WAF (Cloudflare)
Our WAF is based on Cloudflare's and offers robust, cloud-based protection for web applications. It effectively blocks malicious traffic and prevents common web threats, ensuring security without compromising performance. With advanced intelligence and customisable rulesets, Cloudflare's WAF is designed to adapt to the evolving security landscape, offering real-time threat mitigation.
Features
- Cloud-based protection, ensuring security across global content delivery networks
- Blocks malicious traffic, protecting against common web attacks and vulnerabilities
- Customisable rulesets tailored to specific application security needs
- Real-time threat mitigation, responding swiftly to emerging security risks
- Advanced intelligence gathering and analysis for proactive threat prevention
- High-performance architecture ensures minimal latency and fast response times
- Seamless integration with existing Cloudflare services for comprehensive security
- Automated updates and patches for continuous, up-to-date protection
- User-friendly interface for easy management and rule configuration
- Detailed analytics/reporting for enhanced visibility into traffic and threats
Benefits
- Enhances web application security, safeguarding against external cyber threats
- Reduces risk of data breaches and information theft
- Customisable protection allows for specific security needs of applications
- Ensures business continuity by preventing disruptive cyber attacks
- Saves time and resources with automated security management
- Improves website performance while maintaining high security standards
- Offers scalability to protect growing and evolving web applications
- Provides peace of mind with industry-leading cybersecurity expertise
- Facilitates regulatory compliance with advanced security measures
- Delivers detailed insights for informed security strategy and decision-making
Pricing
£18.66 to £261.93 a unit a month
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 2 7 2 0 6 7 2 4 1 6 2 1 6 5
Contact
Node4
David Cheetham
Telephone: 0345 123 2222
Email: bidmanagement@node4.co.uk
Service scope
- Service constraints
- Our solution is primarily based on Cloudflare Application Security & Performance suite – Pro, Business and Enterprise plans.
- System requirements
- None
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Node4 shall prioritise all Service Tickets based on its reasonable assessment of the Priority level (P1 to P4); and respond to all Service Tickets in accordance with the initial response times specified below:
Response Acknowledgement - P1=30 Mins, P2=1 Hour, P3=2 Hours, P4=4 Hours
Commencement – P1=1 Hour, P2=2 Hours, P3=4 Hours, P4=N/A
Frequency of Updates – P1=1 Hour, P2=2 Hours, P3 and P4 =12 Hours if Resolve / Target to Fix exceeded
Resolve / Target to Fix – P1=4 Hours, P2=8 Hours, P3=12 Hours, P4=36 Hours. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- Standard testing with accessibility software.
- Onsite support
- Yes, at extra cost
- Support levels
-
Support level options are as follows: -
Business Hours
Standard business hours support 9am to 5:30pm weekdays, excluding bank and national holidays
24 x 7
Priority 1 and 2 – Support hours 24/7
Priority 3, 4 and Service Request – Support hours between 9am and 5.30pm weekdays, excluding bank and national holidays. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
When onboarding we support the client by consulting on their requirements, performance goals, management, and security needs to deliver the solution.
WAF services are provisioned across Cloudflare’s global network as a managed service. Clients must specify which domains they wish protection to be enabled on. Clients will be required to update their domain DNS records. The service can be either procured alongside new connectivity or applied to existing connectivity. The service requires minimal installation activity by the client.
After deployment an overview of the solution, management tasks and responsibilities depending on the client’s operating requirements, are shared with the client.
When offboarding we will work with the client on an exit plan, co-ordinating the offboarding activities and working with the clients’ internal teams or nominated 3rd parties as a separate professional services engagement. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- The Client places a request with the Service Desk and Node4 will facilitate offboarding and extraction of data.
- End-of-contract process
- At the end of the contract Node4 will decommission the services in line with an exit plan agreed with the client.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Users are able to access all areas of the Cloudflare dashboard portal, but are unable to control billing aspects on the portal as these are managed through Node4.
- Web interface accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web interface accessibility testing
-
The Information Technology Industry (ITI) Council worked with the U.S. General Services Administration (GSA) to create a tool called the Voluntary Product Accessibility Template (VPAT) that government contracting and procurement officials can use to identify commercial products that comply with Section 508 regulations and WCAG standards.
