Bridgeway Security Solutions

Accellion mobile and secure compliant data exchange (kiteworks)

The Accellion kiteworks solution enables secure inter-and-intra agency collaboration, secure remote access to files and documents, as well as easy collaboration with third-parties, from any device, ensuring today’s government employees are productive and agile. Whole product solution with consultancy, training and support services delivered by Bridgeway, the leading Accellion partner.

Features

  • Secured collaboration workspaces with role-based access controls
  • File and document synchronisation across approved devices
  • Integrates with existing file repositories (CIFS, DFS, SharePoint)
  • Integrates with leading document management systems for a digital workspace
  • Secure, integrated mobile Microsoft Office editor and file tracking log
  • Integration with Microsoft Outlook and Lync/Skype for secure file sending
  • Managed and audited file sharing with trusted third-parties
  • Public, private, hybrid cloud and on-premise deployment options
  • FIPS 140-2 certified file sharing and managed file transfer
  • APIs for workflow automation, integration and unified workspace

Benefits

  • Access remote file repositories securely from mobile devices
  • Prevent data duplication by synchronising content repositories automatically
  • Flexible access to existing document stores to improve productivity
  • Control who has and what access to files by role
  • Visibility of file access from users & third-parties (audit logs)
  • Simplify file sending with file download and file receipt confirmation
  • Download, edit and upload Office documents securely from mobile devices
  • Versatile and scalable deployment options to meet security/infrastructure needs
  • Expand IT services by integrating into existing systems and workflows
  • Integrate into existing service workflows for secure file exchange

Pricing

£45 per user per year

Service documents

Framework

G-Cloud 11

Service ID

5 9 7 1 9 9 6 3 0 3 6 6 8 0 7

Contact

Bridgeway Security Solutions

Jason Holloway

01223 979 090

g-cloud@bridgeway.co.uk

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Accellion kiteworks can operate as a standalone file and document repository, but its true value emerges when integrated into existing organisational file repositories, including CIFS, SharePoint, OneDrive, Box, Dropbox, OpenText and Documentum. Other ECM and enterprise content stores can be centrally managed and securely searched and shared through kiteworks connectors.
Cloud deployment model
Hybrid cloud
Service constraints
Public cloud instances require internet connectivity and an HTML-5 capable web-browser.
On-premises deployments will require a dedicated VMware VM, minimum of 4GB RAM, 2x vCPUs, and sufficient storage disk space. Typical recommendations are number of users x storage caps, but further advice and assistance are provided as part of the installation consultancy service.
System requirements
  • VMware ESX v4 or higher
  • Minimum of 4GB RAM
  • 2 x vCPUs (quad-core 2.5GHz Intel or AMD processor)
  • Typically, 100GB min HDD for POC pilots
  • A minimum of 500GB for production deployment
  • Additional VMs required if resilience and service segregation are desired
  • Firewall configuration required for secure access to repository

User support

Email or online ticketing support
Email or online ticketing
Support response times
Tickets are assigned a priority level, which may be altered during the lifecycle of the ticket, but always based on agreement between the customer and our support team. A P1 (mission critical) priority level has a 1 hour first response time. A P5 (information) priority level, has a first response time of 48 hours.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Bridgeway support (Bridge Support) services are flexible: we can augment your existing support arrangements, or provide a complete outsourced support function. Standard support is available during UK office hours and can be extended to include full 24x7 and/or onsite consultancy visits. Support is provided as an extra but minimal annual flat-fee service.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Bridgeway provides installation and configuration consultancy services, as well as end-to-end project management to ensure overall project success. Documentation services, whether from high-level design (HLD) to low-level design (LLD), as well as project management and end-user training material can also be provided, subject to scope and cost.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
Backups of the live servers can be extracted through the GUI. Files can be downloaded through the GUI or synchronised to the desktop (if policy allows).
End-of-contract process
Service is switched off and remaining server/service data destroyed.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Safari 9+
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Optional integration with existing Enterprise Mobility Management (EMM) solution. Automatic file synchronisation not usually provided for mobile devices, instead files are downloaded/stored on demand.
Service interface
Yes
Description of service interface
The platform has a fully documented REST API, with state of the art authentication and authorisation mechanisms. Their own plugins and automation agent is using this API.
Accessibility standards
WCAG 2.1 A
Accessibility testing
JAWS and kite works integration testing.
API
Yes
What users can and can't do using the API
API provides programmatic access to authentication, file management and user management. APIs are extensively documented and example code is provides for most common programming languages.
API documentation
Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
The Accellion solution can be customer branded and customised to meet customer's preferred file and folder structures, user rights assigned by groups, authentication integrated into existing directory services (e.g. AD, LDAP) and Single Sign-On (SSO) solutions. Bridgeway's consultancy and training services are highly customisable according to a jointly-agreed statement of work and corresponding success criteria.

