GCI Network Solutions Ltd

GCI Distributed Denial of Service (DDoS)

A Distributed Denial of Service (DDoS) attack involves the targeting of a network with the intent of disrupting or making unavailable internet connection(s), web facing systems, or web facing applications. The DDoS service provides mitigation against attacks through the monitoring of network traffic and the invocation of controls when detected.

Features

  • DDoS Protection for GCI supplied internet connectiivty
  • Support for local, and centralised internet breakout connections
  • 24/7 monitoring via Level 3 Communications Security Operations Centre
  • Upstream protection
  • Automatic mitigation

Benefits

  • Real-time protection against DDoS attacks
  • Always-on protection via upstream detection / scrubbing centres
  • No noticeable performance degredation or latency
  • Lower cost entry point than the purchase of dedicated hardware
  • Backed by the 24/7 Level 3 Communications Security Operations Centre

Pricing

£200 per unit

Service documents

G-Cloud 10

509317958073378

GCI Network Solutions Ltd

Tim Quin

0844 443 4433

tenders@gcicom.net

Service scope

Service scope
Service constraints The service is limited to customers internet connectivity provided by GCI
System requirements Limited to customers internet connectivity provided by GCI

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Low: Routine question, feature request. Service desk engineers will respond within four hours, 8am – 18:00 Mon-Fri
Normal: Unable to perform routine function. Service desk engineers will respond within two hours, 8am – 18:00 Mon-Fri
High: Single user or business critical service impacted. Service desk engineers will respond within one hour, 24/7
Critical: All users unable to work. Business critical services unavailable. Service desk engineers make critical cases a priority and respond within 30 minutes, 24/7
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels Support provided within the service:
Low: Routine question, feature request. Service desk engineers will respond within twelve hours, 8am – 18:00 Mon-Fri
Normal: Unable to perform routine function. Service desk engineers will respond within four hours, 8am – 18:00 Mon-Fri
High: Single user or business critical service impacted. Service desk engineers will respond within one hour, 24/7
Critical: All users unable to work. Business critical services unavailable. Service desk engineers make critical cases a priority and respond within 30 minutes, 24/7

Additional Managed Service options available, priced on application.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started The DDoS service is initiated via a project to implement which involves modifications to customer routing. All activity will be completed by GCI support engineers.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction All customer data is securely deleted. All network connectivity is removed.
End-of-contract process Project team follows published end-of-contract procedures, including settling outstanding payments and ensuring secure deletion / transfer of customer data.

Professional service costs to reinstate the customer environment to default will be presented at the point of cancellation.

Using the service

Using the service
Web browser interface No
API No
Command line interface No

Scaling

Scaling
Scaling available No
Independence of resources The service is managed by Level 3 Communications and designed to scale in line with the demands on the service.
Usage notifications No

Analytics

Analytics
Infrastructure or application metrics No

Resellers

Resellers
Supplier type Reseller providing extra support
Organisation whose services are being resold Level 3 Communications

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Backup and recovery Yes
What’s backed up Core network device configuration
Backup controls User control of backups is not available.
Datacentre setup Multiple datacentres with disaster recovery
Scheduling backups Supplier controls the whole backup schedule
Backup recovery Users contact the support team

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Private network or public sector network
Data protection within supplier network Other
Other protection within supplier network We run an internal MPLS network with firewalls to protect traffic

Availability and resilience

Availability and resilience
Guaranteed availability The Level 3 Security Operations Centre (SOC) is geo-resilient.

Any request to mitigate an active DDoS attack will be actioned within 30 minutes of receiving a call or a trouble ticket from an authorised GCI contact, in the scenario where an attack is not automatically mitigated.

Service rebate entitlement is defined within the GCI standard terms and conditions.
Approach to resilience Available on request
Outage reporting Email alerts, or telephone

Identity and authentication

Identity and authentication
User authentication Username or password
Access restrictions in management interfaces and support channels Access to support channels is limited to named, authorised contacts.
Access restriction testing frequency Never
Management access authentication Username or password
Devices users manage the service through Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 LQRA
ISO/IEC 27001 accreditation date 2017
What the ISO/IEC 27001 doesn’t cover None listed
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification Yes
Who accredited the PCI DSS certification Nettitude
PCI DSS accreditation date 2016
What the PCI DSS doesn’t cover Platforms that do not handle card holder data are not covered.
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes GCI follows the procedures laid down by ISO27001 and PCI DSS. Policies are followed through inductions, training and internal/external audits.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach GCI ensures all maintenance is approved and delivered in a controlled manner to minimise disruption. These changes can include but not limited to technical changes, optimisation activity, equipment or systems upgrades, delivery of orders or projects and testing, auditing, benchmarking or base-lining. GCI will use reasonable endeavours to ensure that the service is available 24 hours per day, 7 days a week, and 365/366 days per year. However, scheduled maintenance will be required at regular intervals. Scheduled maintenance is excluded from any service availability.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Monthly vulnerability scan with remediation in line with accepted best practice.
Protective monitoring type Supplier-defined controls
Protective monitoring approach GCI monitors availability of systems and services including up-time via a dedicated NOC team and associated tools. Response times are subject to published SLAs.
Incident management type Supplier-defined controls
Incident management approach GCI follows recommended ISO27001 policies for incident management

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart Yes
Who implements virtualisation Third-party
Third-party virtualisation provider Standard network protocols are deployed for data separation
How shared infrastructure is kept separate Standard network segregation protocols are used to ensure end user data separation

Energy efficiency

Energy efficiency
Energy-efficient datacentres No

Pricing

Pricing
Price £200 per unit
Discount for educational organisations No
Free trial available No

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