications
API documentation No
API sandbox or test environment No
Customisation available Yes
Description of customisation The features of the service can be customised to provide a tailored service

Scaling

Scaling
Independence of resources The Aerohive Cloud infrastructure has been rebuilt form the ground up to scale to millions of clients. This is evidenced by the speed of delivery of new updates and features.

Analytics

Analytics
Service usage metrics No

Resellers

Resellers
Supplier type Reseller providing extra features and support
Organisation whose services are being resold Aerohive

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency Never
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process No
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Data is exported via reports
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Private network or public sector network
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability AWS
Approach to resilience Available on request
Outage reporting AWS

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication 2-factor authentication
Access restrictions in management interfaces and support channels Tbc
Access restriction testing frequency Never
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for Less than 1 month

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 A-lign
ISO/IEC 27001 accreditation date 21/03/2019
What the ISO/IEC 27001 doesn’t cover Aerohive ISO/IEC 27001:2013 certification is for its Information Security Management Systems (ISMS) Aerohive is an ISO/IEC 27001:2013 certified provider whose ISMS, designed to ensure a secure information processing environment for employees, customers, and partners, has received third-party accreditation from the International Standards Organization (ISO).

Unlike competitors, who may use ISO 27001 certified data centres and claim this provides them with certification of their service , Aerohive cloud management platforms are ISO 27001 certified.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification Yes
Who accredited the PCI DSS certification Security Metrics
PCI DSS accreditation date 8th March 2017
What the PCI DSS doesn’t cover Based on the information provided by AIT Partnership Group Ltd involving its security policies, procedures, and regulations,
Security Metrics has found the merchant to be compliant with the Payment Card Industry Data Security Standards (PCI DSS),
endorsed by Visa, MasterCard, American Express, Discover, and JCB card brands. AIT holds SAQ C3.1 level certification which excludes electronic storage of credit card data
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Enterprise level firewall appliance which has regular intrusion tests.
Complex user passwords with a 30 days enforced change policy.
L2TP VPN for remote access.

All policies are communicated during the staff induction process and regularly communicated during departmental meetings.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach All changes made to our internal systems must first be approved by our senior management team before being thoroughly test. When the acceptance criteria has been met the change will be implemented.

All perimeter appliances are regularly tested for vulnerabilities. Updated firmware and security patches are implements to all perimeter and internal appliances as appropriate.

Our security appliances have proprietary software that will detect any unauthorized activities and notify our systems manager.

Incident management is handled using our Ticketing / CRM system
Vulnerability management type Undisclosed
Vulnerability management approach All perimeter appliances are regularly tested for vulnerabilities. Updated firmware and security patches are implements to all perimeter and internal appliances as appropriate and when advised by the vendor. Information in relation to potential threats is gathered from vendor websites.
Protective monitoring type Undisclosed
Protective monitoring approach This is handled by our perimeter security appliance. Out systems manager will be alerted to any unauthorised activity by way of text / email notification and it will be immediately investigated.
Incident management type Undisclosed
Incident management approach Incidents are management / tracked by our CRM system. Incidents can be raised by phone or email and this will be logged as a ticket with the appropriate SLA. Our CRM has the ability to provide granular reporting on all tickets raised.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £58 per device per year
Discount for educational organisations Yes
Free trial available Yes
Description of free trial Details of free service are customised for each user

Service documents

pdf document: Pricing document pdf document: Terms and conditions
Service documents
Return to top ↑