Scaling

Independence of resources
Customers can choose between a public cloud, private cloud or on-premises deployment, according to risk appetite, server integration and service management preferences.
Services are covered by availability guarantees, which vary from option to option. Contact us for further details.

Analytics

Service usage metrics
Yes
Metrics types
Accellion can provide the most comprehensive usage and compliance reporting on the market, including a variety of system, administration and management reporting. A dedicated CISO dashboard is also available. Details available on request.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Accellion

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Other
Other data at rest protection approach
In VM and cloud deployments, files are stored on encrypted partitions using AES128-bit encryption. Additionally, each file can be encrypted with a unique key. The encryption key is not stored on the server, so the decryption keys for stored files cannot be obtained from the compromised server. Data is also encrypted in transit using TLS.
Accellion’s security mechanisms guard against malicious access; File names are dereferenced when stored so that files are inaccessible. Files may be stored encrypted for added security. Data can be accessed only through the file URL embedded in the email. Each URL call is authenticated individually.
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users can export the relevant files and folders via API, the native synchronisation app, or through a GUI-initiated export process.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
Original file source type (any file type)
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
Any file type

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • Other
Other protection between networks
All files on an Accellion system are encrypted in transit and at rest. Data in transit is encrypted with TDES (168 bits) or AES (128/256 bits) depending on the web browser. Accellion uses AES encryption for data at rest.
Accellion has optional anti-virus software, provided by F-Secure, to scan files on upload and download. When a file containing a virus is uploaded to Accellion it will be quarantined.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network
All files on an Accellion system are encrypted in transit and at rest. Data in transit is encrypted with TDES (168 bits) or AES (128/256 bits) depending on the web browser. Accellion uses AES encryption for data at rest.
Accellion has optional anti-virus software, provided by F-secure, to scan files on upload and download. When a file containing a virus is uploaded to Accellion it will be quarantined.

Availability and resilience

Guaranteed availability
Guaranteed availability 99.9% for both Accellion service and Bridgeway support (Bridge Support). Service part-refund for non-performance.
Approach to resilience
Accellion kiteworks enables complete deployment flexibility by allowing the web, application, and storage tiers to be separated and placed anywhere in the network, whether pure cloud, hosted private cloud and/or on-premises. This allows for increased security by being able to place just the web tier in the DMZ for example, while placing application and storage tiers behind the internal firewall.
Each tier of the solution can be scaled independently and in different locations and hosting arrangements. This enables deployments to grow seamlessly from small single server instances to extremely large multi-location systems.
Outage reporting
Email alerts and system dashboards.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Access restricted by Role Based Access Control (RBAC). Devices authenticate with centrally managed (and issued) digital certificates. Authentication can also be restricted by access control lists. Support tickets can only be opened by previously approved administrator contacts.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
EY CertifyPoint
ISO/IEC 27001 accreditation date
18/11/2010 and last re-issued 15/12/2017
What the ISO/IEC 27001 doesn’t cover
Scope covers datacentre services and facilities, and does not include components, configurations or on-premise deployments.
ISO 28000:2007 certification
No
CSA STAR certification
Yes
CSA STAR accreditation date
14/12/2016
CSA STAR certification level
Level 1: CSA STAR Self-Assessment
What the CSA STAR doesn’t cover
Hosting service (if not hosted in the Accellion cloud) and any Bridgeway consultancy, training and support services.
PCI certification
No
Other security certifications
Yes
Any other security certifications
SOC I & II

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • CSA CCM version 3.0
  • ISO/IEC 27001
Information security policies and processes
Contact details and reporting structure available on request.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Security and risk teams assess potential impact before implementation. Peer and security team code review, automated testing and audited code tracking allow for the services to be tracked throughout their lifetime.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Available on request
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Available on request
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Available on request

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
Yes
Connected networks
  • Public Services Network (PSN)
  • NHS Network (N3)
  • Scottish Wide Area Network (SWAN)

Pricing

Price
£45 per user per year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Time limited trials available. Full functionality, but available only for a limited trial time period and for a maximum agreed number of users.
Link to free trial
https://www.bridgeway.co.uk/accellion-trial

Service documents

Return to top ↑