Thales UK Ltd

Thales T-Sure Vigilance SOC Managed Cyber Security Operations Centre Protective Monitoring

Thales T-sure Vigilance SOC houses Thales UK industry expert analysts alongside IBMs world-leading QRadar SIEM platform. The SOC as a whole is becoming the cornerstone of the overall cybersecurity architecture, ensuring the cybersecurity consistency of the organization, across the business and the infrastructure, encompassing on-premise IT and cloud.


  • Thales Global threat intelligence and IBM QRadar SIEM technology
  • Anticipates the threats and risks for the company
  • Detects the security incidents as early as possible
  • Reacts to the incidents with relevant contextual analysis and resolution
  • Measures security operations and their security levels via specific indicators
  • Multi sector - Commercial, Government, PSN and CNI organisations
  • Protective monitoring compliance requirements; NIS Directive, DCPP, GDPR, GPG 13
  • Flexibility to provide bespoke services to meet customer requirements
  • ISO27001:2013 and ISO20000 Certified
  • SC, NPPV3 cleared staff


  • Trusted provider of cyber security services to UK Government
  • “cloudready” approach, supporting multiple cloud providers
  • Varied deployments; cloud, hybrid or on premise networks
  • Enabling cost savings by adoption of a managed security service
  • Tailored approach to provide protective monitoring to fit your business
  • Ensure consistency between identified business risks and the security policy
  • Cyber security analysts experts in securing Operational Technology
  • Assistance with implementation and transition to Thales SOC Services
  • Highest levels of security and regulatory compliance for CNI
  • We are at the forefront of secure network development


£908 per person per day

Service documents

G-Cloud 10


Thales UK Ltd

Margaret Shay


Service scope

Service scope
Service constraints None
System requirements Requirement to return event logs to the Thales UK CSOC

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Response is based on SLAs and service requirements agreed with the client.
Thales can respond and notify clients to security incidents within 30 minutes of detection if required.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels Thales provide tailored support levels for clients or provide the following standard GPG 13 aligned options:

• Aware – Not always manned. Alerts for critical conditions
• Deter – Manned during core business hours. (8am – 6pm)
• Detect & Resist – Manned 24x7

Service Delivery Managers are assigned to each client.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started The Thales CSOC onboarding process is followed, which will help clients migrate to the Thales MSSP.
Thales provides consultant/s to scope the protective monitoring requirement with the client. Using Thales models for sizing and cost models, the consultant will tailor a proposal to meet the clients needs. The Thales CSOC onboarding process is followed, which will help clients migrate to the Thales MSSP.
Thales provides consultant/s to scope the protective monitoring requirement with the client. Using Thales models for sizing and cost models, the consultant will tailor a proposal to meet the clients needs. This process includes:
• Defining client security objectives
• Identify applicable threats
• Defining assets, network architecture and monitoring zones
• Define SLA and compliance requirements
• Define the services required to meet client needs (e.g vulnerability assessment, forensic)
• Study of traffic flows
• Define monitored behaviours
• Define security alerts and reporting requirements
Thales provides guidance and assistance on site to help client’s install and configure the event collectors and onboard devices to the Thales CSOC service. The Thales onboarding process will then verify that client assets are logging correctly.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Thales will provide an extract of the clients data in an agreed format at the end of the contract. Client data will be securely destroyed as agreed with the client.
End-of-contract process At the end of the contract the data is provided to the customer in an agreed format (CSV or xml) and then deleted from Thales systems.
For an additional fee, Thales can return the data in alternative formats or retain the data for an extended period if required.

Using the service

Using the service
Web browser interface No
Command line interface No


Scaling available Yes
Scaling type Automatic
Independence of resources Thales Infrastructure is monitored 24x7 for availability and capacity, in line with ISO27001 and ISO20000 certifications.
Usage notifications Yes
Usage reporting Email


Infrastructure or application metrics Yes
Metrics types Other
Other metrics
  • Events Per Second – peak
  • Events Per Second – average
  • Primary Storage
  • Archive Storage
  • DR Storage
  • Incidents raised
Reporting types
  • Regular reports
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Hardware containing data is completely destroyed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Backup and recovery Yes
What’s backed up
  • SOC Environment (SIEM components)
  • Customer configuration, SIEM rules, SIEM reports
  • Client event log data within the data retention period
  • Client reports and incident tickets
Backup controls Backups are provided as part of the Thales MSSP (Managed Security Service Provider).
Datacentre setup Multiple datacentres with disaster recovery
Scheduling backups Supplier controls the whole backup schedule
Backup recovery Users contact the support team

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Clients can choose either a non-resilient or resilient service.
The service can be delivered as a geo-graphically diverse high availability service designed to exceed 99.95% availability.
Approach to resilience Available on request
Outage reporting Thales contacts clients to inform them should service outages occur. Service outages would be reported in the Service Delivery Management Reports.

