Identiproof
Identiproof provides an easy to use and quick to implement digital identity solution for credential issuers, holders and verifiers that supports the W3C Verifiable Credentials model, and other relevant standards.
Features
- Automate cumbersome workflows
- Easy integration through REST API
- Fully encrypted credentials
- Instant credential creation and verification
- VC issuer service/API for integrating this with your user database
- VC wallet for users with iPhones and Android smartphones
- Verifier web service/API
- Verifier app for iPhones/Android tailored specifically to a service
Benefits
- Replace physical credentials with secure forgery proof digital credentials
- Streamline credential issuing processes
- Eliminate fraud
- Significantly reduce costs
- Supports self sovereign identity putting the individual in control
- Fully GDPR compliant and privacy preserving
- Designed for interoperability with other systems
Pricing
£12,000 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
4 1 1 6 8 7 1 3 7 3 3 2 7 1 7
Contact
Crossword Cybersecurity Plc
Richard Page
Telephone: 0333 090 2587
Email: richard.page@crosswordcybersecurity.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- None
- System requirements
- Browser based SaaS solution - no system requirements
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- User support, including telephone and email support for up to two named Customer “super-users” during Business Hours (meaning 9.00am to 5.30pm (GMT) on Business Days).
- User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- No
- Support levels
- User support, including telephone and email support for up to two named Customer “super-users” during Business Hours (meaning 9.00am to 5.30pm (GMT) on Business Days).
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Crossword will work with the customer and provide implementation services to connect our cloud based API to your database
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- The service does not store any data
- End-of-contract process
- We would simply remove the service
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- Our REST API connects to your database that contains the information needed to generate the credentials. It is a simple API with just two calls making it straightforward to implement
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- Any credential can be customised to suit business requirements. Any attributes can be created as part of the credential. Look and feel can be customised, including the mobile wallet
Scaling
- Independence of resources
- We run a separate tenant for each customer and ensure that the service is provided with enough capacity. Demand from other users does not affect the platform
Analytics
- Service usage metrics
- Yes
- Metrics types
- We can provide details of the logins, number of assessments sent, completed, outstanding. The software provides tracking of the whole end to end processes.
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- There is no data stored by the service
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Service Credits are calculated as a percentage of the total charges paid by the Customer for the Services for the Quarter in which the error occurred in accordance with the below.
=>90.0% but < 95.0% - 20%
Less than 90.0% - 40%
Less than 50% - 80%
To receive a Service Credit, Customer must submit a claim in writing. To be eligible, the credit request must be received by Crossword no later than 30 days after receipt by Customer of the management information for the relevant period. Any credit request must include:
i. the words “SLA Credit Request” in the subject line; and
ii. the dates and durations of each period of Downtime.
b. Crossword will issue the Service Credit to the Customer within one month of the confirmation by Crossword of the Customer’s request.
c. Crossword will apply any Service Credits only against future payments otherwise due from the Customer. At Crossword’s discretion, Crossword may issue the Service Credit to the billing details the Customer used to pay for the billing cycle in which the error occurred. Service Credits may not be transferred or applied to any other account. - Approach to resilience
- Available on request
- Outage reporting
- Through email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
-
Support Administrator (Crossword)
1. Two factor via IP restriction
2. Minimum password requirements
3. No access to user assessment data, only general account information.
4. No database access
5. No full-deletion capability
Development Administrator (Crossword)
1. Minimum password requirements
2. Two factor via mobile phone
3. Restricted to two administrators only
4. Full database access - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
- Other
- Description of management access authentication
- IP Restriction
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
- IASME Governance Certification
Security governance
- Named board-level person responsible for service security
- No
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
-
Cyber Essentials and Cyber Essentials Plus
IASME Governance - Information security policies and processes
- Crossword has a CISO within the business. The security risk committee operate a set of security policies and processes that are regularly reviewed. Users undergo annual security awareness training. Our policies and processes are independently assessed for our IASME governance certification
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Patches
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Rizikon is scanned continuously for vulnerabilities using SonarQube, identified vulnerabilities are categorised according to CWE and then mitigated according to the seriousness of the vulnerability.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Monitoring is performed using AWS Cloudwatch. Crossword follows our incident response plan to escalate any perceived incidents. Incidents are responded to within 24hrs
- Incident management type
- Supplier-defined controls
- Incident management approach
- Crossword maintains an incident management policy . Users report incidents via email or through our support ticketing system. Incident reports are provided via email to our customers.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Covid-19 recovery
-
Covid-19 recovery
Crossword is a growth business and as such are helping with the Covid-19 recovery through the creation of jobs in the labour market. This creates employment, re-training and other return to work opportunities for
those left unemployed by COVID-19, particularly new opportunities in high
growth sectors such as cyber security.
Pricing
- Price
- £12,000 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- A proof of value can be provided in exceptional circumstances