Skip to main content

Help us improve the Digital Marketplace - send your feedback

Brookcourt Solutions

Data Discovery - SecurEnvoy

An automated solution for discovering confidential and sensitive information, on-premise or in the cloud. Provides comprehensive data visibility; simple and elegant to deploy and use.
Ideal for quick risk assessments across your entire digital estate including data held in Atlassian Suite. Supports compliance processes including
those governing banks.

Features

  • Data discovery on endpoints, servers and cloud
  • Automated classification for easier setup
  • End User education and real time feedback mechanisms
  • Real time visualisation of events in enterprise dashboard
  • Interventions include alert, block sharing, quarantine and log
  • Easy to set up, deploy and administrate
  • Cloud or on premise solution and computationally inexpensive

Benefits

  • Facilitation of safe content sharing with real-time reporting
  • Dashboard real-time reporting and the dynamically generated Executive Summary
  • Easy to deploy and does not interrupt end user workflow
  • Provides protection of content, keywords, phrases and documents
  • Educates and engages end users
  • Easy setup of automated classification
  • Elegant and simple to deploy and use
  • Protects unstructured data
  • Real-time monitoring and auditing capabilities for enhanced security.
  • Seamless integration with existing IT infrastructure for effortless deployment.

Pricing

£6 a user a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at contact@brookcourtsolutions.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

3 8 6 3 1 9 2 3 6 6 2 7 9 7 7

Contact

Brookcourt Solutions Phil Higgins
Telephone: 01737 886111
Email: contact@brookcourtsolutions.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Atlassian Confluence (Server, DataCentre, Cloud)
Atlassian Jira (Server, DataCentre, Cloud)
Atlassian Bitbucket (Server, DataCentre, Cloud)
Google Workspace
Microsoft (M365, Fileservers & Endpoints)
Cloud deployment model
Private cloud
Service constraints
No noteworthy issues - Any scheduled maintenance is communicated in advance and usually has minimal impact on service.
System requirements
  • The Manager requires correct sizing of physical memory:
  • *16GB for Large Installations - (>6000 endpoints or >10m results)
  • *8GB for Medium Installations - (>1000 endpoints or >1m results)
  • *4GB for Small Installations - (up to 6000 endpoints)
  • The SecurEnvoy Data Discovery solution requires Java Runtime installed

User support

Email or online ticketing support
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Needs a response
Support available to third parties
No

Onboarding and offboarding

Getting started
SecurEnvoy provides end users with a comprehensive array of options to kickstart their service journey. From streamlined quick start guides and detailed documentation to technical enablement sessions, organisations have the flexibility to choose the approach that best fits their needs. Whether opting for self-configuration of their tenant or preferring a vendor-led implementation, SecurEnvoy ensures a seamless and tailored onboarding experience. Quick start guides offer a swift entry point for those eager to get started, while comprehensive documentation serves as a valuable resource for in-depth understanding and troubleshooting. For organisations seeking more hands-on guidance, technical enablement sessions empower them to configure their tenant independently, fostering a sense of ownership and customisation. Alternatively, opting for a vendor-led implementation provides expert guidance and support every step of the way, ensuring a smooth transition and maximising the benefits of SecurEnvoy's solutions. With these diverse options, SecurEnvoy caters to the unique preferences and requirements of every organisation, setting them up for success in their security journey.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
From the Admin Console the customer can export log data.
End-of-contract process
All data is kept in the on-premise customer database and it’s the customers responsibility to uninstall once contract ends.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
Yes
Compatible operating systems
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
Data Discovery administration console, accessible via a Web GUI secured with local accounts or integrated with AD, enables seamless platform setup and configuration. Users can configure policies and scan tasks for sensitive data discovery scanning.
Accessibility standards
None or don’t know
Description of accessibility
We support the built in accessibility options on supported devices.
Accessibility testing
N/A
API
No
Customisation available
No

Scaling

Independence of resources
Each customer has their own dedicated tenant.
Scanning engines can be throttled to not overwhelm the service.
Scans can be paused and only run in quiet times.

Analytics

Service usage metrics
Yes
Metrics types
Amount of data scanned per repository
Amount of data with sensitive information
Amount of data remediated
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
SecurEnvoy

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
Other
Other data at rest protection approach
All data is stored within the customer database on-premise and follows customer security policy.
Data sanitisation process
No
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
From the Admin Console the customer can export log data.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
This is an on-premise solution using customer equipment - so no SLA.
Approach to resilience
This is an on-premise solution using customer equipment - so no SLA.
Outage reporting
Admin dashboard
Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Local or AD Credentials
Access restriction testing frequency
Never
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Needs a response

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Change control tickets are meticulously logged via our CRM system and promptly assigned to designated team members, who carefully assess risk levels before deciding to approve or deny the requested change control
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Our vulnerability management process is comprehensive and robust, utilising a combination of state-of-the-art technologies and expert oversight. We employ a managed service provided by our trusted MSSP (Managed Security Service Provider), which utilises advanced solutions such as Deep Instinct and Tenable, supported by a Breach Discovery Alert system. This multifaceted approach ensures proactive identification, swift remediation, and continuous monitoring of vulnerabilities across our infrastructure, safeguarding our systems against potential threats.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
SecurEnvoy have a real-time email alerting.
Incident management type
Supplier-defined controls
Incident management approach
Incident reports are sent to either the designated business unit security officer or the group data protection officer (DPO).

Incidents are typically reported via email in a written report.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

SecureEnvoy are a part of the Shearwater Group. We are committed to fighting climate change and document our approach, at group level within out ESG policy document. Available here - https://www.shearwatergroup.com/environmental-policy/

Pricing

Price
£6 a user a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Full Version of the Service Limited for 100 users for 30 days
Link to free trial
https://securenvoy.com/request-free-trial-dd/

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at contact@brookcourtsolutions.com. Tell them what format you need. It will help if you say what assistive technology you use.