Bridgeway Security Solutions

Accellion mobile and secure compliant data exchange (kiteworks)

The Accellion kiteworks solution enables secure inter-and-intra agency collaboration, secure remote access to files and documents, as well as easy collaboration with third-parties, from any device, ensuring today’s government employees are productive and agile. Whole product solution with consultancy, training and support services delivered by Bridgeway, the leading Accellion partner.

Features

  • Secured collaboration workspaces with role-based access controls
  • File and document synchronisation across approved devices
  • Integrates with existing file repositories (CIFS, DFS, SharePoint)
  • Integrates with leading document management systems for a digital workspace
  • Secure, integrated mobile Microsoft Office editor and file tracking log
  • Integration with Microsoft Outlook and Lync/Skype for secure file sending
  • Managed and audited file sharing with trusted third-parties
  • Public, private, hybrid cloud and on-premise deployment options
  • FIPS 140-2 certified file sharing and managed file transfer
  • APIs for workflow automation, integration and unified workspace

Benefits

  • Access remote file repositories securely from mobile devices
  • Prevent data duplication by synchronising content repositories automatically
  • Flexible access to existing document stores to improve productivity
  • Control who has and what access to files by role
  • Visibility of file access from users & third-parties (audit logs)
  • Simplify file sending with file download and file receipt confirmation
  • Download, edit and upload Office documents securely from mobile devices
  • Versatile and scalable deployment options to meet security/infrastructure needs
  • Expand IT services by integrating into existing systems and workflows
  • Integrate into existing service workflows for secure file exchange

Pricing

£45 per user per year

Service documents

G-Cloud 11

597199630366807

Bridgeway Security Solutions

Jason Holloway

01223 979 090

g-cloud@bridgeway.co.uk

Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to Accellion kiteworks can operate as a standalone file and document repository, but its true value emerges when integrated into existing organisational file repositories, including CIFS, SharePoint, OneDrive, Box, Dropbox, OpenText and Documentum. Other ECM and enterprise content stores can be centrally managed and securely searched and shared through kiteworks connectors.
Cloud deployment model Hybrid cloud
Service constraints Public cloud instances require internet connectivity and an HTML-5 capable web-browser.
On-premises deployments will require a dedicated VMware VM, minimum of 4GB RAM, 2x vCPUs, and sufficient storage disk space. Typical recommendations are number of users x storage caps, but further advice and assistance are provided as part of the installation consultancy service.
System requirements
  • VMware ESX v4 or higher
  • Minimum of 4GB RAM
  • 2 x vCPUs (quad-core 2.5GHz Intel or AMD processor)
  • Typically, 100GB min HDD for POC pilots
  • A minimum of 500GB for production deployment
  • Additional VMs required if resilience and service segregation are desired
  • Firewall configuration required for secure access to repository

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Tickets are assigned a priority level, which may be altered during the lifecycle of the ticket, but always based on agreement between the customer and our support team. A P1 (mission critical) priority level has a 1 hour first response time. A P5 (information) priority level, has a first response time of 48 hours.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels Bridgeway support (Bridge Support) services are flexible: we can augment your existing support arrangements, or provide a complete outsourced support function. Standard support is available during UK office hours and can be extended to include full 24x7 and/or onsite consultancy visits. Support is provided as an extra but minimal annual flat-fee service.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Bridgeway provides installation and configuration consultancy services, as well as end-to-end project management to ensure overall project success. Documentation services, whether from high-level design (HLD) to low-level design (LLD), as well as project management and end-user training material can also be provided, subject to scope and cost.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Backups of the live servers can be extracted through the GUI. Files can be downloaded through the GUI or synchronised to the desktop (if policy allows).
End-of-contract process Service is switched off and remaining server/service data destroyed.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Safari 9+
  • Opera
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Optional integration with existing Enterprise Mobility Management (EMM) solution. Automatic file synchronisation not usually provided for mobile devices, instead files are downloaded/stored on demand.
Accessibility standards WCAG 2.1 A
Accessibility testing JAWS and kite works integration testing.
API Yes
What users can and can't do using the API API provides programmatic access to authentication, file management and user management. APIs are extensively documented and example code is provides for most common programming languages.
API documentation Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation The Accellion solution can be customer branded and customised to meet customer's preferred file and folder structures, user rights assigned by groups, authentication integrated into existing directory services (e.g. AD, LDAP) and Single Sign-On (SSO) solutions. Bridgeway's consultancy and training services are highly customisable according to a jointly-agreed statement of work and corresponding success criteria.

