Collaborative Working Environment (CWE)
The Collaborative Working Environment (CWE) platform boosts productivity for global national security, defence and law enforcement agencies. Integrating multiple communication tools into one platform, it's field-tested with Five Eyes and industry partners, ensuring reliability. CWE can be hosted in a controlled cloud environment or managed as a service.
Features
- Real-time messaging with secure direct and group channels.
- End-to-end encrypted one-to-one voice calls via WebRTC.
- On-demand video conferencing with screen-sharing, fully encrypted.
- Protected collaboration spaces for secure team interactions.
- Collaborative editing and sharing of Microsoft Office documents.
- Low-code framework-based app store for easy customisation.
- Responsive, web-based interface accessible on multiple devices.
- User experience modelled on popular social networking tools.
- Navigation dashboard with quick access to all features.
- Public or private workspaces with adjustable privacy settings.
Benefits
- Streamlines secure communication across organisations and teams.
- Ensures confidentiality with advanced encryption for all communications.
- Facilitates effective remote meetings with comprehensive tools.
- Promotes secure, trusted collaboration environments.
- Enhances productivity through seamless document collaboration.
- Simplifies application deployment and management.
- Offers consistent performance on desktop and mobile.
- Minimises training time with intuitive social-media-like interface.
- Provides immediate access to essential tools and information.
- Allows customisation of workspaces to fit project needs.
Pricing
£3,800,000 a licence a year
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 2 2 0 2 9 8 4 6 0 6 4 4 1 7
Contact
MONKTON GROUP UK LIMITED
Shirley Herron
Telephone: +44 7866 566 141
Email: shirley.herron@monkton.io
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- The CWE can be extended through AWS API services and integrated with third-party open-source products. GitLab, an open-core DevOps software package combines the ability to develop, secure, and operate software in a single application is built in.
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- The CWE encompasses a Security and Compliance Baseline which includes a complete System Security Plan tailored for the FISMA Moderate and FedRAMP Moderate baselines that can be easily adapted for implementation by any FVEY member nation. The solution includes quarterly patches and security updates delivered via Terraform scripts integrated with Gitlab. Security and Compliance Baseline is delivered as a managed service and is backed by a Tier 3 support contract for resolving any product related issues.
- System requirements
- N/A
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- Within the working day, we aim to respond within two hours. At weekends, a line of communication is available.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
- Baseline support for all access is included within the contract. Extra support to be discussed on a contractual basis depending on customer requirements.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We provide a structured and comprehensive training program tailored to meet organisational needs.
Virtual Training: We provide digital training sessions that are accessible remotely. These sessions are conducted live to allow real-time interaction and are recorded for on-demand access. The virtual training is designed to cover all fundamental aspects of our platform and Q&A sessions to enhance understanding.
On-site Training: We can provide on-site training sessions for organisations that request in-person instruction. These sessions are conducted by experienced trainers and are customised to address the specific operational needs of users.
User Documentation: Comprehensive user manuals and quick-start guides are available in both digital and print formats. These documents provide detailed step-by-step instructions for using the platform effectively.
Interactive Learning and Support Tools:
Getting Started Guide: Upon signing up, users receive an interactive guide that walks them through the initial setup process, from account creation to basic operations, ensuring a smooth start.
Platform Wiki: The platform features a dedicated wiki that includes a variety of learning materials such as how-to videos, instructional guides, and best practices. This resource is continuously updated and available directly within the platform, allowing users to learn and troubleshoot at their own pace. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
For the customer-hosted CWE, data is stored within the customer's own AWS environment, allowing full control over their information. Upon annual license subscription expiry, access to the CWE platform is discontinued, and users cannot log in.
Before the subscription expires, customers receive detailed instructions on securely extracting and migrating their data from the CWE. This process adheres to best practices for data handling to ensure all data remains protected during the transition.