Cloudflare's dashboard completes Voluntary Product Accessibility Template (VPAT) in compliance with international standards set forth by the Web Content Accessibility Guidelines (WCAG) 2.1 AA and in conformance with legal standards set forth by Section 508 of the Rehabilitation Act.
Product accessibility conformance reports are available on Cloudflare’s website - https://www.cloudflare.com/en-gb/trust-hub/compliance-resources/ - API
- Yes
- What users can and can't do using the API
- Users can be provided with access to Cloudflare’s API. Users are able to access all areas of the Cloudflare API except billing as this is managed through Node4.
- API automation tools
-
- Ansible
- Chef
- OpenStack
- SaltStack
- Terraform
- Puppet
- Other
- Other API automation tools
- Any other automation tools developed to support Cloudflare’s API.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
-
Cloudflare’s vast global network, which is one of the fastest on the planet, is trusted by millions of web properties. With direct connections to nearly every service provider and cloud provider, the Cloudflare network can reach about 95% of the world’s population within approximately 50 ms.
Minimize latency and increase resiliency with a global Anycast network that can effortlessly stop even the largest DDoS attacks.
Cloudflare is your own fast lane on the Internet. By avoiding network hops and optimizing traffic paths, drastically reduce latency while improving application performance and the end user experience. - Usage notifications
- No
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- HTTP request and response status
- Network
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Cloudflare
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- No
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- The service availability objectives of this service is 99.95%
- Approach to resilience
-
Cloudflare’s vast global network, which is one of the fastest on the planet, is trusted by millions of web properties. With direct connections to nearly every service provider and cloud provider, the Cloudflare network can reach about 95% of the world’s population within approximately 50 ms.
Minimize latency and increase resiliency with a global Anycast network that can effortlessly stop even the largest DDoS attacks.
Cloudflare is your own fast lane on the Internet. By avoiding network hops and optimizing traffic paths, drastically reduce latency while improving application performance and the end user experience. - Outage reporting
-
We monitor key product/service attributes grouped by availability, throughput, utilisation, latency and errors.
Alerts trigger service tickets into the service desk for proactive management
Client receives email alerts from the ticketing platform to alert them of issues and actions.
Additionally client can view or service status page: https://www.n4status.co.uk/
Cloudflare’s status page is also available at: https://www.cloudflarestatus.com
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Access is only granted to those that require access. Access can only be provided by those with the correct permission to authenticate. Management networks are isolated.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Dedicated device on a government network (for example PSN)
- Dedicated device over multiple services or networks
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Alcumus ISOQAR
- ISO/IEC 27001 accreditation date
- 29/03/2022
- What the ISO/IEC 27001 doesn’t cover
- All aspects are covered.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- ClaraNet Ltd
- PCI DSS accreditation date
- 12/08/2023
- What the PCI DSS doesn’t cover
- PCI controls 2d, 2e, 3, 4, 5, 6, 7, 8, 10, 11
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Node4 operates an Information Security Management System (ISMS) which conforms to ISO27001. The purpose of the ISMS is to assess and manage risk and to protect the organisation’s information assets from all threats, whether internal or external, deliberate or accidental. The CEO has approved the information security policy. The Information Security Objectives of Node4 are to: -
Protect information against unauthorised access
Assure the confidentiality of information
Maintain the integrity of the information
Ensure the availability of information as required by the business processes
Meet all regulatory and legislative requirements
Implement, maintain and test DR / BC plans in line with the security policy
Train all staff on information security
Continually review and improve the ISMS
Additional policies and procedures exist to support the Information Security Policy. These include, but are not limited to, physical and logical access controls, network security, malware controls, vulnerability management and business continuity.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- All changes are assessed for their potential security impact through the Change Advisory Board. A Low-Risk change is one which has a possibility of causing up to a Priority 3 or 4 Incident. A High-Risk change is one which has a possibility of causing a Priority 1 or 2 Incident or a large amount of Priority 3 and 4 Incidents for multiple customers.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Vulnerability testing is performed monthly using internal and external tool sets. Vulnerabilities are assessed and remediation actions performed depending on risk. Information about potential threats is provided by the vulnerability scanning tools.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- Protective monitoring is performed by the SIEM tool and monitored by the Security Operations Centre. The SIEM provides real-time alerts of any potential compromises and a process of detect, analyse and response is followed with 1 hour.
