INTEGRITY360 LIMITED
Trellix MVISION Cloud
The Trellix XDR ecosystem contains a suite of products that provide world-class cybersecurity through endpoint security and so much more.
Features
- Identifies and tracks High Risk Cloud Services
- Delivers comprehensive registry of SaaS, IaaS, and PaaS services
- Summarises cloud usage from across the business
- Sensitive log data tokenised for on premises for security
- Automatically generates scripts for popular firewalls/web proxies
- Collects and analyses firewall logs
- Simple Usage Dashboard: easy-to-understand visual summary of key usage statistics
- Provides a detailed audit trail for forensic investigations and compliance
- Detect and respond to potential data exfiltration attempts
- Encrypts data in transit and at rest in cloud services.
Benefits
- Helps protect public-sector organisations from reputational damage from cyber-attack
- Capability to self-audit an organisation’s usage of cloud services
- Policy enforcement prevents unauthorised data leakage (DLP)
- Underpins information privacy, security, and compliance with detailed reporting
- Highlights the use of ‘Shadow IT’ across the organisation
- Encryption/other features help facilitate the secure adoption of cloud-services
- Quickly identifies sensitive data subject to compliance-requirements or security policies.
- Identifies third-party suppliers and the data flows that exist.
- Guides users from unapproved services to business sanctioned alternatives
- Highlights gaps in cloud-policy enforcement and force consistent policy deployment
Pricing
£15.65 a user a year
- Education pricing available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at bidreviewboard@integrity360.com.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
1 6 3 2 6 3 2 1 1 1 7 2 1 0 9
Contact
INTEGRITY360 LIMITED
Paul Momirovski
Telephone: +44 20 3397 3414
Email: bidreviewboard@integrity360.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- No
- System requirements
-
- NIC: 1GB with access to the internet
- RAM: 8+ GB recommended
- CPU: 4 Cores min
- Operating System: Windows (32/64 bits), *nix, or Mac
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Response time to questions raised within 1 hour and if these result in a specific ticket these will be managed based on a criticality level defined from 1 through 4
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Account Management
Sales Engineer
Support and Maintenance
Support Requests
Phone, Email & Web 24/7
Technical Support
Office hours (critical and non-critical issues) M-F 6am-6pm PST (excluding US holidays)
Availability for critical issues 24/7
Service Support
Upgrade notifications Yes
Remote diagnostics Yes
Online Resources
Documentation Yes
FAQ Yes
User Portal with searchable KB articles
Based on 4 service criticality levels 1 to 4
Support is included in the annual subscription for the MVISION Cloud Services
A Technical account manager is allocated to a group of accounts and a customer success manager provides regular quarterly services reviews"
Caretower also offer a range of Professional Services, Managed Security Services and Support Contracts for McAfee Products. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
MVISION Cloud customers are supported through all the way through the lifecycle. Expert advice and guidance in offered from our presales team during planning and customers are provided training both on site and by remote Webex during deployment phase. Support is provided 24x7 to cover operation and technical aspects. User documentation is available on line.
A Customer Success manager from McAfee is allocated to support customers from and has responsibility to ensure all operational criteria are met and value realised as quickly as possible.
Customers may also wish to use Caretower Professional Services to install and configure MVISION . We can also provide a fully Managed Security Service for MVISION - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- McAfee provide data extraction as part of this service as part of their standard user agreement.
- End-of-contract process
- Data Export and Data deletion at no cost to the customer
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The dashboard will operate on mobile devices in a restricted manner by the rendering of the device itself and will also not allow de-tokenisation of users unless the device is on the same corporate network as the Enterprise connector application
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- Yes
- What users can and can't do using the API
- The API is not available to the users but is used to control services around the MVISION Cloud service. ie a functional API not a management API
- API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
-
MVISION Cloud offers customers various levels of customisation in both the technical functionality and user experience of MVISION Cloud. Customisation and control is available in the Shadow and Sanctioned IT packages allowing various features and control functions to be applied as required.
The User interface can be customised and white labelled for the customer with detailed customisation available on the screen rendered dashboard and reports outputs.
