Cloud Security Platform with advanced threat protection for devices with an IP address connecting to your network based on Cisco Technologies. If you can control the DNS settings of the device, you can transparently protect the device with Cisco Umbrella.
- Malware Protection
- Advanced Threat Protection
- Policy Control and Enforcement
- Web Content Filtering
- Visibility and protection everywhere
- Intelligence to uncover attacks earlier
- Open platform for integration
- Fast and reliable cloud infrastructure
- Protects Network
- Protects End Users
- Protects Mobile Users
- Protects Roaming Users
- Mitigate remediation costs and breach damage
- Reduce the time to detect and contain threats
- Increase visibility into internet activity across all locations and users
- Identify cloud apps used across the business
£25 per licence per year
- Education pricing available
- Free trial available
|Software add-on or extension||Yes, but can also be used as a standalone service|
|What software services is the service an extension to||Anti Virus, advanced malware protection, firewall IPS IDS and end point security|
|Cloud deployment model||Public cloud|
|Service constraints||Andriod phones currently cannot be protected via Cisco Umbrella.|
|Email or online ticketing support||Yes, at extra cost|
|Support response times||Questions are all acknowledged within 5 minutes and depending on the priority are responding to from 5 minutes when it is priority 1; multiple work groups affected or whole organisation affected or critical service and Preventing the business from operating normally to 8 hours with a priority 4 ticket; no immediate impact on users and immediate solution or workaround can be provided.|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||24 hours, 7 days a week|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
There are 4 main support levels which Nowcomm offer which can be stacked to create the best fit for your organisation. Nowcomm’s Service Desk operates 24*7.
1) Remote Service Desk - providing technical assistance, advice and guidance.
2) Break Fix Support - providing minor software patches and upgrades. Our engineering resources can either be remote or onsite.
3) Monitoring Service - providing proactive monitoring of devices with downtime alerts.
4) Managed Service - providing Moves, Adds, Changes and Deletes, monthly backups and storage, vulnerability scanning, patching and monthly reporting.
|Support available to third parties||Yes|
Onboarding and offboarding
Nowcomm onboards customers by gathering all key information required to bring the service live. All system information and supporting documentation is developed and distributed to the customer as part of the onboarding process. Detailed design documentation is derived from this initial documentation. The detailed design is agreed and signed off by both parties prior to implementation.
A full copy of the system documentation is provided following user acceptance testing.
|End-of-contract data extraction||Data is provided upon request by Nowcomm once the contract has ceased. The tenant will be deleted following sign off from the customer. Some customers may want to retain read only copies of some data, this can be arranged following conversations with our technical team.|
|End-of-contract process||All Software functionality is provided for the duration of the contract with Nowcomm. Once the contract has ceased, the organisation will be off - boarded, information securely deleted from the Nowcomm database, and tenant is removed at no extra cost. Bespoke off-boarding requirements can be purchased via "Nowcomm Specialist Cloud Consultancy Services".|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||No difference in service. Interface is scaled for the mobile environment|
|Accessibility standards||None or don’t know|
|Description of accessibility||N/A|
|What users can and can't do using the API||
The Enforcement API integrates security events with Umbrella, Network Devices API integrates hardware and Investigate API lets customers dig into the data to find more about security incidents.
Umbrella Enforcement API: Gives technology partners the ability to send security events from their platform within a mutual customer’s environment to the Umbrella cloud for enforcement.
Umbrella Investigate API: Provides API access to Umbrella threat intelligence and provides querying of our threat database to find emerging threats.
Umbrella API: Helps our technology partners integrate their network devices with the Umbrella dashboard.
Full details available on request or on Cisco Website
|API sandbox or test environment||No|
|Independence of resources||Nowcomm are reselling a global Cisco Platform so organisations are not at service risk. Cisco hold a validated design guide detailing configuration maximum's and minimums to enable customers to scale from small to large enterprise deployment. Nowcomm have a mature staff scaling strategy enabling a response to the demands of our clients from small to enterprise scales.|
|Service usage metrics||Yes|
|Metrics types||Summary or detailed monthly reports can be provided for an extra cost.|
|Reporting types||Reports on request|
|Supplier type||Reseller providing extra features and support|
|Organisation whose services are being resold||Cisco|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Managed by a third party|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||In-house|
|Protecting data at rest||
|Data sanitisation process||Yes|
|Data sanitisation type||
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||Data can be exported at request from the Nowcomm Support Team.|
|Data export formats||CSV|
|Data import formats||CSV|
|Data protection between buyer and supplier networks||
|Data protection within supplier network||
Availability and resilience
|Guaranteed availability||99.999% made possible through the global network of DNS providers based on Open DNS|
|Approach to resilience||Available on request|
|Outage reporting||Email alerts|
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||All management interfaces are made available via the management VLAN only.|
|Access restriction testing frequency||At least once a year|
|Management access authentication||
Audit information for users
|Access to user activity audit information||No audit information available|
|Access to supplier activity audit information||You control when users can access audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||Nowcomm is a Cyber Essentials Certified organisation and follows the processes set out within it. Nowcomm are actively working towards Cyber Essentials Plus and 27001 and operates within the guidelines set out.|
|Information security policies and processes||Nowcomm follow the processes from Cyber Essentials as well as key processes and procedures from 27001.|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||All changes and configuration management follow ITIL V3 best practice.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
All external facing services are subject to monthly vulnerability scans. Patching takes place monthly with emergency patching taking place within 1 week of the vulnerability detection. In extreme circumstances and to protect the security of the organisation and customer, Nowcomm will patch on the same day.
Vulnerability information is obtained from Cisco's TALOS platform and Cisco TAC.
We use independent feeds using QUALSYS scanning engine, correlating all known CVE's, enabling us to establish impact for all managed assets scanned by the platform.
Further support can be purchased under the "Nowcomm Monitor, Manage, Support and Optimise" GCloud service.
|Protective monitoring type||Undisclosed|
|Protective monitoring approach||All external facing services are subject to monthly vulnerability scans. Patching takes place monthly with emergency patching being performed within 1 week of the vulnerability detection. In extreme circumstances and to protect the security of the organisation and customer, Nowcomm may patch on the same day. Vulnerability information is obtained from Cisco's TALOS platform and Cisco TAC. We use independent feeds using QUALSYS scanning engine, correlating all known CVE's, enabling us to establish impact for all managed assets scanned by the platform. Further support can be purchased under the "Nowcomm Monitor, Manage, Support and Optimise" GCloud service.|
|Incident management type||Supplier-defined controls|
|Incident management approach||Incidents are logged with a unique case reference number and tracked from triage through to resolution via our service desk platform. We have pre-approved processes / changes for certain tasks, however day to day operation is bespoke per customer and may change depending on the organisation’s needs. Users can report incidents via email, web or telephone. Reports are provided via email upon request. Major incident reports are provided within 48 hours of the incident resolution. Updates available upon request.|
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||No|
|Price||£25 per licence per year|
|Discount for educational organisations||Yes|
|Free trial available||Yes|
|Description of free trial||30 day free trail period of full functionality with limitied amount of licences.|
|Pricing document||View uploaded document|
|Skills Framework for the Information Age rate card||View uploaded document|
|Service definition document||View uploaded document|
|Terms and conditions document||View uploaded document|