Skip to main content

Help us improve the Digital Marketplace - send your feedback

2T SECURITY LTD

Cross Domain Secure Mobility

We design, build and support sensitive mobile systems for accessing classified data and domains, in line with NCSC patterns and our work in Advanced Mobile Solutions (AMS). Cross Domain Gateways (CDGs), ephemeral systems design, tailored monitoring, and strict data definition, protect sensitive and high threat systems against sophisticated threat actors.

Features

  • Custom design and build for tactical sensitive mobile systems
  • Cross-Domain expertise for robust inter-domain segregation
  • Designs align with NCSC patterns for Advanced Mobile Solutions
  • Ephemeral technology used to provide enhanced system security
  • Strong data design and typecasting for effective CDG deployment
  • Support available for individual components or whole mobile ecosystem
  • Experience of safely passing complex crypt/protocols across CDGs
  • We provide non-biased vendor-neutral view on problems and their solutions
  • Tactical or strategic architecture for projects, and migration support
  • Solutions solve complex issues using of commercial mobile devices

Benefits

  • Tailored monitoring and strict data definition protect high threat systems
  • Your technical security problems managed by an NCSC assured organisation
  • Confidence your security-architecture is being delivered to a consistent standard.
  • We have extensive real-world experience covering most central Government departments
  • Services led by UKCSC Chartered, ACSC Security Architect, Head Consultant
  • Modular approach to functionality, augmented in stages to support enhanced-requirements
  • Our response plans protect your controls and business assets
  • Understanding existing security controls for effectiveness and response capabilities
  • Risk assessments executed to identify your most critical business assets

Pricing

£450 to £1,800 a unit a day

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at opportunities@2t-security.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

3 2 7 0 0 5 7 3 5 5 2 5 5 7 7

Contact

2T SECURITY LTD Antony Badsey-Ellis
Telephone: 07711 037701
Email: opportunities@2t-security.com

Planning

Planning service
No

Training

Training service provided
Yes
How the training service works
Our philosophy is to provide only the amount of help and support that is required; we are happy to teach our clients how to build and run their solutions to enable in-house management, and should you require support in the technical security space, then we can help. We can support projects of all sizes, across a wide variety of security disciplines.
Training is tied to specific services
No

Setup and migration

Setup or migration service available
No

Quality assurance and performance testing

Quality assurance and performance testing service
Yes
How the quality assurance and performance testing works
We can provide architecture assurance where standard mobile apps and services need to run across a cross domain mobile. We also support third parties who create “AMS middleware” that sits between the client and server through design review and quality assurance, and where appropriate, ongoing support through the development of the project.

Security testing

Security services
Yes
Security services type
  • Security strategy
  • Security risk management
  • Security design
  • Cyber security consultancy

Ongoing support

Ongoing support service
No

Service scope

Service constraints
None - We provide a non-biased vendor-neutral view on problems and their solutions, and will always ensure we remain faithful to our security morals and openly and honestly reflect our professional security opinion; even if this means being the bearer of bad news within a project.

User support

Email or online ticketing support
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Support levels
Given the bespoke nature of Cross Domain Secure Mobility solutions, the majority of the support will be done by an NCSC assured security architect, and as part of the wider project engagement. However, a technical account manager will be available to ensure all of our activities are planned, and support will be via email and phone.

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
ACSC (CCP) Head Consultants

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

At 2T Security we are fully committed to continuously improving our environmental performance, examples of which include:
1. We assist the development of Science, Technology Engineering, and Maths (STEM) at a grassroots level and are proud to sponsor Harrington Sixth Form School who take part in the GreenPower racing series. This supports our wider sustainability aims to use renewable energy sources.
2. Where practical, travelling via the least impactful method for a given journey e.g., rail versus flying, public transport versus car.
3. Using ecologically friendly solutions to meet our business needs.
4. Managing waste generated from our business operations according to the principles of reduction, re-use, and recycling.
5. Purchasing office consumables that are from a sustainable source, reducing the reliance on single-use items, and by recycling all paper products, ink, or toner cartridges.
6. Becoming a net producer of sustainable energy, and supplement by only purchasing energy from “green” providers.
7. Leased or owned company cars must have zero emissions.
8. Working with suppliers who share our environmental aims.
9. Measuring and making public our energy consumption, generation, and environmental impact, reviewing results, and looking at how we can improve.
10. Complying, as a minimum, with all relevant environmental legislation as well as other environmental requirements.
11. We refine our Social Value Method Statement and associated Action Plan on a regular basis.

