BitDefender GravityZone Business Security
Bitdefender Endpoint Risk Analytics (ERA) helps customers assess and harden their endpoint security configurations against industry best practices, to minimize the attack surface.
Features
- Creates visual representation of attack-path generating relevant data for investigation
- Evaluates risk, user behaviour and highlights root cause of attack
- Tuneable Machine Learning for advanced attack technique detection and response
- Exploit, Fileless Attack and Network Attack Defense services.
- E-mail Security
- Device Control
- Application Control
- Patch and Configuration Management
- Full Disk Encryption
- Sandbox Analysis
Benefits
- Endpoint protection platform (EPP) stops phishing, ransomware and fileless attacks
- Provides attack visualization for detected threats and provides remediation responses
- Highlighting data that is malicious mapping against MITRE ATT&CK framework
- Identify Operating system CVE for Windows, MacOS and Linux endpoints
- Anti-Exploit module provides endpoint detection and blocking disabling known tactics
- User & Endpoint risk management to track suspicious user activity
- Policy configuration lowers administration burden and ensures consistent configuration
- Multiple layers of security ensuring zero day protection using AI/ML
- Ability to automate report generation and delivery to demonstrate ROI
- Sandbox analyzer allows for proactive means of unknown file identification
Pricing
£28.50 a user a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 8 9 8 9 3 6 6 9 7 9 3 2 0 8
Contact
Nettitude Limited
Grace Harrison
Telephone: 0345 5200085
Email: bidteam@nettitude.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- Further information on compatibility can be found here: https://www.bitdefender.com/business/support/en/77209-376327-endpoint-protection.html
- System requirements
- 77209-376327-endpoint-protection.html
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Detailed response times and SLAs are describe in fine detail at: https://www.bitdefender.com/site/view/enterprise-support-policies.html
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Bitdefender website
- Web chat accessibility testing
- N/A
- Onsite support
- Onsite support
- Support levels
-
Standard support - complimentary for business customers and provides access to technical documentation, knowledge base, online resources and incident assistance via phone, portal and web.
Premium support business - faster response times, education service, on-demand remote training sessions, routine health checks and maintenance sessions.
Premium support enterprise - includes technical account manager, faster response times, quarterly alignment call, quarterly support technical reviews, direct support on technical issues, handles escalated technical issues and Access to senior engineers. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Bitdefender can provide professional service days to facilitate onsite or online training and provide comprehensive (online) user documentation to ensure the easy usage of their software solution.
Bitdefender can also offer remote or on-site training regarding using our solutions at extra cost. Online resources include an onboarding guide, user documentation, and a knowledge base. - Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
-
Users would export any reports that they want PDF / CSV and any exceptions that they'd like (CSV).
We also have extended data retention licenses that entitle users to export raw events, these could be kept in customer SIEM etc for as long as they want. - End-of-contract process
- Customers are provided with basic offboarding instructions on top of any commercial/contractual details.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Gravity zone security for mobile is an Add-on product to our main Endpoint Protection / Endpoint Detection and Reponse products. EPP / EDR covers Windows, Mac & Linux. Mobile Security covers Chrome OS, Android & iOS.
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Web GUI / compatible with most current web browsers.
- Accessibility standards
- None or don’t know
- Description of accessibility
- Management facilities are provided through a web-based portal via a web browser such as Google Chrome.
- Accessibility testing
- Other significant testing manners used, subject to the highest security standards.
- API
- Yes
- What users can and can't do using the API
-
Users can do a multitude of actions using our API, from fetching incident data, to creating reports or getting licensing information.
The finer details are described at the following page: https://www.bitdefender.com/business/support/en/77209-125277-public-api.html - API documentation
- Yes
- API documentation formats
- Other
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- By creating custom security policies for users and groups.
Scaling
- Independence of resources
- Our platform is hosted on in Google Datacenters and is scalable automatically to a customer's license count. We provide service metrics from within our console that detail how many devices are assigned to a tenant, and a total license count and usage.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
We have an open api and reports available from our management console. Please see the API documentation to discover what is possible.
https://www.bitdefender.com/business/support/en/77209-125277-public-api.html - Reporting types
- API access
Resellers
- Supplier type
- Reseller (no extras)
- Organisation whose services are being resold
- Bitdenfender
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Data export formats
-
- CSV
- Other
- Other data export formats
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Other
- Other protection between networks
- We always take the minimum amount of data from a customer's environment where possible. E.g. Hashes instead of files sent for cloud analysis.
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
- Information and data collected from the customer will be anonymized where possible. Security measures (authentication, authorization, and encryption) are taken to fully secure this data. Encryption for data in transit is in place using industry-standard SSL/TLS.
