Fujitsu Services Limited

Secure Managed Mobile

Fujitsu’s Secure Managed Mobile solution delivers a managed mobile service provides all the services that you use at your primary workplace to be extended to wherever you are located at classifications up to UK SECRET enabling security protection of voice, video and data services using smartphones/phablets, tablets and laptops.

Features

  • Seamlessly integrates with existing infrastructure, services
  • Extensible capability that can be deployed anywhere in the world
  • Cellular and WiFi network/communication service provision
  • Solution can be scaled and configured for high resilience
  • Anchored to any geographically fixed commercial, government or military network

Benefits

  • Security fully incorporated design ensuring the highest resilience
  • Integrated environment using open source interface standards
  • Enable collaboration and VoIP with all users
  • Use of mobile applications in secure manner
  • Provide high-readiness disaster relief deployment capability

Pricing

£483 per user per month

Service documents

G-Cloud 10

600156701275422

Fujitsu Services Limited

Government Frameworks Desk

07867828254

government.frameworks@uk.fujitsu.com

Service scope

Service scope
Service constraints This Service has been designed to take advantage of a 24 month service term. The entry criteria of this single tenant solution is based on a minimum of 20 users, and the service is charged at a committed rate of 20 users per month. Fujitsu is happy to discuss alternatives for smaller customers who still want a fully featured service.
Only those items explicitly included in the Service Definition are within the initial unit based pricing, all other additional items or extended services would be included as part of a tailored
System requirements
  • An accredited gold device image for the End User Devices
  • WAN and LAN provision at the Data Centre
  • Any IDAM, authentication and directory services access
  • Connectivity to existing customer network/infrastructure that already has EUDs
  • Any security enforcing products (e.g. AV, Malware, Clamp)
  • SIEM Toolset and system
  • Software delivery mechanisms
  • Help Desk / 1st Line support
  • Security of the devices and any required documentation
  • Security of the devices and any required documentation

User support

User support
Email or online ticketing support Yes, at extra cost
Support response times Service Levels would be defined and agreed upon during definition of service and agreement of
scope required, however, all service levels and availability metrics defined apply during the
standard working hours Monday to Friday 08:00Hrs – 17:00Hrs (excluding Public and Bank
Holidays).
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels The service includes a Service Delivery Manager for each account and service levels will be dependent upon the customer requirements and example of service levels are as follows;
Service Level Description | Measurement | Service Level
Incident Management – Severity Level 1 (Response) | Monthly |15 Minutes
Incident Management – Severity Level 2 (Response) | Monthly | 1 Hour
Incident Management – Severity Level 3 (Response) | Monthly | 5 Hours
Incident Management – Severity Level 4 (Response) | Monthly | 1
Incident Management – Severity Level 5 (Response) | Monthly | 2
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started User documentation and knowledge articles is provided. On site training can be provided as Day Rate charges.
Service documentation Yes
Documentation formats
  • PDF
  • Other
Other documentation formats
  • .xls
  • .json
End-of-contract data extraction This is not applicable to this service. No Client data is held.
End-of-contract process Based on customer requirements, determined by individual security policies, a decommissioning activity could be scoped and priced.

Using the service

Using the service
Web browser interface No
API No
Command line interface No

Scaling

Scaling
Scaling available No
Independence of resources After the initial start-up activities the service leverages the customer's existing IaaS/Private Cloud infrastructure.
Usage notifications No

Analytics

Analytics
Infrastructure or application metrics No

Resellers

Resellers
Supplier type Reseller providing extra features and support
Organisation whose services are being resold Horsebridge Network Systems Ltd

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency Less than once a year
Penetration testing approach In-house
Protecting data at rest Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
  • Hardware containing data is completely destroyed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Backup and recovery No

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Private network or public sector network
Data protection within supplier network Other
Other protection within supplier network Private network or public sector network

Availability and resilience

Availability and resilience
Guaranteed availability The availability of the secure network gateway will largely be dependant upon the host data centre service provision. The WAN/bearer of opportunity availability will be dependent upon the service provider. The actual levels of availability of the end to end service will depend on the customer requirements and the availability levels that the customer infrastructure can provide.
Approach to resilience Available upon request. The security polices prevents this information being made publically available.
Outage reporting Email and telephone contact as agreed with the customer

Identity and authentication

Identity and authentication
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels This information is available on request.
Access restriction testing frequency At least once a year
Management access authentication Other
Devices users manage the service through Dedicated device on a government network (for example PSN)

Audit information for users

Audit information for users
Access to user activity audit information Users receive audit information on a regular basis
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users receive audit information on a regular basis
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 Bureau Veritas
ISO/IEC 27001 accreditation date 05/12/2015
What the ISO/IEC 27001 doesn’t cover This is not applicable
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards
  • CSA CCM version 3.0
  • ISO/IEC 27001
Information security policies and processes Fujitsu deliver the Services using a secure ISO27001:2013 compliant support environment. This element of the service comprises - Definition, maintenance and implementation of the Fujitsu standard Information Security Management System (ISMS); Physical protection of the defined infrastructure within Fujitsu’s ISO27001:2013 accredited Data Centres; Undertaking appropriate audits and assessments to ensure ongoing compliance; Implementation and enforcement of Fujitsu’s security policies and supporting processes and procedures; Prevention of unauthorized physical or logical access to the Services; Identification of threats to relevant assets and implementation of proactive controls to diminish risk probability and/or impacts; Visibility and involvement in the maintenance of the Fujitsu standard ISMS at all levels of Fujitsu management.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach During transition Fujitsu will configure features and functionality of the instance according to your
agreed requirements. After transition is complete Fujitsu will change the configuration per change
request via an Install, Moves and Changes (IMAC) process.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Services are patched on a monthly basis with the last patch release from vendors.
Where information is available to Fujitsu, Fujitsu shall apply firmware or software updates that address known security vulnerabilities in the Customer network.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach Fujitsu deliver the Services using a secure ISO27001:2013 compliant support environment. This element of the service comprises - Definition, maintenance and implementation of the Fujitsu standard Information Security Management System (ISMS); Physical protection of the defined infrastructure within Fujitsu’s ISO27001:2013 accredited Data Centres; Undertaking appropriate audits and assessments to ensure ongoing compliance; Implementation and enforcement of security policies and supporting processes and procedures; Prevention of unauthorized physical or logical access to the Services; Identification of threats to relevant assets and implementation of proactive controls to diminish risk probability and/or impacts; Visibility and involvement in the maintenance of the Fujitsu standards
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach Fujitsu provides atechnical support resolver group for the service.

a) investigate and diagnose the Incident and determine the severity of the Incident
b) allocate a Unique Reference Number in the Incident Management Toolset
c) recover the Service back to steady state, implementing fixes where necessary
d) engage and manage any relevant third party hardware and software suppliers to support resolution as appropriate
e) provide tracking on the Incident to Closure
f) utilise and update the Incident Management Toolset with reasonably relevant information relating to an Incident
g) confirm resolution of the Incident with the Customer before Closure of the Incident"

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart No

Energy efficiency

Energy efficiency
Energy-efficient datacentres Yes

Pricing

Pricing
Price £483 per user per month
Discount for educational organisations No
Free trial available No

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