Skip to main content

Help us improve the Digital Marketplace - send your feedback

4 DATA SOLUTIONS LIMITED

Centripetal CLEANInternet

CleanINTERNET® is an intelligence-powered security solution that leverages the world's most comprehensive Threat Intelligence (TI) database combined with a team of TI operatives to provide an unprecedented level of protection at the perimeter. An order of magnitude faster than NGFWs, CLEANInternet is essential as part of your Secure Boundary strategy.

Features

  • Actionable Threat Intelligence
  • Real-Time Enforcement
  • Augmented Human Analysis
  • Advanced Threat Detection
  • Security Log Management
  • Reconnaissance Traffic Suppression
  • Preemptive Vulnerability protection
  • Insightful Monthly Security Reports

Benefits

  • Blocks malicious traffic entering or leaving your network
  • Reduces security event logs saving analyst time and storage costs
  • Suppresses reconnaissance traffic removing network noise
  • Incorporates the fastest packet filtering technology on the planet​
  • Powered by the combined TI of more than 250 providers
  • Comprehensive protection against the latest cyberthreats
  • Based on the most current TI updated in real-time
  • Your network monitored by elite team of intelligence operations analysts
  • Analysts act as an extension of customer’s internal cybersecurity team
  • Significantly reduces the burden on overworked IT resources

Pricing

£30,000 a unit a year

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ian.tinney@4datasolutions.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

2 6 8 6 5 6 3 2 4 6 5 7 2 1 3

Contact

4 DATA SOLUTIONS LIMITED Ian Tinney
Telephone: +44 330 128 9180
Email: ian.tinney@4datasolutions.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
No
System requirements
None

User support

Email or online ticketing support
Email or online ticketing
Support response times
4 hrs, 7 days a week
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Onsite support
Support levels
Support is tailored to the needs of the customer.
Support engineers are available to resolve any issues and are backed-up by the technical product team
Support available to third parties
No

Onboarding and offboarding

Getting started
Onsite installation (on-prem solution) or assistance with cloud-based deployments. Extensive documentation. Online training is also available for QuickThreat tools
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
API integration provides a mechanism for users to download their security event logs on demand.
End-of-contract process
Termination of the service will result in the solution being placed in bypass mode, where all traffic is passed without shielding or monitoring. It will then be taken offline and removed as required.

No termination costs apply.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
The service interface is primarily used to examine the status of the solution. It is only used by security administrators.
Accessibility standards
None or don’t know
Description of accessibility
Accessible from within the customer's network on a secure interface.
Accessibility testing
None
API
Yes
What users can and can't do using the API
The API is principally used for integration with security log management solutions such as a third-party SIEM. The user cannot make any changes to the system via the API
API documentation
Yes
API documentation formats
PDF
API sandbox or test environment
No
Customisation available
No

Scaling

Independence of resources
Customers do not share infrastructure

Analytics

Service usage metrics
Yes
Metrics types
Extensive reporting is provided on a weekly and monthly basis, describing the service effectiveness, threat intelligence policy enforcement, security incidents identified, etc.
Reporting types
  • Real-time dashboards
  • Regular reports

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Crowdstrike, Splunk, Cribl, Axiom, Centripetal

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
No
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
API integration provides a mechanism for users to download their security event logs on demand.
Data export formats
Other
Other data export formats
API
Data import formats
Other

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Not applicable
Approach to resilience
Available on request
Outage reporting
Email Alerts
Private dashboards

Identity and authentication

User authentication needed
Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Not applicable
Access restriction testing frequency
At least every 6 months
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
Users receive audit information on a regular basis
How long supplier audit data is stored for
Between 6 months and 12 months
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Available on Request
ISO/IEC 27001 accreditation date
Available on Request
What the ISO/IEC 27001 doesn’t cover
Nothing
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
  • SOC2 Type II
  • Secure Frame