In the managed CWE scenario, our team directly handles data management and access within a secure and compliant framework. When the license subscription ends, access to the CWE platform is terminated. Customers are notified in advance about the expiration and provided with the necessary support for data extraction. The CWE platform will notify the administrator that the license has expired and will give the administrator permission to export all data to an S3 bucket. - End-of-contract process
-
At the conclusion of the contract, our process is designed to ensure a smooth and transparent transition, addressing all necessary aspects of service discontinuation and data management. Customers are given the opportunity to retrieve all their data from our platform. We provide comprehensive support to assist with data extraction, ensuring that clients can securely download or transfer their data to a preferred location. Following the data retrieval period, and in compliance with legal and contractual obligations, all customer data stored on our systems will be securely erased. Confirmation of data deletion is provided to the customer to ensure that no residual data remains on our servers. Customer accounts are formally closed, and all access rights are revoked to safeguard against unauthorised access post-contract. For customer hosted the CWE platform will notify the administrator that the license has expired and will give the administrator permission to export all data to an S3 bucket.
Additional costs incur for data migration services at the end of the contract if customers require technical assistance beyond the standard data retrieval processes. Knowledge transfer documentation and specialist support during the transition can be purchased.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Full functionality on mobile and desktop device.
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- The CWE platform is delivered using a single-pane-of-glass web-based user interface that is responsive on both desktop and mobile form factors. The user experience is modelled after popular social networking tools to minimise field training requirements. Each module is designed with usability and accessibility in mind to ensure easy adoption by both headquarters and field personnel. The home page provides easy navigation to all the key functions within the platform, including spaces, people, chat, files, calendar, tasks, and apps. Users receive alerts of messages and notifications in the upper right navigation bar.
- Accessibility standards
- None or don’t know
- Description of accessibility
- No accessibility standards are met at present, but this is on the immediate roadmap
- Accessibility testing
- None at present
- API
- No
- Customisation available
- Yes
- Description of customisation
- Any user can create protected spaces to organise their work across organisations, projects, or mission areas. Spaces can be designated as either public (open to the entire community) or private (requiring others to request to join) as required. Spaces can also optionally be hidden from the directory for increased privacy. Users can build web-based apps implemented using a low-code development framework. Modules can be enabled/disabled.
Scaling
- Independence of resources
- Customer environments are logically segregated to prevent users and customers from accessing resources not assigned to them. Services which provide virtualised operational environments to customers ensure that customers are segregated via security management processes/controls at the network and hypervisor level. We continuously monitor service usage to project infrastructure needs to support availability commitments/requirements. We maintain a capacity planning model to assess infrastructure usage and demands at least monthly, and usually more frequently. In addition, we provide capacity planning model which supports the planning of future demands to acquire and implement additional resources based upon current resources and forecast requirements.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Yes, we provide detailed service usage metrics accessible through PDF and HTML. These metrics include user activity, resource utilisation, performance indicators, and error rates.
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
-
The platform has an in-built function for exporting to .csv the user-defined results with appropriate file size limits for the size of data being requested. As a cloud-based service the export query is queued against other incoming requests and processed sequentially.
The CWE can be extended via AWS API systems to export both current and snapshot data. - Data export formats
-
- CSV
- Other
- Other data export formats
- Json
- Data import formats
-
- CSV
- Other
- Other data import formats
- Json
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
For customer hosted workloads, refer to the AWS Legal Terms and Conditions that governs a customers usage. https://aws.amazon.com/legal/
For managed services, we align with the customers AWS Support Tier - https://aws.amazon.com/premiumsupport/plans/ - Approach to resilience
-
Our service is rigorously designed for resilience to ensure high availability and robust performance, with deployment options tailored to specific needs. For managed services, we typically deploy in the AWS London region or AWS US GovCloud. These regions are chosen for data sovereignty, redundancy, security, and compliance capabilities, providing a resilient infrastructure that withstands a variety of operational challenges.
For customers managing their own deployments, we offer detailed blueprints and guidance to support a resilient setup. Our professional cloud support services are available to help implement a fully resilient deployment of the CWE platform. This service includes integration patterns for multi-domain integration, data interoperability, or for establishing secure connections with FVEY, AUKUS, NATO allies, and partner organisations.
