Convergence Group LAN & Wi-Fi Managed Services
Convergence Group's LAN & Wi-Fi Managed services free up IT teams for strategic projects, ensuring peak efficiency in network management. We provide standardised configurations, accurate asset information, and real-time visibility through Tiviti, our self-service portal, streamlining operations for faster issue resolution and enhanced control.
Features
- Access to 24x7x365 UK Network Operations Centre
- Replacement parts / hardware delivered to site
- On-site technician (hardware SLA dependent)
- Tiviti platform (access to self-service and direct engineering interface)
- Inventory and asset management live database
- Device real-time monitoring and alerting, live status topology map
- Annual health reports
- Software patch management
- Automated moves, adds and changes
- Configuration management and capacity planning
Benefits
- Free-up your internal IT team
- Make more informed decisions about network infrastructure changes
- See and solve network security vulnerabilities more easily
- Secure a stronger compliance position with better audit-related information
- Take care of vendor management and supply chain headaches
- Analyse trends easily, identify potential issues before they happen
- For any network issues, you will be alerted within minutes
- Reduce downtime thanks to faster fault resolution and part replacement
- Eliminate excessive costs of wasted call-outs and unresolved issues
- Guaranteed Service Level Agreements on response and resolution times
Pricing
£28.84 a device a month
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 5 7 0 5 7 2 7 7 8 4 2 6 1 4
Contact
Convergence Group
Sales Team
Telephone: 0845 270 2709
Email: sales@convergencegroup.co.uk
Service scope
- Service constraints
- Customers must possess or acquire supported LAN or Wi-Fi products from vendors such as Cisco, Cisco Meraki, or Extreme Networks. If Convergence did not implement the LAN solution, an initial network assessment is required to ensure compatibility with our service. Sole administrative control of managed LAN assets and network devices is necessary to maintain standardised configuration, inventory, automation, and Tiviti workflow. Vendor (stable) updates, including firmware, are included and conducted outside regular business hours with prior notification. Emergency patches and security fixes are also handled outside regular hours whenever possible. Please note, this service excludes support for data cabling infrastructure.
- System requirements
-
- Supported vendors: Cisco, Meraki, Extreme, and Fortinet.
- Vendor licenses needed for all active managed devices.
- Secure network access (IPSec VPN) is mandatory.
- Ensure live internet connection and power at premises.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Telephone calls are answered within 30 Seconds.
Response times on tickets created via telephone, email or the Tiviti self-service portal:
P1 – Critical Impact - 15 Minutes
P2 – Major Impact - 30 Minutes
P3 – Minor Impact - 1 Hour
P4 – Normal - 4 Hours - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
- This is a fully managed service, please refer to our Service Definition Document for further information regarding the level of support included.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Upon completion of the initial network assessment, we'll create a service document detailing the agreed scope. A dedicated service delivery manager will oversee the onboarding process. This involves thorough information auditing as we map and document the infrastructure, establish secure access, and configure monitoring. Implementation timelines depend on network size and geographical distribution. Device reconfiguration may be necessary to align with current LAN networking best practices.
Users will receive an onboarding email to set up their account within the self-service customer interface. - Service documentation
- Yes
- Documentation formats
-
- ODF
- Other
- Other documentation formats
- .docx
- End-of-contract data extraction
- Data can be provided on request . Following the offboarding for a customer at the end of contract, data may remain non operational within our system and is retained in accordance with our data retention and disposal processes.
- End-of-contract process
- At the end of the contract CG will arrange to cease the service and remove remote access, monitoring and services from your systems. Any hardware you will own (unless subscription rented) along with any user data collected via the portal.
Using the service
- Web browser interface
- Yes
- Using the web interface
-
Tiviti is a simple-to-use, real-time customer portal that makes life so much easier. There’s no need to be a highly trained technical network engineer to use our platform. A quick introduction ... and you’re away.
With Tiviti, you can:
• View your asset inventory
• Check service details and status
• Raise support requests
• View network performance (Managed and Monitored only)
• Manage changes with automated workflows (Managed service only)
In short, Tiviti takes all the complexity out of managing a LAN and Wi-Fi network, so your team can focus on bigger and better projects. As part of our service, you’ll also have access to a complete network inventory featuring data on every component in your network – all contained in your own Configuration Management Database (CMDB). And don’t forget, with Tiviti you’ll be able to view that inventory quickly and easily in real time. - Web interface accessibility standard
- WCAG 2.1 A
- Web interface accessibility testing
- None.
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- This is a managed networking service, each customer has their own tenancy within a cloud platform that scales indefinitely. We provide an API driven self-service front-end to these tenants as part of our service.
- Usage notifications
- No
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
- Other
- Other metrics
- Availability (uptime)
- Reporting types
- Regular reports
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Vendor hardware replacement services (Cisco, Cisco Meraki, Extreme & Fortinet)
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
- All network device configuration & the configuration databases themselves
- Backup controls
- This is a fully managed service, the customer does not perform any backup.
