Auriga Consulting Ltd

CyberGator Cyber Monitoring Saas Service

Security Event Monitoring can be costly. Auriga’s CyberGator bucks this trend and is a first to market of its type. CyberGator is a cost effective, subscription-based Cyber Security Monitoring SaaS service, that is agile, intuitive and real-time, offering much more than security monitoring alone. Security health and alerting are included


  • Log Management - provides orchestration and transport of log data
  • Realtime Security Event Detection
  • Health and Maintenance Management - provides security anomaly detection
  • Threat Detection and Management - detection of suspicious traffic flow
  • Device Application Detection and Inventory – Software/Operating System patching awareness
  • Security Health Check - dashboards display overall device health
  • Incident Management Tracking - provides ability to track detected incidents
  • Event Notification - provides alerting through Dashboard, Email, SMS messages


  • Cost effective proactive Security
  • Scale-up and down the service according to Clients’ requirements
  • Reduce costs of ICT resources staff
  • Targeted maintenance management
  • Real time view of Clients’ infrastructures
  • Manage events appropriately and effectively
  • Hands-on support when required
  • Links to Auriga’s Compass SOC (Security Operations Centre) service


£9.99 to £29.99 per unit per month

  • Free trial available

Service documents

G-Cloud 10


Auriga Consulting Ltd

Ian McKay

0203 7938820

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints N/A
System requirements
  • Monitored infrastructure must be capable of producing valid log files
  • Monitored infrastructure must be listed on supported components list
  • Access to internet to facilitate updates and subscription processes

User support

User support
Email or online ticketing support Yes, at extra cost
Support response times Depending on CyberGator service subscription purchased, support entitlement ranges from ticket-based support (best endeavour response) to SLA (4 hour response) and dedicated Support (customised SLA)
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support No
Web chat support Yes, at an extra cost
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard None or don’t know
How the web chat support is accessible Depending on CyberGator service subscription purchased, web chat entitlements vary
Web chat accessibility testing Web chat testing with assistive technology users is planned
Onsite support Yes, at extra cost
Support levels CyberGator Points - ticket based support
CyberGator Degree - priority based support (SLA)
CyberGator Grads - dedicated support
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Online web portal is designed to be intuitive guiding users through a series of simple steps to start using service
Service documentation No
End-of-contract data extraction Customers continue to own and have full title to data. Online web portal will guide Users on necessary steps to off-board service and extract data
End-of-contract process CyberGator variants are Points, Degree and Grads, available for subscription via Auriga's SaaS portal. Minimum term is 1 (one) month and termination term is 30 days - there is no termination charge

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install Yes
Compatible operating systems
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
Designed for use on mobile devices No
Accessibility standards None or don’t know
Description of accessibility CyberGator is accessible via Auriga's SaaS platform
Accessibility testing Interface testing with assistive technology is planned
Customisation available No


Independence of resources Independence of resources is guaranteed through scalability of service based on usage and performance


Service usage metrics No


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations European Economic Area (EEA)
User control over data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Other
Other data at rest protection approach Data at rest is protected using IAAS capabilities provided by AWS
Data sanitisation process No
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Using standard data interfaces
Data export formats
  • CSV
  • ODF
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Standard terms are available to define SLAs depending on variant of CyberGator purchased
Approach to resilience Available on request
Outage reporting Public dashboard

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels Platform is supplied over public internet. All communications are authenticated
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information No audit information available
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Auriga’s Information Security Policy, in line with ISO 27001 best practices, forms the top level policy statement for information security and is supported by a subset of policies and procedures to ensure objectives are met. It covers:
a) a definition of information security and Auriga's overall objectives
b) a statement of management intent
c) Strategic approach to risk, underpinned by the Information Risk Policy
d) i)ensure compliance with legal and regulatory requirements
ii) training requirements
iii) Business continuity management requirement
iv) failure to adhere to security policy may result in disciplinary action
e) Incident Management Procedures
f) supporting documentation
Policies have been communicated via the ISMS and by e-mail on release
A SIRO, IAO and ISM are appointed and are responsible for ensuring continual compliance to ISF Terms of Reference. Regular meetings are held where ISF policies are regularly reviewed - any gaps are identified and escalated for remediation in accordance with defined processes

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Formal change management processes are followed which assess impact and likelihood of any service changes before changes are implemented or actioned
Vulnerability management type Undisclosed
Vulnerability management approach Information is available upon request - not publicly available
Protective monitoring type Undisclosed
Protective monitoring approach CyberGator is a protective monitoring platform so monitors itself
Incident management type Undisclosed
Incident management approach Undisclosed - not publicly available - available upon request

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £9.99 to £29.99 per unit per month
Discount for educational organisations No
Free trial available Yes
Description of free trial Full functionality is available for 21 day time period - applies to CyberGator Points, CyberGator Degree and CyberGator Grads


Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