- Incident management type
- Undisclosed
- Incident management approach
-
The following approach in used for incident management to ensure the objectives are achieved
Incident Resolution is achieved in the most effective manner
All Incidents are identified promptly and correctly
All Incidents are evaluated, categorised, and prioritised correctly
Communication is maintained with all Stakeholders throughout the lifecycle of all Incidents
All Incidents are constantly monitored throughout their lifecycle
Incident are handled as outlined in the Incident Management Schedule Document here: -
https://node4.co.uk/app/uploads/2022/07/Schedule-Incident-Management-07.04.2021-release.pdf
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
In our commitment to fighting climate change, we take a holistic approach that encompasses reducing carbon emissions, enhancing energy efficiency, and promoting sustainable practices in the delivery of our cloud hosting and software services. Our strategies include:
Energy Efficiency: We optimise our datacentres and cloud infrastructure to be as energy-efficient as possible, employing the latest in green technology and design principles. This reduces our overall energy consumption and minimises our carbon footprint.
Renewable Energy: Where feasible, we power our operations with renewable energy sources, such as solar and wind, to reduce reliance on fossil fuels. This commitment extends to encouraging our suppliers and partners to also adopt renewable energy.
Carbon Offsetting: We invest in carbon offset projects, including reforestation and renewable energy projects, to compensate for our unavoidable emissions. These efforts contribute to global carbon reduction initiatives.
Sustainable Practices: We advocate for and implement sustainable practices within our organisation, including reducing waste, promoting recycling, and encouraging the digitalisation of processes to minimise paper use.
Client Engagement: We work with our clients to understand and minimise the environmental impact of their cloud and software service choices. This includes offering guidance on how to use cloud resources more efficiently and sustainably.
Innovation: We continuously explore innovative ways to reduce the environmental impact of our services, including the development of more energy-efficient software and the utilisation of AI to optimise resource usage.
Our aim is to lead by example in the fight against climate change, demonstrating that it is possible to deliver high-quality cloud services while also making a positive impact on the environment. Through these actions, we not only contribute to the sustainability of our planet but also offer our clients the opportunity to engage with a provider that aligns with their values on environmental responsibility.Covid-19 recovery
In our efforts to support COVID-19 recovery, we're committed to leveraging our cloud hosting and software services to aid businesses, communities, and public sector organisations in navigating the challenges posed by the pandemic and its aftermath. Our strategies include:
Remote Work Solutions: We provide robust cloud solutions that enable seamless remote work, ensuring that organisations can continue their operations without interruption. This includes secure access to critical applications, collaboration tools, and data storage solutions, facilitating productivity and connectivity among dispersed teams.
Digital Transformation Acceleration: Recognising the increased need for digital services, we assist organisations in accelerating their digital transformation journeys. This involves migrating traditional services to the cloud, enabling them to offer their own customers more flexible and resilient services.
Educational Support: To address the surge in demand for online learning, we offer cloud-based learning platforms and tools that educational institutions can leverage to deliver high-quality education remotely. This includes solutions for virtual classrooms, online assessments, and resource sharing.
Healthcare Support: We support healthcare providers by offering cloud solutions that enhance their ability to deliver telehealth services, manage patient data securely, and scale their resources in response to fluctuating demands.
Economic Resilience: We're committed to supporting economic resilience by offering flexible pricing models and financial assistance programs for businesses affected by the pandemic, helping them to maintain their cloud services without financial strain.
Community Engagement: We engage with communities and non-profit organisations, providing technology resources and expertise to support recovery efforts, including initiatives aimed at bridging the digital divide and supporting vulnerable populations.
Our goal is to be a proactive partner in COVID-19 recovery, providing technology solutions that not only help organisations adapt to the new normal but also contribute to building a more resilient and inclusive future.Tackling economic inequality
In addressing economic inequality, we are committed to leveraging our cloud hosting and software services as tools for empowerment and opportunity creation. Our approach is centered on making technology accessible and beneficial for all segments of society, particularly those who are most vulnerable or have been traditionally underserved. Here’s how we contribute:
Accessibility and Affordability: We strive to ensure our services are accessible and affordable, offering scalable solutions that cater to the needs of small and medium-sized enterprises (SMEs), non-profits, and educational institutions. This includes flexible pricing models for qualifying organisations, enabling them to leverage technology to drive their missions forward.
