Managed 24x7 MXDR Security Operations Centre
Cyberfort's MXDR defends your organisation from cyber threats 24x7x365. Utilising the right combination of Microsoft Sentinel and Elastic SIEM for each customer, SOAR enables ingest efficiency, increased ROI and reduces cost . Detecting, responding, and remediating with high speed, accuracy and transparency, you'll see everything we do to defend you.
Features
- 24x7x365 monitoring, detection and response to mitigate cyber risk
- Unique multi SIEM (Microsoft and Elastic) with SOAR solution
- Coverage of all log sources, clouds, infrastructure, data and endpoints
- Dedicated Technical Account Manager as your security expert
- Full SOAR automation and ITSM integration
- ROI Reviews of ingest and efficiency
- Fully integrated and license free EDR solution included
- Scheduled and ad-hoc Threat hunting detects incidents without alerts
- Custom queries, use cases, dashboards, reporting and automation playbooks
- Threat Modelling to align the service to each customers risks
Benefits
- Unique cost management between multiple vendors saves you cost
- Included EDR agent available at no extra cost saves cost
- Active responses under your governance stop threat actors reducing risk
- Tailoring service to your cyber risk reduces risk and cost
- Dedicated TAM works with you to improve your security posture
- Utilise all your existing security investments increasing ROI
- Reduce your compliance effort, delivering custom dashboards/reports
- Reduce risks responding quickly and accurately to events
- Actively support the earning and development of your resources
- No requirement to change your SIEM/tooling for our service
Pricing
£2,000 a unit a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 7 2 1 3 2 3 6 0 6 3 4 6 8 4
Contact
Cyberfort Ltd
Cyberfort Bid Team
Telephone: 01635 015600
Email: bidmanagement@cyberfortgroup.com
Service scope
- Software add-on or extension
- Yes
- What software services is the service an extension to
- Microsoft Sentinel & Elastic SIEM
- Cloud deployment model
- Public cloud
- Service constraints
- No constraints
- System requirements
- None
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Cyberfort’s will triage all requests within 30 minutes and respond according to the incident priority
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- Keyboard shortcuts, captions and transcriptions, screen reader, voice control, magnify screen content, use high contrast colour
- Onsite support
- No
- Support levels
-
We only have one level of support 24x7x365 with full technical account management, analysis and engineering
Please refer to our Service Definition, for more details on our service management and commitments. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Your technical account manager will engage as part of the onboarding project, providing advice, guidance and familiarisation and continue to support throughout the life of the service to maximise ROI and speed of usability
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- The customers Microsoft data is retained in their Azure tenancy meaning that it is resident within their environment and hence does not require extracting. The elastic data is resident in AWS, and can be extracted as part of the offboarding project. All reporting data can be downloaded from Jira
- End-of-contract process
- As part of an offboarding plan, a consultative approach will be built to transfer/delete the data as required. The elastic SIEM can either be migrated to customer ownership, or deleted, as agreed during offboarding. If Microsoft Sentinel is in use, the customer simply defederates Cyberfort from the lighthouse connectivity and removes any guest access authorisation. Microsoft Sentinel remains as is and continues to function collecting logs and detecting incidents according to the existing detection queries, workbooks and playbooks which are all retained by the client.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Other
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- No differences
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Microsoft Sentinel uses the azure portal or azure app, Elastic uses the browser interface, jira has browser support or a dedicated app
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- Keyboard shortcuts, captions and transcriptions, screen reader, voice control, magnify screen content, use high contrast colour
- API
- Yes
- What users can and can't do using the API
- The Microsoft service runs in the clients Microsoft Azure meaning all azure API's are available, The Elastic SIEM is a hosted environment, and does not support API's, however jira also supports API, which we can integrate with your ITSM
- API documentation
- Yes
- API documentation formats
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- The Microsoft service runs in the clients Microsoft Sentinel, meaning that clients can customise as they choose, the Elastic service also provides user customisable dashboards.
Scaling
- Independence of resources
- Cyberfort carefully measures resource/impact of multiple customers, and structured 3year plan mapping of capacity to the resources available. Our service is designed to deliver efficient incident management for both multiple customers and multiple incidents, reducing repetitive manual tasks, and enabling humans to leverage ML and AI in partnership, enabling scalability during times of high incidents. We operate on call capabilities to provide specialist support, and an extensive flood-in capability from within Cyberfort's business of cybersecurity experts that are utilised during major outbreaks or multiple incidents. This is underpinned by regular capacity management reviews, measuring both current reality and future trends.
