Centripetal CLEANInternet
CleanINTERNET® is an intelligence-powered security solution that leverages the world's most comprehensive Threat Intelligence (TI) database combined with a team of TI operatives to provide an unprecedented level of protection at the perimeter. An order of magnitude faster than NGFWs, CLEANInternet is essential as part of your Secure Boundary strategy.
Features
- Actionable Threat Intelligence
- Real-Time Enforcement
- Augmented Human Analysis
- Advanced Threat Detection
- Security Log Management
- Reconnaissance Traffic Suppression
- Preemptive Vulnerability protection
- Insightful Monthly Security Reports
Benefits
- Blocks malicious traffic entering or leaving your network
- Reduces security event logs saving analyst time and storage costs
- Suppresses reconnaissance traffic removing network noise
- Incorporates the fastest packet filtering technology on the planet
- Powered by the combined TI of more than 250 providers
- Comprehensive protection against the latest cyberthreats
- Based on the most current TI updated in real-time
- Your network monitored by elite team of intelligence operations analysts
- Analysts act as an extension of customer’s internal cybersecurity team
- Significantly reduces the burden on overworked IT resources
Pricing
£30,000 a unit a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 6 8 6 5 6 3 2 4 6 5 7 2 1 3
Contact
4 DATA SOLUTIONS LIMITED
Ian Tinney
Telephone: +44 330 128 9180
Email: ian.tinney@4datasolutions.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- No
- System requirements
- None
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 4 hrs, 7 days a week
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
-
Support is tailored to the needs of the customer.
Support engineers are available to resolve any issues and are backed-up by the technical product team - Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Onsite installation (on-prem solution) or assistance with cloud-based deployments. Extensive documentation. Online training is also available for QuickThreat tools
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- API integration provides a mechanism for users to download their security event logs on demand.
- End-of-contract process
-
Termination of the service will result in the solution being placed in bypass mode, where all traffic is passed without shielding or monitoring. It will then be taken offline and removed as required.
No termination costs apply.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- The service interface is primarily used to examine the status of the solution. It is only used by security administrators.
- Accessibility standards
- None or don’t know
- Description of accessibility
- Accessible from within the customer's network on a secure interface.
- Accessibility testing
- None
- API
- Yes
- What users can and can't do using the API
- The API is principally used for integration with security log management solutions such as a third-party SIEM. The user cannot make any changes to the system via the API
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- No
- Customisation available
- No
Scaling
- Independence of resources
- Customers do not share infrastructure
Analytics
- Service usage metrics
- Yes
- Metrics types
- Extensive reporting is provided on a weekly and monthly basis, describing the service effectiveness, threat intelligence policy enforcement, security incidents identified, etc.
- Reporting types
-
- Real-time dashboards
- Regular reports
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Crowdstrike, Splunk, Cribl, Axiom, Centripetal
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- API integration provides a mechanism for users to download their security event logs on demand.
- Data export formats
- Other
- Other data export formats
- API
- Data import formats
- Other
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- Not applicable
- Approach to resilience
- Available on request
- Outage reporting
-
Email Alerts
Private dashboards
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Not applicable
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- Users receive audit information on a regular basis
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Available on Request
- ISO/IEC 27001 accreditation date
- Available on Request
- What the ISO/IEC 27001 doesn’t cover
- Nothing
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- SOC2 Type II
- Secure Frame
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Security governance is driven by our CISO, who has oversight of all operations across all customers. Adherence to strict standards provides a high level of confidence for our customers.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All technical components are reviewed and vulnerability assessed on a regular basis. Automated pen testing ensures ongoing verification of security controls.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
All technical components are reviewed and vulnerability assessed on a regular basis. Automated pen testing ensures ongoing verification of security controls.
RuleGATE software can be patched seamlessly at any time. Urgent patches can be pushed down remotely with no impact on service.
As the largest consumer of threat intelligence in the world, we have real-time visibility of any emerging threats. - Protective monitoring type
- Undisclosed
- Protective monitoring approach
- We use our own technology to monitor our service, which provides a superior level of monitoring and protection against compromises. As a real time solution we can block any emerging threat, preventing security incidents, and protecting our entrire customer base.
- Incident management type
- Undisclosed
- Incident management approach
-
The solution is tasked with monitoring security events in real-time. It is supported by a team of security analysts. The analysts will report any high-priority incidents that require action by the customer.
Typically, a user will not report incidents, but they can reach out to their designated analysts at any time.
Incident reports are provided in real time if of high priority or are included in Monthly reports."
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
Fighting climate change
4 Data Solutions Limited (“4Data”) recognises that it has a responsibility to the environment that goes beyond its legal and regulatory obligations. As such, 4Data is committed to reducing its environmental impact and continually improving its environmental impact as part of a wider business strategy for good.
POLICY GOALS
4Data will endeavour to fulfil the following goals:
- Comply with all relevant regulatory requirements.
- Continually monitor and improve its environmental performance.
- Continually reduce environmental impact.
- Incorporate environmental issues into business decisions.
- Increase training and awareness for employees.
OFFICE IMPROVEMENTS
4Data’s founders made the decision to use a remote-first approach to running their business. There is no permanent office, with most staff working from home. Some of the staff work from carefully selected, shared, and managed workplaces, using a company called Runway East, a certified B Corp (https://www.bcorporation.net/en-us/find-a-b-corp/company/runway-east-limited/).
4Data’s lack of a permanent office means the following environmental benefits:
Paper - no paper is used at 4Data unless an ink signature is absolutely required.
Energy and Water - no energy and water are used outside of normal use at home.
Office Supplies - no office means no office supplies are needed.
TRANSPORTATION
4Data is committed to:
- reduce air travel to the minimum necessary to run our business and to choose direct flights as much as possible.
- promote the use of video conferencing to reduce in-person meetings.
- find the most economical means of travel between cities when necessary.
MONITORING AND IMPROVEMENT
4Data is committed to:
- Monitor our environmental performance
- Have management and employees suggest beneficial changes
- Incorporate environmental impact into business decisions
- Increase employee awareness through training
- Review this policy and any related issues at regular monthly management meetings.Tackling economic inequality
Our Equal Opportunities And Diversity Policy covers economic inequality. Full details of our Equal Opportunities And Diversity Policy can be provided upon request.Equal opportunity
POLICY STATEMENT
4 Data Solutions Limited (“the Company”) is committed to achieving a working environment which provides equality of opportunity and freedom from unlawful discrimination on the grounds of race, sex, pregnancy and maternity, marital or civil partnership status, gender reassignment, disability, religion or beliefs, age or sexual orientation. Our Equal Opportunities And Diversity Policy aims to remove unfair and discriminatory practices within the Company and to encourage full contribution from its diverse community. The Company is committed to actively opposing all forms of discrimination.
The Company also aims to provide a service that does not discriminate against its clients and customers in the means by which they can access the services and goods supplied by the Company. The Company believes that all employees and clients are entitled to be treated with respect and dignity.
Any and all personal data used in connection with this Policy shall be collected, held, and processed in accordance with the Company’s Data Protection Policy.
Full details of our Equal Opportunities And Diversity Policy can be provided upon request.
Pricing
- Price
- £30,000 a unit a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
-
Provides the full service for 30 Days
Integrations with third party systems (e.g. SIEM and log management tools)