Parallels Secure Workspace Solution
Parallels Secure Workspace enables users to securely use the applications, files and services in their work environment without exposing the systems to Cyber Security threats. Only a web browser is required and there are not downloads. Enabling a mobile workforce is now simple and secure.
Features
- Remote Access
- Access to files, internal web sites and application remotely
- Browser only secure remote access
- Access to files, internal web sites and application remotely
Benefits
- Most secure form of remote access
- No risk of mass data loss via VPN
- No challenging deployment of software, simply go to a URL
- Significantly lower cost than Citrix
Pricing
£40 to £100 a user
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 5 9 9 6 6 1 7 0 1 1 4 1 1 0
Contact
DO Business Services Limited
David Overton
Telephone: 07712 410 268
Email: david@davidoverton.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- This service has no constraints as maintenance is agreed with the customer
- System requirements
-
- HTML 5 web browser
- Network connection to the cloud
- Windows Server or Desktops to run user software
- Windows RDS CALs
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
P1 tickets are normally responded to within 1 hour,
P2 tickets are normally responded to within 4 hours
p3 tickets are normally responded to within 1 day - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Our basic support tier is 9am - 5:30pm, Mondays to Fridays excluding bank holidays.
We offer upgrades to
- 8am-8pm, 5 days per week, excluding bank holidays, 30% uplift to support
- 8am-8pm, 7 days per week, including bank holidays, 80% uplift to support
- 8am-12am, 7 days a week, 150% uplift to support
- 24x7, 250% uplift to support
You will have access to a technical account manager - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Our onboarding information process consists of the following steps:
1) Application identification and provision for remote access
2) Testing via UAT
3) Release to production portal
We provide on-site and remote training, end user videos and getting started guide and a customised Wiki for the users - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
All data is stored on customer accessible or owned solutions, so no extraction is required.
Applications, configurations and customisations are not provides once the contract has ended. - End-of-contract process
- At the end of the contract the service is either terminated or extended. As no data resides within the service, there is nothing to hand back to an organisation
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The solution works with any web browser. When working on a mobile device touch is supported and when typing the touch keyboard can be brought up.
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- Yes
- Description of customisation
-
This service is customised for each customer, including branding, urls, applications per user.
The customisation is performed by us on behalf of the customer as part of the service provided.
Scaling
- Independence of resources
- We size appropriately and can scale as needed
Analytics
- Service usage metrics
- Yes
- Metrics types
-
We can provide regular reports that show:
- Number of users (concurrent and used)
- Number of sessions
- Application usage (qty of sessions, duration)
- Feature usage - Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- The only data that can be exported is audit data and this is provided through a service request.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
We offer three levels of reliable architecture than enable different levels of SLA.
We start at 99% and can provide solutions that move to 99.9% of the solution we control and provide.
In the event of failing the SLA in a month we will offer a service credit of 1 month - Approach to resilience
- Resiliency is built into the solution architecture with multiple systems replicated as required by the customer
- Outage reporting
- We report outages, by default, via e-mail and if the customer has an API we can call, we will also report via that api.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
-
Access to admin and support functions is limited by security group, login username and password, that must exist in the customer AD group as well as MFA to ensure stolen credentials by themselves cannot compromise the system.
Access to the solution does not in itself provide the ability to access the customer servers or software with any admin or management capability - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Cyber Essentials
- Information security policies and processes
-
When we control the datacentre, we apply the following principles:
- All data is encrypted, whether in transit or at rest
In all circumstances:
- All data from solution to the client is encrypted
- All data from solution to client servers is encrypted
- All access, including Admin access is audited and by default has MFA enabled
- Suspicious activity is reported to the client and investigated in-house
- No customer data is held in/on the solution system, so always remains with the customer.
- We read and follow NSCS, Microsoft and Parallels security recommendations and patch systems as soon as possible.
Our staff must follow our security procedures at all time. If they fail to do so, they will face disciplinary action. Any concerns about security must be raised to a director to ensure follow-up and visibility
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
All changes have to be approved by Change Management. This requires approval by the customer as well as our technical and security teams.
All components of the Awingu service are tracked with full audit capability enabled. We track every change and access to the system. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Our systems have a very small footprint exposed to the outside world to minimise security risks. All systems are kept fully patched and admin access is monitored for unusual or unexpected behaviours.
Any potential threats identified are checked with our suppliers to understand if they are a risk to the service. If they are, we immediately take remedial action. We may take remedial action in any event before we get confirmation.
We get threat information from NHS Digital, NCSC, Microsoft Security Response Centre, our suppliers and our in house team. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
We run constant monitoring systems looking for suspicious activity. All suspicious activity is checked and if necessary actions will be taken to remove the issue. We may be reliant on customer solutions in terms of account management.
We respond 24x7 to security issues often within minutes of becoming aware of an issue. - Incident management type
- Supplier-defined controls
- Incident management approach
-
E have a number of pre-defined incident responses that range from user information through to full processes executed by ourselves. Where we integrate with customer systems our response may be to log a call with the customer IT teams for them to implement a change.
Where possible, we will follow standard CRB processes, however if security or service provision require an immediate response, this will be taken in conjunction with the customer in agreed scenarios.
All major incidents go through a root cause analysis and a document is produced.
Users can log incidents via e-mail or Web chat
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Wellbeing
Fighting climate change
Working remotely has a positive impact on reducing travel requirements and therefore our CO2 footprint. Awingu enables users to travel less every day and be more productive, getting more done as a result.Covid-19 recovery
Due to Covid-19 more people want to have a flexible work-style, while some need to be able to work from more remote locations. The remote access provide a secure way to enable these users to work from where they are safe and comfortable. Rather than having to travel or be furloughed, staff can continue to be productive.Wellbeing
Due to Covid-19 more people want to have a flexible work-style, while some need to be able to work from more remote locations. The remote access provide a secure way to enable these users to work from where they are safe and comfortable. Rather than having to travel or feeling insecure in a work environment, staff can continue to be productive without these stresses.
Pricing
- Price
- £40 to £100 a user
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- We can provide access to a trial solution for 2 weeks. We will install and configure the solution in this time and provide limited licenses to enable access during this time.