Skills Development and Training: Recognising the importance of digital literacy in the modern economy, we offer training programs and resources aimed at developing the digital skills of individuals from disadvantaged backgrounds. By partnering with educational institutions and community organisations, we aim to close the skills gap and open up new opportunities for employment and entrepreneurship in the tech industry.
Supporting Social Enterprises: We actively support social enterprises and organisations working to tackle economic inequality through preferential access to our cloud and software services. This support extends to collaboration on projects that leverage technology to address social issues, such as unemployment, education, and access to healthcare.
Innovation for Inclusion: We invest in developing innovative solutions that address barriers to economic participation. This includes technologies that enhance financial inclusion, support remote work and education, and enable access to essential services for underserved populations.
Economic Opportunity Creation: Through our ecosystem of partners, customers, and suppliers, we seek to create economic opportunities by prioritising diversity and inclusion in our procurement processes and by fostering an environment where small and diverse businesses can thrive.Equal opportunity
Our dedication to promoting equal opportunity is woven into the fabric of our operations, services, and community engagements. We believe that technology has the power to level the playing field, providing access to information, resources, and opportunities that can transform lives regardless of background, location, or circumstance. Here’s our approach:
Diverse and Inclusive Hiring Practices: We are committed to fostering a diverse and inclusive workforce by implementing fair hiring practices that actively seek out and welcome candidates from a variety of backgrounds, including underrepresented groups. This diversity enriches our team with a wide range of perspectives and ideas, driving innovation and understanding of the diverse needs of our clients.
Workplace Equality: We ensure that all employees have equal access to opportunities for growth, development, and advancement. This includes creating a supportive work environment that respects and values each individual's contributions, and implementing policies that promote work-life balance, fair compensation, and professional development.
Technology Accessibility: Our cloud hosting and software services are designed with accessibility in mind, ensuring that individuals with disabilities have equal access to our technologies. This includes adherence to accessibility standards and guidelines, and providing tools and features that enhance usability for all users.
Community Programmes and Partnerships: We engage in community programmes and partnerships aimed at promoting equal opportunity in the technology sector and beyond. This includes supporting educational initiatives that provide technology access and digital literacy training to underserved communities, and collaborating with organisations that work towards social inclusion.
Supplier Diversity: We are committed to supplier diversity by ensuring that small and minority-owned businesses are given fair opportunities to participate in our procurement processes. This not only supports economic inclusion but also enriches our supply chain with a diversity of ideas and products.Wellbeing
In addressing wellbeing, we recognise the critical importance of mental and physical health, particularly in today’s fast-paced and often stressful work environments. Our approach to wellbeing is holistic, focusing on creating a supportive and healthy work culture for our employees, and extending this ethos to our clients and the communities we serve. Here’s how we contribute:
Employee Wellbeing Programmes: We implement comprehensive wellbeing programmes that support the mental, physical, and emotional health of our employees. These include access to mental health resources, such as counselling services and stress management workshops, as well as initiatives promoting physical health, like fitness classes and ergonomic workplace assessments. We believe that a healthy team is more engaged, productive, and innovative.
Flexible Working Arrangements: Recognising the diverse needs of our workforce, we offer flexible working arrangements to help employees balance their professional and personal lives. This flexibility includes options for remote work, flexible hours, and the provision for necessary breaks to recharge, contributing to a more sustainable work-life balance.
Healthy Work Environment: We strive to create a work environment that promotes wellbeing, including safe and comfortable physical spaces, a positive and inclusive culture, and opportunities for social connection and community building among employees.
Client and Community Support: Beyond our internal initiatives, we extend our commitment to wellbeing through the services and support we provide to clients and the wider community. This includes offering products and services that encourage healthy work practices and partnering with organisations focused on mental health and wellbeing.
Continuous Learning and Development: We believe in the wellbeing benefits of lifelong learning and professional development. Our programmes are designed to support continuous growth and development, reducing the risk of burnout and increasing job satisfaction by providing meaningful opportunities for advancement and skill enhancement.
Pricing
- Price
- £18.66 to £261.93 a unit a month
- Discount for educational organisations
- No
- Free trial available
- No