Broadcom/Symantec Email Threat Isolation (ETI)
Symantec Email Threat Isolation stops advanced email attacks by insulating users from spear phishing, credential theft, and ransomware attacks by isolating malicious links and downloads. It stops credential theft by rendering webpages in read-only mode by virtualizing browsers in a highly-scalable and secure, disposable container, creating a secure execution environment.
Features
- The URL Isolation feature executes URLs in an isolation platform
- Isolates malicious content
- A seamless indistinguishable user experience
Benefits
- Insulate users from spear phishing, ransomware
- Prevent credential theft by using read-only
- Only safe or sanitized content is delivered to your organization
Pricing
£1 a user
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 2 5 5 0 0 3 7 1 3 7 1 0 3 2
Contact
Gradian Systems Ltd
Stuart Case
Telephone: 07770 377936
Email: stuart.case@gradian.co.uk
Service scope
- Software add-on or extension
- Yes
- What software services is the service an extension to
- Symantec's Email Security Service
- Cloud deployment model
- Public cloud
- Service constraints
- None.
- System requirements
- Customer must also have Symantec's Email Security Service
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Please see Gradian's Support Guide attached.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- No
- Support levels
- Please see Gradian's Support Guide attached.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Gradian possess the skills and support to configure, deploy, support and run this service on your behalf. These services can be found under Gradian's Professional Service and Gradian's Managed Configuration Service. Alternatve support options can be found under Gradian's Technical Account Service Plan (T.A.S.P) and Gradian Support for Symantec Products.
- Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
- PowerPoint
- End-of-contract data extraction
- The reporting data can be exported in CSV format, no data will be held after end of contract.
- End-of-contract process
- Symantec will stop isolating and rewriting links for the customer. Should they also stop using ESS, their instance is deleted from AWS cloud after the end of the contract and all information is deleted with it.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- All detection is carried out in a cloud environment so there is no difference in service regardless of the endpoint being used
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- The portal is a web based management console. As the administrator for the organization you can configure various security settings. Administrators log in using a portal administrator account. Password policy settings ensure that your portal user accounts are controlled with a time-limited password expiry date and a set limit of password re-use.
- Accessibility standards
- None or don’t know
- Description of accessibility
- Web based management console, dependant on threat levels the users may be in read mode.
- Accessibility testing
- Unknown
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- The Services are designed ground-up to be resilient by providing highly-available regions. The Detection Servers (Detectors) are provisioned on-demand as a pool (more than one) and elastically scale depending on the workload.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Broadcom/Symantec
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Other
- Other data at rest protection approach
- Data at rest is stored in the Amazon cloud.
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- The reporting data can be exported in CSV format, no data will be held after end of contract.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- The Platform is available on a twenty-four (24) hours/day by seven (7) days/week basis and is monitored for availability and service capacity.
- Approach to resilience
- Buyers are provided with their own instance of the Email Security Services, ETI is an add on to this solution. Redundant data center clusters to balance availability in the event of outage.
- Outage reporting
- Scheduled maintenance and emergency outages reported to customer by Symantec.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Must be logged into the web app to access these features, and have the appropriate user-role in the Platform.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- Data centers SOC 2 type 2 reports
- ISO27001 compliant
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We have an ISMS committee who are responsible for day to day management of the ISMS system. That committee is headed by a senior manager who is responsible for compliance and customer assurance. That committee reports to a governance committee responsible for all applicable standards compliance, which then reports to the business owner of the service.
- Information security policies and processes
- All staff are required to read and comply with our security policies. Staff are trained in line with our security practices. Our Chief Security Officer reports directly to Symantec's General Counsel. Our policies and processes include, but are not limited to, security, incident response, business continuity, secure software development and supply chain risk management. External versions of a number of our policies are available here: https://www.symantec.com/about/customer-trust-portal
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- We follow a multi-stage process. Our DevOps process drives change management, including the development cycle, testing, quality assurance and staging, prior to deployment into production deployment
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Symantec has a formal process for handling and managing vulnerabilities. For any externally reported issues, Symantec follows the process outlined in ISO 29147, Information technology — Security techniques — Vulnerability disclosure ([ISO/IEC 29147:2014(E)]). Symantec'c Software Security Group works with the impacted team(s) to: Recreate the environment and issue within Symantec’s labs for an expedited resolution. Facilitate a prompt and accurate response. Avoid delays in new Symantec releases.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We follow a multi-stage process. Our DevOps process drives change management, including the development cycle, testing, quality assurance and staging, prior to deployment into production deployment
- Incident management type
- Supplier-defined controls
- Incident management approach
- Symantec’s internal Security Incident Response Plan documents repeatable, industry standard procedures for handling actual cyber threats when they arise. It also provides the necessary engagement and information-sharing processes to allow prompt coordination among all relevant stakeholders, and describes the reporting, communication, containment, investigation, and recovery mechanisms that exist to support a comprehensive end-to-end process flow from threat detection through remediation. The development and implementation of this forward-looking plan supports Symantec’s ultimate mission to its customers, partners, shareholders, and employees as a trusted leader in information security risk management.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
Gradian are very proud to be an equal opportunity employer.
Pricing
- Price
- £1 a user
- Discount for educational organisations
- No
- Free trial available
- No