Scaling

Scaling
Independence of resources Customers can choose between a public cloud, private cloud or on-premises deployment, according to risk appetite, server integration and service management preferences.
Services are covered by availability guarantees, which vary from option to option. Contact us for further details.

Analytics

Analytics
Service usage metrics Yes
Metrics types Accellion can provide the most comprehensive usage and compliance reporting on the market, including a variety of system, administration and management reporting. A dedicated CISO dashboard is also available. Details available on request.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Reseller providing extra features and support
Organisation whose services are being resold Accellion

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Other
Other data at rest protection approach In VM and cloud deployments, files are stored on encrypted partitions using AES128-bit encryption. Additionally, each file can be encrypted with a unique key. The encryption key is not stored on the server, so the decryption keys for stored files cannot be obtained from the compromised server. Data is also encrypted in transit using TLS.
Accellion’s security mechanisms guard against malicious access; File names are dereferenced when stored so that files are inaccessible. Files may be stored encrypted for added security. Data can be accessed only through the file URL embedded in the email. Each URL call is authenticated individually.
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Users can export the relevant files and folders via API, the native synchronisation app, or through a GUI-initiated export process.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats Original file source type (any file type)
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats Any file type

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • Other
Other protection between networks All files on an Accellion system are encrypted in transit and at rest. Data in transit is encrypted with TDES (168 bits) or AES (128/256 bits) depending on the web browser. Accellion uses AES encryption for data at rest.
Accellion has optional anti-virus software, provided by F-Secure, to scan files on upload and download. When a file containing a virus is uploaded to Accellion it will be quarantined.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network All files on an Accellion system are encrypted in transit and at rest. Data in transit is encrypted with TDES (168 bits) or AES (128/256 bits) depending on the web browser. Accellion uses AES encryption for data at rest.
Accellion has optional anti-virus software, provided by F-secure, to scan files on upload and download. When a file containing a virus is uploaded to Accellion it will be quarantined.

Availability and resilience

Availability and resilience
Guaranteed availability Guaranteed availability 99.9% for both Accellion service and Bridgeway support (Bridge Support). Service part-refund for non-performance.
Approach to resilience Accellion kiteworks enables complete deployment flexibility by allowing the web, application, and storage tiers to be separated and placed anywhere in the network, whether pure cloud, hosted private cloud and/or on-premises. This allows for increased security by being able to place just the web tier in the DMZ for example, while placing application and storage tiers behind the internal firewall.
Each tier of the solution can be scaled independently and in different locations and hosting arrangements. This enables deployments to grow seamlessly from small single server instances to extremely large multi-location systems.
Outage reporting Email alerts and system dashboards.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Access restricted by Role Based Access Control (RBAC). Devices authenticate with centrally managed (and issued) digital certificates. Authentication can also be restricted by access control lists. Support tickets can only be opened by previously approved administrator contacts.
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 EY CertifyPoint
ISO/IEC 27001 accreditation date 18/11/2010 and last re-issued 15/12/2017
What the ISO/IEC 27001 doesn’t cover Scope covers datacentre services and facilities, and does not include components, configurations or on-premise deployments.
ISO 28000:2007 certification No
CSA STAR certification Yes
CSA STAR accreditation date 14/12/2016
CSA STAR certification level Level 1: CSA STAR Self-Assessment
What the CSA STAR doesn’t cover Hosting service (if not hosted in the Accellion cloud) and any Bridgeway consultancy, training and support services.
PCI certification No
Other security certifications Yes
Any other security certifications SOC I & II

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards
  • CSA CCM version 3.0
  • ISO/IEC 27001
Information security policies and processes Contact details and reporting structure available on request.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach Security and risk teams assess potential impact before implementation. Peer and security team code review, automated testing and audited code tracking allow for the services to be tracked throughout their lifetime.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Available on request
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach Available on request
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach Available on request

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks Yes
Connected networks
  • Public Services Network (PSN)
  • NHS Network (N3)
  • Scottish Wide Area Network (SWAN)

Pricing

Pricing
Price £45 per user per year
Discount for educational organisations Yes
Free trial available Yes
Description of free trial Time limited trials available. Full functionality, but available only for a limited trial time period and for a maximum agreed number of users.
Link to free trial https://www.bridgeway.co.uk/accellion-trial

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Service definition document pdf document: Terms and conditions pdf document: Modern Slavery statement
Service documents
Return to top ↑