In the US, the CWE can be deployed in both the UK and US GovCloud regions with configured cross-nation data replication to support US/UK interoperability. The US GovCloud region has native access to US Department of Defense Gateway Services such as C2S, SIPRNet, and NIPRNet. This dual-region approach enhances operational continuity and secures data handling across different jurisdictions, ensuring that our service meets the highest standards of global data security and operational reliability. - Outage reporting
-
Our service employs several methods to ensure transparent and effective reporting of any outages.
The CWE operates on AWS, which provides a comprehensive health dashboard. Users can directly access this dashboard if the service is hosted in a customer's AWS environment, allowing real-time monitoring of service status. For managed services, we issue email alerts to all affected users during an outage. These alerts detail the outage scope, expected resolution timeline, and user impact. We maintain continuous communication throughout the outage to keep users informed of ongoing progress. For administrators who require deeper oversight, we offer integrations with Security Operations Centers (SOC) or Security Information and Event Management (SIEM) solutions. This allows admintrators to monitor the platform directly or pull logs into their own dashboards. In the event of critical incidents, we collaborate closely with administrator technical/security teams and AWS service teams to manage and resolve issues. This partnership ensures that we provide swift and coordinated responses to minimise downtime and disruption. These mechanisms ensure that users are promptly informed of service interruptions, enabling effective planning and minimising disruption while enhancing communication and transparency during incidents.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Other
- Other user authentication
- OAuth 2.0/OIDC
- Access restrictions in management interfaces and support channels
- Our approach to access restrictions in management interfaces and support channels is grounded in the principles of Role-Based Access Control (RBAC). This method ensures that only authorised personnel have access to specific levels of information and functionality, based on their roles within the organisation.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Other
- Description of management access authentication
- We use OAuth 2.0 with OpenID Connect (OIDC) for secure, token-based user authentication and authorisation before allowing access to management interfaces. OAuth2.0's framework ensures authentication requests are handled securely. We enforce 2FA for all users accessing management interfaces. After initial login, users must verify their identity through another method, (eg mobile device notification/ a text message/ security key) providing a dynamic token that must be entered to gain access. We support FIDO standards for additional security, allowing authentication via biometric devices or FIDO security keys. This enhances security and simplifies the authentication process by leveraging universal second factor (U2F) technology.
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- -
- ISO/IEC 27001 accreditation date
- -
- What the ISO/IEC 27001 doesn’t cover
- -
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- AWS Cloud Professional
- GCP Cloud Professional
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
We adhere to stringent information security policies and processes, designed to protect data integrity, secure our infrastructure, and comply with industry standards. Our security policies include:
Two-Factor Authentication and Zero Trust: We enforce mandatory two-factor authentication and adhere to the Zero Trust model, ensuring robust identity verification for network access and minimising unauthorised access risks.
Workforce Education: All employees undergo regular security awareness training to strengthen adherence to our security standards and enhance overall awareness.
Data Encryption: To safeguard sensitive information, we encrypt all data at rest, ensuring protection even in the event of physical security breaches.
Sensitivity Assessment: We classify data and projects by sensitivity, applying tailored security controls to each category to adequately protect information.
Our security framework is continuously managed according to current industry standards. Regular audits and systematic reviews help maintain the effectiveness of our policies and adapt to emerging threats. These comprehensive measures ensure the security of our operations and sensitive information, aligning with best practices in information security.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Using Gitlab for version control provides comprehensive audit trails ensuring modifications are tracked (including who/what/when) enabling easy rollback and accountability in our development process.
Infrastructure as code (IaC) allows automated setup and maintenance of environments ensuring consistency and reducing mistakes. Configurations are declarative and are automatically enforced and maintained.
Advanced observability tools monitor infrastructure and configurations continuously alerting to unexpected or unauthorised changes. This maintains security, stability and compliance of environments.
