Online Brand Protection
To combat the ever growing global problem of online brand abuse in the form of cyber-squatted domain names, Safenames has developed a fully managed and innovative brand protection service called Mark Protect. To simplify the overwhelming task of policing and taking action on trademark infringements across the Web.
- Domain Name Infringement Monitoring
- Keyword Monitoring
- App Store Monitoring
- Reverse Logo Search
- Social Media Monitoring
- Website Content Monitoring
- Phishing Site Take-down service
- WIPO / UDRP Legal Services
- Protect the financial investment and equity of your intellectual property
- Increase web traffic, by minimising traffic diversion sites
- Recover multiple domains with single UDRP to increase recovery ROI
- Prevent customer mis-trust and confusion
- Protect brand and revenue streams from counterfeiting and affiliate misuse
- Reduce marketing costs through prevention of pay per click abuse
- Proactive Managed Services
£100 to £500 per unit per month
- Education pricing available
|Software add-on or extension||No|
|Cloud deployment model||Private cloud|
|System requirements||Web Browser required to access the service.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
Support response times
365 x 24 hour support, 30 minute initial response. Severity based system, SEV1 - 1 hour SEV2 - 4 hour SEV3 - for scheduled / project work
User can manage status and priority of support tickets
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||WCAG 2.1 A|
|Phone support availability||24 hours, 7 days a week|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
Support availability - 24/7/365
Standard support response times - 30 minutes
|Support available to third parties||Yes|
Onboarding and offboarding
New customers are assigned an account manager who will meet with you and determine your requirements.
Safenames Mark Protect will make an initial scan of your online brand and identify all infringements. Incidents will be categorised and your account manager will then advise best course of for each type of incident.
Safenames will provide full training and user documentation.
|End-of-contract data extraction||Data may be exported from our portal via excel.|
All data should be removed from Safenames systems. All ongoing reports would be stopped.
There are no costs associated with discontinuing the service.
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||
Web Application automatically resizes to fit available screen area offered by tablets or mobile phones.
An Apple/Android app is also available for domain registration services.
|Accessibility standards||WCAG 2.1 A|
|What users can and can't do using the API||Users may order and manage domain names through our API.|
|API documentation formats|
|API sandbox or test environment||Yes|
|Description of customisation||
Portal can be branded with your logo.
Customised domain reporting available.
Configurable Brand & Trademark reporting options.
Custom domain security options.
|Independence of resources||Safenames operates a capacity management plan under our ISO27001 certification.|
|Service usage metrics||Yes|
Our portal will show the following statistics:-
Infringing domains that are high risk.
Domains that have been registered in the past 90 days
Domains which contain your brand which expire within 60 days
Domains infringing on your brand which are registered by Registration Private
Infringing domains that have been registered for 5 years or more
|Supplier type||Not a reseller|
|Staff security clearance||Conforms to BS7858:2012|
|Government security clearance||Up to Security Clearance (SC)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||No|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider|
|Protecting data at rest||
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||All data in Safenames management portal can be exported into excel.|
|Data export formats||CSV|
|Data import formats||CSV|
|Data protection between buyer and supplier networks||
|Data protection within supplier network||
Availability and resilience
Safenames server network SLA is 99.965%
Our full SLA agreement can be found at:-
|Approach to resilience||Information available on request.|
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||
Safenames has a role based access system.
All access is controller through our ISO27001 policies.
|Access restriction testing frequency||At least once a year|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||Users have access to real-time audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||At least 12 months|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||DAS Certification|
|ISO/IEC 27001 accreditation date||03/04/2016|
|What the ISO/IEC 27001 doesn’t cover||Our scope contains all aspects of Safenames business.|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Who accredited the PCI DSS certification||Trustwave Holdings, Inc|
|PCI DSS accreditation date||02/03/2010|
|What the PCI DSS doesn’t cover||All aspects of PCI DSS have been implemented.|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||
We follow utilise the following policies and processes:
We have 2 external audits each year to ensure compliance.
The ISMS is the responsibility of Safenames CTO.
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||Change control is implemented and operated under our ISO27001 scheme.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||In accordance with our ISO27001 certification, Safenames operates a complete technical and vulnerability management policy.|
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||Safenames has implemented a number of protective monitoring controls aimed at reducing cyber risk. These include inspecting firewall logs, investigating operating system security alerts and monitoring Intrusion Detection Systems.|
|Incident management type||Supplier-defined controls|
|Incident management approach||
Safenames has an ISO27001 compliant Incident Management Process.
Users can report incidents to our help desk.
An incident report would be produced after the incident is resolved and distributed via email.
|Approach to secure software development best practice||Conforms to a recognised standard, but self-assessed|
Public sector networks
|Connection to public sector networks||No|
|Price||£100 to £500 per unit per month|
|Discount for educational organisations||Yes|
|Free trial available||No|