Scaling
- Independence of resources
- The MVISION Cloud service is a true multi-tenant cloud environment and as such scales elastically to deal with user load in real time.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Detailed reporting is available for:
Cloud Services visited
Activity on the service
Size of uploads/downloads
Risk Scoring detail of each cloud service
Anomalous/Rogue activity of users versus services
Fully customisable user reports around variable parameters - Reporting types
-
- API access
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- McAfee
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- This is not a function that users can perform. McAfee will manage this process as part of the end of contract process.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
99.5% is the target availability defined in client contractual documentation.
Refunds for service discrepancies are also defined in the contract and may vary per client dependant on criticality of deployment within the organisation. - Approach to resilience
-
The McAfee solution is delivered as a highly available Software as a Service (SaaS).
Each McAfee datacentre consists of redundant hardware components and ISPs. High availability between datacentres is provided through Verisign Hosted DNS (Domain Name System)
Verisign Hosted DNS (Domain Name System) provides 100% SLA for DNS resolution, globally-distributed, highly redundant design, extremely rapid propagation updates, and DNS failover as a core feature.
If a McAfee datacentre fails, Verisign detects the failure and updates their DNS automatically to supply services from another McAfee Datacentre. The 24/7 McAfee incident response team would then follow Incident Response Procedure to bring the datacentre back online.
Further details are available to customers. - Outage reporting
- API services exist where customers can run health checks. Any major outages to the API would be advised to the customer by email with associated resolution activity.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Based on user permissions hierarchy and authentication
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- External Agency
- ISO/IEC 27001 accreditation date
- 1/1/20
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- Yes
- CSA STAR accreditation date
- 1/1/20
- CSA STAR certification level
- Level 1: CSA STAR Self-Assessment
- What the CSA STAR doesn’t cover
- N/A
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- ISO/IEC 27001
- Information security policies and processes
- McAfee has a fully documented security control policy and procedure, as outlined by ISO 27001 and 27018 . Full details available on request.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
McAfee’s Change Management (CM) process provides a framework for the thorough documentation, testing, and evaluation of all proposed changes to the production environment. The CM process mitigates risks to McAfee production applications.
Process is as follows:
Weekly meetings are held to review pending patches to production systems.
Critical patches including security patches are prioritized and scheduled for implementation as soon as possible
Non-critical patches will be analysed to determine the logical window to schedule the upgrades
In cases where downtime is required, system maintenance is during off hours. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Routine vulnerability scanning tests are performed by external companies like Qualys and others and work is created to identify and mitigate vulnerabilities.
For security reason we do not provide vulnerability scan to tenants. We can provide the scan schedule and the remediation plan and result.
Patches applied as soon as vulnerabilities are disclosed. There are multiple sources of threat intelligence. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
A Combination of edge protection provided by Inbound/Outbound next generation firewalls and use of industry leading IPS intrusion protection
Real-time alerting via SoC/SIEM security incident and event monitoring using McAfee expert resources - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
McAfee’s incident response procedure ISMS Incident Response Procedure undergoes continuous improvement as a part of our ISMS for ISO 27001.
The standard process is to open case is via email or phone. All cases are documented. Once the case is opened , the case is assigned to the technical support engineer, who will triage the case based on the information provided by the customer. If they cannot resolve the case within the first 2 hours, the case is escalated to the Senior Escalation Engineer.
Based on the severity and business impact, engineering will resolve issues as appropriate.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
Trellix celebrates fresh thinking and soulful work.
Trellix provides an opportunity to change the world – with bigger, better, bolder ideas.
Encourage to: Be disruptive. Be innovative. Be a game changer.
Encourages DEI:
Announced a partnership with the Hispanic Alliance for Career Enhancement (HACE) to launch a comprehensive mentorship and educational program and a partnership with Gotara, a global career growth platform for women in STEM+ to close the cybersecurity talent gap.
Pricing
- Price
- £15.65 a user a year
- Discount for educational organisations
- Yes
- Free trial available
- No
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at bidreviewboard@integrity360.com.
Tell them what format you need. It will help if you say what assistive technology you use.