Analytics
- Service usage metrics
- Yes
- Metrics types
- All data in azure can be reported on as required, additionally incident data is reported as part of the incident, and in monthly reporting, SLA's, service performance
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Data can be exported, utilised for dashboards and then leveraged by the client (for example in powerbi) in any way that they require.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- CSV
- TSV
- JSON
- Parquet
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- CSV
- TSV
- JSON
- Parquet
- Raw text
- CEF
- Syslog
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Other
- Other protection between networks
- Elastic agent recieves configuration over encyrpted connection, and persists this data at rest, in transit encryption via SSL/TLS with OS approporiate encryption enabling offline persistence. Where Microsoft utilised, the service resides in subscription within clients Microsoft tenant, in this instance we do not transfer data directly to our network, however The Defender for Endpoint and Azure Monitor Agent both transmit using TLS 1.2 is protected in transit. The Defender for Endpoint agent utilises tamper protection on endpointsprotecting data and ability to disable the host. The Azure Monitor Agent used for non-MS/Endpoint devices can also be protected utilising Defender for endpoint
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
-
Our service operates under the principle of least privilege, in the elastic area, this access is granted and maintained by Cyberfort, and within the Microsoft environment granted by the client to the data within their Sentinel and Defender environments, this access is granted via Azure lighthouse and Microsoft guest access, and is fully auditable, reputable and owned by the client.
Additionally we mandate secure build devices that are managed intune, all hosts have EDR and SIEM monitoring, and all identities are defended by conditional access and monitoring
Availability and resilience
- Guaranteed availability
- Cyberfort's Service availability for the service itself (SOC) is 99.9, the service on elastic SIEM has SLA's available at, and on Microsoft Sentinel and Azure, whose SLA's are available at https://www.microsoft.com/licensing/docs/view/Service-Level-Agreements-SLA-for-Online-Services?lang=1, the service credits in this case are between Microsoft and the customer.
- Approach to resilience
- Cyberfort's MXDR service is built on a combination of Elastic SIEM, utilising the AWS environment to provide resilience and availability, and (where appropriate and beneficial) Microsoft Sentinel, utilising the Microsoft Azure platform to enable Microsoft logging and correlation performance. Cyberfort monitors the availability of the platforms using the inbuilt service notifications for the Elastic SIEM, Azure portal and all relevant services. The availability and performance of all service components are monitored by the Cyberfort Engineering teams. Our architecture is designed to maximise availability and resilience, including features provided by Elastic (e.g. agent persistence in monitoring should connectivity be lost) and by Microsoft (e.g. Agents spool data in the event of destination loss, and those created by Cyberfort (including resilience and recovery built into our backup and restore pipelines)
- Outage reporting
- Through the notifications and priorities agreed with the customer, including dashboards, emails, phone calls and the ability to subscribe to both Elastic (https://status.elastic.co/) and azure (https://learn.microsoft.com/en-us/azure/service-health/alerts-activity-log-service-notifications-portal) alerts directly.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- For Jira and the Elastic SIEM environment, users are provided by a username with modern password policy requirements and MFA which is JML managed in exactly the same way as Cyberfort user accounts are managed. For Microsoft Sentinel the customer manages this according to their own processes as the service runs within their environment (with specific relevance to G-Cloud found at https://learn.microsoft.com/en-us/azure/compliance/offerings/offering-uk-g-cloud)
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- Current certification accredited: 15/04/2024-17/04/2024
- What the ISO/IEC 27001 doesn’t cover
- Cyberfort was first registered to ISO27001 in August 2019. At our recertification audit in 2023, there were no nonconformities or observations. 2024 Continual assessment visit resulted in no nonconformities or observations.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- 2 Sec Consulting
- PCI DSS accreditation date
- Current certification accredited on: 09/10/2023
- What the PCI DSS doesn’t cover
- Requirement 3 Requirement 4 Appendix A1 Appendix A2
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- NHS Data Security and Protection Toolkit
- NCSC IT Health - CHECK Service Provider
- CREST Cyber Incident Response, Vulnerability Assessment & Penetration Testing
- NCSC Assured Cybersecurity Consultancy - Risk Assessment/Management, Audit & Review
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
-
ISO/IEC 9001
ISO/IEC 14001
ISO/IEC 45001
Cyber Essentials Plus
PCI DSS - Information security policies and processes
-
As an ISO 27001 accredited company, Cyberfort recognise the importance of Information Technology (IT) and its impacts on Information Security and have designed our ‘IT Information Security Policy’ to ensure correct and secure operations are maintained across or organisation. The policy applies to all our operations and all that we do, including 3rd parties, recruitment, IT security, and physical security amongst other subjects.
