Network & Internet Security - SSL Certificate Inventory Management System
Discover and manage every SSL certificate in your network inventory. Easily identify, what, where, when and centralise all expiry dates. Never miss a single certificate renewal with automated expiry alerts guaranteeing continuity of business processes. Easily identify, manage weak or non-compliant certificates and services across your public and private networks
Features
- Comprehensive discovery of SSL certificates across all networks public &private
- Non-intrusive – No software needs to be installed
- Web-based management interface
- Vendor neutral – can discover commercial or self-signed certificates
- Multi-protocol – not just HTTP/S but most common TLS-enabled services
- Scalable – uses optional discovery agents to cover entire topologies
- Policy driven, to easily identify rogue or weak certificates
- Full reporting, export and email alerting facilities
- Offline, stand-alone inventory tool for disconnected networks
- Local Certificate Authority Integration
Benefits
- Inventory Management, What Certificates, Where, How Many, Expiry, What Used?
- Never Miss a Certificate Renewal, Auto Alerts Guarantee Business/Service Continuity
- Reduce downtime, find and replace expiring certificates before they expire
- Locate and replace weak/non-compliant certificates before they present security risk
- Produce MI on SSL certificates across entire ICT estate
- Identify certificates installed against organisational policies
- Identify networks services using outdated, invalid or missing certificates
- Consolidate certificates across devices, reducing cost and maintenance
- Easily identify services and certificates in use prior to redeployment
- Cloud Based, access securely from any location/site, enable DR
Pricing
£199 to £2,999 a unit a month
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 10
Service ID
9 6 0 8 9 0 1 7 3 6 7 9 2 9 6
Contact
Genius Software Solutions Ltd
Barry Crawford
Telephone: 07584 684 781
Email: bcrawford@geniusssl.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- Not Applicable
- System requirements
- Web browser access
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Email, online and telephone support are available aligned to match every client contract operating hours, with out of hours service levels also agreed as part of any contract agreement.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.0 A
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
- Outside of access to helpdesk, support and account management teams matching client contract core hours, every contract is assigned a dedicated technical (cloud support) as well as account manager for contract contact consistency. Comprehensive support is provided via our fully inclusive licence and maintenance model, onsite if ever required.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Every installation can be supported by onsite training at initial roll out, as well as online training and user documentation given the cloud based delivery model and access. Onsite training can also be provided post go-live, if required.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- This is generally managed via a managed SFTP data transfer process where we pass back any data held on our systems before purging upon contract termination (unless any follow on retention periods have been specified in teh contract requirements), but this specific process can be tailored to individual contract requirements also.
- End-of-contract process
- Upon termination of service, all data would be returned at no additional cost. Cost would only be incurred if it involved the purchase of hardware outside of a standard secure SFTP repatriation, as described earlier.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 7
- Internet Explorer 8
- Internet Explorer 9
- Internet Explorer 10
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari 9+
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The application could be accessed from mobile devices in the same way as the desktop site.
- Accessibility standards
- WCAG 2.0 A
- Accessibility testing
- None to date, but we are happy to do that as part of any contract requirements.
- API
- No
- Customisation available
- Yes
- Description of customisation
-
Each installation can be delivered as an off the shelf package or tailored to the individual client and process it is to be used by.
Screen layouts, system actions, task history, management information & reports, are all customisable. Customisation can be either driven by the end user or the Genius Support & Development teams.
Scaling
- Independence of resources
- Our cloud deployment model and data centre based delivery model ensures no capacity scaling constraints, either on lead times or physical volumes. We have access to unlimited bandwith, hardware, utilities, telecoms providers and parallel redundancy measures ensures unlimited scaling and capacity capabilities. On top of this, we also use a number of live and automated system monitoring devices for all software and networks.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Yes, reports can be produced based on any (or mix of) populated database fields allowing any form of usage metrics to be provided via the reporting suite
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
Users can export their data from the systems in any specified format; most commonly .xls or .csv.
System outputs however are flexible and can be worked to export in any client defined format, layout or file extension type, i.e. matched to an existing client specific format, layout or process. - Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- .csv
- .doc
- Data import formats
-
- CSV
- ODF
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Defined service level agreements (SLAs) are tied to our service delivery, with service credits available should guaranteed levels of availability not be achieved within the measured timeframe. Service level credits could be agreed as part of the contract.
- Approach to resilience
- Our data centre partners provide access to redundant bandwidth, power, utilities, air conditioning, telecoms providers, etc. Several layers of parallel redundancy exist, i.e. Power; 1. Primary Power, 2. Secondary Power Provider, 3. Diesel Generator Back Up 4. Battery Pack Back Up, showing lower levels of redundancy beyond core. Data Centre partners are also PSN Connection & Service certified and are existing direct government hosting partners themselves.
- Outage reporting
- Email alerts and service desk telephony updates.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- All access is log-in/user specific. Access to system functionality can be given on a granular and hierarchical basis, ensuring specified users only have access to specified functionality.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- QAS International
- ISO/IEC 27001 accreditation date
- 08/12/16
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- AOC 3.5
- PCI DSS accreditation date
- 28/10/2016
- What the PCI DSS doesn’t cover
- N/A we have payment processing software that allows customers to enter card details from the security of their own telephone keypad at home, never disclosing details to teh handling agent, taking PCI DSS out of scope completely anyway, regardless of our accreditation. As well as protecting card details from handling person, the DMTF tones are also masked whilst processing and immediately purged by the payment gateway.
- Other security certifications
- Yes
- Any other security certifications
-
- ISO 22301
- ISO 9001:2015
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- ISO 27001, ISO 22301, ISO 9001, PCI DSS
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Our change management approach is governed by a Change Advisory Board assessing changes appropriately in terms of:
Urgency
Rationale
Benefit
Impact of completing the change, versus not completing it
Risk assessment
An initial assessment of the work/timescales involved
The CAB will agree as a team the resulting priority of the change, and if the team agree the change should go ahead it is undertaken in line with overall priorities. In line with this, legal or regulatory change will always remain highest on the priority list and changes are assessed for impact in line with our ISO 27001 accreditation and framework. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Our security team monitor communications from our vendors and suppliers for patches, both scheduled and out-of-cycle. Patches are typically deployed within 24 hours of availability into a limited production environment, before progressing to the remaining environment within 48 hours of availability. We subscribe to industry mailing lists (e.g. CERT/NCAS) to maintain an awareness of any breaking threats.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Regular scans are ran of our internal and external network to identify any potential areas of weakness, using commercial products. Reports from these scans are reviewed daily. If any issues are found, they generate an immediate ticket within our response system, and mitigations or fixes are typically installed within 24 hours.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Our incident management process is aligned to our ISO 27001 accreditation. Users can report incident via our helpdesk and support teams and incident reports are draft and issued by the same teams for our clients upon reporting on incidents.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £199 to £2,999 a unit a month
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Free trial is available for a one month period. Full system functionality is included as part of the trial.