Skip to main content

Help us improve the Digital Marketplace - send your feedback

BlueFort Security Ltd

iboss Zero Trust Edge

The iboss Zero Trust Edge prevents breaches by making applications, data and services inaccessible to attackers while allowing trusted users to securely and directly connect to protected resources from anywhere. Providing customers with a containerized architecture built for infinite scalability.

Features

  • Dedicated Unique Public IP addresses per customer
  • Web Filtering
  • Zero Trust Policy Manager
  • Inline & API CASB
  • DLP & Exact Data Matching DLP
  • Malware Prevention & Sandboxing
  • DNS Security
  • Private Access (for internal applications/resources)
  • Remote Browser Isolation

Benefits

  • True Zero-Trust model of secured access to any resource, anywhere
  • Eliminates the need for slow and overloaded VPN connections
  • Reduces the risk of data loss
  • Provides Granular Access
  • consistent visibility and protection for all enterprise apps and data

Pricing

£30 to £150 a user a year

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Dave.Henderson@bluefort.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 0 5 7 3 4 3 5 6 3 3 5 4 9 3

Contact

BlueFort Security Ltd David Henderson
Telephone: 01252 917000
Email: Dave.Henderson@bluefort.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
Available upon request.
System requirements
  • Internet Connectivity.
  • Standard browser for management.

User support

Email or online ticketing support
Email or online ticketing
Support response times
15mins - 2hrs dependent upon service type.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Via management portal.
Web chat accessibility testing
N/A
Onsite support
No
Support levels
Standard, Mission Critical and Evolve Service levels available. Mission critical and Evolve service levels include Customer Success Manager.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Faststart configuration onboarding service, to include remote configuration and onboarding.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Available upon request.
End-of-contract process
No additional costs at end of term if cancelled in writing 90days prior to expiry.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
N/A
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
The iboss platform offers many CASB features that control and limit access to cloud apps and identify and prevent data leakage. The API CASB functionality allows the iboss platform to support out-of-band access to files via APIs for Box, Google and Microsoft 365. This integration with Box, Google and Microsoft 365 enables the iboss platform to generate a list of files a user has stored in each of these cloud services. This file and user information allows the iboss platform to do further analysis on the content including malware detection and DLP compliance. If any DLP violations are discovered or any file stored within the cloud service contains malware, the file will be flagged along with the specific user. This information provides greater insight into the data at rest in Box, Google and Microsoft 365 and ensures that any DLP violations or malware threats can be remediated quickly.
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • PDF
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
Available upon request.

Scaling

Independence of resources
Details of secure infrastructure available upon request.

Analytics

Service usage metrics
Yes
Metrics types
Available upon request.
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Iboss

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Other
Other data at rest protection approach
Available upon request.
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Dependent upon service tier. Details available upon request.
Data export formats
CSV
Data import formats
Other
Other data import formats
Text file

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Availability within a month

<99.99999% – ≥ 99.40000%=5% Credit

<99.40000% – ≥ 98.99999%=10% Credit

<98.99999% – ≥ 97.99999%=20% Credit

<97.99999% – ≥ 97.00000%=30% Credit

<97.00000% =50% Credit
Approach to resilience
Available upon request.
Outage reporting
Email Alerts and service dashboard.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
  • Other
Other user authentication
External Authentication methods available upon request.
Access restrictions in management interfaces and support channels
Role based management options.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password
  • Other
Description of management access authentication
Available upon request.

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
UKAS
ISO/IEC 27001 accreditation date
2019
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
Yes
CSA STAR accreditation date
2021
CSA STAR certification level
Level 1: CSA STAR Self-Assessment
What the CSA STAR doesn’t cover
Available upon request.
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
Available upon request.
Information security policies and processes
Available upon request.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Available upon request.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Available upon request.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Available upon request.
Incident management type
Supplier-defined controls
Incident management approach
Available upon request.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Tackling economic inequality

Through partnering with BlueFort, you will be actively supporting the creation of employment and training opportunities designed to help address the shortage of cyber security skills within the UK. Each additional contract provides a new opportunity for BlueFort to:
• Increase the amount of specialist cyber security roles within the business. Over 80% of our current workforce are in specialist cyber security roles. In line with our own growth plan, our target is to increase the amount of specialist roles by 50% by 2028.
• Encourage the uptake of cyber security careers for school leavers and undergraduates. We commit to partnering with local schools and higher educational institutions. Our target is to offer 4 industry placements per year from 2025.
In addition to the above, BlueFort’s service also actively supports the creation of diverse supply chains. We partner with a wide variety of specialist technology vendors and contractors to deliver our service. Each contract provides additional opportunities for new businesses, start-ups, and SMEs within the cyber security sector to grow and continue to innovate.
• We support innovation and disruptive technologies. Our solution portfolio is continuously updated and reviewed

Equal opportunity

BlueFort are actively working towards improving workforce inequality. Women and minorities are for example currently underrepresented within the cyber security industry. For example, fewer than 25% of cyber security professionals currently come from minority backgrounds. Each additional contract provides a new opportunity for BlueFort to work towards achieving our equal opportunities targets. We are currently:
• Working with local educational institutions to promote the uptake of STEM qualifications amongst underrepresented groups. We commit to providing key staff to attend National Careers Week events at local educational institutions, with the aim to raise awareness of the benefits of work within the industry.
• Working to increase the number of women in cyber security roles within the business. Our target is to increase the number of women in specialist roles by 75% by 2028. In order to remove key barriers, BlueFort have committed to ensure that all roles continue to be able to be worked remotely, that we continue to implement fair compensation practices, and that we offer enhanced family friendly benefits (including occupational family leave arrangements).
• Our Equal Opportunities and Respect at Work Policy confirms our commitment to eliminating discrimination, victimisation, harassment (as defined by the Equality Act 2010) and bullying. Our Diversity and Inclusion Policy outlines our expectations of employees in their behaviours to others. To underline our commitment to equality, we have a dedicated Equality Complaints Procedure, designed to deal with such complaints in a way that makes all individuals, including those from minority groups, feel more comfortable raising concerns.

Wellbeing

BlueFort takes the health and wellbeing of its workforce seriously. We provide a range of wellbeing benefits and aim to treat employees who are sick with dignity and respect, providing support, and (if appropriate and practicable) workplace adjustments that may assist that individual to continue productive employment with the Company. BlueFort currently partner with Vitality to support our goal to build a healthier and happier workforce. Via Vitality Private Medical Insurance and Vitality at Work Business, we provide staff with a comprehensive health and wellbeing service offering that helps to address some of the leading causes of workplace absence, as well as offering many proven health and wellbeing benefits (including GP consultations and mental health treatment, including Cognitive Behavioural Therapy and counselling).

Pricing

Price
£30 to £150 a user a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Time limited access to full product available upon request.
Link to free trial
N/A

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Dave.Henderson@bluefort.com. Tell them what format you need. It will help if you say what assistive technology you use.