To ensure that the importance of each information security area is not missed or vague, we use separate policies and procedures for each information security area and where applicable, including; business continuity, breach management, physical and environment security, HR resource security, incident management, asset management, access control, supplier relationships, and information management policies.
Cyberfort’s Data Protection & Compliance Director is responsible for managing and directing our Information Security efforts within this organisation and that our policies are approved at board level.
The IT Information Security Policy is reviewed annually as a matter of course, considering our organisational or technical infrastructure, legislation, and incident reviews. An Information governance and compliance team is in place with clear roles of responsibilities to manage and maintain the compliancy frameworks within the business.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Cyberfort's change management policy is documented and audited as part of our ISO27001 accreditation and ensures all changes are auditable and subject to the correct level of scrutiny based on the potential risk and impact.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Cyberfort use continual vulnerability monitoring to alert us to threats in real-time and in the face of constant changes to our services. An annual infrastructure assessment is commissioned to perform more detailed analysis. Vulnerabilities rated critical or high are patched or mitigated within 14 days, and those rated medium and low are patched or mitigated within 30 days
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Cyberfort deploy next generation endpoint security agents which constantly assess the behaviour of the servers and endpoints for malicious or threatening activity. Threats are notified to out 24x7x365 Service Desk for remediation.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Cyberfort operate ISO27001 and ITIL process for Incident Management, with defined paths for escalation which are dependant on Impact and Urgency. Users can report Incidents by Email, Telephone or Self Service Portal. Incident Reports are provided via Email.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- Public Services Network (PSN)
- Police National Network (PNN)
- NHS Network (N3)
- Joint Academic Network (JANET)
- Scottish Wide Area Network (SWAN)
- Health and Social Care Network (HSCN)
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Cyberfort support and act on fighting climate change through our Environmental Management System (EMS) which meets the requirements of our ISO:14001 certification. We have initiated programs designed to increase the energy efficiency of our operations, reduce waste, and protect the environment in communities where we work. Our environmental goals and achievements are published in our Carbon Reduction Plan (CRP), which is aligned to the requirements of CCS PPN 06/21.
Our social value strategy addresses MAC 4.1 & 4.2 with the following commitments:
Effective stewardship of the environment
We are committed to become a net-zero and environmentally conscious company by conserving energy, minimising consumption, reducing, and preferring low pollution materials, maximising environmental efficiency, whilst ensuring waste is managed and controlled.
We support our environmental targets with the following initiatives:
• Continue to reduce our carbon emissions, including 100% renewable energy, power saving modes, light replacement programmes, hybrid/remote working and cycle to work incentives.
• Reduce water consumption, including water filter systems off the mains instead of using water providers, consider Water Butts around site as an alternative for gardening, and detection of increased water consumption to identify any leaks in facilities.
• Adopt strategies to promote, reuse, recycle, recover energy and disposal of waste sent to landfill, including initiatives to reduce our plastic waste and targets for recycling of waste.
• Deliver initiatives to support our environments, ensuring that we are protecting and encouraging native plants and wildlife. We’ve already introduced a small flock of sheep to our Ash site to help make our site more environmentally friendly, and at our Newbury site we limit operations to specific times to ensure protection of nightjars which is a protected wildlife species.
• Consider who we purchase goods and services from ensuring providers are targeting net-zero initiatives and offer sustainable product and servicesCovid-19 recovery
Cyberfort support and act on Covid-19 recovery by encompassing initiatives that force for positive change. We have aligned the activities of our business by considering sustainability through the decisions we make as a business, including the way we operate, employ staff, engage with communities, and procure products and services, allowing us to cultivate a more sustainable, resilient, and inclusive society.
Our social value strategy addresses MAC 1.1, 1.3, 1.4 & 1.5 with the following commitments:
Help local communities to manage and recover from the impact of COVID-19
We support Covid-19 recovery with the following initiatives:
• Throughout the pandemic and to date we’ve maintained a recruitment drive, often offering positions to individuals affected by the impacts of Covid-19 in the industry.
• We upskill people new to Cyber via supporting Apprenticeship schemes.
• We remove any barriers for disadvantaged groups by adjusting our recruitment and selection processes and excluding bias.
• We promote health and wellbeing in the workplace, ensuring all our people have healthy lifestyles, thrive, and that they feel supported with the tools they need from us to be at their best. Including Mental Health First Aiders, confidential, and free-of-charge, support and benefits to all, including counselling and Private Medical Insurance.
• Since the pandemic we recruit fully remote or hybrid working roles, which allows us to tap into wider talent pools and therefore ensure we are accessing the best candidates without any locational barriers.