Covid-19 recovery

2T Security has worked closely with Test & Trace (now UKHSA) programme over the last 3 years, and we continue to take Covid-19 very seriously. We remain committed to the wider Covid-19 recovery and some examples of this include:
1. SMEs were significantly impacted by Covid-19, and this is why we support local businesses and Small to Medium Enterprise (SMEs), where possible, preferring them to larger or global suppliers.
2. Align to the Prompt Payment Code, which ensures that SMEs are paid within 30 days of receipt of an invoice.
3. Taking an approach that doesn't view supply chain partners just as vendors but as collaborators working towards the successful end delivery to customers, behaving responsibly and delivering with mutual respect.
4. We refine our Social Value Method Statement and associated Action Plan on a regular basis.

Tackling economic inequality

At 2T Security we are fully committed to tacking economic inequality, examples of which include:
1. Implementing strategies to benefit the lives and wellbeing of those affected by our activities within the localities and communities. We have demonstrated this by assisting the development of Science, Technology Engineering, and Maths (STEM) at a grass roots level. As such, we are proud to sponsor Harrington Sixth Form School who take part in the GreenPower racing series. GreenPower Education trust is a charity organisation seeking to kick start careers in engineering. This also supports our wider sustainability aims to use renewable energy sources.
2. We ensure we offer fair rates of pay, above the national average and minimum requirements.
3. Offering summer placements to university students, helping to inspire future generations.
4. Promote workforce diversity by targeting harder-to-reach and under-represented groups and communities.
5. Provide accessible, entry-level employment and training opportunities for local people and develop future talent.
6. Promote Fairness, Inclusion, and Respect (FIR) principles.
7. We refine our Social Value Method Statement and associated Action Plan on a regular basis.

Equal opportunity

At 2T Security we are fully committed to continuously improving equal opportunities, examples of which include:
1. Providing opportunities for those disadvantaged, for example employing a Ukrainian refugee to assist us with our ISO27001 certification.
2. Deliver with transparency, supporting knowledge sharing, improving visibility and efficiency.
3. Value everyone’s voice, regardless of role or where they reside in the supply chain.
4. Respect and welcome diversity, relishing difference, ensuring everyone is treated equally, underpinned by our equal opportunities and diversity policy.
5. Collaborate with people who uphold the same social values, ethical business practices and environmental ambitions.
6. An active participant in the CyberFirst scheme since 2019, providing experience to summer students and year-in-industry students, and recruiting graduates to support their professional cyber security journey.
7. Proudly providing sponsorship of the CyberFirst Girls Competition 2024, supporting, and encouraging woman in Cyber careers.
8. Our resources have experience with job coaching in the community, helping those less fortunate get back into work, something we hope to continue to build on.
9. Providing training and qualification opportunities to our people, supporting future development and progression.
10. Working with charities and making charitable donations, for example our recent support of Osprey Leadership foundation, who work to inspire and enable young conservation leaders.
11. We refine our Social Value Method Statement and associated Action Plan on a regular basis.

Wellbeing

At 2T Security we take health and wellbeing very seriously, examples of which include:
1. Taking an integrative approach that doesn't view supply chain partners just as vendors but as collaborators working towards the successful end delivery to customers, behaving responsibly and delivering with mutual respect.
2. Strive to be entrepreneurial in spirit and help new organisations, as well as our people, flourish.
3. We support a healthy work life balance, supporting our employees with families and their wellbeing, focusing on delivery outcomes above the hours spent at a desk.
4. Look to reduce ill health and improve wellbeing, underpinned by our health and wellbeing policy.
5. We refine our Social Value Method Statement and associated Action Plan on a regular basis.

Pricing

Price
£450 to £1,800 a unit a day
Discount for educational organisations
Yes

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at opportunities@2t-security.com. Tell them what format you need. It will help if you say what assistive technology you use.