Skip to main content

Help us improve the Digital Marketplace - send your feedback

Sweethaven

Cyber Security as a Service

In today's digital landscape, ensuring the security and compliance of your IT infrastructures isn't just an option – it's a necessity. Cyber Security as a Service offers a tailored solution to proactively monitor our client’s digital assets while ensuring they meet rigorous security standards to securely access cloud services.

Features

  • Diligent centralised monitoring of your IT environment.
  • Swift detection of suspicious activities and anomalies
  • Comprehensive log management and intelligent correlation to pin-point threats
  • Improved incident response times with actionable alerts
  • Continuous scanning of IT assets to identify and report vulnerabilities
  • Prioritised risk assessment to guide remediation efforts.
  • Minimise attack surface by catching vulnerabilities before they're exploited.
  • Conformance to Cyber Essentials Plus/CIS/NIST standards as required
  • EDR, Antivirus and RansomWare protection to keep your community safe.
  • Patch management of all major applications.

Benefits

  • Nessus Scan of existing environment
  • Written RAG report with recommendations from specialist IASME accredited assessor.
  • Face-to-face consultation to communicate findings and recommended remedial actions
  • Deployment of Datto RMM
  • Removal of existing Anti-Virus/Endpoint Protection from all devices/servers.
  • Test patching capabilities and patch devices
  • Cost-effective prevention of data breach expenses.
  • Implement secure configuration practices
  • Support to ensure compliance with safeguarding standards, including KCSIE.

Pricing

£7.50 a device a month

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at commerical@sweethaven.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 9 1 3 5 7 1 3 6 8 2 9 4 4 7

Contact

Sweethaven Tommy Isaksson
Telephone: 01737228208
Email: commerical@sweethaven.co.uk

Planning

Planning service
No

Training

Training service provided
Yes
How the training service works
Sweethaven and inTEC provide a wide range of training services, aimed at both end users (including teachers and students) and technical staff. Training can be delivered both in person (either on-site or at one of our training centres) and remotely by a skilled trainer. Training sessions are interactive, and structured so that attendees are aware of the desired outcomes of the session or course, understanding is confirmed and reinforced throughout, and that feedback is garnered at the end of the sessions. Supplementary materials, such as course guidance, additional reading and resources are supplied.
Sweethaven and inTEC provide access to a Learning Management System that provides learners with a single pane view of all training that they are undertaking, with progress recorded and fed back.
Support is given for users to achieve industry-recognised accreditations, for example, Google Certified Educator or Microsoft Innovative Educator, whilst technical staff can achieve Microsoft or Google technical accreditations through proctored exams.
Training is tied to specific services
Yes
Services the training service works with
  • Microsoft Azure
  • Microsoft 365
  • Google Workspace
  • Google Cloud Platform

Setup and migration

Setup or migration service available
No

Quality assurance and performance testing

Quality assurance and performance testing service
Yes
How the quality assurance and performance testing works
Sweethaven/inTEC follow the quality principles enshrined in our ISO 9001 accreditation. Within this, we have detailed and comprehensive processes for ensuring that we deliver the utmost standards of service for our customers across the work that we do. These processes are regulated by our Quality Policy, which embeds continual review of business processes and our service into everything that we do. Both within Sweethaven and across the wider inTEC Group, we have named individuals responsible for the delivery of a quality service across our sectors of work and continually report to, and consult with, our customers to ensure that their expectations are communicated and met on a regular basis.

Security testing

Security services
Yes
Security services type
  • Security strategy
  • Security risk management
  • Cyber security consultancy
  • Security testing
  • Security audit services
Certified security testers
Yes
Security testing certifications
  • Cyber Scheme
  • Other
Other security testing certifications
  • Assessing GDPR as part of the IASME Standard
  • CESG Technical Cyber Auditing Course
  • IASME Assessor Training Course
  • Microsoft SC 100

Ongoing support

Ongoing support service
Yes
Types of service supported
  • Buyer hosting or software
  • Hosting or software provided by your organisation
  • Hosting or software provided by a third-party organisation
How the support service works
Using our industry-standard helpdesk and processes, we put in place management and change-control procedures to help your own teams manage cloud services effectively and safely.
Our reporting mechanisms allow us to monitor cloud resource usage in real time and, leveraging the power of AI, help with resource planning and budgeting to ensure that you are getting the most from your investment in the cloud, and not overspending on unused compute resource or storage.
Our Cloud Solution Architects support both our internal teams and our customers with regular reviews of the cloud setup, bringing new trends and principles to ensure that the estate is kept fresh and up-to-date, as well as being able to provide consultancy and advice through the change control process.

Service scope

Service constraints
Traditionally, when attempting to achieve security certifications, our client’s infrastructure will undergo rigorous vulnerability scans and associated remediation. These scans are only a “snapshot in time”, so new vulnerabilities, cloud services or rogue devices can become vulnerable. Service includes Remote Management and Monitoring, Antivirus, Patching, EDR, RansomWare Protection, Vulnerability Scanning.

User support

Email or online ticketing support
Email or online ticketing
Support response times
In our organisation we put people first, and we believe that our customers deserve the fastest response possible. During our standard working hours of 08:30 - 18:00, Monday to Friday (excluding Bank Holidays) we aim to acknowledge all email queries within 15 minutes, answer telephone calls within 30 seconds, and where an immediate answer cannot be given, respond to non-technical queries within 1 business day. Technical issues and change requests are always responded to within the relevant SLA period.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Support levels
Our support is based upon the fundamental principle that all customers should receive equally excellent service, and as such we offer one tier of service.
Our service is provided using industry-standard ITSM platforms using ITIL-based processes.
You will be assigned a dedicated Relationship Manager who will be the main contact with your organisation, as well as a dedicated Project Manager and a dedicated Senior Cloud Engineer.
Support for our services is included within our product fee with no additional cost for duration of the service.

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
None

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
  • IASME Cyber Assurance Level 1
  • IASME Cyber Assurance Level 2
  • IASME Quality Principles

Social Value

Social Value

Social Value

Wellbeing

Wellbeing

Our Cyber Security as a Service package supports organisations to become more secure against the threat of cyber attacks, providing them with an additional layer of operational security and stability. This stability provides for the wider wellbeing of our communities, as it helps to prevent harmful data loss, financial loss and widespread fear and uncertainty that can be caused by cyber attacks.

By supporting the cultivation of a wider cyber security awareness within an organisation, we can support more individuals to have better awareness and understanding of good cyber security practice, allowing them to protect themselves and colleagues to a greater standard as well as easing some of the anxiety associated with cybersecurity. This can also help to move organisations toward a greater common acceptance of good cyber security practice, even where it may cause minor inconvenience to users.

Pricing

Price
£7.50 a device a month
Discount for educational organisations
Yes

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at commerical@sweethaven.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.