Availability and resilience
- Guaranteed availability
- Uptime of GravityZone cloud is 99.9%
- Approach to resilience
- Bitdefender uses cloud servers hosted in the Google Cloud Platform ("GCP") infrastructure, located worldwide. Our solution’s SLA ratio is 99.9% and GCP’s ratio is 99.9%
- Outage reporting
- Yes. Via alerts and a central Service Status page.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- RBAC is provided within the Bitdefender GravityZone Cloud management Console and further options are available by SAML integration with Active Directory (or other SAML provider).
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Other
- Description of management access authentication
-
GravityZone Cloud platform uses by default two-factor authentication (2FA).
Two-factor authentication adds an extra layer of security to GravityZone accounts, by requiring an authentication code in addition to Control Center credentials. 2FA requires downloading and installing the Google Authenticator, Microsoft Authenticator, or any two-factor TOTP (Time-Based One-Time Password Algorithm) authenticator app on a device such as a smartphone or computer. The authentication app generates a six-digit code each 30 seconds. To complete the Control Center login, after entering the password, the user will have to provide also the six-digit authentication code.
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- IQNet
- ISO/IEC 27001 accreditation date
- 08/05/2023
- What the ISO/IEC 27001 doesn’t cover
- All controls from the ISO27001 standard are applicable to Bitdefender.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- SOC 2 Type 2
- HIPAA
- ISO 27017
- ISO 9001
- ISO27001
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
-
SOC2 Type 2 Compliant
HIPAA Compliant
ISO 27001
ISO 27017
ISO 9001 - Information security policies and processes
-
Bitdefender has Information Security policies and procedures in place which are annually updated. Such policies and procedures include, but are not limited to, Access Control Policy, Information Security Management Policy, Vulnerabilities Assessment and Pentest Procedure, and Malicious Software Management Policy.
The standards are built according to the company's certifications.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- For the entire application development process, Bitdefender follows an agile software development cycle. Depending on the team specifics, we can follow a scrum, or a Kanban development processes, with sprints, periodic standup meetings, increment demo and periodic reviews. Changes requests (feature requests, user stories, bugs, improvements etc.) are monitored using specific 3rd party dedicated tools, and are prioritized, estimated, executed, tested, validated according to our internal processes and can be tracked in every stage of development.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- We perform weekly automated vulnerability scanning tests with Nessus. We also perform security reviews for new features/components before release, based on industry standards like OWASP top 10. We also have a Bug Bounty process in place.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- As per the SOC2 Type2 report, the company conducts an annual self-assessment of controls as part of governance and compliance processes through internal audit and department management. Vulnerability scanning process includes weekly scanning of computer systems and networks followed by the generation and execution of remedial actions. Log management tools are used on the systems for their operation and management, and security events are recorded and evaluated centrally.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- As per the SOC2 Type2 report, Security incidents are centrally recorded and managed according to the incident management policy and procedure in the incident management system tracked by an individual ticket. Clear roles and responsibilities are established, and every step is recorded. Post-incident steps assess any need to improve the execution of security controls.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Yes, please find our extensive efforts in our sustainability report: https://www.bitdefender.com/content/dam/bitdefender/business/ar/Bitdefender_Sustainability_Report_2022.pdfCovid-19 recovery
Yes, Bitdefender's Employee recovery program / partnership with MIND as outlined in our report here https://www.bitdefender.com/content/dam/bitdefender/business/ar/Bitdefender_Sustainability_Report_2022.pdfTackling economic inequality
Yes, as outlined in the Bitdefender sustainability report here: https://www.bitdefender.com/content/dam/bitdefender/business/ar/Bitdefender_Sustainability_Report_2022.pdfEqual opportunity
Bitdefender is an equal opportunities employer. Honesty, integrity and trust are at the core of Bitdefender’s values and abiding to core ethical principles brings about what’s best in us - creativity, focus and innovation. We train the teams to be mindful in all business instances and consistent with Bitdefender values. However, if faced with ethical dilemmas, reach out for guidance to the management and HR teams or contact Bitdefender Ethics.Wellbeing
Bitdefender invests heavily into well-being programs for its employees as outlined in the sustainability report here: https://www.bitdefender.com/content/dam/bitdefender/business/ar/Bitdefender_Sustainability_Report_2022.pdf
Pricing
- Price
- £28.50 a user a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Endpoint Protection / Endpoint Detection and Response. Same functionality as paid version.
- Link to free trial
- https://www.bitdefender.co.uk/business/products/free-trials/