Configuration and change management are aligned with industry best practice ensuring secure, scalable and maintainable infrastructure. Our process is responsive and controlled, supporting rapid development while ensuring rigorous oversight. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Our vulnerability management strategy proactively identifies and mitigates risks to secure our applications. We integrate SAST, DAST, Container, and Dependency Scanning in our workflows, use cryptographically signed artefacts, and embed threat modelling in development to ensure early vulnerability detection. Patches are rapidly deployed after rigorous testing in a test environment and moved to production without downtime. Updates failing user acceptance testing are reverted. We source threat intelligence from diverse databases, advisories, and community partnerships, continually adapting to evolving threats to maintain robust protection.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Our protective monitoring processes are designed to promptly identify and respond to potential security compromises, ensuring the integrity and security of our systems. We use advanced security tools to continuously monitor our network and systems for unusual activities that may indicate a compromise. Through anomaly detection, our systems are configured with baseline security profiles. Any deviation from these configured baselines is flagged for further investigation. We integrate the latest threat intelligence into our monitoring systems to identify potential threats proactively. Upon detection of a potential compromise, affected systems are immediately isolated to prevent further unauthorised access or damage.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Customer management support process will escalate any incident according to its criticality, assessed by our CSM team member on call. This will be relayed to our Engineering team on-call. Our security team conducts a thorough analysis to understand the scope and impact of the incident. We implement necessary remediations based on the incident’s nature, followed by strategies to prevent future occurrences. Relevant stakeholders are informed of the incident according to the severity and escalation protocols. Incident reports are provided. Our approach ensures that we are well-prepared to handle security incidents swiftly and efficiently, minimising potential impacts and maintaining trust.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Tackling economic inequality
We strive to tackle economic inequality by creating opportunities for new businesses, fostering entrepreneurship, and enhancing skills development. Our services are delivered with a strong emphasis on economic inclusivity, engaging SMEs, start-ups, and social enterprises in our supply chain to promote diverse economic growth. Innovation is at the heart of our strategy to modernise delivery and increase productivity.
We invest in disruptive technologies and support our supply chain partners in adopting these innovations, thereby enhancing their capacity and resilience. We also prioritise cybersecurity, ensuring that all partners in our supply chain are equipped to manage these risks effectively. Our approach to economic inequality is holistic, involving every stakeholder from employees and suppliers to customers and community members, ensuring that the benefits of our contracts extend beyond traditional business metrics to foster genuine economic change and resilience.Equal opportunity
We are committed to fostering a workplace that supports the diverse needs of all employees by adjusting workplace policies, enhancing tool accessibility, and improving productivity. Our dedication extends beyond internal practices to include closing the disability employment gap through inclusive hiring practices that prioritise accessibility and fairness. We also promote these values among our suppliers, partners, and customers to encourage a network-wide commitment to diversity.
We strive for equal treatment in all aspects of employment and cultivate an inclusive culture where varied perspectives and experiences are valued. This commitment enriches our service quality and strengthens our team through shared diverse experiences. To attract top talent, we use direct recruitment and select third-party recruiters who align with our diversity goals. Our strategy leverages platforms like LinkedIn to reach beyond our traditional networks, ensuring a diverse range of candidates and supporting our broader commitment to inclusion.Wellbeing
Our commitment to wellbeing is integral to our operational philosophy, designed to support both the physical and mental health of our employees. We provide extensive health benefits, access to mental health resources, and conduct workshops focused on stress management, work-life balance, and healthy living. Flexible working hours, remote work options, and wellness days are part of our approach to promote a healthy work environment.
We encourage our team to prioritise their wellbeing and seek support when needed, fostering a culture of openness, inclusivity, and respect. This comprehensive approach ensures that all team members can perform at their best, effectively balancing professional and personal lives while contributing positively to broader societal goals. Our efforts create a supportive and integrated working environment that meets the immediate needs of our team and customers and enhances overall community wellbeing.
Pricing
- Price
- £3,800,000 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- No