Roke Manor Research

UK Government Obligations – Investigatory Powers Act (IPA) compliance

Roke provides impact assessments, solution design, assurance and in-service support for communication and compliance services. We perform research and advice on the threats and opportunities to compliance services. We provide concept demonstrators for novel and innovative solutions for collecting, storing, analysing and exploiting compliance data for cost and operational advantage.

Features

  • Compliance impact assessments for new services and products
  • Development of compliance concept demonstrators
  • Delivery of compliance requirements for communications content (lawful interception)
  • Delivery of compliance requirements for metadata (CDRs, ICRs, subscriber information)
  • Data engineering and analytics for compliance data
  • Rapid analytic development and data feed integration
  • Experienced in assuring others’ systems, conformance and interoperability testing
  • Range of support models and incident management services
  • Provision of SC and DV cleared professionals

Benefits

  • Meeting UK government IPA/security requirements
  • Become proactive in anticipating policy, legislation and guidance changes
  • Enabling migration to cloud services and evolving legacy systems
  • Ensuring compliance investments deliver value for money
  • Expertise in compliance solutions minimising time and schedule risk
  • Established government compliance relationships
  • Ability to work efficiently on the authority's premises and IT
  • Ability to work fully remote up to and including Official-Sensitive

Pricing

£600 to £2,070 a person a day

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sue.gannon@roke.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

6 6 0 4 2 8 4 1 1 2 6 7 2 0 2

Contact

Roke Manor Research Sue Gannon
Telephone: (0)1794 833158
Email: sue.gannon@roke.co.uk

Planning

Planning service
Yes
How the planning service works
As part of planning and designing a new service which uses Information Technology, Cyber Security must be considered. Roke’s Secure Architecture and Risk Assessment service provides support to service planning teams through the application of a well-defined Cyber Risk Assessment process:

(1). Understand User Needs – what does the system need to do?

(2). Asset Identification – what information or service needs to be protected?

(3). Threat Identification – what is the system likely to be exposed to?

(4). Vulnerabilities – in the current design, where is the solution vulnerable?

(5). Risk Identification – based on 1 to 5, what are the current risks when operating the system?

(6). Risk Control – the development of mitigations for the top risks.

(7). Risk Management – the ongoing management of Cyber risk.

Roke are able to use this Risk Assessment process, either to assist with the definition of a secure architecture or to review the architectures produced by client design teams. Performing this activity early and before the service is implemented enables savings in cost, time to market and reputation through the reduction in re-work in latter phases of the service development.
Planning service works with specific services
No

Training

Training service provided
No

Setup and migration

Setup or migration service available
Yes
How the setup or migration service works
When planning to migrate to the Cloud, or between Cloud services, it's vital that Cyber Security is considered, including changes to the threat landscape since the service was originally implemented. Roke’s Secure Architecture and Risk Assessment service provides support to teams who are planning the migration of services through the application of Cyber Risk Assessment of the new service:

(1). Understand User Needs – what does the system need to do?
(2). Asset Identification – what information or service needs to be protected?
(3). Threat Identification – what is the system likely to be exposed to?
(4). Vulnerabilities – in the current design, where is the solution vulnerable?
(5). Risk Identification – based on 1 to 5, what are the current risks when operating the system?
(6). Risk Control – the development of mitigations for the top risks.
(7). Risk Management – the ongoing management of Cyber risk.

Roke are able to use this Risk Assessment process to review the architectures and service migration plans produced by design teams. Performing this activity early and before the service is migrated enables savings in cost, time to market and reputation through the reduction in re-work in latter phases of the service development.
Setup or migration service is for specific cloud services
No

Quality assurance and performance testing

Quality assurance and performance testing service
Yes
How the quality assurance and performance testing works
Roke has a mature, comprehensive Quality Management System and holds 3rd party certification to ISO 9001:2015 (BSI registration certificate number Q05609).

The scope of this certification is for technical consultancy; research and development; design, development and supply of hardware and software products, and technical service and support in the fields of sensors, electronics and communications.

Security testing

Security services
Yes
Security services type
  • Security strategy
  • Security risk management
  • Security design
  • Cyber security consultancy
  • Other
Other security services
To be discussed individually with each Customer.

Ongoing support

Ongoing support service
No

Service scope

Service constraints
No

User support

Email or online ticketing support
Email or online ticketing
Support response times
1 business working day, during offices hours.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Support levels
To be discussed as part of statement of work.

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Pricing

Price
£600 to £2,070 a person a day
Discount for educational organisations
Yes

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sue.gannon@roke.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.