risual Ltd

Kemp 360 Metered Enterprise Licensing for Application Delivery

Kemp simplifies how you optimize, analyse and secure applications anywhere, delivering an optimal application user experience while maintaining the centralized insight required to be in total control regardless of the type or number of cloud delivery platforms.

Features

  • Layer 4 and Layer 7 Load Balancing and Cookie Persistence
  • Application Delivery
  • Application Optimisation
  • Data Centre Migration
  • Cloud Migration
  • Hybrid Cloud
  • Load Balancing
  • Reverse Proxy
  • Certificate management
  • DDoS Protection

Benefits

  • Always On applications
  • Increased resiliency
  • Disaster Recovery
  • Lower cost of ownership
  • Application health and visibility
  • Multi cloud deployment

Pricing

£400 to £22,000 a unit

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at bidmanagement@risual.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

4 9 6 6 3 3 0 5 9 9 6 5 2 3 0

Contact

risual Ltd Bid Management
Telephone: 0300 303 2044
Email: bidmanagement@risual.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Applications, security, cloud migration.
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
None known.
System requirements
  • Minimum spec - 2gb RAM, 2vCPU and 60gb storage
  • Hypervisor deployment: HyperV, Vmware, Oracle, KVM, Xen based virtual appliances

User support

Email or online ticketing support
Email or online ticketing
Support response times
Ticketing support is available as part of an active support subscription, there are 3 tiers of subscription: Standard, Enterprise and Enterprise Plus.
Support tickets response SLA within 4 hours.
Non-support related tickets usually within 72 hours.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AAA
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Chat is accessible via the main website 9 to 5 (Irish time) Monday to Friday. See www.kemp.ax
Web chat accessibility testing
Unknown
Onsite support
Yes, at extra cost
Support levels
Standard - 10x5 (in region).
Enterprise - 24x7 (international) telephone and email.
Enterprise Plus - 24x7 international WAF and GSLB included.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Kemp will offer impartial advice as to the use of the Loadmaster and 360 product range - Partners will typically consult with end users to offer levels of service for solution requirements.
Service documentation
Yes
Documentation formats
  • PDF
  • Other
Other documentation formats
Word
End-of-contract data extraction
Backup configuration from LB - Snapshots of the service from KEMP 360 Central.
End-of-contract process
VLMS can no longer be used.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Yes
Compatible operating systems
  • Linux or Unix
  • Other
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
This service is not designed to work on mobile devices from a base OS perspective, but yes as a technology.
Service interface
Yes
Description of service interface
Linux based proprietary with Web Front End access - works with most browsers for WUI access. Load balances in excess of 100,000 different apps.
Accessibility standards
None or don’t know
Description of accessibility
Accessible through a market place in Azure, AWS and via partner network.
Accessibility testing
Unknown
API
Yes
What users can and can't do using the API
Users can deploy and configure Kemp Loadmaster load balancing products via the API.
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • PDF
  • Other
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
All Load Balancers are configurable - dependent on the nature of the requirement (customer specific).

Scaling

Independence of resources
Kemp can help to size and provide scope for dimensioning - dedicated appliances are used per application/service/customer to prevent over utilisation and under provision.

Analytics

Service usage metrics
Yes
Metrics types
CPU, disk, HTTP request and response status, memory, network, number of active instances.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Kemp Technologies

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
Other
Other data at rest protection approach
To populate
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
There is an option to export backups and logs from Kemp Appliances. No exportable data is stored in the customer portal.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • Text based.
  • Proprietary backup - encrypted for logs and settings from appliances.
Data import formats
Other
Other data import formats
Not applicable

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Bonded fibre optic connections
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection between networks
Logical separation between interfaces with VLAN tagging, or with separate devices per application/network/customer.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection within supplier network
Data at rest is encrypted using industry standards.

Availability and resilience

Guaranteed availability
Dependent on the deployment scenario, and subscription.
Approach to resilience
Kemp can be configured in High availability (2 nodes active passive) or 4 to 16 nodes for active/active clustering.
Outage reporting
Email, SMS, Proactive Support - Kemp 360 vision, Central dashboard (email/syslog).

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Other user authentication
Depending on the service there is combination of ways we authenticate including - VPN, SAML, Public Key.
Access restrictions in management interfaces and support channels
Determined by KEMP Management and role of individual - controlled through the KEMP IT Services Team.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Description of management access authentication
Username and password after initial setup.

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
08/10/2018
What the ISO/IEC 27001 doesn’t cover
Field to be populated
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Risual is compliant with ISO 27001 Information Security Management and are audited every year. risual are also compliant with Cyber Essentials Plus, able to provide services to UK public sector organisations.
risual’s approach to security is that of a continuous cycle to proactively identify weakness before the worst happens and proactively act where necessary. Our partnership with Microsoft allows us to stay on the leading edge of technology, actively working to improve defences using advanced monitoring and reporting capabilities through the Microsoft toolset, whist maintaining user experience satisfaction.
risual recognise the benefits working with third parties who specialise in network security and as part of existing contracts we have experience of successfully partnering with our own and our customers Network Security partners to provide a comprehensive service that meets our customers security needs and expectations.
As part of service design and transition activities, risual will document and maintain documented Security processes to align with the client’s security policy, with provision for roles and responsibilities of the client and their third parties.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Risual, as an ISO/IEC 20000-1:2011 ITSM accredited organisation has a robust change management process internally to demonstrate awareness and compliance to ITIL best practice Change Management processes. We are comfortable to adopt and work within a customer’s change management process as we are using our own processes. We acknowledge that as the Supplier, we will follow the Client’s specified change management process. The process will be documented to ensure that all risual engineers understand how to engage with the process. We will support the change administration requirements by always logging/tracking required changes, recording change decisions and producing a Change Schedule.
Vulnerability management type
Undisclosed
Vulnerability management approach
Risual use Microsoft Sentinel and other Microsoft cloud-based proactive monitoring services to provide event alerts across the organisation relating to security vulnerabilities. These are classified as Priority One incidents and dealt with under agreed SLAs.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Risual use Microsoft Sentinel and other Microsoft cloud-based proactive monitoring services to provide event alerts across the organisation relating to security vulnerabilities. These are classified as Priority One incidents and dealt with under agreed SLAs.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
All incidents generated from user interaction or the event management service will be recorded within the risual ITSM tool, assigned a unique reference number and triaged to the associated resolver group. Assigning the priority of each incident will be agreed between the user and rMS in line with the priority level description and calculated on the assessment of the Urgency and Impact, providing the client with the flexibility to amend priority levels as the issue progresses. Incidents can be escalated, should the need arise and assigned a higher priority level at any point during the incident management process.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
Yes
Connected networks
  • Public Services Network (PSN)
  • Police National Network (PNN)
  • NHS Network (N3)
  • Joint Academic Network (JANET)
  • Scottish Wide Area Network (SWAN)
  • Health and Social Care Network (HSCN)

Pricing

Price
£400 to £22,000 a unit
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
30 day trial with our high end virtual Load balancer - no obligation to buy - access to 24/7 support during the 30 days & free load balancer.
Link to free trial
Www.kemptechnologies.com/try | www.freeloadbalancer.com

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at bidmanagement@risual.com. Tell them what format you need. It will help if you say what assistive technology you use.