Barracuda Log Security 24 X 7 Detection & Response
Barracuda MSP Log Security Monitoring is a managed security that collects, aggregates, and normalizes log data from hundreds of sources for AI-enabled analysis using BMSP’s analytics platform, SIEM, threat intelligence, and 24/7 365 SOC. Identify threat-like behavior in your systems such as impossible logins, multi-factor bypass & coordinated attacks.
Features
- SIEM Analysis
- AI Analytics Engine
- Multi-tenancy dashboard
- Deployment of physical or virtual appliance
- Compliance Tool
Benefits
- Prevent Cloud Infrastructure Attacks
- Prevent Unauthorized Access
- Stop Anomalous Privilege Escalation
- Prevent Third-Party Violations
- Prevent Compromised User Credentials
- 24X7X365 Security Operations Center as a Service
- Extend your Security team
Pricing
£14.50 to £14.50 a user a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
4 8 5 8 7 2 7 0 8 9 4 0 8 2 6
Contact
Glemnet Ltd
Roger Parsons
Telephone: 02086390230
Email: rparsons@glemnet.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- None
- System requirements
-
- Ability to install a virtual appliance on the network
- Hyber v or VMware or other
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Proactively Research Threats SKOUT SOC experts are skilled in threat research and the art of the identification of suspicious activity known in the industry as "Threat Hunting." Escalate Priority Incidents Ready 24x7x365, SKOUT SOC experts are trained in straightforward explanations of security findings. Priority Alarms / Alerts are escalated to you according to your designated escalation call tree. Respond for Remediation When an escalated incident requires remediation, SKOUT SOC experts are available to provide remote remediation assistance and advice.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Proactively Research Threats SKOUT SOC experts are skilled in threat research and the art of the identification of suspicious activity known in the industry as "Threat Hunting." Escalate Priority Incidents Ready 24x7x365, SKOUT SOC experts are trained in straightforward explanations of security findings. Priority Alarms / Alerts are escalated to you according to your designated escalation call tree. Respond for Remediation When an escalated incident requires remediation, SKOUT SOC experts are available to provide remote remediation assistance and advice.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- A dedicated onboarding Technical consultant is available at no additional cost, in addition, the user has the option to easily deploy the API directly from the dashboard.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
- At the expiration or termination of your service with Barracuda, Barracuda generally stores customer data for 30 days post-termination to allow additional time for you to manually export your data or renew your subscription. After this 30-day retention period, Barracuda will fully disable the account and commence deletion of all customer data at its discretion, including any cached or backup copies.
- End-of-contract process
- At the expiration or termination of your service with Barracuda, Barracuda generally stores customer data for 30 days post termination to allow additional time for you to manually export your data or renew your subscription. After this 30-day retention period, Barracuda will fully disable the account and commence deletion of all customer data at its discretion, including any cached or backup copies.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Linux or Unix
- MacOS
- Windows
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- WCAG 2.1 AAA
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- Data in the Barracuda Cloud is stored in a proprietary storage system developed and managed by Barracuda. This system maintains two copies of customer data to provide redundancy. In the United States, the two copies are stored in separate data center locations. Outside of the United States, the two copies are stored within the same location on separate storage systems.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
SKOUT Log Security Monitoring comes with a web-based customer security dashboard with following components:
Multitenancy
SKOUT Partners who manage multiple accounts (also referred as End Customers) can select which account they want the whole dashboard to work in addition to being able to see all customers’ data at once.
Security Incidents Visualization
All Security Incidents that are stored in the SKOUT’s Ticket System are pulled into the dashboard database and are available to the customers in a variety of views.
Incidents are shown as a timeseries bar chart having aggregated number of alarms and alerts.
Incidents Map - Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Reseller (no extras)
- Organisation whose services are being resold
- Barracuda
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- The operational processes and controls that govern access to and use of customer data in the Barracuda Cloud are regularly verified. Barracuda regularly performs sample audits to attest that access is only for legitimate business purposes. Strong controls and authentication help limit access to customer data to authorized personnel only. When access is granted, whether to Barracuda personnel or our subcontractors, it is carefully controlled and logged, and revoked as soon as it is no longer needed.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Bonded fibre optic connections
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- 99.99% Guaranteed availability Proactively Research Threats SKOUT SOC experts are skilled in threat research and the art of the identification of suspicious activity known in the industry as "Threat Hunting." Escalate Priority Incidents Ready 24x7x365, SKOUT SOC experts are trained in straightforward explanations of security findings. Priority Alarms / Alerts are escalated to you according to your designated escalation call tree. Respond for Remediation When an escalated incident requires remediation, SKOUT SOC experts are available to provide remote remediation assistance and advice.
