Harmonic Limited

Information Assurance and Cyber Security

Retro-fitting security carries significantly more cost than when it is designed-in. Harmonic provides a structured information assurance advisory service to assess vulnerabilities and risks at the preliminary stages of your project and assist in digital solutions that design-out exploitability and reduce the attack surface of your cloud implementation.

Features

  • Technical architecture and design assessment and review
  • Capturing security requirements at every level
  • Scenario based cloud-oriented cyber risk assessment
  • Holistic information assurance across people, process and technology
  • Cloud deployment roadmapping and transition planning
  • System-based assessment of failure modes and vulnerabilities
  • Experienced and security cleared professionals for on and offsite working
  • Cross-domain experience in multiple sectors.

Benefits

  • Early intervention to design-out flaws and reduce future cost
  • Delivery of a secure service without impacting digital user experience
  • Ensures that cyber protection is proportionate to the deployed environment
  • Maintaining compliance and avoidance of data breach fines
  • Independence from vendors to provide impartial advice
  • Flexible and agile approach to information assurance.

Pricing

£790 to £1,650 a person a day

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Business.Development@harmonic.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

6 2 0 2 8 2 0 4 4 0 3 2 6 7 8

Contact

Harmonic Limited Charlotte Mumford
Telephone: 07398 188608
Email: Business.Development@harmonic.co.uk

Planning

Planning service
Yes
How the planning service works
Harmonic will assist in the planning of your cloud services through a structured assessment process that identifies and categorises the cyber risks to your cloud implementation and supports the development of a mitigation strategy.

(1)Understanding the overall scope and functionality of the proposed system and the user needs to be addressed.

(2) Understanding and capturing the information assets to be protected in the proposed deployment.

(3) Understanding the potential threats to the deployment based on the context of use and expected environment.

(4) Assessing the vulnerabilities of the current design and identifying where additional vulnerabilities may be introduced by the deployment roadmap.

(5) Analysis of cyber risks and proposals for mitigation and ongoing management.

Our approach takes a holistic view of the implementation. Rather than assessing each component we look at overall interactions between people, process and technology to elicit weaknesses and vulnerabilities that can manifest even when every individual component is functioning as designed.
Planning service works with specific services
No

Training

Training service provided
Yes
How the training service works
Harmonic do not consider the implementation of a new service as being complete until our client's team are capable of managing it for themselves. Whilst not a formal training provider Harmonic integrates the upskilling and handover of management responsibility as part of its delivery programme.
Training is tied to specific services
No

Setup and migration

Setup or migration service available
Yes
How the setup or migration service works
Harmonic can provide advisory services for your cloud migration activities. We can support migration strategy and planning to ensure integrity of your data and to maintain compliance with relevant data protection legislation. We can assist in specifying the requirements and architecture for your planned cloud environment, develop documentation and support migration activities. To ensure continued protection we can also advise on BCDR strategies, forensic readiness, incident management and vulnerability detection and mitigation.
Setup or migration service is for specific cloud services
No

Quality assurance and performance testing

Quality assurance and performance testing service
No

Security testing

Security services
Yes
Security services type
  • Security strategy
  • Security risk management
  • Security design
  • Cyber security consultancy

Ongoing support

Ongoing support service
No

Service scope

Service constraints
Service will depend on availability of relevant staff and as such a lead time may be necessary or service may commence on a part-time basis until full time resources can be deployed.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Email queries will be responded to within 24 hours.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Support levels
When delivering our service we deploy a dedicated technical account lead who serves as the primary point of contact for our clients in issue resolution. Should escalation be required we have client based account managers who serve as that point of escalation and who will develop the close partnering relationship with the client to ensure a smooth working environment.

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Pricing

Price
£790 to £1,650 a person a day
Discount for educational organisations
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Business.Development@harmonic.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.