Skip to main content

Help us improve the Digital Marketplace - send your feedback

Nettitude Limited

BitDefender GravityZone Business Security

Bitdefender Endpoint Risk Analytics (ERA) helps customers assess and harden their endpoint security configurations against industry best practices, to minimize the attack surface.

Features

  • Creates visual representation of attack-path generating relevant data for investigation
  • Evaluates risk, user behaviour and highlights root cause of attack
  • Tuneable Machine Learning for advanced attack technique detection and response
  • Exploit, Fileless Attack and Network Attack Defense services.
  • E-mail Security
  • Device Control
  • Application Control
  • Patch and Configuration Management
  • Full Disk Encryption
  • Sandbox Analysis

Benefits

  • Endpoint protection platform (EPP) stops phishing, ransomware and fileless attacks
  • Provides attack visualization for detected threats and provides remediation responses
  • Highlighting data that is malicious mapping against MITRE ATT&CK framework
  • Identify Operating system CVE for Windows, MacOS and Linux endpoints
  • Anti-Exploit module provides endpoint detection and blocking disabling known tactics
  • User & Endpoint risk management to track suspicious user activity
  • Policy configuration lowers administration burden and ensures consistent configuration
  • Multiple layers of security ensuring zero day protection using AI/ML
  • Ability to automate report generation and delivery to demonstrate ROI
  • Sandbox analyzer allows for proactive means of unknown file identification

Pricing

£28.50 a user a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at bidteam@nettitude.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 8 9 8 9 3 6 6 9 7 9 3 2 0 8

Contact

Nettitude Limited Grace Harrison
Telephone: 0345 5200085
Email: bidteam@nettitude.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
Further information on compatibility can be found here: https://www.bitdefender.com/business/support/en/77209-376327-endpoint-protection.html
System requirements
77209-376327-endpoint-protection.html

User support

Email or online ticketing support
Email or online ticketing
Support response times
Detailed response times and SLAs are describe in fine detail at: https://www.bitdefender.com/site/view/enterprise-support-policies.html
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Bitdefender website
Web chat accessibility testing
N/A
Onsite support
Onsite support
Support levels
Standard support - complimentary for business customers and provides access to technical documentation, knowledge base, online resources and incident assistance via phone, portal and web.

Premium support business - faster response times, education service, on-demand remote training sessions, routine health checks and maintenance sessions.

Premium support enterprise - includes technical account manager, faster response times, quarterly alignment call, quarterly support technical reviews, direct support on technical issues, handles escalated technical issues and Access to senior engineers.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Bitdefender can provide professional service days to facilitate onsite or online training and provide comprehensive (online) user documentation to ensure the easy usage of their software solution.

Bitdefender can also offer remote or on-site training regarding using our solutions at extra cost. Online resources include an onboarding guide, user documentation, and a knowledge base.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
Users would export any reports that they want PDF / CSV and any exceptions that they'd like (CSV). 

We also have extended data retention licenses that entitle users to export raw events, these could be kept in customer SIEM etc for as long as they want.
End-of-contract process
Customers are provided with basic offboarding instructions on top of any commercial/contractual details.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Gravity zone security for mobile is an Add-on product to our main Endpoint Protection / Endpoint Detection and Reponse products. EPP / EDR covers Windows, Mac & Linux. Mobile Security covers Chrome OS, Android & iOS.
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
Web GUI / compatible with most current web browsers.
Accessibility standards
None or don’t know
Description of accessibility
Management facilities are provided through a web-based portal via a web browser such as Google Chrome.
Accessibility testing
Other significant testing manners used, subject to the highest security standards.
API
Yes
What users can and can't do using the API
Users can do a multitude of actions using our API, from fetching incident data, to creating reports or getting licensing information. 

The finer details are described at the following page: https://www.bitdefender.com/business/support/en/77209-125277-public-api.html
API documentation
Yes
API documentation formats
Other
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
By creating custom security policies for users and groups.

Scaling

Independence of resources
Our platform is hosted on in Google Datacenters and is scalable automatically to a customer's license count. We provide service metrics from within our console that detail how many devices are assigned to a tenant, and a total license count and usage.

Analytics

Service usage metrics
Yes
Metrics types
We have an open api and reports available from our management console. Please see the API documentation to discover what is possible. 

https://www.bitdefender.com/business/support/en/77209-125277-public-api.html
Reporting types
API access

Resellers

Supplier type
Reseller (no extras)
Organisation whose services are being resold
Bitdenfender

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
PDF
Data export formats
  • CSV
  • Other
Other data export formats
PDF
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Other
Other protection between networks
We always take the minimum amount of data from a customer's environment where possible. E.g. Hashes instead of files sent for cloud analysis.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network
Information and data collected from the customer will be anonymized where possible. Security measures (authentication, authorization, and encryption) are taken to fully secure this data. Encryption for data in transit is in place using industry-standard SSL/TLS.

