IBM United Kingdom Ltd

IBM Security - Managed SIEM and Protective Monitoring from List X SOC

IBM Security provides a professionally managed service to monitor security events using IBM's industry leading technology, including QRadar, ranked No.1 by Gartner. Based out of our secure UK List-X facilities, the security cleared staff are able to provide protective monitoring of systems at OFFICIAL and OFFICIAL SENSITIVE.

Features

  • Collection of event/data flow information in your data centre
  • Event aggregation and correlation
  • Industry leading security intelligence analytics
  • Security event alerting and reporting
  • Remote monitoring from a List X IBM data centre
  • Direct client access to the management console to investigate
  • Fits both OFFICIAL and OFFICIAL SENSITIVE data with options
  • Vulnerability Management added as optional feature or as stand-alone service

Benefits

  • Identification of breaches in defined security policies on devices monitored
  • Identifying insider theft and fraud
  • Reporting near-time alerts that could indicate possible or actual breaches
  • Monitoring events on target devices according to GPG13 guidelines
  • Supports security accreditation process providing detective and analytical controls
  • Framework to enable traceability of remedial actions to address events
  • Addressing regulatory mandates
  • Consolidating audit data silos into one integrated solution
  • Managing vulnerabilities, configurations, compliance and risks
  • Supports the forensic investigations of incidents and offenses

Pricing

£31.56 per person per month

Service documents

G-Cloud 11

388304626099923

IBM United Kingdom Ltd

Alice Griffin

+44-07387-134406

gcloud@uk.ibm.com

Planning

Planning
Planning service Yes
How the planning service works Our qualified consultants are experienced in advising and planning the implementation of cloud hosted and cloud software solutions both with private sector and HMG customer requirement sets. We are vendor agnostic in the advice we provide but can provide our own in-house cloud services such as IBM Blue Mix and Soft Layer.
Planning service works with specific services No

Training

Training
Training service provided No

Setup and migration

Setup and migration
Setup or migration service available Yes
How the setup or migration service works Customers migrating to the cloud require expert advice on the risks and threats they may be presented with in order to allow them to take appropriate mitigation and general response actions. As IBM we are experienced in running our own cloud environment we can offer our customers a wealth of experience in migrating to and between cloud providers such as Azure and AWS.
Setup or migration service is for specific cloud services No

Quality assurance and performance testing

Quality assurance and performance testing
Quality assurance and performance testing service Yes
How the quality assurance and performance testing works Quality is integral to our services delivery and underlying this is our patented Worldwide Quality Assurance/Management Discipline (WWQA/MD) methodology. This methodology supports quality assurance activities for the processes of our Customer Relationship Management (CRM). WWQA/MD encompasses six specific CRM quality assurance points across the following stages of our business; Proposal Development – Pricing, Management Review and Approval and Project Management. We have an overriding commitment to the quality of the products, solutions, and services we provide to our customers. Quality is recognised as a fundamental component of the value our customers receive from us. We have initiatives aimed at making us process-led including: To improve our business performance by making effective use of the management information and measurements provided by our processes, to make better decisions and better understand our customer's requirements. To measure ourselves against recognised standards of business excellence we conduct assessments against the ISO 9001:2008 standard to ensure we are executing the Management System and processes we have defined. Through these initiatives we aim to satisfy our customer’s requirements and, in so doing, make certain that the way we operate meets the capabilities set out above.

Security testing

Security testing
Security services Yes
Security services type
  • Security strategy
  • Security risk management
  • Security design
  • Cyber security consultancy
  • Security testing
  • Security incident management
  • Security audit services
Certified security testers Yes
Security testing certifications
  • CREST
  • Other
Other security testing certifications Cyber Essentials

Ongoing support

Ongoing support
Ongoing support service No

Service scope

Service scope
Service constraints None

User support

User support
Email or online ticketing support No
Phone support No
Web chat support No
Support levels This is consultancy based support we will work with you during normal office hours to support your project. Different support needs will be available by request.

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Pricing

Pricing
Price £31.56 per person per month
Discount for educational organisations No

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Service definition document pdf document: Terms and conditions pdf document: Modern Slavery statement
Service documents
Return to top ↑