Skip to main content

Help us improve the Digital Marketplace - send your feedback

Performance Networks Ltd

Managed WiFi, Public Wi-Fi registration portal and content filtering

The Performance Networks Managed Wi-Fi service offers support, monitoring and management for both existing and new public WiFi and private WiFi networks, offering a guest WiFi registration captive portal, data capture, content filtering and monitoring. GDPR compliant data collection, marketing and analytics. Our service works with most WiFi vendors.

Features

  • Fully managed LAN and WAN
  • Public WiFi
  • DNS based Content Filtering
  • Wide area and local area monitoring
  • Secure Corporate WiFi
  • Reporting and Analytics Dashboard
  • Guest WiFi registration and management
  • Multiple vendors supported
  • Marketing and Advertising opportunities
  • Full API and interoperability

Benefits

  • Outsource WiFi management and free up your internal resources
  • Single provider solution
  • Clear SLA's and accountability
  • Utilise your existing infrastructure
  • GDPR compliant Public WiFi
  • Content Filtering for user safety
  • Utilise your existing infrastructure
  • Maximise current technology and return on investment
  • 99.99% availability service
  • Dedicated account management

Pricing

£2.00 to £750 a device

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at gcloud@performancenetworks.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 2 0 8 8 3 8 6 1 1 3 6 4 9 0

Contact

Performance Networks Ltd Will Evans
Telephone: 0115 822 1212
Email: gcloud@performancenetworks.co.uk

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
CRM's, marketing software and existing WiFi and network controllers
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
This service is available on multiple vendors, some services may be limited based on the vendor and network configuration, any limitations will be confirmed during the network verification stage. All maintenance and updates are normally performed remotely. Any service affecting updates will be communicated in advance.
System requirements
  • Secure access to the network for monitoring and management
  • Live internet connection and power at customer premises

User support

Email or online ticketing support
Email or online ticketing
Support response times
The Performance Networks Helps desk is available- 24 x 7 depending on your chosen support package. Our call answering time average is 22 seconds. All calls will be registered as a ticket and ticket number provided.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
None
Onsite support
Yes, at extra cost
Support levels
Business Hours
This package has been created for organisations that operate within standard working hours and need help during that time should a problem occur.
Support Helpdesk & Equipment Monitoring 5 days per week 9am – 17:30 pm

Extended Hours
For organisations that operate outside of standard hours, such as contact centres, coffee shops, bars and restaurants.
Support Helpdesk & Equipment Monitoring 7 days per week 7am – 11 pm

24/7
If you need support 24/7, then opt for package 3 which will give you the reassurance of our support whenever you need it.
Support Helpdesk & Equipment Monitoring 24/7
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Following the initial network assessment a service description will be created covering the agreed scope any limitations.

Following customer sign off we will assign a project manger, who will guide you through the stages of deployment. There will be a significant information gathering element to the onboarding process while we map and document the infrastructure, establish secure access and add monitoring. The standard lead time to implement the service is 4-6 weeks. Following onboarding full documentation will be provided.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
We provide a secure dashboard where all of the data is stored, all user data can be exported via CSV at the end of the contract.
End-of-contract process
At the end of the contract we will arrange to cease the services and remove our access, monitoring and services from your systems. Any hardware you have purchased you will own along with any user data collected via the portal.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Our service is fully responsive and adapts to screen sizer and resolution based on the device
Service interface
Yes
User support accessibility
WCAG 2.1 A
Description of service interface
When user connect to a public WiFi network, a splash screen will pop on their device asking the user to input the required details to access the WiFi, this is a very simple process. Once logged in the y will either directed to a landing page or straight out to the internet.
Accessibility standards
None or don’t know
Description of accessibility
The user interface is designed do be clean and easy to navigate with clear input boxes and no unneeded text or graphics
Accessibility testing
None
API
Yes
What users can and can't do using the API
The API for our service allows you to extract analytic, usage and marketing data securely to other CRM or marketing applications. The API also allows user management.
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
The UX can be customised the organisations brand, the support can be customised based on equipment type and amount.

Scaling

Independence of resources
Our service applies bandwidth limiting on connection to ensure heavy users don't have a negative affect on other users of the service. Heavy user reports are also available. Our resources will automatically scale with load.