Availability and resilience

Guaranteed availability
Uptime of GravityZone cloud is 99.9%
Approach to resilience
Bitdefender uses cloud servers hosted in the Google Cloud Platform ("GCP") infrastructure, located worldwide. Our solution’s SLA ratio is 99.9% and GCP’s ratio is 99.9%
Outage reporting
Yes. Via alerts and a central Service Status page.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
RBAC is provided within the Bitdefender GravityZone Cloud management Console and further options are available by SAML integration with Active Directory (or other SAML provider).
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Other
Description of management access authentication
GravityZone Cloud platform uses by default two-factor authentication (2FA).
Two-factor authentication adds an extra layer of security to GravityZone accounts, by requiring an authentication code in addition to Control Center credentials. 2FA requires downloading and installing the Google Authenticator, Microsoft Authenticator, or any two-factor TOTP (Time-Based One-Time Password Algorithm) authenticator app on a device such as a smartphone or computer. The authentication app generates a six-digit code each 30 seconds. To complete the Control Center login, after entering the password, the user will have to provide also the six-digit authentication code.

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
IQNet
ISO/IEC 27001 accreditation date
08/05/2023
What the ISO/IEC 27001 doesn’t cover
All controls from the ISO27001 standard are applicable to Bitdefender.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
  • SOC 2 Type 2
  • HIPAA
  • ISO 27017
  • ISO 9001
  • ISO27001

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
SOC2 Type 2 Compliant
HIPAA Compliant
ISO 27001
ISO 27017
ISO 9001
Information security policies and processes
Bitdefender has Information Security policies and procedures in place which are annually updated. Such policies and procedures include, but are not limited to, Access Control Policy, Information Security Management Policy, Vulnerabilities Assessment and Pentest Procedure, and Malicious Software Management Policy.
The standards are built according to the company's certifications.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
For the entire application development process, Bitdefender follows an agile software development cycle. Depending on the team specifics, we can follow a scrum, or a Kanban development processes, with sprints, periodic standup meetings, increment demo and periodic reviews. Changes requests (feature requests, user stories, bugs, improvements etc.) are monitored using specific 3rd party dedicated tools, and are prioritized, estimated, executed, tested, validated according to our internal processes and can be tracked in every stage of development.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
We perform  weekly automated vulnerability scanning tests with Nessus. We also perform security reviews for new features/components  before release, based on industry standards like OWASP top 10. We also have a Bug Bounty process in place.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
As per the SOC2 Type2 report, the company conducts an annual self-assessment of controls as part of governance and compliance processes through internal audit and department management. Vulnerability scanning process includes weekly scanning of computer systems and networks followed by the generation and execution of remedial actions. Log management tools are used on the systems for their operation and management, and security events are recorded and evaluated centrally.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
As per the SOC2 Type2 report, Security incidents are centrally recorded and managed according to the incident management policy and procedure in the incident management system tracked by an individual ticket. Clear roles and responsibilities are established, and every step is recorded. Post-incident steps assess any need to improve the execution of security controls.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Yes, please find our extensive efforts in our sustainability report: https://www.bitdefender.com/content/dam/bitdefender/business/ar/Bitdefender_Sustainability_Report_2022.pdf

Covid-19 recovery

Yes, Bitdefender's Employee recovery program / partnership with MIND as outlined in our report here https://www.bitdefender.com/content/dam/bitdefender/business/ar/Bitdefender_Sustainability_Report_2022.pdf

Tackling economic inequality

Yes, as outlined in the Bitdefender sustainability report here: https://www.bitdefender.com/content/dam/bitdefender/business/ar/Bitdefender_Sustainability_Report_2022.pdf

Equal opportunity

Bitdefender is an equal opportunities employer.  Honesty, integrity and trust are at the core of Bitdefender’s values and abiding to core ethical principles brings about what’s best in us - creativity, focus and innovation. We train the teams to be mindful in all business instances and consistent with Bitdefender values. However, if faced with ethical dilemmas, reach out for guidance to the management and HR teams or contact Bitdefender Ethics.

Wellbeing

Bitdefender invests heavily into well-being programs for its employees as outlined in the sustainability report here: https://www.bitdefender.com/content/dam/bitdefender/business/ar/Bitdefender_Sustainability_Report_2022.pdf

Pricing

Price
£28.50 a user a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Endpoint Protection / Endpoint Detection and Response. Same functionality as paid version.
Link to free trial
https://www.bitdefender.co.uk/business/products/free-trials/

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at bidteam@nettitude.com. Tell them what format you need. It will help if you say what assistive technology you use.