Provision of Public and Guest WiFi access using a range of WiFi Access Points, with customer branded splash pages and content.
Solution fully hosted in the cloud and customer has access to all end user, anonymised and statistical information.
- Enterprise-class public WiFi access to the Internet
- Branded Customer Content Portal
- Full surveys to define the feasibility, design and costs
- Deployment of Ruckus/Aruba or Cisco Access Points (APs)
- Access Points (APs) that can deliver high capacity throughput
- Fully meshed network design to ensure maximum WiFi coverage
- Availability and fix time SLA’s for the WiFi solution
- Minimum of 2 Access Points per site for resilience
- Content Filtering, with black list and white list names sites
- High Availabilty solution
- Ability to provide internet to the public or guest users
- Customer branding and advertising revenues available
- Access to end user, anonymised and statistical data
£1 to £1000000 per instance per month
CenturyLink Communications UK Limited
0207 400 5600
|Service constraints||This service is for public and guest WiFi only|
|Email or online ticketing support||Email or online ticketing|
|Support response times||When a ticket is opened on the Level 3 Incident Management System diagnosis begins into the cause. Automated notification emails can also be set up and Level 3 will provide updates at key milestones during the incident within the service SLA until the incident is resolved and closed.|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||24 hours, 7 days a week|
|Web chat support||No|
|Onsite support||Onsite support|
|Support levels||Level 3 could offer on-site training after a service deployment to floor walk or provide user workshops to ensure users were comfortable using any new technology, this would be a chargeable activity. Level 3 engineers would also attend site to assist in any incident management activity and this would come at no extra cost.|
|Support available to third parties||Yes|
Onboarding and offboarding
|Getting started||Level 3 provide on-site training and user documentation|
|Other documentation formats||MS Word|
|End-of-contract data extraction||Data is available from the customer portal until the contract is terminated.|
|End-of-contract process||At the end of the contract, the customer information is removed and the connectivity is terminated.|
Using the service
|Web browser interface||Yes|
|Using the web interface||Level 3 are delivering internet access for the public / guest WiFi users via a Customer Content Portal. This portal provides a registration page for users and customer specific content pages for revenue opportunities via advertising.|
|Web interface accessibility standard||None or don’t know|
|How the web interface is accessible||The web interface is a link on a users mobile device when they log into the WiFi service. The mobile devices can be any mobile phone, tablet or laptop.|
|Web interface accessibility testing||None|
|Command line interface||No|
|Independence of resources||The service is monitored for useage and in the event of 80% utilisation, Level 3's capacity management policy will take effect.?|
|Infrastructure or application metrics||Yes|
|Other metrics||The service provides anonymised, statistical and end user data|
|Reporting types||Real-time dashboards|
|Supplier type||Not a reseller|
|Staff security clearance||Conforms to BS7858:2012|
|Government security clearance||Up to Security Clearance (SC)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Managed by a third party|
|Penetration testing frequency||Never|
|Protecting data at rest||Physical access control, complying with CSA CCM v3.0|
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Backup and recovery
|Backup and recovery||Yes|
|What’s backed up||Analytical Data|
|Backup controls||The back ups are performed automatically via the service|
|Datacentre setup||Multiple datacentres with disaster recovery|
|Scheduling backups||Supplier controls the whole backup schedule|
|Data protection between buyer and supplier networks||Private network or public sector network|
|Data protection within supplier network||IPsec or TLS VPN gateway|
Availability and resilience
The Wi-Fi SLA is broken down into 2 parts; an availability SLA for the Core Services or a fault on the on-site hardware, either the LAN switches or the APs. The customer LAN cabling is not part of the SLA, the reason being is that in most large outside venues where this services is intended, the cabling is often run in high-up locations that cannot be reached without specialist equipment such as a cherry picker.
For the Service Level to be applicable there must be at least 2 Access Points deployed per site.
The overall SLA offered is 99%
|Approach to resilience||
A minimum of 2 (two) Access Points (unmeshed) must be provided to each site to ensure resiliency at the site in order to meet the SLA's.
Dependent upon hardware chosen there will be resiliency at any AP control layer (physical or virtual).
|Outage reporting||The whole service, including Access Points are proactively monitored by Level 3. Customers can also view the status of their AP's from the customer portal which will show if they are up, down or how busy each AP is.|
Identity and authentication
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||Describe how you restrict access in management interfaces and support channels.|
|Access restriction testing frequency||At least once a year|
|Management access authentication||Username or password|
|Devices users manage the service through||Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)|
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security accreditations||No|
|Named board-level person responsible for service security||Yes|
|Security governance accreditation||Yes|
|Security governance standards||Other|
|Other security governance standards||What security governance standards do you comply with?|
|Information security policies and processes||
What information security policies and processes do you follow?
Include your reporting structure and how you ensure policies are followed.
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||Describe your configuration and change management processes. please write|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
Describe your vulnerability management process?
Include details of how:
how you assess potential threats to your services
how quickly you deploy patches to your services
where you get your information about potential threats from
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||
Describe your protective monitoring processes.
how you identify potential compromises
how you respond when you find a potential compromise
how quickly you respond to incidents
|Incident management type||Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402|
|Incident management approach||
Level 3’s support model operates with a dual centre 24x7x365 Support Desk and Network Operation Centre for Incident Management within the UK.
Both main Support centres are UK based and have full capabilities to take full management in a DR situation.
The NOCIS proactively managed and incidents identified through network monitoring tools and alarms.
|Approach to secure software development best practice||Supplier-defined process|
Separation between users
|Virtualisation technology used to keep applications and users sharing the same infrastructure apart||Yes|
|Who implements virtualisation||Third-party|
|Third-party virtualisation provider||Global Reach|
|How shared infrastructure is kept separate||
Access Points connect to the Level 3 Zone Director through a secure encrypted layer 2 tunnel, it's IP address is in a completely different range, (From Level 3 Router) to the clients (From Zone Director).
The tunnel is configured to prevent Broadcast traffic (with the exception of ARP & DHCP) and also all Multicast traffic.
Level 3’s Zone Director has a built-in intrusion prevention features Wireless Intrusion Prevention System (“WIPS”) to protect the wireless network from security threats such as DoS attacks and intrusion attempts.
|Price||£1 to £1000000 per instance per month|
|Discount for educational organisations||No|
|Free trial available||No|
|Pricing document||View uploaded document|
|Service definition document||View uploaded document|
|Terms and conditions document||View uploaded document|