Information Assurance and Cyber Security
Retro-fitting security carries significantly more cost than when it is designed-in. Harmonic provides a structured information assurance advisory service to assess vulnerabilities and risks at the preliminary stages of your project and assist in digital solutions that design-out exploitability and reduce the attack surface of your cloud implementation.
Features
- Technical architecture and design assessment and review
- Capturing security requirements at every level
- Scenario based cloud-oriented cyber risk assessment
- Holistic information assurance across people, process and technology
- Cloud deployment roadmapping and transition planning
- System-based assessment of failure modes and vulnerabilities
- Experienced and security cleared professionals for on and offsite working
- Cross-domain experience in multiple sectors.
Benefits
- Early intervention to design-out flaws and reduce future cost
- Delivery of a secure service without impacting digital user experience
- Ensures that cyber protection is proportionate to the deployed environment
- Maintaining compliance and avoidance of data breach fines
- Independence from vendors to provide impartial advice
- Flexible and agile approach to information assurance.
Pricing
£790 to £1,650 a person a day
Service documents
Request an accessible format
Framework
G-Cloud 12
Service ID
6 2 0 2 8 2 0 4 4 0 3 2 6 7 8
Contact
Harmonic Limited
Gareth Bicknell
Telephone: 07976 683 767
Email: Business.Development@harmonic.co.uk
Planning
- Planning service
- Yes
- How the planning service works
-
Harmonic will assist in the planning of your cloud services through a structured assessment process that identifies and categorises the cyber risks to your cloud implementation and supports the development of a mitigation strategy.
(1)Understanding the overall scope and functionality of the proposed system and the user needs to be addressed.
(2) Understanding and capturing the information assets to be protected in the proposed deployment.
(3) Understanding the potential threats to the deployment based on the context of use and expected environment.
(4) Assessing the vulnerabilities of the current design and identifying where additional vulnerabilities may be introduced by the deployment roadmap.
(5) Analysis of cyber risks and proposals for mitigation and ongoing management.
Our approach takes a holistic view of the implementation. Rather than assessing each component we look at overall interactions between people, process and technology to elicit weaknesses and vulnerabilities that can manifest even when every individual component is functioning as designed. - Planning service works with specific services
- No
Training
- Training service provided
- Yes
- How the training service works
- Harmonic do not consider the implementation of a new service as being complete until our client's team are capable of managing it for themselves. Whilst not a formal training provider Harmonic integrates the upskilling and handover of management responsibility as part of its delivery programme.
- Training is tied to specific services
- No
Setup and migration
- Setup or migration service available
- Yes
- How the setup or migration service works
- Harmonic can provide advisory services for your cloud migration activities. We can support migration strategy and planning to ensure integrity of your data and to maintain compliance with relevant data protection legislation. We can assist in specifying the requirements and architecture for your planned cloud environment, develop documentation and support migration activities. To ensure continued protection we can also advise on BCDR strategies, forensic readiness, incident management and vulnerability detection and mitigation.
- Setup or migration service is for specific cloud services
- No
Quality assurance and performance testing
- Quality assurance and performance testing service
- No
Security testing
- Security services
- Yes
- Security services type
-
- Security strategy
- Security risk management
- Security design
- Cyber security consultancy
Ongoing support
- Ongoing support service
- No
Service scope
- Service constraints
- Service will depend on availability of relevant staff and as such a lead time may be necessary or service may commence on a part-time basis until full time resources can be deployed.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Email queries will be responded to within 24 hours.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Support levels
- When delivering our service we deploy a dedicated technical account lead who serves as the primary point of contact for our clients in issue resolution. Should escalation be required we have client based account managers who serve as that point of escalation and who will develop the close partnering relationship with the client to ensure a smooth working environment.
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2012
- Government security clearance
- Up to Developed Vetting (DV)
Pricing
- Price
- £790 to £1,650 a person a day
- Discount for educational organisations
- No