Glemnet Ltd

Barracuda Log Security 24 X 7 Detection & Response

Barracuda MSP Log Security Monitoring is a managed security that collects, aggregates, and normalizes log data from hundreds of sources for AI-enabled analysis using BMSP’s analytics platform, SIEM, threat intelligence, and 24/7 365 SOC. Identify threat-like behavior in your systems such as impossible logins, multi-factor bypass & coordinated attacks.

Features

  • SIEM Analysis
  • AI Analytics Engine
  • Multi-tenancy dashboard
  • Deployment of physical or virtual appliance
  • Compliance Tool

Benefits

  • Prevent Cloud Infrastructure Attacks
  • Prevent Unauthorized Access
  • Stop Anomalous Privilege Escalation
  • Prevent Third-Party Violations
  • Prevent Compromised User Credentials
  • 24X7X365 Security Operations Center as a Service
  • Extend your Security team

Pricing

£14.50 to £14.50 a user a month

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at rparsons@glemnet.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

4 8 5 8 7 2 7 0 8 9 4 0 8 2 6

Contact

Glemnet Ltd Roger Parsons
Telephone: 02086390230
Email: rparsons@glemnet.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
None
System requirements
  • Ability to install a virtual appliance on the network
  • Hyber v or VMware or other

User support

Email or online ticketing support
Email or online ticketing
Support response times
Proactively Research Threats SKOUT SOC experts are skilled in threat research and the art of the identification of suspicious activity known in the industry as "Threat Hunting." Escalate Priority Incidents Ready 24x7x365, SKOUT SOC experts are trained in straightforward explanations of security findings. Priority Alarms / Alerts are escalated to you according to your designated escalation call tree. Respond for Remediation When an escalated incident requires remediation, SKOUT SOC experts are available to provide remote remediation assistance and advice.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AAA
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Proactively Research Threats SKOUT SOC experts are skilled in threat research and the art of the identification of suspicious activity known in the industry as "Threat Hunting." Escalate Priority Incidents Ready 24x7x365, SKOUT SOC experts are trained in straightforward explanations of security findings. Priority Alarms / Alerts are escalated to you according to your designated escalation call tree. Respond for Remediation When an escalated incident requires remediation, SKOUT SOC experts are available to provide remote remediation assistance and advice.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
A dedicated onboarding Technical consultant is available at no additional cost, in addition, the user has the option to easily deploy the API directly from the dashboard.
Service documentation
Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction
At the expiration or termination of your service with Barracuda, Barracuda generally stores customer data for 30 days post-termination to allow additional time for you to manually export your data or renew your subscription. After this 30-day retention period, Barracuda will fully disable the account and commence deletion of all customer data at its discretion, including any cached or backup copies.
End-of-contract process
At the expiration or termination of your service with Barracuda, Barracuda generally stores customer data for 30 days post termination to allow additional time for you to manually export your data or renew your subscription. After this 30-day retention period, Barracuda will fully disable the account and commence deletion of all customer data at its discretion, including any cached or backup copies.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Yes
Compatible operating systems
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices
No
Service interface
No
User support accessibility
WCAG 2.1 AAA
API
No
Customisation available
No

Scaling

Independence of resources
Data in the Barracuda Cloud is stored in a proprietary storage system developed and managed by Barracuda. This system maintains two copies of customer data to provide redundancy. In the United States, the two copies are stored in separate data center locations. Outside of the United States, the two copies are stored within the same location on separate storage systems.

Analytics

Service usage metrics
Yes
Metrics types
SKOUT Log Security Monitoring comes with a web-based customer security dashboard with following components:
Multitenancy
SKOUT Partners who manage multiple accounts (also referred as End Customers) can select which account they want the whole dashboard to work in addition to being able to see all customers’ data at once.
Security Incidents Visualization
All Security Incidents that are stored in the SKOUT’s Ticket System are pulled into the dashboard database and are available to the customers in a variety of views.

Incidents are shown as a timeseries bar chart having aggregated number of alarms and alerts.
Incidents Map
Reporting types
Real-time dashboards

Resellers

Supplier type
Reseller (no extras)
Organisation whose services are being resold
Barracuda

