Skip to main content

Help us improve the Digital Marketplace - send your feedback

SECURE NEXUS LTD

SIEM

SIEM is a comprehensive security information and event management (SIEM) solution. It offers real-time threat monitoring, incident detection, and response capabilities, combined with advanced analytics and automation. SIEM enables organisations to enhance their security posture, detect and mitigate threats efficiently, and achieve compliance with regulatory requirements

Features

  • Real-time Monitoring
  • Incident Detection
  • Threat Intelligence
  • Automated Response
  • Compliance Reporting
  • Scalability
  • User-friendly Interface
  • Integration

Benefits

  • Improved Threat Detection
  • Efficient Incident Response
  • Enhanced Visibility
  • Compliance Readiness
  • Cost Savings
  • Scalability
  • Streamlined Operations
  • Actionable Insights

Pricing

£1,000 a unit a year

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at rsetchfield@securenexus.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

2 6 5 5 3 9 7 4 3 3 1 1 1 6 2

Contact

SECURE NEXUS LTD Raymond Setchfield
Telephone: 07973573734
Email: rsetchfield@securenexus.co.uk

Planning

Planning service
Yes
How the planning service works
When assisting buyers in planning the implementation of cloud hosting or software services, we employ a methodical and collaborative approach. We begin by conducting a comprehensive assessment of the buyer's current infrastructure, applications, and business requirements. Based on this assessment, we work closely with the buyer to design a customized solution tailored to their specific needs and objectives. This includes selecting the most suitable cloud hosting or software service and determining the optimal deployment model. We also identify potential risks and challenges associated with the implementation and develop risk mitigation strategies proactively. Additionally, we create a detailed project plan outlining the implementation timeline, milestones, and resource requirements. Throughout the planning process, we provide training and support to help the buyer's team adapt to the new services and conduct thorough testing and validation to ensure functionality, performance, and security. By following this structured approach and providing expert guidance and support, we empower buyers to implement cloud hosting or software services successfully, achieve their business objectives, and drive innovation and growth
Planning service works with specific services
No

Training

Training service provided
No

Setup and migration

Setup or migration service available
Yes
How the setup or migration service works
In facilitating the migration to SIEM or transitioning between SIEM solutions, we provide comprehensive support to ensure a smooth and successful transition for our buyers. We initiate the process by conducting a thorough assessment of the buyer's existing security infrastructure, including current SIEM solutions, log sources, and security tools. This assessment enables us to develop a detailed migration plan tailored to their unique security needs and objectives, considering factors like threat detection capabilities, compliance requirements, and scalability.

Collaborating closely with the buyer, we assist in deploying SIEM, including the installation, configuration, and integration with existing security infrastructure. Our expertise extends to data migration, ensuring the seamless transfer of security event logs and configurations to SIEM. Throughout the migration process, we conduct rigorous testing and validation to guarantee optimal performance and functionality post-migration.

We also provide comprehensive training and support to facilitate user adoption and adaptation to SIEM's capabilities. Post-migration, we offer ongoing monitoring, optimisation, and documentation services, ensuring the continued effectiveness and efficiency of the SIEM solution. By leveraging our extensive experience with SIEM and security best practices, we empower buyers to enhance their security posture, minimise risks, and achieve their security objectives seamlessly.
Setup or migration service is for specific cloud services
No

Quality assurance and performance testing

Quality assurance and performance testing service
Yes
How the quality assurance and performance testing works
We offer comprehensive quality assurance (QA) and performance testing services for SIEM deployments. Our QA process ensures that SIEM meets the highest standards of reliability, functionality, and security. We conduct thorough testing of all aspects of the SIEM solution, including its features, configurations, integrations, and scalability.

Our QA testing includes functional testing to verify that all features and functionalities of SIEM perform as expected according to specifications. We also perform integration testing to ensure seamless interoperability with other security tools and systems within the buyer's environment. Additionally, we conduct security testing to identify and address any vulnerabilities or weaknesses in the SIEM solution, ensuring robust protection against cyber threats.

