Secure Managed Zero Trust Network Access (ZTNA)
hSo ZTNA enables a Work from anywhere approach such that trusted devices can access any approved application.
Replacing a VPN into the LAN, ZTNA clients are used to seamlessly validate both the user and the device state to ensure only trusted people on safe devices are allowed into corporate resources.
Features
- Secure 'work from anywhere' network access
- Role based user profile access
- Reduces network 'attack surface'
- 'Least privilege' application access
- Time profiles to limited hours of access
- URL Blocking and limiting
- End point protection
Benefits
- Promotes work from anywhere capability
- Users access only applications required for their role
- Hides cloud applications from unvalidated users and devices
- Time based network access control
- Restricted User URL access
- End point protection to enhance security
Pricing
£1.51 a device a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 1 1 4 4 1 6 5 1 3 0 6 5 4 8
Contact
hSo
Marketing
Telephone: 020 7847 4510
Email: marketing@hso.co.uk
Service scope
- Service constraints
- Non mainstream devices may require workarounds
- System requirements
- Client to be installed on end device
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We have a 24/7 support 365 days a week with a 4 hour SLA on service issues. Automated systems log the ticket and follow up is within 4 hours, or quicker for high priority issues.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
-
HSo provide one level of support 24/7 .
hSo operate a dedicated Customer Services Centre. The Service centre provides tiered telephone support so that customers can speak directly to the appropriate technical or non-technical support staff as required.
Support of the service is covered within the cost of the service.
Support for configuration or migration assistance - i.e. helping/training you use the service for your own needs is a paid for addition.
All customers have an assigned account manager to assist in managing your account. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
HSo will set up the environment, agree user access profiles, work with the customer IT team to identify all application access profiles and all affected devices.
hSo would agree a remote based rollout program with the customer and an associated communications program for users. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Not applicable as no data is held.
- End-of-contract process
- The service is terminated at no cost. Various options are available should the customer wish to retain an element of the service.
Using the service
- Web browser interface
- Yes
- Using the web interface
-
HSo provides an Endpoint Management Service that is a security management solution that enables scalable centralised management of multiple endpoints. The hSo EMS provides customer administration of endpoints and provides visibility across the network to securely share information and assign security policies to endpoints.
hSo EMS features include:
• Remotely deploying ZTNA software to Laptop computers
• Updating profiles for endpoint users regardless of access location
• Administering ZTNA endpoint connections, such as accepting, disconnecting, and blocking connections
• Managing and monitoring endpoints, such as status, system, and signature information
• Defining web filtering rules in a profile and remotely deploying the profile to the Web Filter extension on Google Chromebook endpoints - Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
-
HSo Endpoint management system is accessed by a URL, customised and provided to the customer.
hSo EMS features include:
• Remotely deploying ZTNA software to Laptop computers
• Updating profiles for endpoint users regardless of access location
• Administering ZTNA endpoint connections, such as accepting, disconnecting, and blocking connections
• Managing and monitoring endpoints, such as status, system, and signature information
• Defining web filtering rules in a profile and remotely deploying the profile to the Web Filter extension on Google Chromebook endpoints - Web interface accessibility testing
- None
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- The Endpoint Management system is sized for, and dedicated to each customer thereby ensuring no resource or contention constraints
- Usage notifications
- Yes
- Usage reporting
-
- API
- SMS
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- Number of active instances
- Other
- Other metrics
-
- Security and logon profiles
- Software client versions
- Reporting types
-
- Real-time dashboards
- Regular reports
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
- Physical access control, complying with SSAE-16 / ISAE 3402
- Data sanitisation process
- No
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- No
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
HSo provide one level of support 24/7 and will respond to any incident within 4 hours.
Service credits, if applicable, can be agreed at the commencement of the contract - Approach to resilience
- HSo's Datacentre services are geo resilient, and further details will be provided on request.