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
The operational processes and controls that govern access to and use of customer data in the Barracuda Cloud are regularly verified. Barracuda regularly performs sample audits to attest that access is only for legitimate business purposes. Strong controls and authentication help limit access to customer data to authorized personnel only. When access is granted, whether to Barracuda personnel or our subcontractors, it is carefully controlled and logged, and revoked as soon as it is no longer needed.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Bonded fibre optic connections
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
99.99% Guaranteed availability Proactively Research Threats SKOUT SOC experts are skilled in threat research and the art of the identification of suspicious activity known in the industry as "Threat Hunting." Escalate Priority Incidents Ready 24x7x365, SKOUT SOC experts are trained in straightforward explanations of security findings. Priority Alarms / Alerts are escalated to you according to your designated escalation call tree. Respond for Remediation When an escalated incident requires remediation, SKOUT SOC experts are available to provide remote remediation assistance and advice.
Approach to resilience
Data in the Barracuda Cloud is stored in a proprietary storage system developed and managed by Barracuda. This system maintains two copies of customer data to provide redundancy. In the United States, the two copies are stored in separate data center locations. Outside of the United States, the two copies are stored within the same location on separate storage systems
Outage reporting
Email & Dedicated published Dashboard.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Username or password
Access restrictions in management interfaces and support channels
Barracuda uses a defense-in-depth strategy and proprietary hardened software and operating systems to protect data and services. Barracuda conducts regular inspections to ensure the security of its systems.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
US Based
ISO/IEC 27001 accreditation date
01/06/2021
What the ISO/IEC 27001 doesn’t cover
Not applicable
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Barracuda Networks understands the importance of your data and takes steps to secure and protect it while in our cloud. Our policies regarding data ownership and protection are focused on providing you with confidence that your data remains secure and under your sole control. We follow ISO 27001.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Barracuda understands that security and data protection services must work exceptionally well. Our customers need connectivity and must have their systems stay secure. Barracuda has implemented protocols and controls to resume our operations in the event of a catastrophic event with the target of minimal downtime and maximum efficiency to minimize impact on our customers. Each of our functional areas is ready to meet the challenges of disruption by having evaluated, mitigated, and planned their specific responses to a variety of possible scenarios.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
The severity of the vulnerability. You can change this value, based on your organization's perception of the Severity. Refer to Vulnerabilities or click the Help icon on the Vulnerabilities on page for information on changing the Severity
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Fully managed Office 365 Monitoring means our automated advanced search & detection technology is backed by SKOUT’s team of certified security analysts. These experts in the SKOUT Security Operations Center (SOC) manage, tune and monitor our systems and your business's data 24x7, 365 days a year to ensure you are protected. SKOUT's SOC Team protects your business with the combination of machine and human analysis.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
An Emergency Response Team (“ERT”) . Members of the ERT generally include the heads of IT, Facilities, Human Resources, Operations, Engineering, and Technical Support working in conjunction with. applicable local site leadership. ERT is responsible for collecting, evaluating, disseminating, and monitoring incident information and addressing issues requiring resolution. The ERT also tracks the current and potential implications of the incident and the status of resources assigned to the incident. The ERT will have daily meetings led by the General Counsel while the catastrophic situation is ongoing to discuss the issues, statuses, actions, and communications. responses.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
Yes
Connected networks
  • Public Services Network (PSN)
  • Police National Network (PNN)
  • NHS Network (N3)

Social Value

Fighting climate change

Fighting climate change

Environmental impact (in conjunction with our Carbon Reduction Policy)

We have identified the key aspects where we have a negative impact on the environment, namely: heating and cooling, travel to clients, on site servers, paper use & delivery of hardware.

Since 2018 we have implemented projects to reduce this impact and have a policy in place to measure and further reduce these impacts.

We are now 95% paper-free with contracts signed and delivered electronically.

We no longer have on premise servers but are 100% cloud based with our communications systems.

We no longer have company vehicles with engineers travelling by public transport or offering remote support where practical.

Replacing parking spaces with 'Cycle anchor's' allowing staff to cycle to work.

We deliver environmental awareness 'quiz' to our staff to highlight small measures that can be taken by individuals to reduce our carbon footprint.
Covid-19 recovery

Covid-19 recovery

We want to involve and empower the community to recover from Covid-19 and assist with bringing members of the community together to enhance the community with work & live in.

90% of Glemnet staff live in the local community and are encouraged to engage with local projects which the company will also support.

• Encourage & support staff carrying out volunteering activities that deliver benefits to local communities, both with charities and local education/training providers.

• Supporting staff with health and wellbeing and managing stress/anxiety in the workplace (working with a local provider to deliver wellbeing programs and practical exercises). Working with staff who do not wish to return full time to the office to map out a plan for future hybrid working, where possible.

• Commitment to procure goods & services locally, where possible although supply chain is reviewed annually to ensure compliance with legislation & pricing remaining competitive.

• Continue to have an office presence locally to ensure support and provide work/support to local businesses.

• For small business customers who continue to suffer the economic fall-out from Covid-19, Glemnet has continued to offer a financial assistance package which spreads the cost of essential services such as broadband/cloud communications with relief offered on some products/services.

