Skip to main content

Help us improve the Digital Marketplace - send your feedback

SECURE NEXUS LTD

NDR (Network Detection)

Our Network Detection and Response (NDR) service offers proactive cybersecurity measures by monitoring network traffic in real-time to detect and mitigate cyber threats. With advanced analytics and machine learning, we provide comprehensive visibility and rapid response capabilities to safeguard organisational networks from malicious activity.

Features

  • Real-time Monitoring
  • Advanced Threat Detection
  • Incident Investigation
  • Automated Response
  • Comprehensive Visibility
  • Integration Capabilities
  • Scalability
  • Compliance Reporting

Benefits

  • Improved Threat Detection
  • Reduced Incident Response Time
  • Enhanced Visibility
  • Cost Savings
  • Regulatory Compliance
  • Scalability
  • Ease of Integration
  • Peace of Mind

Pricing

£500 a unit a year

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at rsetchfield@securenexus.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

3 5 2 8 8 0 2 2 5 6 9 8 4 7 2

Contact

SECURE NEXUS LTD Raymond Setchfield
Telephone: 07973573734
Email: rsetchfield@securenexus.co.uk

Planning

Planning service
Yes
How the planning service works
In facilitating the implementation of FortiNDR for cloud hosting or software services, we adhere to a meticulous and collaborative approach. Firstly, we conduct a thorough assessment of the buyer's existing network infrastructure and security requirements. Based on this assessment, we work closely with the buyer to design a customized FortiNDR solution tailored to their specific needs and objectives. We identify potential risks and challenges associated with the implementation and develop proactive strategies to mitigate them effectively. Collaboration continues as we create a detailed project plan, outlining timelines, milestones, and resource allocations for a smooth and timely implementation. We provide guidance on vendor selection and negotiation, ensuring alignment with the buyer's requirements and budget. Throughout the process, we offer comprehensive training and support to facilitate user adoption and adaptation to FortiNDR's capabilities. Rigorous testing and validation precede deployment to ensure functionality, performance, and security. Finally, we document the implementation process and provide knowledge transfer sessions to empower the buyer's team with the skills needed for effective management and maintenance of FortiNDR. Through our structured approach and expert guidance, we enable buyers to implement FortiNDR seamlessly, bolstering their network security and achieving their business objectives.
Planning service works with specific services
No

Training

Training service provided
No

Setup and migration

Setup or migration service available
Yes
How the setup or migration service works
In facilitating the migration to the cloud or transitioning between cloud services with FortiNDR, we follow a meticulous and collaborative approach. We begin by conducting a comprehensive assessment of the buyer's current network security infrastructure and requirements, identifying key objectives and constraints. Collaboratively, we design a tailored migration or transition plan, selecting the most suitable cloud service providers, deployment models, and architectures for FortiNDR. Throughout the process, we prioritize risk assessment and mitigation, proactively addressing potential challenges such as data security, compliance, integration complexity, and scalability. Our detailed project plan outlines the migration or transition timeline, milestones, and resource requirements, ensuring a smooth and timely process. Assisting in vendor selection and negotiation, we help evaluate options, negotiate contracts, and ensure alignment with the buyer's requirements and budget. Providing comprehensive training and support, we help the buyer's team adapt to the new cloud environment or services, educating stakeholders on best practices, security protocols, and operational procedures. Thorough testing and validation precede migration or transition, ensuring compatibility, integration, data migration, and user acceptance. Documenting the process and best practices, we provide knowledge transfer sessions to empower the buyer's team with the skills needed to manage and maintain FortiNDR effectively.
Setup or migration service is for specific cloud services
No

Quality assurance and performance testing

Quality assurance and performance testing service
Yes
How the quality assurance and performance testing works
In ensuring the quality and performance of NDR deployments, we employ a rigorous and systematic approach to quality assurance (QA) and performance testing. Our process begins with a thorough assessment of the buyer's network environment and security requirements to understand their specific needs and objectives. Leveraging this insight, we design comprehensive test scenarios and strategies tailored to the buyer's environment, including functional testing, integration testing, and performance benchmarking.