- Approach to resilience
- Data in the Barracuda Cloud is stored in a proprietary storage system developed and managed by Barracuda. This system maintains two copies of customer data to provide redundancy. In the United States, the two copies are stored in separate data center locations. Outside of the United States, the two copies are stored within the same location on separate storage systems
- Outage reporting
- Email & Dedicated published Dashboard.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Username or password
- Access restrictions in management interfaces and support channels
- Barracuda uses a defense-in-depth strategy and proprietary hardened software and operating systems to protect data and services. Barracuda conducts regular inspections to ensure the security of its systems.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- US Based
- ISO/IEC 27001 accreditation date
- 01/06/2021
- What the ISO/IEC 27001 doesn’t cover
- Not applicable
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Barracuda Networks understands the importance of your data and takes steps to secure and protect it while in our cloud. Our policies regarding data ownership and protection are focused on providing you with confidence that your data remains secure and under your sole control. We follow ISO 27001.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Barracuda understands that security and data protection services must work exceptionally well. Our customers need connectivity and must have their systems stay secure. Barracuda has implemented protocols and controls to resume our operations in the event of a catastrophic event with the target of minimal downtime and maximum efficiency to minimize impact on our customers. Each of our functional areas is ready to meet the challenges of disruption by having evaluated, mitigated, and planned their specific responses to a variety of possible scenarios.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- The severity of the vulnerability. You can change this value, based on your organization's perception of the Severity. Refer to Vulnerabilities or click the Help icon on the Vulnerabilities on page for information on changing the Severity
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Fully managed Office 365 Monitoring means our automated advanced search & detection technology is backed by SKOUT’s team of certified security analysts. These experts in the SKOUT Security Operations Center (SOC) manage, tune and monitor our systems and your business's data 24x7, 365 days a year to ensure you are protected. SKOUT's SOC Team protects your business with the combination of machine and human analysis.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- An Emergency Response Team (“ERT”) . Members of the ERT generally include the heads of IT, Facilities, Human Resources, Operations, Engineering, and Technical Support working in conjunction with. applicable local site leadership. ERT is responsible for collecting, evaluating, disseminating, and monitoring incident information and addressing issues requiring resolution. The ERT also tracks the current and potential implications of the incident and the status of resources assigned to the incident. The ERT will have daily meetings led by the General Counsel while the catastrophic situation is ongoing to discuss the issues, statuses, actions, and communications. responses.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- Public Services Network (PSN)
- Police National Network (PNN)
- NHS Network (N3)
Social Value
- Fighting climate change
-
Fighting climate change
Environmental impact (in conjunction with our Carbon Reduction Policy)
We have identified the key aspects where we have a negative impact on the environment, namely: heating and cooling, travel to clients, on site servers, paper use & delivery of hardware.
Since 2018 we have implemented projects to reduce this impact and have a policy in place to measure and further reduce these impacts.
We are now 95% paper-free with contracts signed and delivered electronically.
We no longer have on premise servers but are 100% cloud based with our communications systems.
We no longer have company vehicles with engineers travelling by public transport or offering remote support where practical.
Replacing parking spaces with 'Cycle anchor's' allowing staff to cycle to work.
We deliver environmental awareness 'quiz' to our staff to highlight small measures that can be taken by individuals to reduce our carbon footprint. - Covid-19 recovery
-
Covid-19 recovery
We want to involve and empower the community to recover from Covid-19 and assist with bringing members of the community together to enhance the community with work & live in.
90% of Glemnet staff live in the local community and are encouraged to engage with local projects which the company will also support.
• Encourage & support staff carrying out volunteering activities that deliver benefits to local communities, both with charities and local education/training providers.
• Supporting staff with health and wellbeing and managing stress/anxiety in the workplace (working with a local provider to deliver wellbeing programs and practical exercises). Working with staff who do not wish to return full time to the office to map out a plan for future hybrid working, where possible.
• Commitment to procure goods & services locally, where possible although supply chain is reviewed annually to ensure compliance with legislation & pricing remaining competitive.
• Continue to have an office presence locally to ensure support and provide work/support to local businesses.
• For small business customers who continue to suffer the economic fall-out from Covid-19, Glemnet has continued to offer a financial assistance package which spreads the cost of essential services such as broadband/cloud communications with relief offered on some products/services.