Analytics

Service usage metrics
Yes
Metrics types
Total users, new users, total bandwidth, user bandwidth, time usage, device type, browser type, returning visitors, usage by location, session data, marketing opt in.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
User data can be exported via the API or via a secure CSV download.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Our services run to a 99.99% target availability, we monitor our services continuously against this uptime. Service credits are available for service disruptions and can be claimed by raising a support ticket where we will review the claim and raise any applicable service credits.
Approach to resilience
Our services are designed to be highly available, resilient and scalable. All services have been risk assessed and appropriate redundancy measures implemented to achieve our target uptimes, including instance and data centre redundancy, load balancing, hardware and software failover across disparate components, data replication, and automated scaling. Further information is available on request.
Outage reporting
All of our services are monitored 24/7 by our Network Operations Centre, should our monitoring alert us of any service degradation or downtime our engineers will open a ticket immediately and begin investigation, based on the severity and nature of the issue we will provide updates to our customers via email detailing the nature of the issue, the current status of the issue, next steps and target resolution time.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Other user authentication
Facebook
Voucher Code
PayPal
Stripe
Access restrictions in management interfaces and support channels
All staff access is controlled by our access control policy, staff only have access to areas of the systems required for their specific job roles and these are regularly reviewed in line with ISO27001. All systems are protected by a secondary authentication method and have full logging.
Access restriction testing frequency
At least every 6 months
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
British Assessment Bureau
ISO/IEC 27001 accreditation date
12/04/2024
What the ISO/IEC 27001 doesn’t cover
Our ISO27001 certification covers all of our services
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
Cyber Essentials
Information security policies and processes
As a ISO27001 certified organisation we have a well documented information security management system, which include acceptable use, data classification and storage, access control, business continuity. and security incident reporting and management. Any incidents and non conformities are reported and logged as per the ISO standard and our system is regular audited internally and externally.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Performance Networks follow a strict change management procedure as detailed in our Change Management Policy. All changes must follow the process, through request, risk assessment, approval, testing, implementation and review, all changes are tracked in the change log.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We use software to monitor and assess our infrastructure for known vulnerabilities and threats, on discovery of a new vulnerability we aim to apply patches within 72 hours. We also monitor the logs from our services and are alerted to suspicious activity.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We use software to monitor and assess our infrastructure for known vulnerabilities and threats, on discovery of a new vulnerability we aim to apply patches within 72 hours. We also monitor the logs from our services and are alerted to suspicious activity.
Incident management type
Supplier-defined controls
Incident management approach
We have pre-defined a Incident management processes in place for common incidents such as compromised user accounts or the detection of suspicious activity, users can log incidents via our support desk. Each indecent will be logged along with actions taken. Incident reports are made available following incident resolution and communicated by email to affected parties.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

As a WiFi installer and software provider our main directly controllable emissions are travel, hosting and our office operations. Hence we have focused on these for our key objectives as these areas are where we can have the biggest impact. We work with an external specialist to measure our emissions and create a carbon reduction plan (CRP) on an annual basis. 1. Reduce the emissions from our fleet – Target - Migrate 20% of our fleet fully electric, all remaining vehicles under 150g/km 2. Reduce hosting and office operations emissions and impact – Target - 100% renewable electricity for hosting, office and recycle all non-confidential paper waste – Certified renewable electricity used by hosting provider and building and dedicated paper recycling bins introduced. 3. Operate a virtually paperless workplace – Target – Print under 1000 pages per year and push suppliers to paperless invoices

Covid-19 recovery

We are actively engaging with the community and are proactively looking to recruit apprentices to help them into employment following on from the difficulties Covid 19 caused with employer and trainer engagement. As a supplier to many Covid affected businesses who we're forced to close we adopted a payment holidays for those affected and also free of charge early contract terminations where possible if required to help affect affected businesses and communities.

Tackling economic inequality

As a business we have so far employed 11 apprentices from the local area and are actively recruiting for 2 additional apprentices and are very proud to provide fully funded training and a rewarding career path to our employees.

Equal opportunity

Our equal opportunities and diversity policy mandates that our recruitment is fair and open to all. As a business we have so far employed 11 apprentices from the local area and are actively recruiting for 2 additional apprentices and are very proud to provide fully funded training and a rewarding career path to our employees. Objectives of our Equal Opportunities and Diversity Policy: 1. To prevent, reduce and stop all forms of unlawful discrimination in line with the Equality Act 2010. 2. To ensure that recruitment, promotion, training, development, assessment, benefits, pay, terms and conditions of employment, redundancy and dismissals are determined on the basis of capability, qualifications, experience, skills and productivity.

Wellbeing

The wellbeing of our team and community are of the utmost importance to us. We provide our team members with additional health insurance along with additional resources to help their wellbeing including the following: Wellbeing App; Digital GP; Stress counselling; Online workouts and health advice; Mental Health Advice Articles. We are also keen to help our wider community and our team members recently participated in the Big Walk event for MacMillan.

Pricing

Price
£2.00 to £750 a device
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
A limited 30 day trial of the guest registration service is available on request.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at gcloud@performancenetworks.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.