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Security governance is driven by our CISO, who has oversight of all operations across all customers. Adherence to strict standards provides a high level of confidence for our customers.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All technical components are reviewed and vulnerability assessed on a regular basis. Automated pen testing ensures ongoing verification of security controls.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
All technical components are reviewed and vulnerability assessed on a regular basis. Automated pen testing ensures ongoing verification of security controls.
RuleGATE software can be patched seamlessly at any time. Urgent patches can be pushed down remotely with no impact on service.
As the largest consumer of threat intelligence in the world, we have real-time visibility of any emerging threats.
Protective monitoring type
Undisclosed
Protective monitoring approach
We use our own technology to monitor our service, which provides a superior level of monitoring and protection against compromises. As a real time solution we can block any emerging threat, preventing security incidents, and protecting our entrire customer base.
Incident management type
Undisclosed
Incident management approach
The solution is tasked with monitoring security events in real-time. It is supported by a team of security analysts. The analysts will report any high-priority incidents that require action by the customer.
Typically, a user will not report incidents, but they can reach out to their designated analysts at any time.
Incident reports are provided in real time if of high priority or are included in Monthly reports."

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Tackling economic inequality
  • Equal opportunity

Fighting climate change

4 Data Solutions Limited (“4Data”) recognises that it has a responsibility to the environment that goes beyond its legal and regulatory obligations. As such, 4Data is committed to reducing its environmental impact and continually improving its environmental impact as part of a wider business strategy for good.

POLICY GOALS
4Data will endeavour to fulfil the following goals:
- Comply with all relevant regulatory requirements.
- Continually monitor and improve its environmental performance.
- Continually reduce environmental impact.
- Incorporate environmental issues into business decisions.
- Increase training and awareness for employees.

OFFICE IMPROVEMENTS
4Data’s founders made the decision to use a remote-first approach to running their business. There is no permanent office, with most staff working from home. Some of the staff work from carefully selected, shared, and managed workplaces, using a company called Runway East, a certified B Corp (https://www.bcorporation.net/en-us/find-a-b-corp/company/runway-east-limited/).

4Data’s lack of a permanent office means the following environmental benefits:
Paper - no paper is used at 4Data unless an ink signature is absolutely required.
Energy and Water - no energy and water are used outside of normal use at home.
Office Supplies - no office means no office supplies are needed.

TRANSPORTATION
4Data is committed to:
- reduce air travel to the minimum necessary to run our business and to choose direct flights as much as possible.
- promote the use of video conferencing to reduce in-person meetings.
- find the most economical means of travel between cities when necessary.

MONITORING AND IMPROVEMENT
4Data is committed to:
- Monitor our environmental performance
- Have management and employees suggest beneficial changes
- Incorporate environmental impact into business decisions
- Increase employee awareness through training
- Review this policy and any related issues at regular monthly management meetings.

Tackling economic inequality

Our Equal Opportunities And Diversity Policy covers economic inequality. Full details of our Equal Opportunities And Diversity Policy can be provided upon request.

Equal opportunity

POLICY STATEMENT
4 Data Solutions Limited (“the Company”) is committed to achieving a working environment which provides equality of opportunity and freedom from unlawful discrimination on the grounds of race, sex, pregnancy and maternity, marital or civil partnership status, gender reassignment, disability, religion or beliefs, age or sexual orientation. Our Equal Opportunities And Diversity Policy aims to remove unfair and discriminatory practices within the Company and to encourage full contribution from its diverse community. The Company is committed to actively opposing all forms of discrimination.
The Company also aims to provide a service that does not discriminate against its clients and customers in the means by which they can access the services and goods supplied by the Company. The Company believes that all employees and clients are entitled to be treated with respect and dignity.
Any and all personal data used in connection with this Policy shall be collected, held, and processed in accordance with the Company’s Data Protection Policy.

Full details of our Equal Opportunities And Diversity Policy can be provided upon request.

Pricing

Price
£30,000 a unit a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Provides the full service for 30 Days
Integrations with third party systems (e.g. SIEM and log management tools)

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ian.tinney@4datasolutions.com. Tell them what format you need. It will help if you say what assistive technology you use.