Torsion
Across Microsoft 365, get total control and visibility of 'who has access to what'. Designed for business users, automated for IT, and trusted by security and compliance. Simple, intelligent and automatic, Torsion empowers business data owners to take responsibility for their own data. Seamlessly in Teams, SharePoint and OneDrive.
Features
- Comprehensive visibility of data access for business owners and IT
- Dynamic automatic access controls
- Security certification campaigns
- Automated security issue detection and resolution
- Attribute-based access controls
- Comprehensive reporting on all data, users and access
- Strategic focus on business users, as well as IT
- Works consistently across SharePoint, Teams, OneDrive
- Vast and complex data access controls run on auto-pilot
- Shift responsibility towards the data users, without being a burden
Benefits
- Get visibility and control of 'who has access to what'
- Data security through precise, automated control of access
- Simplify compliance, it simple to demonstrate control under audit
- Save money by removing manual governance processes
- Democratize your data, by engaging responsibility of the data owners
- Get control of external sharing
- Ensure security and compliance
- Intelligently pinpoint inappropriate access, and automatically fix it
- Seamlessly embedded inside existing systems
- Simple – no user training required
Pricing
£17.08 to £38.60 a user a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
2 3 9 1 7 8 7 2 1 0 9 2 4 3 1
Contact
TORSION INFORMATION SECURITY
Peter Bradley
Telephone: +447767017981
Email: peter.bradley@torsionis.com
Service scope
- Software add-on or extension
- Yes
- What software services is the service an extension to
-
Microsoft 365
Office 365
SharePoint
Teams
OneDrive - Cloud deployment model
- Private cloud
- Service constraints
- Torsion connects to the customers' Microsoft Office 365 collaboration tools, including SharePoint, Teams and OneDrive.
- System requirements
- Microsoft Office 365
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Same business day.
- User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Customer support sessions are typically carried out online via Teams or Zoom.
- Web chat accessibility testing
- N/A
- Onsite support
- No
- Support levels
-
Level 1, 2 and 3 support are all available.
Support costs and model will depend on the customer circumstance and whether a delivery partner (such as a partner consultancy) is involved in the customer relationship. Engaging our direct support is available, in which a product support engineer will be assigned to the ticket directly. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Customers have access to a considerable library of documentation, videos and online help. Furthermore, partner consultancies are fully trained and available to support customers to onboard the solution according to their unique requirements and circumstances.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Depending on the data required, some extraction functionality is available through the product via the extensive reporting capabilities. All other data can be extracted and delivered to the customer upon request.
- End-of-contract process
- Prior to the end of the contract subscription period, the customer will be contacted to discuss whether the subscription shall be renewed. If the customer chooses to renew, payment is received and the service continues without interruption. If the customer declines to renew, the service discontinues on the expiry date. 30 days after the expiry date, all customer data is deleted. This deletion can be completed earlier upon request.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- Yes
- Description of customisation
- The service is configured as part of deployment. The configuration is reflects the Data Access Governance requirements of the customer organisation. Configuration is carried out by IT administrators through a simple administration console.
Scaling
- Independence of resources
- We create a unique and isolated set of all application services, databases ands communication channels for every customer. This logically isolates each customer from a system performance perspective.
Analytics
- Service usage metrics
- Yes
- Metrics types
- All user actions within Torsion are tracked and reportable in various ways. e.g. Torsion is able to orchestrate a Security Certification Campaign, whereby data owners are periodically requested to certify the access to their own information. All user actions, certification outcomes, deadline slippages and results are included in the available reports.
- Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Export / reporting functionality is built into the service. Reports are generated in Microsoft Excel format.
- Data export formats
- Other
- Other data export formats
- Microsoft Excel
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- We're able to offer a 99.9% uptime SLA, with any overruns being reimbursed in service credits.
- Approach to resilience
- All service components (web servers, application servers, databases, communication buses, etc) are based on highly available cloud infrastructure, which includes the ability to rapidly replicate, failover, scale and respond to all resilience events.