- Datacentre setup
- Multiple datacentres
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
- Device hardening / Vulnerability management
Availability and resilience
- Guaranteed availability
-
99.999% uptime for the Tiviti platform.
Service credits shall be awarded where we fail to meet SLA. - Approach to resilience
- Critical systems have either local or site redundancy depending on criticality of service, for example no critical systems are hosted within our head office (rather, they are hosted in key data centers or cloud) reducing our reliance on our head office and mitigating any risks associated with loss of our office due to power failure, fire or otherwise. With regards to those services hosted within data centers, we utilize multiple data centers for geographical resiliency, which mitigates against any risks that could impact an entire data center/local area (power outage, fire etc.). The data centers have resilient paths provided by resilient carriers. Our network design is based on Design principles specifying full mesh as the optimal design i.e. a triangle formed by three data centers as most optimal.
- Outage reporting
- Outages are detected and reported automatically via Solarwinds and ServiceNow. Any outages and associated tickets/incidents shall be available via the Tiviti platform for users.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Role based access controls (RBAC)
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- Username or password
- Other
- Description of management access authentication
- All devices are configured with and locked down to the TACACS+ server details and relevant security information. TACACS+ resides inside a Management MPLS VPN and with sophisticated overlapping MPLS VPN technologies, the equipment is exposed to the TACACS+ server at a routing level. Any management access to a device hands the authentication, authorisation and accounting off to the TACACS+ system.
- Devices users manage the service through
- Dedicated device on a segregated network (providers own provision)
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 28/08/2022
- What the ISO/IEC 27001 doesn’t cover
- N/A. The scope of our ISO27001 Certifications covers The provision of integrated and fully managed IT, network and communication solutions, including design, installation, management, configuration, testing and in-life support, maintenance and management.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- Cyber Essentials
- Information security policies and processes
-
With regards to reporting structure, our organisation consists of employees who report into an operational manager, whom report into a representative of the Senior Management Team (who form our 'Board') that report into the Executive Chairman.
The framework of our ISMS currently consists of the following key information security policies aligned with the requirements of ISO27001 which all employees are required to follow where applicable:
SS01 - Information Security Policy Statement
SP01 - Information Security Management Policy
SP02 - ISMS Internal Organisation Policy
SP03 - Risk Management Policy
SP04 - HR Security Policy
SP05 - Asset Management Policy
SP06 - Access Control Policy
SP07 - Physical and Environmental Security Policy
SP08 - Cryptography Policy
SP09 - Operations Security Policy
SP10 - Communications Security Policy
SP11- Systems Acquisition Development and Maintenance Policy
SP12 - Supplier Management Policy
SP13 - Information Security Incident Management Policy
SP14 - Business Continuity Policy
SP15 - Compliance Policy
SP16 - Change Management Policy
SP17 - Capacity Management Policy
SP18 - Acceptable Use Policy
SP19 - Information Classification Policy
SP21 - Availability Policy
SP22 - Password Policy
SP23 - Network Security Policy
PL101 - Network Device Configuration Policy
PL125 - Vulnerability Management Policy
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- The lifecycle of service components is tracked and managed via our CMDB and also provides visibility of the relationship between service components. We maintain and adhere to our Change (Emergency / Normal / Standard) Processes. In case of Normal and Standard changes our Change Form shall always be completed and approved by our Change Approval Board (CAB) before the change is carried out. Our change form contains a risk assessment to ensure we understand the potential implications of the change. In accordance with our change template, testing is conducted prior to the change and a back-out/roll-back plan established.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We maintain a vulnerabilities mailbox which key stakeholders have access to. Here we receive notifications of vulnerabilities direct from vendors, via relevant third party security authorities, and results from our internal vulnerability scans. These vulnerabilities are then logged in our 'vulnerability tracker' where we assess the impact of the vulnerability based on its CVSS score and where the affected devices are located within our or our customers networks. Patches are deployed in accordance with our Vulnerability Management Policy. In summary this is within 14-30 days for vulnerabilities with a CVSS >6.9, and within 90 days where the CVSS <6.9.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We are able to identify potential compromises through our event logs. All critical systems generate logs and are sent to a central location (Azure Sentinel) which is monitored by our IT department. Monitoring and alerting processes have been established to highlight suspicious activity that may need investigation. Additionally, we have Anti-Virus installed on all client and server endpoints which may also flag potential compromises requiring investigation. Any identified or suspected security weaknesses or incidents shall be managed per our security incident management policy. Incidents shall be assessed for their severity/risk and managed accordingly.
- Incident management type
- Supplier-defined controls
- Incident management approach
- In alignment with our Incident Management Policy, we have established a Security Incident Reporting Process (PRS201) which requires employees to raise any security incidents via our CMDB. Our IT team are responsible for initial investigations, liaising with our Compliance Team where appropriate. All employees are trained on this process as part our new starter induction. All investigation notes/findings are raised within the incident ticket. Where relevant, third parties (impacted parties/authorities) shall be notified. Where necessary, the details logged within the incident ticket can be exported to form an incident report.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- Compliance with the EU Code of Conduct is detailed on these third-party websites.
