Skip to main content

Help us improve the Digital Marketplace - send your feedback

MLL Telecom Ltd.

MLL Sophos Managed Detection and Response

Sophos MDR is a flexible, fully managed, 24x7x365 cyber security threat protection, detection, and response service. It provides SOC analyst-led threat hunting and investigation, combining human expertise with protection technologies and advanced machine learning. MDR can detect, investigate, and neutralize advanced human-led attacks, preventing data breaches, exfiltration, and ransomware attacks.

Features

  • Instant 24x7x365 Security Operations Centre (SOC)
  • 24x7x365 MDR Threat Detection and Response
  • Expert-lead threat hunting
  • Full-scale incident response
  • Root Cause Analysis – to prevent future recurrence
  • Health checks to ensure strong security posture
  • Integrations with third party vendors, consolidated data lake telemetry
  • Telemetry retention for 90days as standard, extendible to 365 days
  • Integrations with Microsoft 365 telemetry via Microsoft Graph
  • Monitors WAN telemetry, preventing threats before they reach internal networks

Benefits

  • Reduce the risk and costs associated with security incidents
  • Improve system availability and up time
  • Improved cyber security posture, preventing data breaches
  • Stop Ransomware attacks and associated data exfiltration
  • Boost your cyber insurance cover eligibility, reducing your premium costs
  • Reduce time and effort spent managing cyber security attacks
  • Automate response & containment of threats
  • Data loss prevention, preventing ciphering and exfiltration of data
  • 24x7x365 protection & reporting, delivering peace of mind
  • Ransomware breach warranty of upto $1M included with MDR Essentials

Pricing

£30.71 a user a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at gcloud@mlltelecom.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

3 6 8 4 5 3 3 6 9 1 9 3 3 5 6

Contact

MLL Telecom Ltd. Public Sector Sales Team
Telephone: 01628 495 400
Email: gcloud@mlltelecom.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
Supports Sophos products and a defined number of 3rd party categories. Including Firewall, Identity, network, Email, Cloud, and Endpoint.

Full list can be seen here https://docs.sophos.com/central/Customer/help/en-us/ManageYourProducts/ThreatAnalysisCenter/Integrations/index.html
System requirements
  • Supports Windows 7,8,8.1, 10 and 11
  • Windows Endpoint: Free disk Space 8GB RAM 4GBCPU Cores2
  • Mac: macOS 10.15/11/12 Intel-based Macs (64-bit) macOS 11/12 Apple Silicon
  • MacOS: Disk space: 2 GB free RAM: 2 GB
  • Domain and Port Connectivity as outlined: https://shorturl.at/OPRT8

User support

Email or online ticketing support
Email or online ticketing
Support response times
Sophos Support is available 24 hours per day, 7 days per week, 52 weeks per year, including statutory, public, and bank holidays.

For Enhanced Support Plan:
Critical Within 4 hours
High Within 8 hours
Medium Within 24 hours
Low Within 24 hours

For Enhanced Plus Support Plan:
Critical Within 1 hour
High Within 2 hours
Medium Within 24 hours
Low Within 24 hours

Please see this link for details (page 9):
https://www.sophos.com/en-us/medialibrary/PDFs/Support/Sophos-Support-Services-Guide.pdf
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
No testing has been completed at this time
Onsite support
Yes, at extra cost
Support levels
Enhanced
• 24/7 multi-channel support
• Software downloads, updates, & maintenance
• Access to support knowledgebase and support forums
• Warranty (Appliances only)
• Hardware replacement (Appliances only)
• Remote assistance support

Enhanced Plus - includes all features of the Enhanced plan above and the following:
• Remote consulting
• Priority case and sample handling
• Phone calls routed to senior Technical Support Engineers

TAM (available at additional cost) - includes all features of Enhanced and Enhanced plus with the following:
• Named Technical Account Manager (TAM)
• Front of the line access to product information
• Personalized communications and alerts
• Performance and feature optimization
• Enhanced escalation
• Emergency Onsite Support

Please see this link for reference:
https://www.sophos.com/en-us/support/technical-support

Professional Services (available at additional cost) can be procured for implementation and configuration support:
https://www.sophos.com/en-us/support/professional-services
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Sophos offer a Guided Onboarding Service at an additional cost.

