EDR (Endpoint Detection)
EDR is a comprehensive Endpoint Detection and Response solution that provides advanced threat detection, prevention, and response capabilities to protect endpoints from cyber threats, including malware, ransomware, and zero-day attacks.
Features
- Advanced Threat Detection
- Endpoint Visibility
- Real-time Response
- Attack Surface Reduction
- Forensic Analysis
- Integration Capabilities
- Scalability
- Compliance Reporting
Benefits
- Improved Threat Detection
- Reduced Incident Response Time
- Enhanced Visibility
- Compliance Readiness
- Scalability
- Ease of Integration
- Peace of Mind
Pricing
£1,000 a unit a year
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 5 3 5 2 5 9 6 7 1 0 4 6 2 0
Contact
SECURE NEXUS LTD
Raymond Setchfield
Telephone: 07973573734
Email: rsetchfield@securenexus.co.uk
Planning
- Planning service
- Yes
- How the planning service works
-
In guiding buyers through implementing cloud hosting or software services with EDR, we adopt a comprehensive approach to ensure seamless integration and effective deployment. Firstly, we conduct a thorough assessment of the buyer's existing endpoint security infrastructure and requirements, gaining insights into their specific needs and objectives. Leveraging this understanding, we collaborate closely with the buyer to design and customise an implementation plan tailored to their environment. This plan encompasses selecting the most suitable deployment model, configuring EDR to align with their security policies, and integrating it with existing security solutions for enhanced efficacy.
Throughout the planning process, we prioritise risk assessment and mitigation, identifying potential challenges and developing strategies to address them proactively. Our team provides guidance on best practices for deploying EDR in cloud environments, ensuring optimal performance and adherence to security standards.
Additionally, we offer comprehensive training and onboarding support to empower the buyer's team with the knowledge and skills required to manage and maintain EDR effectively. This includes education on endpoint security best practices, threat detection techniques, and incident response procedures. - Planning service works with specific services
- No
Training
- Training service provided
- No
Setup and migration
- Setup or migration service available
- Yes
- How the setup or migration service works
-
In facilitating the migration to the cloud or transitioning between cloud services with EDR, we offer a comprehensive and structured approach to ensure a smooth and successful transition. Firstly, we conduct a thorough assessment of the buyer's existing endpoint security infrastructure and requirements, gaining insights into their specific needs and objectives. Leveraging this understanding, we collaborate closely with the buyer to design and customise a migration or transition plan tailored to their environment.
Our team assists in selecting the most suitable cloud service provider(s) and deployment model(s), considering factors such as performance, scalability, security, and compliance. We provide guidance on best practices for deploying EDR in cloud environments, ensuring optimal performance and adherence to security standards.
Throughout the process, we prioritise risk assessment and mitigation, identifying potential challenges and developing strategies to address them proactively. Thorough testing and validation are conducted to ensure compatibility, data integrity, and functionality.
We provide comprehensive training and support to facilitate user adoption and adaptation to the new cloud environment or services. This includes education on endpoint security best practices, threat detection techniques, and incident response procedures. - Setup or migration service is for specific cloud services
- No
Quality assurance and performance testing
- Quality assurance and performance testing service
- Yes
- How the quality assurance and performance testing works
-
In ensuring the quality and performance of EDR implementations, we employ a systematic and rigorous approach to quality assurance (QA) and performance testing. Our process begins with a comprehensive assessment of the buyer's endpoint security infrastructure and requirements, enabling us to understand their specific needs and objectives.
Leveraging this insight, we design comprehensive test scenarios and strategies tailored to the buyer's environment. These include functional testing to validate the functionality of EDR features, integration testing to ensure compatibility with existing security infrastructure, and performance testing to evaluate the solution's responsiveness and scalability under various conditions and workloads.
Throughout the QA and performance testing process, we employ advanced tools and methodologies to evaluate the effectiveness, reliability, and scalability of EDR implementations. Our team of experienced QA engineers and security experts meticulously analyse test results, identifying any issues or areas for improvement.
