NIGHTBALL TECHNOLOGIES LIMITED

Cyber Resilient Integrated Workspace (CRIW)

Cyber Resilient Desktop as a service.

Features

  • Secure remote access
  • Citrix Cloud integration
  • Managed service options
  • Modern authentication and identity management
  • Secure endpoint and authentication options with Becrypt and Yubico
  • Additional Citrix components available including Content Creation (Sharefile)

Benefits

  • Enables secure user access to Hybrid working
  • Rapidly onboard/offboard users
  • Flexible access to multi-cloud
  • Bespoke requirements supported
  • Rapidly deploy and scale services
  • Allows a tailored transition to cloud access

Pricing

£90.00 a user

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at commercial@nightball.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

2 5 0 4 7 0 6 1 0 7 3 4 0 7 1

Contact

NIGHTBALL TECHNOLOGIES LIMITED Polly O'Meara
Telephone: -
Email: commercial@nightball.co.uk

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
CRIW is primarily built on Citrix Cloud, which is deployed and maintained on behalf of the client.
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
No specific service constraints. CRIW is underpinned by Citrix Cloud, which offers 99.9% SLA.
System requirements
  • An Active Directory domain (can be optionally provisioned)
  • Citrix Cloud Connectors (can be optionally provisioned)
  • An Authentication service (can be optionally provisioned)
  • Federated Authentication Servers (FAS) (can be optionally provisioned)
  • Public Key Infrastructure to support FAS (can be optionally provisioned)
  • Domain joined machines for hosting workload (can be optionally provisioned)
  • Operating system licences (can be optionally provisioned)
  • Client Access licences (can be optionally provisioned)

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 4 Hours, 9am to 5pm, Monday to Friday (excluding Public Holidays).

Other support options may be available on request.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Standard Support Services are provided by Nightball Technologies Limited in the UK between 9am to 5pm, Monday to Friday (excluding Bank Holidays) via Email or Phone.

Additional Support options may be provided at an extra cost, based on client requirements.
Support available to third parties
No

Onboarding and offboarding

Getting started
Nightball Technologies Limited use virtual meetings (e.g. Microsoft Teams) to provide a 1 hour CRIW familiarisation session.

User onboarding guides are included as standard.

Further training assistance may be provided at an additional cost, depending on client requirements.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
CRIW is an access broker, no client data is held or stored.
End-of-contract process
Client services will be de-provisioned on a pre-agreed date.

Any additional support or consultancy required will be subject to an additional charge.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
None.
Service interface
No
User support accessibility
None or don’t know
API
No
Customisation available
Yes
Description of customisation
Limited branding options available.

Scaling

Independence of resources
The service is designed using Citrix scalable cloud technologies to ensure that other users demands do not affect the service.

Analytics

Service usage metrics
Yes
Metrics types
This will be defined in the contract.
Reporting types
Regular reports

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Citrix, Becrypt, Microsoft and Yubico

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
As a broker we do not hold data.

Any data export would be provided by the client.
Data export formats
Other
Data import formats
Other

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
SLAs are defined by Citrix Cloud. These are defined as 99.9%
Approach to resilience
Dependant on requirement. At minimum multiple components are deployed as part of the onboarding process.
Outage reporting
Email alerts and Citrix Cloud uptime monitor.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Role based access is used to restrict administration functions.

Privileged access is also utilised where applicable.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
Cyber Essentials Plus
Information security policies and processes
Available on request

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Available on request
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Available on request
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Available on request
Incident management type
Supplier-defined controls
Incident management approach
Available on request

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Fighting climate change

Fighting climate change

Nightball Technologies Limited has made the SME Climate Commitment to be Net Zero by 2040, via the SME Climate Hub.

All company vehicles are either EV or Hybrid EV. Public transport and car sharing is encouraged.

As a company Nightball Technologies Limited endeavours to be a paperless work environment.
Equal opportunity

Equal opportunity

Nightball Technologies Limited is committed to promoting equal opportunities in employment.
Wellbeing

Wellbeing

As an organisation Nightball Technologies Limited promotes an open culture around mental health.

All employees are offered medical insurance which includes, but is not restricted to, Mental Healthcare, Physiotherapy and self care health tools.

Hybrid working is encouraged throughout the organisation to help employees with work/life balance.

Pricing

Price
£90.00 a user
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at commercial@nightball.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.