Identity and authentication

Identity and authentication
User authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Access to management interfaces is restricted to appropriately security cleared and authorised Thales staff members. Network segmentation is in place to secure management interfaces, located within secure processing facilities. These configurations are subject to CHECK ITHC. Management interfaces are not exposed to the internet. All event logs are sent to the Thales CSOC for protective monitoring and retained for 12 months. Thales systems are also subject to internal and external audit.
Support – No 3rd parties are provided with remote access to the Thales CSOC network. Only trusted suppliers are used, with contractual and NDA clauses used to protect information.
Access restriction testing frequency At least once a year
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through Dedicated device on a segregated network (providers own provision)

Audit information for users

Audit information for users
Access to user activity audit information Users receive audit information on a regular basis
How long user audit data is stored for User-defined
Access to supplier activity audit information Users receive audit information on a regular basis
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 KPMG
ISO/IEC 27001 accreditation date 25/04/2018
What the ISO/IEC 27001 doesn’t cover The Thales UK Information Security Management System (ISMS) incorporates the people, processes and technologies supporting the portfolio of network services.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications
  • PSNSP certifications up to OFFICIAL SENSITIVE
  • Police Enhanced Regime
  • Accreditation
  • Cyber Essentials Plus

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards ISO 20000,
PSN services at OFFICIAL,
CAS(T) – CESG Assured Services (Telecoms),
Police Enhanced Regime,
Cyber Essentials Plus,
NCSC CCSC (Certified Cyber Security Consultancy),
NCSC CCP (Certified Cyber Professional),
Sector specific accreditation
Information security policies and processes The Thales CSOC is certified to a number of different standards, including ISO 27001:2013. This is based on an ISMS (Information Security Management System) which consists of Thales UK policy, process and procedures in addition to ISO 27001 clauses. The ISMS is audited by independent 3rd parties annually.
An annual IA (Information Assurance) schedule ensures that policies are implemented, assessed and effective. This includes internal audits, external audits, Security Working Groups, Security Awareness campaigns.
The reporting structure is defined in the Thales IA Management Plan, along with incident management processes and RACI matrix.
The Thales CSOC assurance is also achieved through additional certifications and accreditations, which include audit reports being submitted to the Cabinet Office, NCSC and the National Police Information Risk Management Team (NPIRMT).
The Thales CSOC also benefits from the review of Thales staff who hold CCP (Certified Cyber Security Consultancy) certifications and NCSC CCP (Certified Cyber Professional) status.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach The Thales CSOC is part of a business which has achieved ISO 27001:2013 and ISO 20000 certification. It adopts an ITIL aligned Change Management Process.
All Requests for Change (RFC)’s are presented to a Thales’ Change Board (CAB). The CAB is attended by Business, Technical, Service Delivery and Information Assurance stakeholders along with the owner of the RFC’s. On receipt of a request to make changes to the service; an RFC will be generated and submitted to CAB prior to delivery. Changes will be notified to customer CABs where there is a change to the device(s) which may impact service.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach As part of the Thales compliance requirements, Thales has a requirement to be able to adequately respond to Low to Critical level patches and vulnerabilities.
The Thales CSOC utilise an IBM vulnerability management module to scan and prioritise vulnerabilities. The CSOC also utilise various threat intelligence and vulnerability feeds to stay informed of the latest vulnerabilities. The CSOC then advise on recommended activity and mitigations.
Thales Change Management is then used to apply patches in a managed and timely manner – to prevent disruption to customer services.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach The Thales CSOC provides protective monitoring and threat intelligence to identify potential compromises, cyber attacks and non compliance.
The CSOC follow processes and escalation paths in response to potential compromises and security incidents. A severity matrix is used to assign a priority to each incident. The priority determines the response for the incident. Agreed stakeholders and contacts are contacted depending on the severity.
Incidents are responded to within SLA – in accordance with the assigned priority.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach Thales has a pre-defined processes for common security events. These are recorded in playbooks. A central mailbox is available to report suspicious email and spam. Thales then provides central contacts for staff to raise concerns and security incidents. Thales staff receive security inductions and ongoing security awareness training and communications, to keep them informed of policy and threats.
Incident reports are produced by appropriately trained Thales staff. Tier 1 has the technical knowledge to triage all incidents. Incidents can then be progressed via Tier 2 or 3 depending on the skills required to resolve the incident.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart Yes
Who implements virtualisation Supplier
Virtualisation technologies used VMware
How shared infrastructure is kept separate Thales allocates separate Event Processors per customer. This segregates client data and is beneficial for reporting, forensics and when clients data is to be deleted or returned.

Energy efficiency

Energy efficiency
Energy-efficient datacentres No


Price £908 per person per day
Discount for educational organisations No
Free trial available No


Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