Teramind - Compliance, Security and Productivity
Data Loss Prevention (DLP) is a strategy for ensuring your employees and vendors do not accidentally or intentionally share sensitive and company confidential data outside your organization. A DLP solution utilizes content discovery, digital inspection techniques, and contextual analysis to identify and categorize sensitive data and IP.
Features
- User activity monitoring
- Powerful policy and rules engine
- Insider threat detection
- Content discovery and classification
- Advanced OCR
- Clipboard monitoring
- Fingerprinting and tagging
- Compliance management
- Risk management
Benefits
- Achieve Compliance
- Improve Security Posture
- Prevent Data Loss
- Increase Employee Productivity
Pricing
£11.00 a user
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 4 9 2 4 6 7 5 9 6 7 1 4 1 5
Contact
Southern Communications Corporate Solutions T/A SCG Corporate
Rebecca Rowarth
Telephone: 01372 385715
Email: rebecca.rowarth@southern-comms.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- Teramind comes with agents for Windows: 32 and 64-bit. The Windows agents are universal for any platform, including stand-alone workstations, and Windows Servers.
- System requirements
-
- Windows 7 pro and above
- 32 & 64Bit
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 30 mins - Mon - Fri 9 X 5
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Mon - Fri 9 X 5 4 Hour Response includes dedicated technical support manager/engineer UK-based 1st and 2nd line support.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Various training sessions can be accommodated based on the user's preferences these can be online or in-person, in addition full technical support and user training are available via our online training portal.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- Other
- Other documentation formats
- Avi
- End-of-contract data extraction
-
Teramind Cloud customers get up to six months of storage for screen recordings. Other data such as logs, user metadata etc. are kept for as long as your account is active. You cannot delete any data.
Teramind On-Premise and Private Cloud customers can implement their own data retention policy. They can also specify how long the screen recordings are kept. Check out this article to learn how: How to change how long recordings are kept, delete recordings or archive.
You can export screen recordings and most of the reports from Teramind. - End-of-contract process
- Once a contract lapses, access to the data/dashboard is revoked and the data is then permanently deleted and cannot be retrieved.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
- Windows
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AAA
- Description of service interface
- Service interface is via a web browser.
- Accessibility standards
- WCAG 2.1 AAA
- Accessibility testing
- Extensive testing has been carried out in line with various internationally recognized standards such as ISO27001 & 9001 & Mitre Attak & NIST
- API
- No
- Customisation available
- Yes
- Description of customisation
- Reports, dashboards, and interfaces can be customized to suit the user's preferences.
Scaling
- Independence of resources
- The system used state-of-the-art load balancing and hosting on AWS local servers.
Analytics
- Service usage metrics
- Yes
- Metrics types
- All activities are tracked and logged and you can export log activity.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Installation, configuration and Local support
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
You can export videos from the Session Player by clicking the Download video image-192__1_.png icon near the top-right corner:
Click the download link in the email to download the MP4 file.
If you don’t see the email, check your spam folder.
Check out the Session Player section on the Teramind User Guide to learn more about Session Recordings in Teramind. - Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
- Avi
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- 99.99% Guaranteed up time
- Approach to resilience
- The main principle of Teramind’s ISMS program is to ensure the confidentiality, availability and integrity of any type of information that we process, store or communicate. The following table summarizes the ISMS policies and how we implement them to ensure the goals of the program are fulfilled. In addition, they use load balancing servers.
- Outage reporting
- Service outages are reported via the dashboard, email alerts & the website.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Access restrictions in management interfaces and support channels
- Teramind’s identity-based authentication and segregated, role-based access control (RBAC) features let you define what data a user or a group can access, edit or view allowing you to protect your data from insider threats and sabotage. 2-Factor Authentication means your credentials don’t get misused even when lost or stolen. Finally, Teramind integrates with Active Directory to import your users, OUs, computers, groups and security attributes in a read-only mode with domain authentication simplifying implementing a unified access control policy.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 03/07/2022
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
In addition to ISMS, Teramind also conforms to the National Institute of Standards and Technology (NIST) Cybersecurity Framework. The framework provides computer security guidance for how private sector organizations in the United States can assess and improve their ability to prevent, detect, and respond to cyber attacks. Originally developed for operators of critical infrastructure in the U.S., the standard is being used by companies like Teramind and governments world-wide for its granular taxonomy and quality.
Teramind uses the NIST framework to implement both its internal governance, business environment, asset management and risk management strategies and has designed the same level of safeguards in its platform to ensure delivery of critical infrastructure and data processing services to its customers.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- A change management process is in place with various approval processes for any changes including rollback procedures.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Teramind conducts regular penetration testing on the platform and our Cloud instance. This is part of our full security audit practice where we simulate cyber attacks on our systems to identify vulnerabilities and gaps for unauthorized parties to gain access to the system’s features and data and our strength to provide defense against such intrusion enabling full risk assessment for our platform and the hosted products.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- We have implemented strong access controls, database security, employee awareness and training, technical resilience systems and policies and procedures (please see our ISMS program above) to ensure delivery of critical services.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
While Cloud is the easiest deployment option for many organizations, if you prefer more control over your security and compliance, Teramind also offers On-Premise and Private Cloud deployment options.