For self configuration and onboarding the following resources are available:
• Sophos MDR Getting Started:
https://docs.sophos.com/central/mdr/help/en-us/welcomeGuides/MDR/gettingstarted/index.html
• Sophos Central Admin Help:
https://docs.sophos.com/central/Customer/help/en-us/index.html
• Sophos TechVids:
https://techvids.sophos.com/
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
The MDR service retains endpoint and network telemetry for 7 days, MDR Detections in the Sophos Central Data Lake for 90 days (extendable to 1 year) and MDR Cases for 2 years. After these time frames the data is deleted. Additionally, Sophos will store licensed endpoint telemetry and network telemetry from licensed XG firewalls using Central Firewall reporting in Sophos Central for 7 days, or a longer timeframe based on data retention option the customer has purchased. This data is available to be used by the customer to perform their own queries and investigations independently from the MDR, or Rapid Response services. All customer data is deleted upon termination of the service.

Upon termination of the MDR service, access to the customer interface in Sophos Central is disabled after a 10-day grace period. After this period, the data will be permanently deleted and unrecoverable.

All data held in the Sophos Central platform and data lake is available for export manually or via API (as detailed in previous questions). MDR cases information is also detailed within the Sophos Central platform for obtaining if required.
End-of-contract process
The MDR service retains endpoint and network telemetry for 7 days, MDR Detections in the Sophos Central Data Lake for 90 days (extendable to 1 year) and MDR Cases for 2 years. After these time frames the data is deleted. Additionally, Sophos will store licensed endpoint telemetry and network telemetry from licensed XG firewalls using Central Firewall reporting in Sophos Central for 7 days, or a longer timeframe based on data retention option the customer has purchased. This data is available to be used by the customer to perform their own queries and investigations independently from the MDR, or Rapid Response services. All customer data is deleted upon termination of the service.

Upon termination of the MDR service, access to the customer interface in Sophos Central is disabled after a 10-day grace period. After this period, the data will be permanently deleted and unrecoverable.

All data held in the Sophos Central platform and data lake is available for export manually or via API (as detailed in previous questions). MDR cases information is also detailed within the Sophos Central platform for obtaining if required.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
Yes
Compatible operating systems
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
The Managed Detection and Response (MDR) dashboard shows a summary of threats we've recently detected and investigated. It consists of the following:
• Action required banner
• Detections
• Detections by time, by OS, and by technique
• Connector status report
• Detections classification summary
• Most investigated devices
• Active cases

Please see this link for details:
https://docs.sophos.com/central/customer/help/en-us/ManageYourProducts/MDR/MDRDashboard/index.html
Accessibility standards
None or don’t know
Description of accessibility
The Sophos Central Admin Console can be accessed at https://cloud.sophos.com/ with supported web browsers.
Sophos Central currently supports the following browsers:
• Google Chrome.
• Microsoft Edge.
• Mozilla Firefox.
• Apple Safari (Mac only).

It is recommended to install/upgrade to a supported version in the above list and to always run an up-to-date version. Sophos aims to support the latest version and previous versions of Google Chrome, Firefox, and Apple Safari.

Aside from the SuperAdmin account, only users with an admin role can access the management console. The login requires an email and password as well as an MFA.
Accessibility testing
Sophos Central does not currently have a VPAT compliance attestation. As a central console, many separate Sophos products appear in Sophos Central. Some of these products are accessibility compliant and we continue to improve the accessibility of our individual products.
API
Yes
What users can and can't do using the API
Sophos Central has a public API program that can automate monitoring, security, and administration activities in Sophos Central. It can do many of the things normally done in the Sophos Central Admin Console including Live Discover queries and pulling events/alerts into a SIEM.

All our APIs are offered as RESTful HTTP endpoints over the public internet. We use standard authentication, JSON requests and responses, and standard HTTP verbs. All communication is over HTTPS.

Please see the following link for details:
https://developer.sophos.com/intro
https://developer.sophos.com/apis
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
No
Customisation available
No

Scaling

Independence of resources
Should operational targets not be met, or where the MDR service reaches 80% SOC capacity, Sophos recruit additional analysts or employ additional measures to ensure services are able to operate as outlined in the SLAs and SLTs.

Sophos Central is segmented into a number of logically separate virtual networks based on the various workloads they perform (such as authentication or endpoint management). All workloads are then placed into auto-scaling groups, behind a load balancer, so that when a particular workload sees increased load/traffic, additional temporary resources can be allocated to give the group capacity to handle the load.

Analytics

Service usage metrics
Yes
Metrics types
The Managed Detection and Response (MDR) dashboard shows a summary of threats we've recently detected and investigated. It consists of the following:
• Action required banner
• Detections
• Detections by time, by OS, and by technique
• Connector status report
• Detections classification summary
• Most investigated devices
• Active cases

Please see this link for details:
https://docs.sophos.com/central/customer/help/en-us/ManageYourProducts/MDR/MDRDashboard/index.html
Reporting types
  • Real-time dashboards
  • Regular reports

Resellers

Supplier type
Reseller (no extras)
Organisation whose services are being resold
Sophos

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Encryption of all physical media
  • Other
Other data at rest protection approach
All data at rest is encrypted using volume-level encryption: storage volumes, object storage, and virtual drives of virtual machines.

