Becrypt Mobile Device Management+
High-value MDM Servers tend not to reside in the well-protected segments of organisations’ networks, due to the nature of required connectivity to the global smartphone infrastructure.
Delivered as a fully managed solution for businesses, it provides peace of mind over the security, integrity and delivery of the mobile estate
Features
- Cloud based management engine
- Integration with Office 365 mobile applications – Outlook, Teams etc
- Mobile application deployment management
- Self-Service Management Portal
- Remote wipe functionality
- Provisioned to prevent jail-breaking & malicious code upload
- Restrictions on device features
Benefits
- Unique compatibility with NCSC Advanced Mobility Scheme
- No need to deploy MDM for mobile devices
- Flexible working, eliminating dead time
- Traffic inspection in line with NCSC Advanced Mobility Architectures
- Fully synchronised email, calendar, and contacts on your device
Pricing
£30 a device a month
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 8 2 5 2 0 8 9 3 9 2 0 9 3 3
Contact
Becrypt Ltd
Stephen Simm
Telephone: +44 (0) 845 838 2050
Email: sales@becrypt.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
-
The service currently supports Apple iOS and Android (roadmapped) devices.
Provision and supply of the following Apple accounts:
Apple Business Manager (formerly Device Enrolment Program – DEP);
Volume Purchase Program (VPP) token;
Apple Push Notification Service (APNS) token. - System requirements
-
- Service does not include business applications e.g. Office, Docs, Oracle
- Does not include any VPN licensing costs
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Respond within the working hour 09:00 hrs to 17:30 hrs weekdays.
Out of hours support available on request. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Core support hours are Monday to Friday 0900 hrs to 1730 hrs
Incident response time for a 'Critical Priority 1' is 15 mins (telephone only)
Incident response time for a 'High Priority 2' is 1 hour
Incident response time for a' Medium Priority 3' is 2 hours
Incident response time for a 'Low priority 4' is 24 hours - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- To ensure effective customer engagement customers are assigned a Nominated Support Engineer (NSE). The NSE will work with the customer’s in-house team to understand the deployed environment and coordinate service adoption.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
-
Business application data is not retained by service.
Service Management information may be exported from the service for retention by customer. - End-of-contract process
-
Service will run as normal until contract end date
Customer instances of service are removed, and obsolete management information deleted.
No additional costs incurred for service termination
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- MDM+ is a Device Management service for control and management of iOS and Android devices. MDM+ aligns with the NCSC Advanced Mobility Scheme
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Management dashboard to determine policies and access rights.
- Accessibility standards
- None or don’t know
- Description of accessibility
- Service is accessibility from any web connected end point device
- Accessibility testing
- The service interface has been tested by HMG
- API
- No
- Customisation available
- Yes
- Description of customisation
- Policies allow customisation of phone interfaces and determine what applications are installed on the phones.
Scaling
- Independence of resources
- Hardware resources and network bandwidth auto-scale. Network bandwidth is also load-balanced between multiple nodes to provide traffic management.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Detailed metrics available on request
- Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Not applicable
- Data export formats
- Other
- Other data export formats
- Not applicable
- Data import formats
- Other
- Other data import formats
- Not applicable
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- 99.95% service availability
- Approach to resilience
- Available on request
- Outage reporting
- Email alerts to end customers nominated points of contact
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- The Becrypt Management platform is logically separate from the MDM+ hosted service. Dedicated Administrators have separate credentials with a configurable security policy for administering the system.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- British Assessment Bureau
- ISO/IEC 27001 accreditation date
- 24/01/22
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- Cyber Essentials Plus
- ISO27001
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
-
Cyber Essentials Plus
ISO 27001
NCSC Advanced Mobility Scheme - Information security policies and processes
-
ISO 27001
NCSC Principles of Cloud Security.
Cyber Essentials Plus
Security Committee responsible for Board-level reporting.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All configuration and change management processes are aligned to 27001.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Becrypt's vulnerability scanning policy documents the process and how vulnerabilities are proactively detected and remediated in a timely fashion.
Becrypt performs automated vulnerability scanning on a monthly basis.
Patch management occurs within one month for critical patches. Non critical patches are bundled as 3 monthly updates. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Becrypt actively monitor the service in line with the former NCSC Good Practice Guide
- Incident management type
- Supplier-defined controls
- Incident management approach
- Becrypt Incident Management Processes are aligned to ISO27001 as referenced in NCSC Cloud Security Principles.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
Becrypt are an equal opportunities employer, which will be applicable for all recruitment including for contracts relating to G Cloud.
Pricing
- Price
- £30 a device a month
- Discount for educational organisations
- No
- Free trial available
- No