Data Discovery - SecurEnvoy
An automated solution for discovering confidential and sensitive information, on-premise or in the cloud. Provides comprehensive data visibility; simple and elegant to deploy and use.
Ideal for quick risk assessments across your entire digital estate including data held in Atlassian Suite. Supports compliance processes including
those governing banks.
Features
- Data discovery on endpoints, servers and cloud
- Automated classification for easier setup
- End User education and real time feedback mechanisms
- Real time visualisation of events in enterprise dashboard
- Interventions include alert, block sharing, quarantine and log
- Easy to set up, deploy and administrate
- Cloud or on premise solution and computationally inexpensive
Benefits
- Facilitation of safe content sharing with real-time reporting
- Dashboard real-time reporting and the dynamically generated Executive Summary
- Easy to deploy and does not interrupt end user workflow
- Provides protection of content, keywords, phrases and documents
- Educates and engages end users
- Easy setup of automated classification
- Elegant and simple to deploy and use
- Protects unstructured data
- Real-time monitoring and auditing capabilities for enhanced security.
- Seamless integration with existing IT infrastructure for effortless deployment.
Pricing
£6 a user a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 8 6 3 1 9 2 3 6 6 2 7 9 7 7
Contact
Brookcourt Solutions
Phil Higgins
Telephone: 01737 886111
Email: contact@brookcourtsolutions.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
-
Atlassian Confluence (Server, DataCentre, Cloud)
Atlassian Jira (Server, DataCentre, Cloud)
Atlassian Bitbucket (Server, DataCentre, Cloud)
Google Workspace
Microsoft (M365, Fileservers & Endpoints) - Cloud deployment model
- Private cloud
- Service constraints
- No noteworthy issues - Any scheduled maintenance is communicated in advance and usually has minimal impact on service.
- System requirements
-
- The Manager requires correct sizing of physical memory:
- *16GB for Large Installations - (>6000 endpoints or >10m results)
- *8GB for Medium Installations - (>1000 endpoints or >1m results)
- *4GB for Small Installations - (up to 6000 endpoints)
- The SecurEnvoy Data Discovery solution requires Java Runtime installed
User support
- Email or online ticketing support
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Needs a response
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- SecurEnvoy provides end users with a comprehensive array of options to kickstart their service journey. From streamlined quick start guides and detailed documentation to technical enablement sessions, organisations have the flexibility to choose the approach that best fits their needs. Whether opting for self-configuration of their tenant or preferring a vendor-led implementation, SecurEnvoy ensures a seamless and tailored onboarding experience. Quick start guides offer a swift entry point for those eager to get started, while comprehensive documentation serves as a valuable resource for in-depth understanding and troubleshooting. For organisations seeking more hands-on guidance, technical enablement sessions empower them to configure their tenant independently, fostering a sense of ownership and customisation. Alternatively, opting for a vendor-led implementation provides expert guidance and support every step of the way, ensuring a smooth transition and maximising the benefits of SecurEnvoy's solutions. With these diverse options, SecurEnvoy caters to the unique preferences and requirements of every organisation, setting them up for success in their security journey.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- From the Admin Console the customer can export log data.
- End-of-contract process
- All data is kept in the on-premise customer database and it’s the customers responsibility to uninstall once contract ends.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- Yes
- Compatible operating systems
-
- Linux or Unix
- MacOS
- Windows
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Data Discovery administration console, accessible via a Web GUI secured with local accounts or integrated with AD, enables seamless platform setup and configuration. Users can configure policies and scan tasks for sensitive data discovery scanning.
- Accessibility standards
- None or don’t know
- Description of accessibility
- We support the built in accessibility options on supported devices.
- Accessibility testing
- N/A
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
-
Each customer has their own dedicated tenant.
Scanning engines can be throttled to not overwhelm the service.
Scans can be paused and only run in quiet times.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Amount of data scanned per repository
Amount of data with sensitive information
Amount of data remediated - Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- SecurEnvoy
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Other
- Other data at rest protection approach
- All data is stored within the customer database on-premise and follows customer security policy.
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- From the Admin Console the customer can export log data.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- This is an on-premise solution using customer equipment - so no SLA.
- Approach to resilience
- This is an on-premise solution using customer equipment - so no SLA.
- Outage reporting
-
Admin dashboard
Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Local or AD Credentials
- Access restriction testing frequency
- Never
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Needs a response
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Change control tickets are meticulously logged via our CRM system and promptly assigned to designated team members, who carefully assess risk levels before deciding to approve or deny the requested change control
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Our vulnerability management process is comprehensive and robust, utilising a combination of state-of-the-art technologies and expert oversight. We employ a managed service provided by our trusted MSSP (Managed Security Service Provider), which utilises advanced solutions such as Deep Instinct and Tenable, supported by a Breach Discovery Alert system. This multifaceted approach ensures proactive identification, swift remediation, and continuous monitoring of vulnerabilities across our infrastructure, safeguarding our systems against potential threats.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- SecurEnvoy have a real-time email alerting.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Incident reports are sent to either the designated business unit security officer or the group data protection officer (DPO).
Incidents are typically reported via email in a written report.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
SecureEnvoy are a part of the Shearwater Group. We are committed to fighting climate change and document our approach, at group level within out ESG policy document. Available here - https://www.shearwatergroup.com/environmental-policy/
Pricing
- Price
- £6 a user a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Full Version of the Service Limited for 100 users for 30 days
- Link to free trial
- https://securenvoy.com/request-free-trial-dd/