- Outage reporting
- Email alerts are shared with customers and partners.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Identity federation with existing provider (for example Google Apps)
- Access restrictions in management interfaces and support channels
- Logins to the administration console are provided by the administrator's Office 365 identity. Each account in the Torsion administration console is assigned a role, which controls which areas of functionality and data they are able to access or modify. Possible roles include Compliance Auditor, IT Administrator, Full Control. Limitations can also be enforced according to organisational boundaries.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Identity federation with existing provider (for example Google Apps)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- QMS
- ISO/IEC 27001 accreditation date
- 10/02/2022
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- Microsoft Co-Sell Ready
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- The CTO takes direct responsibility for the security of the service. The CTO reports to the CEO, who in turn is responsible for all commercial relationships within and outside of the organisation. Our security practices are externally audited on an annual basis against all ISO27001 requirements, and the results of each successful annual audit are shared with all stakeholders.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All solution components are carefully tracked, defined, documented, change controlled, tested and monitored on a constant basis. This tracking and monitoring is carried out using a range of services including Azure DevOps, Grafana and ZenDuty. Every component is wrapped in an enormous array of automated and manual tests, which are carried out whenever anything changes, and released only when all tests have passed without incident. Customers are advised ahead of all solution updates.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Potential threats are evaluated on a constant basis by the CTO. Internal and external testers are constantly engaged to develop and execute more and more system testing which is aimed at identifying vulnerabilities. All logs of firewalls and externally-facing systems are reviewed regularly. Any discovered vulnerabilities are patched within 2 business days, and typically much more quickly than that.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- The system is constantly monitored by a range of bespoke and third-party applications. The monitoring observes system stability, performance, security, access and all user / administrator actions. All monitoring is consolidated in a single dashboard, which includes real-time alerting for engineers in response to any potential incidents. At least one engineer is on-call at all times, providing 24/7 rapid response to all incidents.
- Incident management type
- Supplier-defined controls
- Incident management approach
- We do have a range of pre-defined processes for common events. These processes are automated where possible, and documented where this is more appropriate. Users are able to report incidents via a support ticketing system. Where appropriate, users are kept up to date regarding affected incidents through regular reports through to resolution.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
As Torsion will enable workers to continue to work remotely without compromising business data security our software can play a pivotal role in the move towards home working for those that want or need it. The environmental advantages created by a drastic reduction of commuting is clear. The UK daily commute produces over 77 million tons of CO2 emissions annually (CompareMyMove, 2020). Removing this entirely would meet 1/3rd of the UK’s emissions targets. Reducing the number of commuting journeys by the equivalent of 1 day per person per week would still save over 15 million tons of CO2 emissions per year.
A key reason why many large organisations are hesitant to move their information management systems into the cloud is concern over data security, with 66% of IT professionals say security is the biggest concern (RedLock, 2019). When sensitive files are stored in the cloud instead of on-premises servers, they can be accessed from anywhere, at any time, and so controlling access to those files becomes more difficult. However, cloud data centres are far more efficient than company-operated server rooms – cloud data centres often have their own sustainable carbon-minimised power generation, and are designed with environmental considerations as priority. Company-operated server rooms, by contrast, run on regular grid power, with no particular consideration for environmental impacts. One study found Amazon Web Services cloud servers to be 3.6 times more energy efficient than the average US company’s server rooms, (541 Research, 2019), and that is before any green energy generation is considered. Torsion enables organisations to remove their security concerns about the cloud, and thus embrace more environmentally efficient cloud computing services. - Covid-19 recovery
-
Covid-19 recovery
In terms of environmental sustainability, Torsion enables organisations to maintain data security whilst staff work remotely. Whilst the initial catalyst for the dramatic shift to home working was Covid-19, 50% of large UK businesses have not yet implemented a return to office plan (BBC, 2020). The drive for more remote working is increasing - 40% of businesses reported an increase in productivity during lockdown, and 85% of businesses are now expanding their remote working policies as a result of the pandemic so they can be continued post-lockdown (City AM report, June 2020). Security issues are the most common reason people gave pre-lockdown as the reason they weren’t able to work remotely (Seareach, 2020).
Pricing
- Price
- £17.08 to £38.60 a user a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- We provide an unlimited 30-day free trial. All service features are available without limitation during the trial period.
- Link to free trial
- https://azuremarketplace.microsoft.com/en-gb/marketplace/apps/torsioninformationsecurity.torsion_is_001?tab=Overview