For sensitive customer data, we use field-level encryption within storage volumes using a per-field multi-part key. These parts are formed from several different locations, including a key management system. Each key is unique to every customer, and every field.

Transport-level encryption is used to secure management communication between the client software and Sophos Central platform via certificates and server validation.

Sophos never stores nor sends Central account passwords in plain text.
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Sophos MDR reports can be downloaded as PDFs from the admin console.

All data held in the Sophos Central platform and data lake is available for export manually as CSV or PDF files, or via API (as detailed in previous questions). MDR cases information is also detailed within the Sophos Central platform for obtaining if required.
Data export formats
  • CSV
  • Other
Other data export formats
PDF
Data import formats
Other
Other data import formats
  • Manually type contact information for Authorized Contacts
  • Active Directory and Entra ID Synchronisation for user information

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Other
Other protection between networks
Transport-level encryption is used to secure management communication between the client software and Sophos Central platform via certificates and server validation.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network
The Sophos MDR service is configured to use and operate with TLSv1.2 for all data transfers from endpoints and server agents, and additional third-party integration log collectors.

Transport-level encryption is used to secure management communication between the Sophos client software and Sophos Central and Sophos MDR SOC platforms via certificates and server validation.

Third-party integrations utilising REST APIs support SHA256 encryption over TLS 1.2 for communication.

Sophos use field-level encryption within storage volumes using a per-field multi-part key. These parts are formed from different locations, including a key management system. Each key is unique to every customer, and every field.

Availability and resilience

Guaranteed availability
Sophos Central does not provide a traditional SLA because the availability of our products is not dependent on the availability of the web portal. However, the availability of the web portal ranged between 99.99 and 100% over the past year, depending on geographic region.

Sophos Central is a cloud-native application with high availability. It is hosted on public cloud platforms, such as Amazon Web Services (AWS) and Microsoft Azure, that dynamically scale to handle an ever-changing workload.
https://www.sophos.com/en-us/trust/sophos-central

Sophos Central status can be viewed here:
https://centralstatus.sophos.com/#!/
Approach to resilience
Sophos Central is hosted on Amazon Web Services (AWS), across a number of virtual machine instances and services that dynamically scale to handle the current Sophos Central workload.

Sophos Central is segmented into a number of logically separate virtual networks based on the various workloads they perform (such as authentication or endpoint management). All workloads are then placed into auto-scaling groups, behind a load balancer, so that when a particular workload sees increased load/traffic, additional temporary resources can be allocated to give the group capacity to handle the load.

For more information please see:
https://www.sophos.com/en-us/trust/sophos-central
Outage reporting
Sophos Central status can be viewed here:
https://centralstatus.sophos.com/#!/

It also has a subscribe button at the top right to receive status notifications.

Identity and authentication

User authentication needed
Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
Access restrictions in management interfaces and support channels
Access to the Sophos Central admin console requires a login (email and password) as well as MFA (Multi-Factor Authentication).
Sophos Central also supports Azure AD Federation authentication.

Except for the SuperAdmin, Users need to have an admin role assigned to them to get access to the Sophos Centrla admin console.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
URS, a UKAS accredited audit body.
ISO/IEC 27001 accreditation date
11/05/2022
What the ISO/IEC 27001 doesn’t cover
MLL’s Statement of Applicability addresses all elements of the services we provide. The two areas not addressed are application development and the export of cryptographic controls as these are not services provided by MLL.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
NHS Digital - Data Security and Protection Toolkit (DSPT)

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
ISO27001:2022, SOC 2 Type 2
Information security policies and processes
MLL maintains an information security management system (ISMS) that is certified to meet the requirements of the ISO 27001:2013 standard, as well as, PSN Service Provider (PSNSP) certification and Cyber Essentials Plus certification. A risk management process based on ISO27005:2011/BS7799-3:2017 underpins the MLL ISMS.
Security incidents are managed through to resolution using a Major Incident Management procedure, regular hourly updates, escalation and a major incident report on resolution.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Changes to the production environment are strictly done after following our Change management process (including approval from the Security team if needed) and are reviewed by the operational team.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
The Security team (Red team) is tasked with scanning systems for vulnerability scans.
We follow a risk-based approach while deciding on the remediation of vulnerabilities.

