Skip to main content

Help us improve the Digital Marketplace - send your feedback

SECURE NEXUS LTD

Web Security

Our web security service provides comprehensive protection against web-based threats, including malware, phishing, and data breaches. Utilizing advanced threat detection and prevention technologies, we safeguard organisations' web traffic, ensuring secure and uninterrupted access to online resources.

Features

  • Malware Detection
  • Phishing Protection
  • Content Filtering
  • URL Filtering
  • Application Control
  • SSL Inspection
  • Advanced Threat Protection
  • Reporting and Analytics

Benefits

  • Improved Security Posture
  • Enhanced Productivity
  • Cost Savings
  • Scalability
  • Comprehensive Protection
  • Business Continuity

Pricing

£200 a user a year

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at rsetchfield@securenexus.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 5 8 1 1 0 8 2 9 9 3 0 8 6 1

Contact

SECURE NEXUS LTD Raymond Setchfield
Telephone: 07973573734
Email: rsetchfield@securenexus.co.uk

Planning

Planning service
Yes
How the planning service works
In assisting buyers with implementing web security solutions, we adopt a strategic approach to ensure effective planning and deployment. Initially, we conduct a thorough assessment of the buyer's web infrastructure, security requirements, and compliance obligations. This assessment helps us understand their specific needs, objectives, and constraints.

Leveraging this insight, we collaborate closely with the buyer to design a customised implementation plan tailored to their environment and goals. This plan includes selecting the most suitable web security features and configurations to meet their security requirements and compliance obligations.

Throughout the planning process, we prioritise risk assessment and mitigation, identifying potential challenges and developing strategies to address them proactively. We also assist in evaluating the compatibility of web security solutions with existing software and services in the buyer's environment, ensuring seamless integration.
Planning service works with specific services
No

Training

Training service provided
No

Setup and migration

Setup or migration service available
Yes
How the setup or migration service works
In facilitating the migration to the cloud or transitioning between cloud web security services, we offer comprehensive assistance to ensure a seamless and secure transition. Our approach begins with a thorough assessment of the buyer's current web security infrastructure, including existing solutions, policies, and compliance requirements.

Leveraging this understanding, we collaboratively design a tailored migration or transition plan that aligns with their needs and security considerations. This plan encompasses selecting the most suitable cloud web security provider(s) and deployment model(s), considering factors such as performance, scalability, security, and compliance.

Throughout the migration or transition process, we prioritise risk assessment and mitigation, identifying potential challenges and developing strategies to address them proactively. Thorough testing and validation are conducted to ensure compatibility, data integrity, and functionality.
Setup or migration service is for specific cloud services
No

Quality assurance and performance testing

Quality assurance and performance testing service
Yes
How the quality assurance and performance testing works
In ensuring the quality assurance (QA) and performance testing of web security implementations, we adopt a meticulous approach to validate the effectiveness and reliability of our solutions. Our process begins with a comprehensive assessment of the buyer's web security requirements, infrastructure, and compliance standards.

Leveraging this understanding, we design and execute comprehensive test scenarios and strategies tailored to their environment. These scenarios encompass functional testing to validate the functionality of web security features, including threat detection, content filtering, and encryption capabilities.

We will also conduct performance testing to evaluate the responsiveness and scalability of the web security solution under different conditions and workloads. This involves simulating real-world scenarios to assess performance metrics such as response time, throughput, and system resource utilisation.

Security testing

Security services
Yes
Security services type
  • Security strategy
  • Security risk management
  • Security design
  • Cyber security consultancy
  • Security testing
  • Security incident management
  • Security audit services
Certified security testers
Yes
Security testing certifications
Other
Other security testing certifications
  • Certified Ethical Hacker v11
  • CISSP

Ongoing support

Ongoing support service
Yes
Types of service supported
  • Buyer hosting or software
  • Hosting or software provided by your organisation
  • Hosting or software provided by a third-party organisation
How the support service works
In supporting cloud hosting or software services with web security solutions, we offer comprehensive assistance to ensure robust protection of web assets in cloud environments. Our approach begins with a thorough assessment of the buyer's cloud infrastructure, web applications, and security requirements.

Leveraging this understanding, we collaborate closely with the buyer to design and implement a tailored web security solution that aligns with their specific needs and compliance obligations. This includes selecting the most suitable web security features and configurations to safeguard against web-based threats, such as malware, phishing, and data breaches.

Throughout the deployment process, we prioritize risk assessment and mitigation, identifying potential vulnerabilities and developing strategies to address them proactively. Thorough testing and validation are conducted to ensure seamless integration and compatibility with cloud hosting or software services.

Service scope

Service constraints
While our web security service offers robust protection against web-based threats, buyers should be aware of potential constraints. These may include the need for sufficient network connectivity and access to ensure seamless integration with web applications and services. Additionally, certain features or configurations may require additional resources or licensing. Buyers should also consider the scalability of the solution to accommodate their growing web traffic and user base. Finally, ongoing maintenance and updates are necessary to ensure the effectiveness and security of the web security solution.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Our response time to questions depends on Service Level Agreement (SLA) agreements and the ticket's priority. We prioritise swift responses based on the urgency and criticality defined in SLAs, ensuring timely resolution of inquiries. The specific SLA terms and ticket priorities guide our commitment to providing efficient and effective support to address questions promptly.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Support levels
Our Support Level Agreements (SLAs) are designed to deliver timely and effective assistance. Users benefit from dedicated cloud engineers available to answer calls and address inquiries. Our SLA categorises issues into four priority levels, each with a corresponding response time commitment. Priority 1 (P1) urgent issues receive a rapid response within 30 minutes, ensuring critical problems are swiftly addressed. High-priority (P2) concerns are attended to within 2 hours, maintaining a prompt response for significant issues. Medium (P3) priority issues receive attention within 4 hours, and low-priority (P4) matters are addressed within 8 hours. These SLAs aim to provide a structured and responsive support framework, allowing users to receive assistance tailored to the urgency and criticality of their specific needs.

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Fortinet

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BRITISH ASSESSMENT BUREAU LTD
ISO/IEC 27001 accreditation date
01/05/2024
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
  • Fortinet Certified Fundamentals in Cybersecurity
  • Fortinet Certified Network Security Professional

Social Value

Social Value

Social Value

Tackling economic inequality

Tackling economic inequality

Tackling economic inequality within the secure nexus framework involves strategic procurement practices aimed at promoting fair wages, supporting local businesses, and fostering job opportunities for marginalised communities. By prioritising contracts with suppliers who demonstrate commitment to equitable employment practices and investing in initiatives that uplift disadvantaged groups, the secure nexus approach not only enhances economic stability but also cultivates a more inclusive and resilient society

Pricing

Price
£200 a user a year
Discount for educational organisations
Yes

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at rsetchfield@securenexus.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.