Skip to main content

Help us improve the Digital Marketplace - send your feedback

Pionen

Detecting Cyber Security Events

Implement capabilities to ensure security and suspected security events are detected and reported efficiently and quickly and security defences remain robust and effective.
Ensure detection is as proactive as possible and response is timely and effective.
Through SIEM real-time analysis and threat detection, Pionen provides proactive prioritisation and remediation advice.

Features

  • Monitor and report infrastructure security status and supporting operations.
  • Relevant data sources monitored for timely security event identification.
  • Security incident evidence identified and managed effectively.
  • Contextualise and enrich security alerts with intelligence.
  • Security Operations Centre (SOC) definition, design and implementation.
  • Identify governance and reporting requirements of security alerts and threats.
  • Detects within networks and information systems, suspected malicious activity.
  • Detect malicious activity by defining system behaviour abnormalities.
  • Monitor system behaviour for sophisticated attack methods and malicious behaviour.
  • Ensuring proportionate Cyber risk management in the supply chain.

Benefits

  • Support development of operational staff skills, tools, and roles.
  • Understand risk mitigation opportunities through security monitoring.
  • Identify appropriate data sources and logs by through business objectives.
  • Recordable events and alerting, retain forensic data for incident evidence.
  • Security Event Correlation, Aggregation, Categorisation & Prioritisation.
  • Extensive runbook development to drive operational efficiency and service consistency.
  • Define use cases, threat maps, to effectively manage new threats.
  • Accelerate detection and response times through continuous optimisation processes.
  • Provide information for remediation and root cause analysis.
  • Enable automation and automated response to common events.

Pricing

£400 to £1,400 a unit a day

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at steve.moran@pionen.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

2 3 9 5 0 5 2 0 2 9 5 3 7 1 3

Contact

Pionen Steve Moran
Telephone: 01743 296 535
Email: steve.moran@pionen.co.uk

Planning

Planning service
Yes
How the planning service works
We will always work closely and collaboratively with our client to understand their objectives, needs and capabilities and then agree how we can most effectively assist them in planning how they will implement cloud hosting or software services. We offer a tailor-able, full-lifecycle project and programme definition and delivery capability.
Planning service works with specific services
No

Training

Training service provided
Yes
How the training service works
We work closely with our clients throughout the project and service lifecycle to fully understand their training needs and build a customised approach to ensure your transition to cloud services is successful.
Training is tied to specific services
No

Setup and migration

Setup or migration service available
Yes
How the setup or migration service works
We provide a comprehensive set-up and migration service to support your transition to cloud hosting or cloud software. We follow a proven multi-stage migration path with full operational engagement to ensure secure and managed migration from legacy to new. We recognise the need to migrate with minimal disruption to operational services and reduce the risk of outage and data loss through structured planning, test and execution.
Setup or migration service is for specific cloud services
No

Quality assurance and performance testing

Quality assurance and performance testing service
No

Security testing

Security services
Yes
Security services type
  • Security strategy
  • Security risk management
  • Security design
  • Cyber security consultancy
  • Security incident management
  • Security audit services
  • Other
Other security services
  • Security Engineering
  • Security Capability Delivery
  • Security Operations Centre Design & Management

Ongoing support

Ongoing support service
Yes
Types of service supported
  • Buyer hosting or software
  • Hosting or software provided by your organisation
  • Hosting or software provided by a third-party organisation
How the support service works
We can provide any ongoing support package that a client may require. We are able to flex levels of support to meet changes in demand, for example we can provide enhanced support during transition or roll-out phases.

Service scope

Service constraints
Our service model is flexible and has no absolute constraints. We are able to offer bespoke packages to clients that include only the features that they need to support their business or organisation.

User support

Email or online ticketing support
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), 7 days a week
Web chat support
No
Support levels
Our support levels include onsite, email and telephone assistance, our projects typically employ an account management structure as as part of our delivery, support and quality assurance processes.

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Centre for Assessment
ISO/IEC 27001 accreditation date
20/04/2022
What the ISO/IEC 27001 doesn’t cover
Out of Scope

Partner company Greenfield IT, Pink Spaghetti (Secretarial Services), Business Applications service providers, Microsoft Azure/ MS Office 365 and Atlassian environments. (in-line with the Shared Responsibility Model for SaaS)

Customer networks are also out of scope and covered by their own security programme.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

Pionen has a well developed method statement on the subject of fighting climate change. Depending on the time of year our activities will be varied in this domain. However we endeavour to measure and report, if requested, on the specific activities our team are participating in. This list if not exhaustive but includes things like reducing energy consumption, reducing travel when possible, investment in green technology and planting trees to offset carbon.

Pricing

Price
£400 to £1,400 a unit a day
Discount for educational organisations
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at steve.moran@pionen.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.