• We are committed to working with small, diverse, high-quality business to procure goods and services, structuring our supply chain selection process in a way that ensures fairness and encourages participation by new and growing businesses.Tackling economic inequality
Cyberfort support and act on tackle economic inequality, through supporting new businesses, new employment opportunities and development of new skills.
Our social value strategy addresses MAC 2.2 & 2.3 with the following commitments:
Create new businesses, new jobs and new skills
We are committed to ensuring that everyone is given the opportunity to develop in accordance with their ability, ambition and opportunities available, providing recruitment, training, development and progression opportunities to encourage everyone to reach their fullest potential.
We support tackling economic inequality with the following initiatives:
• Attract, recruit, develop and retain the very best people at all levels.
• Upskill people new to Cyber via supporting Apprenticeship schemes.
• Actively support educational attainment across our workforce, including training to address skills gaps resulting in recognised qualifications.
• Support young people in the development of their passion for technology, introducing them to cybersecurity, and providing initiatives that support schools and colleges.
Our social value strategy addresses MAC 3.1, 3.4 & 3.5 with the following commitments:
Increase supply chain resilience and capacity
We are committed to work fairly and responsibly with our supply chain and ensure that we manage and identify cyber security risks.
We support tackling economic inequality with the following initiatives:
• Collaborating throughout the supply chain to adopt a fair and responsible approach to working with suppliers and partners.
• Supply chain selection process identifies opportunities to sub-contract with a diverse range of businesses, including new businesses, entrepreneurs, start-ups, SMEs, and VCSEs.
• We have measures within supply chain selection process to mitigate and manage cyber security risks within our supply chain, e.g. including NCSC cyber risk regime and Cyber Essentials/Plus certifications.Equal opportunity
Cyberfort support and act on equal opportunities, fostering an inclusive culture that values people as individuals with diverse opinions, cultures, lifestyles and circumstances. All employees are covered by our Equality, Diversity & Inclusion Policy, which applies to all areas of employment including recruitment, selection, training, deployment, career development, and promotion.
Our social value strategy addresses MAC 5.1 & 5.2 with the following commitments:
Reduce the disability employment gap
We support the disability employment gap with the following initiatives:
• We are signatories of the Armed Forces Covenant.
• We are a Disability Confident Employer and founding members of Neurodiversity in Business.
• Our recruitment practices ensure we are disarming any barriers people with disabilities may face in the hiring process.
• Developing and supporting people with disabilities in gaining the skills they need to succeed.
Our social value strategy addresses MAC 6.1, 6.2 & 6.3 with the following commitments:
Tackle workforce inequality
We support the tackling workforce inequality with the following initiatives:
• Take reasonable and appropriate steps to encourage job applications from as diverse a range of people as possible and recruiting people with an impairment or disability.
• Decisions made relating to a person's promotion or career development must be free from discrimination.
• We provide training, development and progression opportunities to all staff supporting career aspirations.
• Our Employee Resource Groups include Women’s Network, Inclusion Committee and Neurodivergent Community Group, providing forums for people who have a passion for, or a connection with, a particular aspect of equality, diversity and inclusion.
• Whilst not required under the Modern Slavery Act 2015 to have a policy, we have a zero–tolerance approach and have implemented a modern slavery policy.Wellbeing
Cyberfort support and act on health and wellbeing through our Occupational Health and Safety (OH&S) policy in alignment with our ISO:45001 certification. We actively work on initiatives to promote health and wellbeing in the workplace, ensuring all our people have healthy lifestyles, thrive, and that they feel supported with the tools they need from us to be at their best.
Our social value strategy addresses MAC 7.1 & 7.2 with the following commitments:
Ensuring positive physical and mental health in the workforce, ensuring our people have healthy lifestyles.
We support our workforce with the following initiatives:
• Mental Health First Aiders – We have 9 fully trained Mental Health First Aiders within our workforce.
• Wellbeing Benefits – we provide confidential, and free-of-charge, support and benefits to all, including confidential counselling and support service available 24/7, 365 days a year and Private Medical Insurance with extra to cover employees for Mental Health support.
• Our Wellbeing Hub (on the Cyberfort SharePoint) provides various resources, self-help tools and guides to help individuals stay well and includes any previous recordings from workshops that have been run.
Our future goals include:
• Certified to ISO:45003 standard in 2024, which focuses on the “mental health” and “wellbeing” aspects of health and safety.
• Strengthening our commitments through 6 standards of the Mental Health at Work Commitment in 2024, to ensure that we continue to provide the right support as and when needed.
Pricing
- Price
- £2,000 a unit a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Cyberfort offer a PoC of our SOC service where Microsoft technologies are already in use and deployed