The On-Premise version of our software has feature parity with the Cloud solution, and it requires minimal IT effort to deploy and maintain. With the On-Premise edition, you get a Teramind server in the form of a self-contained, Linux-based virtual appliance that runs on VMWare and Hyper-V.
Alternatively, you can use Teramind’s Private Cloud deployment option on AWS and Azure.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Equal opportunity
- Wellbeing
Fighting climate change
SCCS has undertaken an action plan (published carbon reduction plan) on how we can reduce our environmental impact. Whilst we don’t produce any products directly, we do undertake several recycling initiatives to ensure waste products are recycled where possible: • Paper – aim to work as a paperless company, meaning any hard paper documents are scanned and then placed into the shredding bin’s located on site, shredded and disposed of securely via a third party company. • Plastic– This is collected from site and recycled. • Print Cartridges – This is collected from site and recycled. • Staff commuting – SCCS adopts a 'green travel plan' for staff commuting to work. This means that we encourage staff to use public transport, car share and walk/cycle to work schemes. SCCS do not manufacture products directly as we are a reseller, thus reducing the number of raw materials needed to produce devices. As part of environmental promise, we offer all our customers the option to recycle devices, which can be done through a selected third party. SCCS also aims towards ensuring we are always working in accordance with the procedures of ISO 14001 - Environmental Management System. SCCS operates an Environmental Management System within our office and as part of that process, SCCS is rolling out improved energy efficiency measures to reduce impact on the environment and our carbon footprint: • Lighting – moving all lighting towards LED, which if more efficient for the environment, as well as cost saving. • Implementing Smart metering into our office facility. • Air Conditioning – Units are being changed to newer, more energy efficient models. • Additional Heaters – Heaters within the office are only used in extremes of temperature to prevent large fluctuations in temperature. We also use carbon neutral couriers for all deliveries.Covid-19 recovery
Covid-19 had a big impact on the world and many businesses and as such, SCCS, much like everyone else, had to adapt on how we worked throughout this period. As an information technology business, we were already equipped with things such as Teams, work mobiles, work laptops etc so the transition from office to home working didn’t have a large impact on our business like it might have on other businesses. Our recovery to Covid-19 has been very smooth in the sense that we are now working as a hybrid business, meaning that staff have the flexibility to work 2 days in the office and 3 days from home. By reducing the number of staff within the office, we are able to spread desks out further and provide less contact with large numbers of people which we believe helps prevent the spread of Covid and other illnesses. We continue to provide hand sanitising stations throughout the office, and have cleaners come in on a regular basis. By implementing hybrid working as a permanent process, this also helps with the environmental aspect of the business as staff are not having to come into the office every day, meaning less travel is required, thus reducing our carbon footprint as a business. SCCS have supported hundreds of charities and voluntary organisations in recovering from the impacts of Covid but also managing and leading that response. This includes explaining and supporting the implementation of solutions in the short, medium and long term. The deployment of Microsoft Teams Voice, Cloud Telephony solutions and mobiles on a short term contract have all helped customers support the recovery from Covid and are set to support any ongoing requirements.Equal opportunity
SCCS provides a safe environment for all staff and we ensure that equal opportunities exist throughout the company, regardless of race, religion, age, sex or physical ability. When recruiting employee’s, SCCS will first post vacancies on local job boards and with local recruitment agencies to ensure that the pool of candidates we receive are from the local community, however, we would not discriminate if a candidate came from further afield if suitable for the role. The reason for recruiting local is that 1, it contributes towards the local community, both helping towards less unemployment, and also spend in the community, and 2, we believe that by recruiting local helps with our carbon footprint as employees have the option to walk to work, and also car share where possible. SCCS contributes towards the work experience scheme. Over the past several years we have given placement to students who are looking to gain experience within the telecommunication’s sector. When employing staff at SCCS, we ensure that both men and woman feel equally empowered and as such, we have both non-discrimination and equal opportunity policies in place throughout the business. We also believe in equal pay and hold annual pay reviews to ensure that our staff fell they are being paid the correct salary based on their role and skills. SCCS have provided several local projects to support the local community to include but not limited to staff volunteering days, hardware recycling schemes to support local businesses, and consultancy time for local projects. The availability of services is based on the requirements of the customer and how best SCCS can support the request.Wellbeing
SCCS can confirm that in 2021, amidst the presence of COVID-19, we rolled out an opportunity to our employees to become a Mental Health First Aider’s. We are pleased to say that several staff wanted to be involved with this and as such, we teamed up with St. John’s Ambulance and put selected staff members on a week’s course to become qualified FAQ Level 3 Mental Health Workplace First Aiders. Both the physical and mental health of all our employees is at the forefront of our business as we understand how important it is for our employees to be well, and to feel happy and comfortable in the workplace. Since implementing mental health workplace first aiders, we have also made several changes internally to assess and improve the mental health and well being of all staff. These changes include but not limited to: • Fresh Fruit available every morning in the office • Dedicated zone’s and times that a mental health first aider is available should anyone wish to speak with one of them. • Well-being weeks which include various activities for the staff members to enjoy. • Posters added to all the communal area’s with support numbers should someone feel the need they need to speak with someone. In addition to the above, the mental health first aiders have been trained to look out for the common signs and symptoms of someone who may be struggling with their mental health and how to deal with this situation.
Pricing
- Price
- £11.00 a user
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- 14 day free trial of all features.