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Convergence Group has been ISO14001 certified since 2017 and we are continually working to minimise the environmental impacts of our organisations activities. This is demonstrated through our ongoing ISO14001 certification as well as our Carbon Reduction Plan and objective to achieve NetZero by 2050.
Our ISO9001 certified QMS and associated business processes are designed to drive quality and conforming products and services which are ‘right first time’, thus minimising our environmental impacts by ensuring we do not have to repeat activities resulting in duplicate emissions as a result of doing things twice. Additionally, being a ‘menu-driven’ business helps us to standardise our service offerings and drive efficiencies which provides a more sustainable way of working.
Our engineering workforce is spread across the UK and engineers are assigned work based on location to ensure the impacts of travelling to site are minimised as much as possible. We also maintain strong relationships with our vendors and utilise them for support for contracts based in remote parts of the country which are harder for our engineers to reach.
We also utilise strategically placed storage units so that we can deliver hardware to where our engineers are based, or alternatively nearer customer sites which also helps us to mitigate the amount of travel required. We have closed a number of remote offices, and engineers have switched to homebased contracts which eliminates the impact of their commute to a single place of work. We also provide employees with the flexibility to work from home (on average two days/week).
We perform due-diligence on our supply chain and where possible seek to work with organisations that share similar environmental commitments and are on a NetZero journey of their own.
For further information on how we minimise our energy/resource consumption and promote sustainability, please refer to our CRPCovid-19 recovery
Although not directly related to a specific contract, we have implemented various intiaitives that support the social value models first theme of Covid-19 recovery. As mentioned in our response to tackling economic inequality, our CG Academy provides opportunity to those out of work with little experience which could include people left unemployed by COVID-19. We provide fair pay to our employees (and are a certified Living Wage Employer), and invest heavily in our people with access to various learning and development resources (Go1, CBT Nuggets, INE), encouragement to drive their own Personal Development Plans (PDP's) which can help us to identify any additional training needs / qualifications that can support them in their role. We offer our workforce (where possible) flexibility around working conditions (remote-working) and seek to support their physical and mental health by maintaining an ISO45001 certified H&S management system and checking in with our employees,. We are looking to complete an employee NPS to gain feedback direct from our employees and further understand how we can improve workplace conditions and employee satisfaction and wellbeing. Furthermore we intend to sign up to the Mental Health at Work Commitment.Tackling economic inequality
Although not directly related to a specific contract, we have implemented various initiatives that support the social value models second theme of tackling economic inequality. In the past we have run what we call our CG Academy which provides individuals of all ages, backgrounds and experience an opportunity to join our business with little or no experience. These individuals undergo an in-depth induction into each area of our business over a 12-week placement. Following this, successful candidates are placed into a role best suited to their interests and strengths. Here they will be given all the training needed to develop their career and we have had several success stories over the years. This is something we are looking to replicate in the future. In addition to this, we have more recently partnered with a local secondary school which provides placements to students for whom mainstream education is simply not working (for a range of reasons). We are offering them the chance to partake in an 'apprentice' style process whereby they can win a £5k investment in their business idea. This will consist of an 8 week process which involves various team building exercises which will help to improve and develop their skillsets ready for the world of work. They will also receive 1:1 support and coaching from a number of our employees who will work with them throughout this process.Equal opportunity
As an equal opportunities employer, we seek to promote diversity and inclusion in all aspects of our business. We maintain an Equal Opportunities Policy which can be shared on request. Our Policy is available on our intranet for all employees to access and the principles of which are embedded within our business processes, from recruitment and throughout the employee journey. We are a living wage employer and have established succession plans for each department/role within our business which contains clear salary bandings and requirements for progression. This provides transparency of pay to our workforce, and these bandings are also benchmarked regularly by our People Team.Wellbeing
We have implemented various initiatives that support the social value models fifth theme, Wellbeing that enable us to support health and wellbeing in the workforce. We are looking to run an employee NPS to gain feedback directly from our employees to better understand what actions we can take to improve the workplace environment and promote positive mental wellbeing; this is something we can measure over time to identify whether actions taken are effective. In addition to this, and in accordance with our ISO45001 certified OH&SMS, we maintain a H&S training matrix to ensure employees hold the necessary training/knowledge to conduct their work safely but we also track wider business qualifications including first aiders and mental health first aiders. We provide all employees with private healthcare and access to an Employee Assistance Programme (EAP) which is available 24/7 and can help to reduce reliance of public resources. In the next 12months we also plan to formalise a Social Value Policy and associated objectives including signing up to the Mental Health at Work Commitment.
Pricing
- Price
- £28.84 a device a month
- Discount for educational organisations
- No
- Free trial available
- No