Most of the systems are set for automated patch management. In cases where systems are set for manual patch updates, a time frame is mandated to the system owners to apply patches (especially security/ critical patches)
All relevant teams involved in patch management (like system owners, business units, IT, Security, etc.) are notified in advance for patch activity.
Patches are tested in a test environment before moving to the production environment.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We have developed our plans with guidance from the NIST 800-61 Computer Security Incident Handling Guide and we frequently review these plans for compliance with industry standards.

There are many ways Sophos identifies or becomes aware of security incidents. These include:
• Security monitoring capabilities, often in our products, or complementary methods we have developed
• Bug-bounty reports
• Penetration test findings
• Vulnerability analysis
• Code and application analysis
• Research and threat intelligence analysis
• Customer notifications
To report a potential security incident, please see our Responsible Disclosure Program.
Incident management type
Supplier-defined controls
Incident management approach
MLL has a security incident management policy within its ISO27001 certified ISMS. Calls are triaged and where necessary passed to Netcall for resolution. Netcall uses native and licensed software to manage risks and is ISO 27001:2013 compliant for Incident Management. It is tracker based linking risks, assessments into corrective and preventative processes. Compromises are recorded after changes, risk reviews, security incidents, event identification or in worst case scenarios invoking the Business Continuity Plan.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

MLL operates an ISO 14001 certified environmental management system, recycles waste throughout our offices and uses a WEEE contractor for the recycling of used electronic equipment. We work with customers to support their environmental initiatives including funding tree planting for carbon offset, staff volunteering for environmental initiatives and through constantly driving to reduce our environmental impact.

The services proposed in this offer are based centralised systems located in energy efficient datacentres. Services are hosted on a centralised platform removing the need for separate physical installation on the customer premise reducing overall energy consumption. Adoption of this service supports customer environmental agendas through replacement of aged, less energy efficient solutions.

MLL has a published Carbon Reduction Plan and a net zero target date of 2040.

Tackling economic inequality

MLL is an SME with a distributed workforce, working regionally to serve our customers throughout the UK. A high percentage of staff are home-based and live within the region that they serve. Others operate centrally from our Head Office in Buckinghamshire and our engineering and warehouse in Northamptonshire.

MLL supports flexible working methods and understands what is important to our employees from a work-life balance perspective. We encourage managers to consider the needs of their teams and embrace the use of a range of technologies that enable this balance to be met. We offer flexibility with working times, allowing individuals to start work at a time that meets both their personal and occupational needs.

MLL is an active member of the communities in which we operate and aspires to be always a good neighbour. We sponsor local causes, provide job skills programmes, work experience and apprenticeships and many staff volunteer for local charities such as the One Can Trust. MLL is an accredited Living Wage employer and an accredited member of the Armed Forces Covenant.

Equal opportunity

MLL’s Equal Opportunity policy ensures that everyone receives treatment that is fair, equitable and consistent with their skills and abilities. All current and potential employees are offered the same opportunities regardless of a protected characteristic (age, disability, gender reassignment, marriage and civil partnership, pregnancy and maternity, race, religion or belief, sex, sexual orientation) or indeed any other characteristic unrelated to the performance of the job. MLL does not tolerate discrimination or harassment based on any of these characteristics, directly or indirectly, and extends to discrimination by association and by perception.

MLL is committed to a zero-tolerance approach to modern slavery and to acting with integrity in all its dealings, relationships, and supply chains. It expects the same high standards from all its staff, suppliers, contractors and those with whom it does business.

We support our customers through the good working practices we have adopted and seek opportunities to contribute in meaningful ways to the communities we operate in.

Wellbeing

MLL has always recognised the importance of the welfare and wellbeing of our workforce and has an established Wellbeing and Benefits portfolio which underpins our commitment to staff welfare.

MLL’s integrated approach is designed to create:
• A sense of belonging.
• An environment and culture based on shared values and trust.
• An environment where staff wellbeing is integrated into day-to-day practices.
• An environment that recognises skills and encourages personal development.

MLL has appointed Mental Health Champions who reach out to all employees, offering support and positivity, whether that be a one-to-one chat, or publicly through a dedicated Teams channel.

MLL also offers all employees access to a confidential Employee Assistance Programme (EAP), provided by Health Assured, an independent health and wellbeing provider. The EAP is intended to help employees deal with personal problems that might adversely impact their work performance, health and well-being.

We support our customers wellbeing initiatives through staff volunteering, charitable donations and through the provision of mental health awareness programmes and videos.

Pricing

Price
£30.71 a user a month
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at gcloud@mlltelecom.com. Tell them what format you need. It will help if you say what assistive technology you use.