• For those returning to work we offer a short induction course (FOC) in technology / cloud communications which is delivered in house (remotely or on-premise). This gives a short insight into roles being offered as well as cyber security /GDPR/ISO awareness training.

• Recycling laptops/office equipment to local people

We continue to provide FOC lateral flow tests to staff and encourage social distancing. All visitors are asked to confirm they have not experienced any symptoms and are asked to have a temperature check.
Tackling economic inequality

Tackling economic inequality

As a technology company we recognise a digital skills gap therefore a core objective is to create training opportunities for local communities and supporting those returning to the workplace to encourage them to enter the technology sector.

Glemnet works with local education to deliver career's advice (alongside Federation of Small Businesses) and is committed to supporting apprenticeship schemes (City & Guilds).

We offer placement schemes to local students either for work experience or as part of a degree.

For those returning to work we offer a short induction course (FOC) in technology / cloud communications which is delivered in house (remotely or on-premise). This gives a short insight into roles being offered as well as cyber security /GDPR/ISO 27001 awareness training.

We also offer work experience with flexible/hybrid working/job share.

Our staff are given financial support and encouraged to continue with their personal development which is measured using a live skills matrix and in line with our ISO 27001 accreditation. Staff also complete mandatory cyber security awareness training/GDPR & ISO 27001 courses.

Glemnet is an equal opportunities employer and encourage & support applications from disabled and disadvantaged groups.

We ensure our job adverts are worded so not to exclude any applicants and encourage all.

For those facing accessibility challenges with work life, we collaborate with individuals to find a way to work effectively either with remote working or providing a working space/equipment to support the individual.

As a provider of core cloud communication requirements for new business we offer free consultancy to new start-ups / business offering flexible contract terms and free cyber security awareness / GDPR training.

We annually review supplier contracts to ensure compliance with legislation & evidence that modern slavery and cyber security risks are mitigated through on-going supply chains.
Equal opportunity

Equal opportunity

Glemnet Ltd is committed to encouraging equality and diversity among our workforce and eliminating unlawful discrimination in line with our Equal Opportunities Policy.

The aim is for our workforce to be truly representative of all sections of society and we encourage & support applications from disabled and disadvantaged groups.

We ensure our job adverts are worded so not to exclude any applicants and encourage all to apply.

For those facing accessibility challenges with work life, we collaborate with individuals to find a way to work effectively either with remote working or providing a working space/equipment to support the individual.

All staff are given financial support and encouraged to continue with their personal development which is measured using a live skills matrix and in line with our ISO 27001 accreditation. Those facing financial hardship but wish to complete a course unrelated to the contract are still encouraged to continue with personal development and the company will offer or reach a financial assistance agreement with the individual.

Staff facing challenges in completing courses due to accessibility issues are assisted by the company (where practical & possible) to ensure all courses can be delivered & completed.

Glemnet will monitor the make-up of the workforce regarding information such as age, gender, ethnic background, sexual orientation, religion or belief, and disability in encouraging equality and diversity, and in meeting the aims and commitments set in the equality policy.

Monitoring will also include assessing how the equality policy, and any sporting action plan, are working in practice, reviewing the annually, and considering and taking action to address any issues.

Glemnet annually review supplier contracts to ensure compliance with legislation & evidence that modern slavery and cyber security risks are mitigated through on-going supply chains.
Wellbeing

Wellbeing

Glemnet's Social Value Policy outlines our commitment towards managing the social value our organisation is creating, working with our staff & suppliers to promote, influence, train, explore and advise to deliver maximum benefit for the communities in which we work.

Key to our policy is the wellbeing of our staff; both physical & mental.

Glemnet supports staff with health and wellbeing and managing stress/anxiety in the workplace (working with a local provider to deliver wellbeing programs and practical exercises; The Peoples Skills Course).

We work with staff who do not wish to return full time to the office to map out a plan for future hybrid working, where possible, or to find a way to stagger a return to work minimizing social anxiety.

Glemnet regular holds wellbeing lunches to encourage cross collaboration and support from all teams.

Provides financial assistance with membership to local sports clubs and promotes team supports and exercise.

We subside courses un-related to work activities to encourage other interests (current course: Spanish lessons delivered by local provider).

We hold regular 1-2-1 meetings with staff to ensure wellbeing.

We also encourage staff to engage with key suppliers on a regular basis to ensure good working practices and good communication, reducing stress & anxiety in delivering contracts.

Pricing

Price
£14.50 to £14.50 a user a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Full 30-day evaluation

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at rparsons@glemnet.com. Tell them what format you need. It will help if you say what assistive technology you use.