We also provide performance testing services to evaluate the scalability, responsiveness, and efficiency of SIEM under various conditions and workloads. This includes stress testing, load testing, and performance benchmarking to assess the solution's ability to handle high volumes of security events and data while maintaining optimal performance.

Our QA and performance testing services are designed to help buyers deploy SIEM with confidence, ensuring that it meets their security requirements, performance expectations, and business objectives effectively. .

Security testing

Security services
Yes
Security services type
  • Security strategy
  • Security risk management
  • Security design
  • Cyber security consultancy
  • Security testing
  • Security incident management
  • Security audit services
Certified security testers
Yes
Security testing certifications
Other
Other security testing certifications
  • Certified Ethical Hacker v11
  • CISSP

Ongoing support

Ongoing support service
Yes
Types of service supported
  • Buyer hosting or software
  • Hosting or software provided by your organisation
  • Hosting or software provided by a third-party organisation
How the support service works
Deployment Assistance: We provide guidance and assistance in deploying FSIEM in cloud environments, ensuring a smooth and efficient implementation process.
Configuration and Customisation: Our team assists in configuring and customising SIEM to align with specific security requirements and operational needs.
Technical Support: Dedicated technical support is available to address any issues or concerns promptly, ensuring uninterrupted service.
Performance Optimisation: We help optimize the performance of SIEM in cloud environments, ensuring optimal security monitoring and threat detection capabilities.
Integration: Assistance is provided in integrating SIEM with other security tools and systems, enabling comprehensive security monitoring and management.
Scalability Planning: We assist in planning for scalability to accommodate growing data volumes and evolving security requirements effectively.
Monitoring and Maintenance: Ongoing monitoring and maintenance services are available to ensure the continued reliability and performance of SIEM in cloud hosting environments.

Service scope

Service constraints
While SIEM offers robust security capabilities, buyers should be aware of potential constraints. These include the need for sufficient hardware resources to support deployment, complexities in configuration and customisation, and potential integration challenges with existing security infrastructure.
Additionally, buyers should consider ongoing maintenance and support requirements, as well as the need for adequate training to maximise the effectiveness of SIEM. By understanding these constraints and planning accordingly, buyers can ensure a successful deployment and maximise the benefits of SIEM for their organisation's security needs.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Our response time to questions depends on Service Level Agreement (SLA) agreements and the ticket's priority. We prioritise swift responses based on the urgency and criticality defined in SLAs, ensuring timely resolution of inquiries. The specific SLA terms and ticket priorities guide our commitment to providing efficient and effective support to address questions promptly.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Support levels
Our Support Level Agreements (SLAs) are designed to deliver timely and effective assistance. Users benefit from dedicated cloud engineers available to answer calls and address inquiries. Our SLA categorises issues into four priority levels, each with a corresponding response time commitment. Priority 1 (P1) urgent issues receive a rapid response within 30 minutes, ensuring critical problems are swiftly addressed. High-priority (P2) concerns are attended to within 2 hours, maintaining a prompt response for significant issues. Medium (P3) priority issues receive attention within 4 hours, and low-priority (P4) matters are addressed within 8 hours. These SLAs aim to provide a structured and responsive support framework, allowing users to receive assistance tailored to the urgency and criticality of their specific needs.

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Fortinet

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BRITISH ASSESSMENT BUREAU LTD
ISO/IEC 27001 accreditation date
01/05/2024
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
  • Fortinet Certified Fundamentals in Cybersecurity
  • Fortinet Certified Network Security Professional

Social Value

Social Value

Social Value

Tackling economic inequality

Tackling economic inequality

Tackling economic inequality within the secure nexus framework involves strategic procurement practices aimed at promoting fair wages, supporting local businesses, and fostering job opportunities for marginalised communities. By prioritizing contracts with suppliers who demonstrate commitment to equitable employment practices and investing in initiatives that uplift disadvantaged groups, the secure nexus approach not only enhances economic stability but also cultivates a more inclusive and resilient society.

Pricing

Price
£1,000 a unit a year
Discount for educational organisations
Yes

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at rsetchfield@securenexus.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.