• For those returning to work we offer a short induction course (FOC) in technology / cloud communications which is delivered in house (remotely or on-premise). This gives a short insight into roles being offered as well as cyber security /GDPR/ISO awareness training.
• Recycling laptops/office equipment to local people
We continue to provide FOC lateral flow tests to staff and encourage social distancing. All visitors are asked to confirm they have not experienced any symptoms and are asked to have a temperature check. - Tackling economic inequality
-
Tackling economic inequality
As a technology company we recognise a digital skills gap therefore a core objective is to create training opportunities for local communities and supporting those returning to the workplace to encourage them to enter the technology sector.
Glemnet works with local education to deliver career's advice (alongside Federation of Small Businesses) and is committed to supporting apprenticeship schemes (City & Guilds).
We offer placement schemes to local students either for work experience or as part of a degree.
For those returning to work we offer a short induction course (FOC) in technology / cloud communications which is delivered in house (remotely or on-premise). This gives a short insight into roles being offered as well as cyber security /GDPR/ISO 27001 awareness training.
We also offer work experience with flexible/hybrid working/job share.
Our staff are given financial support and encouraged to continue with their personal development which is measured using a live skills matrix and in line with our ISO 27001 accreditation. Staff also complete mandatory cyber security awareness training/GDPR & ISO 27001 courses.
Glemnet is an equal opportunities employer and encourage & support applications from disabled and disadvantaged groups.
We ensure our job adverts are worded so not to exclude any applicants and encourage all.
For those facing accessibility challenges with work life, we collaborate with individuals to find a way to work effectively either with remote working or providing a working space/equipment to support the individual.
As a provider of core cloud communication requirements for new business we offer free consultancy to new start-ups / business offering flexible contract terms and free cyber security awareness / GDPR training.
We annually review supplier contracts to ensure compliance with legislation & evidence that modern slavery and cyber security risks are mitigated through on-going supply chains. - Equal opportunity
-
Equal opportunity
Glemnet Ltd is committed to encouraging equality and diversity among our workforce and eliminating unlawful discrimination in line with our Equal Opportunities Policy.
The aim is for our workforce to be truly representative of all sections of society and we encourage & support applications from disabled and disadvantaged groups.
We ensure our job adverts are worded so not to exclude any applicants and encourage all to apply.
For those facing accessibility challenges with work life, we collaborate with individuals to find a way to work effectively either with remote working or providing a working space/equipment to support the individual.
All staff are given financial support and encouraged to continue with their personal development which is measured using a live skills matrix and in line with our ISO 27001 accreditation. Those facing financial hardship but wish to complete a course unrelated to the contract are still encouraged to continue with personal development and the company will offer or reach a financial assistance agreement with the individual.
Staff facing challenges in completing courses due to accessibility issues are assisted by the company (where practical & possible) to ensure all courses can be delivered & completed.
Glemnet will monitor the make-up of the workforce regarding information such as age, gender, ethnic background, sexual orientation, religion or belief, and disability in encouraging equality and diversity, and in meeting the aims and commitments set in the equality policy.
Monitoring will also include assessing how the equality policy, and any sporting action plan, are working in practice, reviewing the annually, and considering and taking action to address any issues.
Glemnet annually review supplier contracts to ensure compliance with legislation & evidence that modern slavery and cyber security risks are mitigated through on-going supply chains. - Wellbeing
-
Wellbeing
Glemnet's Social Value Policy outlines our commitment towards managing the social value our organisation is creating, working with our staff & suppliers to promote, influence, train, explore and advise to deliver maximum benefit for the communities in which we work.
Key to our policy is the wellbeing of our staff; both physical & mental.
Glemnet supports staff with health and wellbeing and managing stress/anxiety in the workplace (working with a local provider to deliver wellbeing programs and practical exercises; The Peoples Skills Course).
We work with staff who do not wish to return full time to the office to map out a plan for future hybrid working, where possible, or to find a way to stagger a return to work minimizing social anxiety.
Glemnet regular holds wellbeing lunches to encourage cross collaboration and support from all teams.
Provides financial assistance with membership to local sports clubs and promotes team supports and exercise.
We subside courses un-related to work activities to encourage other interests (current course: Spanish lessons delivered by local provider).
We hold regular 1-2-1 meetings with staff to ensure wellbeing.
We also encourage staff to engage with key suppliers on a regular basis to ensure good working practices and good communication, reducing stress & anxiety in delivering contracts.
Pricing
- Price
- £14.50 to £14.50 a user a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Full 30-day evaluation