Arcus Global Limited

Arcus CloudCauseway

Provides a fully managed service that shares data securely between your internal applications and trusted external, including Cloud-based, systems. It enables self-service portals, mobile applications and integrations between legacy applications and customer relationship management systems. Cloud Causeway routes and manages HTTP and HTTPS traffic between private and public networks.

Features

  • Robust & performant
  • Fully-managed
  • Cloud-enabled connectivity
  • Secure
  • DDoS-resilient solution
  • Securely connect with other internal systems and/or trusted external platforms

Benefits

  • Employs best practice to keep your services running
  • Removes the overhead of managing multiple connections.
  • Routes traffic over numerous connectivity scenarios using secure proven techniques.
  • Employs best practice to keep your services secure.
  • Single point for managing all connections into your systems
  • Drive efficiencies through self-service portals

Pricing

£710 per user per month

Service documents

G-Cloud 10

533810835832105

Arcus Global Limited

Karen Humphreys

+44 (0)1223 781254

gcloud@arcusglobal.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints N/A
System requirements N/A

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Arcus Standard SLA (working hours):
Critical, Response < 4 hrs, Resolution 8 hrs
High, Response < 8 hrs, Resolution 16 hrs
Medium, Response < 16 hrs, Resolution 40 hrs
Low, Response 40 hrs,

AWS Support case response time depends on severity. Business Support tier is listed below:
General guidance cases < 24 hours;
system impaired cases < 12 hours;
production system impaired cases < 4 hours;
production system down cases < 1 hour.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Arcus provide 3 levels of stacked, Managed Service charged as a percentage of monthly AWS spend:
Infrastructure (20%) – core infrastructure only
OS (30%) – OS patching, management
Advanced (40%) – dedicated architecture support, additional security
We also offer the option of 24/7 for P1 events, which can be applied to any of the above service levels, for an additional 10%.

These also require AWS Business Support:
As above + 24/7 (Arcus-only) access to Support Engineers via email, chat and phone for unlimited contacts; architecture, 3rd party software and programmatic case management support. TAM. Greater of $100 or spend-dependent percentage (pm).
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We have a defined on-boarding process where we work with users to ensure that they have a smooth transition to our service. This involves working with the user to define the questions they would like the system to answer, how the customer may ask for the information and the approved response to be spoken.
Service documentation Yes
Documentation formats
  • PDF
  • Other
Other documentation formats
  • Arcus documents are provided electronically as PDF's
  • Provide an excellent audit trail of changes, updates/version control
End-of-contract data extraction Users make a service request and are provided with the secure keys and routing configuration data in electronic format.
End-of-contract process On receiving notification of contract termination your account will be closed based on either the requested termination date or on expiration of your G-Cloud contract. If there is no subsequent extension or new contract formed then the customer will be provide with the connectivity routing file and secure keys. The service will then be terminated and all requests to the service will be responded to with a HTTP 410 response.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Firefox
  • Chrome
  • Safari 9+
Application to install No
Designed for use on mobile devices No
Accessibility standards WCAG 2.0 AA or EN 301 549
Accessibility testing The service provides connectivity between systems and is not accessed directly by users. The services reporting and change management portal is based on common open source software libraries that support WCAG 2.0 AA accessibility standards.
API Yes
What users can and can't do using the API The API provides access to logs and service usage data that enables users to understand the traffic that is using the service and if there have been any security alerts on the service.
API documentation Yes
API documentation formats
  • HTML
  • PDF
  • Other
API sandbox or test environment Yes
Customisation available Yes
Description of customisation The named user to specify different security monitoring and alerting rules as well as the access controls for all different endpoints.

Scaling

Scaling
Independence of resources Customer environments are logically segregated to prevent users and customers from accessing resources not assigned to them. We work closely with AWS and monitor continuously to ensure that all customers receive the resources required for their service to run without impediment from others

Analytics

Analytics
Service usage metrics Yes
Metrics types We can provide analytics on the usage of the service, both in terms of traffic volumes, connectivity, access controls and security alerts.
Reporting types Real-time dashboards

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Other
Other data at rest protection approach Arcus can help our customers secure their data at rest and make full use of the available AWS services that support data security and encryption.