- Outage reporting
- HSo provides email and telephone alerts to affected customers.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- HSo has identity and authentication controls in place to ensure users are authorised to access specific areas. Authentication and access to management interfaces over secure channels is restricted through ISO 27001 & CAS-T approved hSo access policies, only active staff concerned with the service have access to system management features. These staff are managed through the hSo support department.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
-
- Dedicated device over multiple services or networks
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Alcumus ISOQAR ISO/IEC 27001-2013
- ISO/IEC 27001 accreditation date
- 13/03/2022
- What the ISO/IEC 27001 doesn’t cover
- N/a - all hSo business processes are within scope.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- HSo's governance framework includes our ISO 27001, CAS-T and HSCN approved Information Security management system of policies and processes. these are regularly assessed . We have a defined information security manager on the management team and have an on-going process of risk reporting and compliance conformance checking.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Our configuration management processes and systems ensure the composite assets of the service are recorded and their configurations known. Changes to services are submitted for review, assessed, prioritised and then planned and recorded in the audited change request system. Orders, incidents and planned works of the customer service and host environment are covered by our ISO 27001, CAS-T & HSCN processes including the patching policy, and by our ISO 20000 service management system.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Vulnerability threats to services are managed through the network operations centre and major issues also via the risk register. These are identified through vendor alerts, threat subscriptions and protective monitoring systems and employee alerting. We patch systems according to our ISO 27001 patching policy and we protect systems though automated updates to threat management systems. We also mitigate potential threats through our access control policy.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- HSo is ISO 27001, CAS-T & HSCN certified, and applies these principals to all services it provides. hSo continually monitors its own base infrastructure through automated network management tools and a 24/7 network operations centre. We also have a propriety network flow monitoring system and a network data analysis tool to identify potential attacks. We protect our systems through DDOS protection against abnormal traffic to individual servers.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- HSo incident management processes conform with ISO 27001, CAS-T & HSCN certified assurances; hSo follows ITIL incident management processes and has trained its staff using this to satisfy ISO 20000. We have defined processes for common and uncommon events and test these annually. Incidents are reported by users, email and phone; And also by our automated monitoring systems. Incident reports are either through the portal, email or phone calls. For major events a root cause report can be provided. We have built in escalation paths depending on the severity of incidents. We can demonstrate robust and rehearsed incident management procedures.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- VMware
- How shared infrastructure is kept separate
- HSo manages separate server instances for each of the endpoint management services.
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
hSo has implemented measures to reduce its environmental impact and carbon emissions and remains fully committed to reaching its targets of achieving net zero emissions and reducing its overall environmental impact. The following environmental management measures and projects have been completed or implemented since the 2019 baseline. The carbon emission reduction achieved by these schemes equate to approximately 275 tCO2e, a 45%ge reduction against the 2019 baseline.
In 2021 hSo successfully gained its ISO 14001 accreditation and has been working towards further improving its environmental footprint.
hSo products and services assist in tackling climate change by using greener products and low carbon solutions. Our Cloud Compute solutions enable customers to reduce their energy consumption in buildings, and our secure connectivity solutions promote flexible working. This results in their staff being able to work flexibly, releasing the benefits of lower transport emissions and a reduced demand for office space.
We are implementing further measures including:
(1) Developing and improving the automation of our office based activities through network and tech based initiatives and efficiencies
(2) Implement a waste recycling scheme for food waste and packaging. Replace any single use plastics with recyclable or biodegradable.
(3) Improve our repurposing and recycling initiatives by introducing further measures in relation to product testing in our training lab and hardware. This includes introducing more ZTP products and services so that more equipment can be shipped directly to customers
(4) Continue to promote Cloud-based services avoiding the need for dedicated customer equipment and eliminating equipment shipping to customer sites or visits by engineers
(5) Continue to only use carbon neutral suppliers
(6) Continue to design and encourage efficient and sustainable solutions for our customers
(7) Offset all our carbon emissions by 2030
Pricing
- Price
- £1.51 a device a year
- Discount for educational organisations
- No
- Free trial available
- No