Throughout the QA and performance testing process, we employ advanced tools and methodologies to evaluate the effectiveness, reliability, and scalability of NDR deployments. We conduct extensive testing to validate the functionality of NDR features, ensuring they meet the buyer's security requirements and expectations. Additionally, we assess the performance of NDR under various conditions and workloads, identifying potential bottlenecks and areas for optimisation.

Our team of experienced QA engineers and security experts meticulously analyse test results, identifying any issues or areas for improvement. We work closely with the buyer to address any identified issues promptly, implementing corrective measures and optimisations as needed to ensure the successful deployment and operation of NDR.

Security testing

Security services
Yes
Security services type
  • Security strategy
  • Security risk management
  • Security design
  • Cyber security consultancy
  • Security testing
  • Security incident management
  • Security audit services
Certified security testers
Yes
Security testing certifications
Other
Other security testing certifications
  • Certified Ethical Hacker v11
  • CISSP

Ongoing support

Ongoing support service
Yes
Types of service supported
  • Buyer hosting or software
  • Hosting or software provided by your organisation
  • Hosting or software provided by a third-party organisation
How the support service works
In supporting cloud hosting or software services with NDR (Network Detection and Response), we provide comprehensive assistance to ensure seamless integration and optimal performance in cloud environments. Our approach begins with a thorough assessment of the buyer's cloud infrastructure, security requirements, and objectives. Leveraging this understanding, we collaborate closely with the buyer to design and implement a tailored NDR solution that aligns with their specific needs.

Our support includes assistance with deployment, configuration, and integration of NDR within cloud environments, ensuring compatibility and seamless operation. We offer guidance on best practices for deploying NDR in cloud environments, optimizing its performance and effectiveness.

Additionally, we provide training and onboarding support to empower the buyer's team with the skills and knowledge needed to manage and maintain NDR effectively in the cloud. This includes education on cloud security best practices, operational procedures, and troubleshooting techniques.

Throughout the deployment and operation of NDR in cloud environments, our dedicated support team is available to address any issues or concerns promptly, ensuring uninterrupted service and optimal security posture.

Service scope

Service constraints
While NDR offers robust network detection and response capabilities, buyers should be aware of potential constraints. These include the need for adequate network visibility and access to network traffic for effective detection. Additionally, deployment and configuration complexity may require experienced personnel or dedicated resources. Buyers should also consider the scalability of the solution to accommodate growing network traffic volumes.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Our response time to questions depends on Service Level Agreement (SLA) agreements and the ticket's priority. We prioritise swift responses based on the urgency and criticality defined in SLAs, ensuring timely resolution of inquiries. The specific SLA terms and ticket priorities guide our commitment to providing efficient and effective support to address questions promptly.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Support levels
Our Support Level Agreements (SLAs) are designed to deliver timely and effective assistance. Users benefit from dedicated cloud engineers available to answer calls and address inquiries. Our SLA categorises issues into four priority levels, each with a corresponding response time commitment. Priority 1 (P1) urgent issues receive a rapid response within 30 minutes, ensuring critical problems are swiftly addressed. High-priority (P2) concerns are attended to within 2 hours, maintaining a prompt response for significant issues. Medium (P3) priority issues receive attention within 4 hours, and low-priority (P4) matters are addressed within 8 hours. These SLAs aim to provide a structured and responsive support framework, allowing users to receive assistance tailored to the urgency and criticality of their specific needs.

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Fortinet

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BRITISH ASSESSMENT BUREAU LTD
ISO/IEC 27001 accreditation date
01/05/2024
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
  • Fortinet Certified Fundamentals in Cybersecurity
  • Fortinet Certified Network Security Professional

Social Value

Social Value

Social Value

Tackling economic inequality

Tackling economic inequality

Tackling economic inequality within the secure nexus framework involves strategic procurement practices aimed at promoting fair wages, supporting local businesses, and fostering job opportunities for marginalized communities. By prioritizing contracts with suppliers who demonstrate commitment to equitable employment practices and investing in initiatives that uplift disadvantaged groups, the secure nexus approach not only enhances economic stability but also cultivates a more inclusive and resilient society

Pricing

Price
£500 a unit a year
Discount for educational organisations
Yes

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at rsetchfield@securenexus.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.