Cyber Security as a Service
In today's digital landscape, ensuring the security and compliance of your IT infrastructures isn't just an option – it's a necessity. Cyber Security as a Service offers a tailored solution to proactively monitor our client’s digital assets while ensuring they meet rigorous security standards to securely access cloud services.
Features
- Diligent centralised monitoring of your IT environment.
- Swift detection of suspicious activities and anomalies
- Comprehensive log management and intelligent correlation to pin-point threats
- Improved incident response times with actionable alerts
- Continuous scanning of IT assets to identify and report vulnerabilities
- Prioritised risk assessment to guide remediation efforts.
- Minimise attack surface by catching vulnerabilities before they're exploited.
- Conformance to Cyber Essentials Plus/CIS/NIST standards as required
- EDR, Antivirus and RansomWare protection to keep your community safe.
- Patch management of all major applications.
Benefits
- Nessus Scan of existing environment
- Written RAG report with recommendations from specialist IASME accredited assessor.
- Face-to-face consultation to communicate findings and recommended remedial actions
- Deployment of Datto RMM
- Removal of existing Anti-Virus/Endpoint Protection from all devices/servers.
- Test patching capabilities and patch devices
- Cost-effective prevention of data breach expenses.
- Implement secure configuration practices
- Support to ensure compliance with safeguarding standards, including KCSIE.
Pricing
£7.50 a device a month
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 9 1 3 5 7 1 3 6 8 2 9 4 4 7
Contact
Sweethaven
Tommy Isaksson
Telephone: 01737228208
Email: commerical@sweethaven.co.uk
Planning
- Planning service
- No
Training
- Training service provided
- Yes
- How the training service works
-
Sweethaven and inTEC provide a wide range of training services, aimed at both end users (including teachers and students) and technical staff. Training can be delivered both in person (either on-site or at one of our training centres) and remotely by a skilled trainer. Training sessions are interactive, and structured so that attendees are aware of the desired outcomes of the session or course, understanding is confirmed and reinforced throughout, and that feedback is garnered at the end of the sessions. Supplementary materials, such as course guidance, additional reading and resources are supplied.
Sweethaven and inTEC provide access to a Learning Management System that provides learners with a single pane view of all training that they are undertaking, with progress recorded and fed back.
Support is given for users to achieve industry-recognised accreditations, for example, Google Certified Educator or Microsoft Innovative Educator, whilst technical staff can achieve Microsoft or Google technical accreditations through proctored exams. - Training is tied to specific services
- Yes
- Services the training service works with
-
- Microsoft Azure
- Microsoft 365
- Google Workspace
- Google Cloud Platform
Setup and migration
- Setup or migration service available
- No
Quality assurance and performance testing
- Quality assurance and performance testing service
- Yes
- How the quality assurance and performance testing works
- Sweethaven/inTEC follow the quality principles enshrined in our ISO 9001 accreditation. Within this, we have detailed and comprehensive processes for ensuring that we deliver the utmost standards of service for our customers across the work that we do. These processes are regulated by our Quality Policy, which embeds continual review of business processes and our service into everything that we do. Both within Sweethaven and across the wider inTEC Group, we have named individuals responsible for the delivery of a quality service across our sectors of work and continually report to, and consult with, our customers to ensure that their expectations are communicated and met on a regular basis.
Security testing
- Security services
- Yes
- Security services type
-
- Security strategy
- Security risk management
- Cyber security consultancy
- Security testing
- Security audit services
- Certified security testers
- Yes
- Security testing certifications
-
- Cyber Scheme
- Other
- Other security testing certifications
-
- Assessing GDPR as part of the IASME Standard
- CESG Technical Cyber Auditing Course
- IASME Assessor Training Course
- Microsoft SC 100
Ongoing support
- Ongoing support service
- Yes
- Types of service supported
-
- Buyer hosting or software
- Hosting or software provided by your organisation
- Hosting or software provided by a third-party organisation
- How the support service works
-
Using our industry-standard helpdesk and processes, we put in place management and change-control procedures to help your own teams manage cloud services effectively and safely.
Our reporting mechanisms allow us to monitor cloud resource usage in real time and, leveraging the power of AI, help with resource planning and budgeting to ensure that you are getting the most from your investment in the cloud, and not overspending on unused compute resource or storage.
Our Cloud Solution Architects support both our internal teams and our customers with regular reviews of the cloud setup, bringing new trends and principles to ensure that the estate is kept fresh and up-to-date, as well as being able to provide consultancy and advice through the change control process.
Service scope
- Service constraints
- Traditionally, when attempting to achieve security certifications, our client’s infrastructure will undergo rigorous vulnerability scans and associated remediation. These scans are only a “snapshot in time”, so new vulnerabilities, cloud services or rogue devices can become vulnerable. Service includes Remote Management and Monitoring, Antivirus, Patching, EDR, RansomWare Protection, Vulnerability Scanning.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- In our organisation we put people first, and we believe that our customers deserve the fastest response possible. During our standard working hours of 08:30 - 18:00, Monday to Friday (excluding Bank Holidays) we aim to acknowledge all email queries within 15 minutes, answer telephone calls within 30 seconds, and where an immediate answer cannot be given, respond to non-technical queries within 1 business day. Technical issues and change requests are always responded to within the relevant SLA period.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Support levels
-
Our support is based upon the fundamental principle that all customers should receive equally excellent service, and as such we offer one tier of service.
Our service is provided using industry-standard ITSM platforms using ITIL-based processes.
You will be assigned a dedicated Relationship Manager who will be the main contact with your organisation, as well as a dedicated Project Manager and a dedicated Senior Cloud Engineer.
Support for our services is included within our product fee with no additional cost for duration of the service.
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- IASME Cyber Assurance Level 1
- IASME Cyber Assurance Level 2
- IASME Quality Principles
Social Value
- Social Value
-
Social Value
WellbeingWellbeing
Our Cyber Security as a Service package supports organisations to become more secure against the threat of cyber attacks, providing them with an additional layer of operational security and stability. This stability provides for the wider wellbeing of our communities, as it helps to prevent harmful data loss, financial loss and widespread fear and uncertainty that can be caused by cyber attacks.
By supporting the cultivation of a wider cyber security awareness within an organisation, we can support more individuals to have better awareness and understanding of good cyber security practice, allowing them to protect themselves and colleagues to a greater standard as well as easing some of the anxiety associated with cybersecurity. This can also help to move organisations toward a greater common acceptance of good cyber security practice, even where it may cause minor inconvenience to users.
Pricing
- Price
- £7.50 a device a month
- Discount for educational organisations
- Yes