We collaborate closely with the buyer to address any identified issues promptly, implementing corrective measures and optimisations as needed to ensure the successful deployment and operation of EDR.
Security testing
- Security services
- Yes
- Security services type
-
- Security strategy
- Security risk management
- Security design
- Cyber security consultancy
- Security testing
- Security incident management
- Security audit services
- Certified security testers
- Yes
- Security testing certifications
- Other
- Other security testing certifications
-
- Certified Ethical Hacker v11
- CISSP
Ongoing support
- Ongoing support service
- Yes
- Types of service supported
-
- Buyer hosting or software
- Hosting or software provided by your organisation
- Hosting or software provided by a third-party organisation
- How the support service works
-
In supporting cloud hosting or software services with EDR, we offer comprehensive assistance to ensure seamless integration and optimal performance in cloud environments. Our approach begins with a thorough assessment of the buyer's cloud infrastructure, security requirements, and objectives. Leveraging this understanding, we collaborate closely with the buyer to design and implement a tailored EDR solution that aligns with their specific needs.
Our support includes assistance with deployment, configuration, and integration of EDR within cloud environments, ensuring compatibility and seamless operation. We offer guidance on best practices for deploying EDR in cloud environments, optimising its performance and effectiveness.
Additionally, we provide training and onboarding support to empower the buyer's team with the knowledge and skills required to manage and maintain EDR effectively in the cloud. This includes education on cloud security best practices, operational procedures, and troubleshooting techniques.
Throughout the deployment and operation of EDR in cloud environments, our dedicated support team is available to address any issues or concerns promptly, ensuring uninterrupted service and optimal security posture.
Service scope
- Service constraints
- While EDR offers robust endpoint detection and response capabilities, buyers should be aware of potential constraints. These include the need for sufficient endpoint visibility and access to endpoint data for effective detection and response. Additionally, deployment and configuration complexity may require experienced personnel or dedicated resources. Buyers should also consider the scalability of the solution to accommodate growing endpoint volumes.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Our response time to questions depends on Service Level Agreement (SLA) agreements and the ticket's priority. We prioritise swift responses based on the urgency and criticality defined in SLAs, ensuring timely resolution of inquiries. The specific SLA terms and ticket priorities guide our commitment to providing efficient and effective support to address questions promptly.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Support levels
- Our Support Level Agreements (SLAs) are designed to deliver timely and effective assistance. Users benefit from dedicated cloud engineers available to answer calls and address inquiries. Our SLA categorises issues into four priority levels, each with a corresponding response time commitment. Priority 1 (P1) urgent issues receive a rapid response within 30 minutes, ensuring critical problems are swiftly addressed. High-priority (P2) concerns are attended to within 2 hours, maintaining a prompt response for significant issues. Medium (P3) priority issues receive attention within 4 hours, and low-priority (P4) matters are addressed within 8 hours. These SLAs aim to provide a structured and responsive support framework, allowing users to receive assistance tailored to the urgency and criticality of their specific needs.
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Fortinet
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BRITISH ASSESSMENT BUREAU LTD
- ISO/IEC 27001 accreditation date
- 01/05/2024
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- Fortinet Certified Fundamentals in Cybersecurity
- Fortinet Certified Network Security Professional
Social Value
- Social Value
-
Social Value
Tackling economic inequalityTackling economic inequality
Tackling economic inequality within the secure nexus framework involves strategic procurement practices aimed at promoting fair wages, supporting local businesses, and fostering job opportunities for marginalised communities. By prioritising contracts with suppliers who demonstrate commitment to equitable employment practices and investing in initiatives that uplift disadvantaged groups, the secure nexus approach not only enhances economic stability but also cultivates a more inclusive and resilient society.
Pricing
- Price
- £1,000 a unit a year
- Discount for educational organisations
- Yes