AWS adheres to independently validated privacy, data protection, security protections and control processes. AWS is responsible for the security of the cloud; customers are responsible for security in the cloud. AWS enables customers to control their content.

AWS offers customers options to add additional security layers to data at rest, via scalable and efficient encryption features. AWS offers flexible key management options and dedicated hardware-based cryptographic key storage.
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach N/A
Data export formats
  • CSV
  • Other
Data import formats
  • CSV
  • Other

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Other
Other protection between networks Network devices, including firewall and other boundary devices, are in place to monitor and control communications at the external boundary of the network and at key internal boundaries within the network. These boundary devices employ rule sets, access control lists (ACL), and configurations to enforce the flow of information to specific information system services.

ACLs, or traffic flow policies, are established on each managed interface, which manage and enforce the flow of traffic. ACL policies comform to Amazon's Information Security best Practice Guides.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network Customer environments are logically segregated to prevent users and customers from accessing resources not assigned to them. AWS gives customers ownership and control over their content by design through simple, but powerful tools that allow customers to determine how their content will be secured in transit.
AWS enables customers to open a secure, encrypted channel to AWS services using TLS/SSL, and/or IPsec or TLS VPN (if applicable), or other means of protection the customer wishes to use.
API calls can be encrypted with TLS/SSL to maintain confidentiality; the AWS Console connection is encrypted with TLS.

Availability and resilience

Availability and resilience
Guaranteed availability AWS currently provides SLAs for several services. Due to the rapidly evolving nature of AWS’s product offerings, SLAs are best reviewed directly on our website via the links below:

• Amazon EC2 SLA: http://aws.amazon.com/ec2-sla/
• Amazon S3 SLA: http://aws.amazon.com/s3-sla
Approach to resilience This service is built using AWS best practices and distributes the workload across three physically separate data centres in the London region. This means that the service would still run, even if a whole data centre were to be lost. We can provide further disaster recovery capability if required.
Outage reporting The service is monitored by ourselves and any outage reported directly to a point of contact within the users organisation.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication 2-factor authentication
Access restrictions in management interfaces and support channels Valid email is required which becomes the unique username, and a password reset email is sent to this address. This ensures that the email address is valid. User is then required to set a new password with a definable structure complexity - for example uppercase / lowercase plus a number.
Access restriction testing frequency At least once a year
Management access authentication 2-factor authentication

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 Socotec
ISO/IEC 27001 accreditation date 19/10/2015
What the ISO/IEC 27001 doesn’t cover N/A
ISO 28000:2007 certification No
CSA STAR certification Yes
CSA STAR accreditation date 14/03/2017
CSA STAR certification level Level 1: CSA STAR Self-Assessment
What the CSA STAR doesn’t cover N/A
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Cloud security at Arcus is the highest priority. This service is based on an AWS VPC, as such you will benefit from a data centre and network architecture built to meet the requirements of the most security-sensitive organizations.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach Arcus will maintain a change log of environmental controls and operate releases through our release manager.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Multiple tiers of vulnerability management. The Product Security team ensures the security of the system, consults with R&D teams and partners, and protects customer data. Cloud Security experts specialise in security research and innovative tool development. A ‘Rapid response’ team reacts to emerging threats as the last line of defence.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach Records all login attempts: originating IP address, time and success/fail against each user account. Information can be extracted for analysis against organisational policies. Configurable settings: enforce logins from an approved IP range and/or at certain times of day, maximum session length and automatic account locking after x failed login attempts.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach Standard incident management ensures that all recorded incidents are triaged and routed to the appropriate resolver groups and, where necessary, escalated. In specific cases it may be necessary to escalate incidents directly to the provider. We have a standard hand off process to ensure that end-to-end communication is maintained.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks Yes
Connected networks
  • Public Services Network (PSN)
  • New NHS Network (N3)
  • Other

Pricing

Pricing
Price £710 per user per month
Discount for educational organisations No
Free trial available No

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