SD-WAN provides a secure hybrid overlay technology virtualizing the enterprise WAN with centralized management and control.


  • Provides enterprise class Software-Defined Networking (SD-WAN)
  • Security is hardened and secure, and built for the Cloud.
  • Builds large-scale networks,integration routing, security and orchestration
  • Centrally managed routing, policy, security, segmentation
  • Managed authentication of all devices on the overlay network
  • Centralized configuration and management
  • Provides real- time dashboard on the health of the network


  • Enables enterprises to reduce operating costs in the WAN 50%
  • Increases bandwidth by 10X
  • Improves cloud performance by 5X
  • Provides more control / visibility over the network
  • Faster provisioning of services
  • Significantly improves security and compliance
  • Transport-agnostic (MPLS, broadband, 4G/LTE, VSat)
  • Cloud- optimised


£3000 per licence

  • Free trial available

Service documents

G-Cloud 10



Steve Walker

0345 880 0808

Service scope

Service scope
Software add-on or extension Yes
What software services is the service an extension to SEN Overlay
vManage Platforms
Zero touch provisioning
Encryption - AES-256
Topology: Hub/nb.Spoke
NAT; split tunnel
Policy support : Local ACL, Data policy
2 VPNs; 1 transport, 1 service sideVPN with L2/bridging
QoS (classification, policing, remarking, scheduling)
2 VPNs; 1 transport, 1 service sideVPN with L2/L3
App aware routing 95 tuple
Cloud deployment model Private cloud
Service constraints None identified
System requirements
  • Software Licences - Plus, Professional, Enterprise
  • RAM 4Gb for 1-1000 sites and 2vCPUs
  • RAM 8Gb 1001 sites or more and 4vCPUs
  • Bandwidth 1-50 sites 1Mbps
  • Bandwidth 51-250 sites 2Mbps
  • Bandwidth 251-1000 sites 5Mbps
  • Bandwidth 1001 sites or more 10Mbps

User support

User support
Email or online ticketing support Email or online ticketing
Support response times First response: 4 hrs 0900 – 1700 hrs (GMT) Mon to Fri excluding public holidays.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Onsite support
Support levels Technical Support is arranged as Levels, based on severity; commencing at Level 1 with escalation to Level 3 to ensure effective resolution. Technical Change requests can also be submitted using Ciptex Support systems. Ticket Submission: Users raise a support Ticket, which is assigned a unique number for tracking through to resolution. Users can email and a tracking ID will be assigned; Users can call Ciptex Technical Support on 0845 8800 808 option 1. All associated communications will require Ticket ID to ensure timely resolution. Only authorized Users may raise support tickets/requests. Hours of Operation: Technical Support is available Standard Hours, included within the Service Package pricing quoted in the pricing document. Additional, Extended Hours, and 24x7 Support is available. A Cloud Specialist Technical Account Manager is provided.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Professional services and lots of on line support and user documentation that is easy to understand and interpolate.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Off boarding is designed to be as quick and seamless as possible. Ciptex can provide data extraction following contract termination.
End-of-contract process Clients that wish to terminate their service, or when the contract terminates are obliged to provide 1-month advance notice of cancellation unless a future cancellation date is pre-agreed. Software licences are purchased for 1/3/5 years duration.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • MacOS
  • Windows
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The vEdge 100 4G/LTE can work on cellular networks with a SIM.
There are a total of 5 different frequencies used in the UK by the mobile networks to deliver their 2G, 3G and 4G mobile services.
800MHz (Band 20)
900MHz (Band 8)
1800MHz (Band 3)
2100MHz (Band 1)
2600MHz (Band 7)
Accessibility standards None or don’t know
Description of accessibility Check
Accessibility testing Check
What users can and can't do using the API Supports a range of API's subject to IA conditions
API documentation Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • PDF
API sandbox or test environment No
Customisation available No


Independence of resources Ciptex provide a guaranteed margin of capacity beyond a maximum number of users on the platform, which is proactively monitored with system alerts. Our cloud platform automatically scales to enable resource sufficiency, with proactive monitoring and system alerts for the external resources.


Service usage metrics Yes
Metrics types The Support Dashboard provides an overview of all support resources. You can navigate the site with the navigation links below the banner or by selecting the pane titles on the dashboard. The panes also contain shortcut links to content in each section.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Reseller providing extra support
Organisation whose services are being resold Viptela

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least every 6 months
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Users can export data from the dashboard in multiple formats.
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability SD-WAN is operated in a virtualised environment running on high availability platforms to provide no single point of failure. The network is meshed and transport agnostic so through multiple transport connections interruptions in service are negated. Access is provided by multiple Tier 1 carriers including Gamma and BT for UK traffic. An MPLS core with redundant links connects all locations and providers to deliver a seamless, resilient solution. This availability of up to 100% can be guaranteed.
Approach to resilience SD-WAN is operated in a virtualised environment running on high availability platforms to provide no single point of failure. The network is meshed and transport agnostic so through multiple transport connections interruptions in service are negated. Access is provided by multiple Tier 1 carriers including Gamma and BT for UK traffic. An MPLS core with redundant links connects all locations and providers to deliver a seamless, resilient solution.
Outage reporting Notification of outages, and scheduled maintenance, are reported primarily by service email alerts that are delivered to nominated account representatives (administrators). Depending upon the nature of the outage or scheduled maintenance, notifications are also placed in the online portal.
Customers have a dashboard to view real time network performance.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels Access is restricted in management interfaces and support channels with users needing password and user name registration.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for Between 6 months and 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for Between 6 months and 12 months
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach We are engaged in a Cyber Essentials accreditation process leading to ISO 27001.
Information security policies and processes Ciptex has in place an Information Security Management System which includes policies for Information Security Management and IT Security. We currently operate to the Cyber Essentials standards and are in the process of achieving ISO27001 with the help of 4 Secure an external security consultancy. All staff are actively engaged in IT Security . The Operations Team have day to day responsibility for implementing policy, reporting through the Operations Manager to the Managing Director. Data Security is a fixed agenda item at management and board meetings. Every new employee is inducted in our policies and procedures. Our policies and procedures are subject to constant review and all updates and suggested improvements are discussed at quarterly all employee meetings.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Agile development processes proactive patching all components kept up to date with firmware releases engineers subscribe to the latest security bulletins and are active in the software security community all patching and config is done outside standard UK business hours
Vulnerability management type Supplier-defined controls
Vulnerability management approach Engineers subscribe to security bulletins active in the security community close relationship with all suppliers Full assessment of threat based on level of access from public internet rapid time to patch and emergency maintenance.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Ciptex have a log scanning management processes in place that quickly identifies anomolies. Together with proactive network monitoring via service sensors that deliver key service statistics. Part of this includes access-control login monitoring. Our incident response time is 15 minutes.
Incident management type Supplier-defined controls
Incident management approach Ciptex supplier defined process includes: Level 3 engineers alerted Proactive customer notifications, with 30-minute email updates to customers. Depending on the nature of the incident and its threat assessment, notification will be available in the portal. Tickets replied to in standard SLA times. Our escalation process includes director level contacts including suppliers.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks Yes
Connected networks
  • Public Services Network (PSN)
  • Joint Academic Network (JANET)


Price £3000 per licence
Discount for educational organisations No
Free trial available Yes
Description of free trial Proof Of Concept


Pricing document View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