F5 BigIP VE Distributed Cloud, Silverline/App Protect, Nginx & Evolve Support
F5 Licensing to facilitate Local /Global Load Balancing / Access Policy Manager (VPN) /Advanced Firewall Manager / DNS / App Security Manager / Big IQ Management/Waap/F5 Distributed Cloud Services Essential App Protect & Nginx sundry services to support installation / training.
Features
- Application Load Balancing
- Remote Access
- Device Management
- Web Application Firewall
- Authentication Consolidation
- Application Securtiy
- Application Performance
Benefits
- Reduced cost of application ownership
- More agile dev ops
- Unified Remote Access Platform
- Cost saving Federated identity options
- Application Security Concentrator
Pricing
£1.50 a unit a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 3 2 8 9 7 5 5 9 0 0 3 5 3 3
Contact
BlueFort Security Ltd
David Henderson
Telephone: 01252 917000
Email: Dave.Henderson@bluefort.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- N/A
- System requirements
- Access to Virtualised infrastructure for deployment
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
24 x 7 x 365
30 Minutes to Next Business Day SLA's Available - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
-
Open tickets
Update tickets
Speak to a support representative
Close tickets - Web chat accessibility testing
- N/a
- Onsite support
- Yes, at extra cost
- Support levels
-
8x5x Next business Day
24 x 7 x 4 hr options
Evolve Enhanced Support inc Service Credits
Customer Success Manager / TAM available with certain service levels
Pricing available upon request - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Onboarding service available. Remote or onsite options available.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Configuration file can be exported prior to deletion.
- End-of-contract process
-
Contract ends as per terms and conditions.
Contract extension option available should service continue to be available.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Web based
- Accessibility standards
- None or don’t know
- Description of accessibility
- N/A
- Accessibility testing
- N/A
- API
- Yes
- What users can and can't do using the API
-
Services can be provisioned via the API.
Resources can be modified directly via the API. - API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
-
Configurations, Featuresets, Management Users, Logon Profiles, Resource Assignments.
Customisation is dependent upon delegated management rights granted per user.
Scaling
- Independence of resources
- N/a
Analytics
- Service usage metrics
- Yes
- Metrics types
- Usage analytics available.
- Reporting types
-
- Real-time dashboards
- Regular reports
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- F5 Networks, NginX, Shape Security
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Configuration file can be exported in text format if required.
- Data export formats
- Other
- Other data export formats
- Text
- Data import formats
- Other
- Other data import formats
- Existing F5 config file
Data-in-transit protection
- Data protection between buyer and supplier networks
- IPsec or TLS VPN gateway
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Any SLA's are driven by the chosen hosting partner of the client.
- Approach to resilience
- Available upon request
- Outage reporting
- SNMP, Syslog, Health Monitors & Big IQ Management Dashboard.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Other
- Other user authentication
- Configuration dependent
- Access restrictions in management interfaces and support channels
- Management interface requires dedicated VLAN.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- UKAS
- ISO/IEC 27001 accreditation date
- September 2019
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- Cyber Essentials+
- ISO 9001
- ISO 27001
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Available upon request
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Available upon request.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Available upon request
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Available upon request.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Available upon request
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Tackling economic inequality
Through partnering with BlueFort, you will be actively supporting the creation of employment and training opportunities designed to help address the shortage of cyber security skills within the UK. Each additional contract provides a new opportunity for BlueFort to:
• Increase the amount of specialist cyber security roles within the business. Over 80% of our current workforce are in specialist cyber security roles. In line with our own growth plan, our target is to increase the amount of specialist roles by 50% by 2028.
• Encourage the uptake of cyber security careers for school leavers and undergraduates. We commit to partnering with local schools and higher educational institutions. Our target is to offer 4 industry placements per year from 2025.
In addition to the above, BlueFort’s service also actively supports the creation of diverse supply chains. We partner with a wide variety of specialist technology vendors and contractors to deliver our service. Each contract provides additional opportunities for new businesses, start-ups, and SMEs within the cyber security sector to grow and continue to innovate.
• We support innovation and disruptive technologies. Our solution portfolio is continuously updated and reviewedEqual opportunity
BlueFort are actively working towards improving workforce inequality. Women and minorities are for example currently underrepresented within the cyber security industry. For example, fewer than 25% of cyber security professionals currently come from minority backgrounds. Each additional contract provides a new opportunity for BlueFort to work towards achieving our equal opportunities targets. We are currently:
• Working with local educational institutions to promote the uptake of STEM qualifications amongst underrepresented groups. We commit to providing key staff to attend National Careers Week events at local educational institutions, with the aim to raise awareness of the benefits of work within the industry.
• Working to increase the number of women in cyber security roles within the business. Our target is to increase the number of women in specialist roles by 75% by 2028. In order to remove key barriers, BlueFort have committed to ensure that all roles continue to be able to be worked remotely, that we continue to implement fair compensation practices, and that we offer enhanced family friendly benefits (including occupational family leave arrangements).
• Our Equal Opportunities and Respect at Work Policy confirms our commitment to eliminating discrimination, victimisation, harassment (as defined by the Equality Act 2010) and bullying. Our Diversity and Inclusion Policy outlines our expectations of employees in their behaviours to others. To underline our commitment to equality, we have a dedicated Equality Complaints Procedure, designed to deal with such complaints in a way that makes all individuals, including those from minority groups, feel more comfortable raising concerns.Wellbeing
BlueFort takes the health and wellbeing of its workforce seriously. We provide a range of wellbeing benefits and aim to treat employees who are sick with dignity and respect, providing support, and (if appropriate and practicable) workplace adjustments that may assist that individual to continue productive employment with the Company. BlueFort currently partner with Vitality to support our goal to build a healthier and happier workforce. Via Vitality Private Medical Insurance and Vitality at Work Business, we provide staff with a comprehensive health and wellbeing service offering that helps to address some of the leading causes of workplace absence, as well as offering many proven health and wellbeing benefits (including GP consultations and mental health treatment, including Cognitive Behavioural Therapy and counselling).
Pricing
- Price
- £1.50 a unit a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Full feature set available for trial upon request.
- Link to free trial
- Upon request