Security Operations
We have considerable experience in designing operational security capabilities for Government Departments using proven architectures and secure design patterns.
We enable your business to understand, assess security/cyber risks and unlock the full potential of cloud technologies using a business oriented approach.
Features
- Security Operations strategy
- Improved security posture
- Development of automation and integration
- Compliance to HMG Security Policy Framework
- Security governance support and representation
- Delivery management
- Reduced security risk/threat awareness to Services
- Business Risk aligned security solutions
Benefits
- Delivers a business-oriented and risk-driven method to cloud security
- User Oriented and Business Focussed Operational outcomes
- Experience of securing services within both Central and Local Government
- Cyber Security Architecture & Design and Governance
- Technical design/assurance for cyber protective monitoring capabilities
- Threat modelling and attack scenarios
- Uses industry leading security standards for governance and compliance
- Uses industry leading security architecture frameworks for design
- Security expertise combined with business change
- Expert programme, stakeholder management and business change skills
Pricing
£400 to £1,400 a person a day
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 5 2 8 3 3 8 6 5 5 8 9 7 1 0
Contact
Pionen
Steve Moran
Telephone: 01743 296 535
Email: steve.moran@pionen.co.uk
Planning
- Planning service
- Yes
- How the planning service works
- We will always work closely and collaboratively with our client to understand their objectives, needs and capabilities and then agree how we can most effectively assist them in planning how they will implement cloud hosting or software services. We offer a tailorable, full-lifecycle project and programme definition and delivery capability.
- Planning service works with specific services
- No
Training
- Training service provided
- Yes
- How the training service works
- We work closely with our clients throughout the project and service lifecycle to fully understand their training needs and build a customised approach to ensure your transition to cloud services is successful.
- Training is tied to specific services
- No
Setup and migration
- Setup or migration service available
- Yes
- How the setup or migration service works
-
We provide a comprehensive set-up and migration service to support your transition to cloud hosting or cloud software. We follow a proven multi-stage migration path with full operational engagement to ensure secure and managed migration from legacy to new.
We recognise the need to migrate with minimal disruption to operational services and reduce the risk of outage and data loss through structured planning, test and execution. - Setup or migration service is for specific cloud services
- No
Quality assurance and performance testing
- Quality assurance and performance testing service
- No
Security testing
- Security services
- Yes
- Security services type
-
- Security strategy
- Security risk management
- Security design
- Cyber security consultancy
- Security incident management
- Security audit services
- Other
- Other security services
-
- Security Capability Delivery
- Security Operations Centre
- Security Engineering
Ongoing support
- Ongoing support service
- Yes
- Types of service supported
-
- Buyer hosting or software
- Hosting or software provided by your organisation
- Hosting or software provided by a third-party organisation
- How the support service works
- We can provide any ongoing support package that a client may require. We are able to flex levels of support to meet changes in demand, for example we can provide enhanced support during transition or roll-out phases.
Service scope
- Service constraints
- Our service model is flexible and has no absolute constraints. We are able to offer bespoke packages to clients that include only the features that they need to support their business or organisation.
User support
- Email or online ticketing support
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- No
- Support levels
- Our support levels include onsite, email and telephone assistance, our projects typically employ an account management structure as as part of our delivery, support and quality assurance processes.
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Centre for Excellence
- ISO/IEC 27001 accreditation date
- 24/04/2022
- What the ISO/IEC 27001 doesn’t cover
- Out of Scope Partner company Greenfield IT, Pink Spaghetti (Secretarial Services), Business Applications service providers, Microsoft Azure/ MS Office 365 and Atlassian environments. (in-line with the Shared Responsibility Model for SaaS) Customer networks are also out of scope and covered by their own security programme.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Pionen has a well developed method statement on the subject of fighting climate change. Depending on the time of year our activities will be varied in this domain. However we endeavour to measure and report, if requested, on the specific activities our team are participating in. This list if not exhaustive but includes things like reducing energy consumption, reducing travel when possible, investment in green technology and planting trees to offset carbon.
Pricing
- Price
- £400 to £1,400 a person a day
- Discount for educational organisations
- No