Email Security
Our email security service provides comprehensive protection against phishing attacks, malware, spam, and other email-borne threats. Utilising advanced threat detection and encryption technologies, we safeguard organisations' email communications, ensuring confidentiality, integrity, and availability of sensitive information.
Features
- Phishing Protection
- Malware Detection
- Spam Filtering
- Content Filtering
- Advanced Threat Protection
- Data Loss Prevention (DLP)
- Reporting and Analytics
Benefits
- Improved Security Posture
- Enhanced Productivity
- Cost Savings
- Scalability
- Comprehensive Protection
Pricing
£200 a user a year
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 5 8 3 6 3 6 3 5 7 7 8 1 1 6
Contact
SECURE NEXUS LTD
Raymond Setchfield
Telephone: 07973573734
Email: rsetchfield@securenexus.co.uk
Planning
- Planning service
- Yes
- How the planning service works
-
In assisting buyers with implementing email security solutions, we adopt a consultative approach to ensure effective planning and deployment. Initially, we conduct a thorough assessment of the buyer's email infrastructure, security requirements, and compliance obligations. This assessment helps us understand their specific needs, objectives, and constraints.
Leveraging this insight, we collaborate closely with the buyer to design a customised implementation plan tailored to their environment and goals. This plan includes selecting the most suitable email security features and configurations to meet their security requirements and compliance obligations.
Throughout the planning process, we prioritise risk assessment and mitigation, identifying potential challenges and developing strategies to address them proactively. We also assist in evaluating the compatibility of email security solutions with existing software and services in the buyer's environment, ensuring seamless interoperability.
Our team provides comprehensive training and support to facilitate user adoption and adaptation to the new email security solution. This includes education on email security best practices, threat detection techniques, and incident response procedures. - Planning service works with specific services
- No
Training
- Training service provided
- No
Setup and migration
- Setup or migration service available
- Yes
- How the setup or migration service works
-
In facilitating the migration to the cloud or transitioning between cloud email security services, we offer comprehensive assistance to ensure a seamless and secure transition. Our approach begins with a thorough assessment of the buyer's current email security infrastructure, including existing solutions, policies, and compliance requirements.
Leveraging this understanding, we collaboratively design a tailored migration or transition plan that aligns with their needs and security considerations. This plan encompasses selecting the most suitable cloud email security provider(s) and deployment model(s), considering factors such as performance, scalability, security, and compliance.
Throughout the migration or transition process, we prioritise risk assessment and mitigation, identifying potential challenges and developing strategies to address them proactively. Thorough testing and validation are conducted to ensure compatibility, data integrity, and functionality. - Setup or migration service is for specific cloud services
- No
Quality assurance and performance testing
- Quality assurance and performance testing service
- Yes
- How the quality assurance and performance testing works
-
In ensuring the quality assurance (QA) and performance testing of email security implementations, we employ a meticulous approach to validate the effectiveness and reliability of our solutions. Our process begins with a comprehensive assessment of the buyer's email security requirements, infrastructure, and compliance standards.
Leveraging this understanding, we design and execute comprehensive test scenarios and strategies tailored to their environment. These scenarios encompass functional testing to validate the functionality of email security features, including threat detection, content filtering, and encryption capabilities.
Security testing
- Security services
- Yes
- Security services type
-
- Security strategy
- Security risk management
- Security design
- Cyber security consultancy
- Security testing
- Security incident management
- Security audit services
- Certified security testers
- Yes
- Security testing certifications
- Other
- Other security testing certifications
-
- Certified Ethical Hacker v11
- CISSP
Ongoing support
- Ongoing support service
- Yes
- Types of service supported
-
- Buyer hosting or software
- Hosting or software provided by your organisation
- Hosting or software provided by a third-party organisation
- How the support service works
-
In supporting cloud hosting or software services with email security solutions, we offer comprehensive assistance to ensure robust protection of email communications in cloud environments. Our approach begins with a thorough assessment of the buyer's cloud infrastructure, email platforms, and security requirements.
Leveraging this understanding, we collaboratively design and implement email security solutions tailored to the buyer's environment and compliance standards. This includes selecting the most suitable email security features and configurations to safeguard against phishing attacks, malware, spam, and data breaches.
Throughout the deployment process, we prioritise risk assessment and mitigation, identifying potential vulnerabilities and developing strategies to address them proactively. Thorough testing and validation are conducted to ensure seamless integration and compatibility with cloud email platforms.
Service scope
- Service constraints
- While our email security service offers robust protection against a wide range of threats, buyers should be aware of potential constraints. These may include the need for sufficient network connectivity and access to ensure seamless integration with email platforms. Additionally, certain features or configurations may require additional resources or licensing. Buyers should also consider the scalability of the solution to accommodate their growing email volume and user base. Finally, ongoing maintenance and updates are necessary to ensure the effectiveness and security of the email security solution.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Our response time to questions depends on Service Level Agreement (SLA) agreements and the ticket's priority. We prioritise swift responses based on the urgency and criticality defined in SLAs, ensuring timely resolution of inquiries. The specific SLA terms and ticket priorities guide our commitment to providing efficient and effective support to address questions promptly.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Support levels
- Our Support Level Agreements (SLAs) are designed to deliver timely and effective assistance. Users benefit from dedicated cloud engineers available to answer calls and address inquiries. Our SLA categorises issues into four priority levels, each with a corresponding response time commitment. Priority 1 (P1) urgent issues receive a rapid response within 30 minutes, ensuring critical problems are swiftly addressed. High-priority (P2) concerns are attended to within 2 hours, maintaining a prompt response for significant issues. Medium (P3) priority issues receive attention within 4 hours, and low-priority (P4) matters are addressed within 8 hours. These SLAs aim to provide a structured and responsive support framework, allowing users to receive assistance tailored to the urgency and criticality of their specific needs.
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Fortinet
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BRITISH ASSESSMENT BUREAU LTD
- ISO/IEC 27001 accreditation date
- 01/05/2024
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- Fortinet Certified Fundamentals in Cybersecurity
- Fortinet Certified Network Security Professional
Social Value
- Social Value
-
Social Value
Tackling economic inequalityTackling economic inequality
Tackling economic inequality within the secure nexus framework involves strategic procurement practices aimed at promoting fair wages, supporting local businesses, and fostering job opportunities for marginalised communities. By prioritising contracts with suppliers who demonstrate commitment to equitable employment practices and investing in initiatives that uplift disadvantaged groups, the secure nexus approach not only enhances economic stability but also cultivates a more inclusive and resilient society
Pricing
- Price
- £200 a user a year
- Discount for educational organisations
- Yes