UK Allied Associates


TrapJaw is Allied's cutting edge network security offering, providing a user-friendly network monitoring and forensics dashboard for network and security analysts.


  • Process from span port or PCAP input
  • Multi-user browser-based Dashboard
  • Cutting-edge visualisations
  • Configurable email alerts
  • BYOD (bring your own device) auditing
  • Selective network traffic recording
  • Honey token search over ingress & egress data
  • Stores up to 30 days of events from 1Gb connection


  • Be able to investigate security incidents in detail
  • Outsource security monitoring


£3900 per instance per year

  • Free trial available

Service documents


G-Cloud 11

Service ID

9 0 9 7 2 6 8 7 2 3 8 8 8 2 6


UK Allied Associates

Dan Metcalfe


Service scope

Service scope
Software add-on or extension No
Cloud deployment model Hybrid cloud
Service constraints If user chooses on-prem installation of software, we will only support recommended hardware configurations listed in our user guide.
System requirements
  • CentOS 7 Operating System environment (virtual or physical supported)
  • Docker 17.05.0-ce
  • 1 Gbps network connection
  • 500 GB of available storage
  • MongoDB

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Within 4 business hours, Mon-Fri 09:00-17:00
Weekend support available for additional fee
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels We offer:
- Basic support included with yearly maintenance. Includes access to the TrapJaw support portal to submit trouble tickets, review knowledge base, and check status of issues. Also included is business hours phone support.
- Premium support offers Basic support plus allows for our engineers to prioritise specific customer issues.
- Custom support packages to support specific customer requirements (such as after-hours support, major customisations, etc) can be offered for an additional fee.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Users perform self-install using our operator's manual provided at time of purchase. We are able to offer live online product training on request.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction All data is stored in MongoDB, and customers are free to export data themselves on contract end.
End-of-contract process The service will stop working at the end of the contract. Users will be warned at least 30 days before contract end to see if they want to extend the service. If user purchases a contract extension, we update our system to reflect the extended contract end date. If not, the users will be locked out of service at the contract end time.

Using the service

Using the service
Web browser interface No
Application to install Yes
Compatible operating systems
  • Linux or Unix
  • Other
Designed for use on mobile devices No
Service interface No
Customisation available Yes
Description of customisation Product can be customised to support additional protocol or token detection. Some customisations can be made by the customer, others must be made by our engineers at customer's request, and come at an additional fee.


Independence of resources Users install our software in their own environments, and are not impacted by demand by other users


Service usage metrics No


Supplier type Reseller providing extra features and support
Organisation whose services are being resold Allied Associates International (US parent company)

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
  • Other locations
User control over data storage and processing locations Yes
Datacentre security standards Supplier-defined controls
Penetration testing frequency Never
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process No
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Through interfaces provided by MongoDB, or by setting up their instance of MongoDB that they control (making data storage outside the scope of our system).
Data export formats Other
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability No SLAs for availability
Approach to resilience Container-based architecture allows for system replication
Outage reporting Not applicable to our service

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Username and password.
Access restriction testing frequency At least once a year
Management access authentication Dedicated link (for example VPN)

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information No audit information available
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Cyber Essentials.
Internally developed ISMS.
Information security policies and processes Cyber Essentials.
Internally developed ISMS.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Use of change processes leveraging Docker, Git, and continuous integration for service component tracking.

Performance of an in-house service penetration test conducted on each software update or configuration change.
Vulnerability management type Undisclosed
Vulnerability management approach In each 2-4 week development sprint, a task is added to check for security-related updates and/or known issues with all third party components used in TrapJaw. If an issue is found, then it is assessed for severity. Critical issues are prioritised for immediate update, and an immediate release is made. Moderate to low priority updates are planned for the next regular release, to happen at the end of the current sprint.
Protective monitoring type Undisclosed
Protective monitoring approach The TrapJaw Docker service is hosted on the company's network, and uses protective monitoring measures in accordance with ISO-27001, and are working toward certification.
Incident management type Undisclosed
Incident management approach TrapJaw employs company incident response processes in accordance with ISO-27001 standards, and are working toward certification.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £3900 per instance per year
Discount for educational organisations No
Free trial available Yes
Description of free trial 1 month trial in customer sandbox or live environment. Serves as demonstration of capability.

Service documents

Return to top ↑