BigFix Endpoint Management & Security
HCL BigFix software enables IT operations to maintain compliance of all servers, desktops and mobile devices. BigFix can automate and manage the deployment of software across all devices.
Features
- Endpoint Management
- IT Asset Discovery and Reporting
- Software Distribution
- Patch Management and remediation
- Operating System Deployment and management
- Compliance and Vulnerability Management
- Multi platform, including mobile devices
- Remote control
Benefits
- Reduce malware and ransomware attacks
- Simpler software deployment
- Provides cost savings
- Software licence complaince
- Scalable
Pricing
£20.02 a device a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 0 0 0 1 4 6 2 3 7 7 4 2 9 6
Contact
Intec Systems Ltd
Steven Laurie
Telephone: 07841493822
Email: slaurie@intec.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Private cloud
- Hybrid cloud
- Service constraints
- None
- System requirements
-
- Windows Server (and MS SQL)
- RHEL Server (and DB2)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
During business hours:
Severity 1 = 1 hour
Severity 2 = 2 hours
Severity 3 = 1 working day
Severity 4 = 2 working days - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Depending on the nature of the support query, Intec can provide first line support and work with the client to agree appropriate course of action.
For more detailed software support, clients can submit requests directly with the vendor (HCL). - Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Training sessions provided to the Admin/super user.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- The database is moved to the client's network and complete access to data is provided with a service interface.
- End-of-contract process
- The service is switched off completely, so as to avoid any misuse. Also the customer is provided with access to all the customer data.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- End point management solution that covers all devices
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- Enrolled users can access the service.
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Clients can choose which functions to deploy and can customise accordingly.
Scaling
- Independence of resources
- The scaling of the hosted service is performed based on the total number of users and peak time concurrency level. Each hosted virtual machine is configured to handle 350 concurrent user requests.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Transaction history report, performance report, exception report, login logout report, offline report, geo fencing report.
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- HCL Software
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- No
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- The client can export data by selecting the export function on the dashboard reports of the Admin application.
- Data export formats
-
- CSV
- Other
- Other data export formats
- Data import formats
-
- CSV
- Other
- Other data import formats
- Excel: .xls .xlsx
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
- Other
- Other protection within supplier network
- Data within the network travels in binary format. Each request or response data is associated with a security token.
Availability and resilience
- Guaranteed availability
- 99.9%
- Approach to resilience
- The hosting area is physically divided into two sites. Each physical site contains an exact replica of servers and acts as failover of the other site. Data synchronisation happens via the "Always On" feature of the MS SQL Server.
- Outage reporting
- Monitoring tools (Microsoft SCOM) are configured to monitor hosted services and virtual machines. Disk coverage and capacity related configurations are performed to raise the alarm to mitigate any failure. An email is sent by the monitoring tool to all stakeholders before any failure happens. Transaction logs are maintained to generate a report on defined intervals.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Public key authentication (including by TLS client certificate)
- Access restrictions in management interfaces and support channels
-
1. Each user is provided with an access role. The access to the system functionalities are directly linked with the access role permissions.
2. When the user logs into the application, only allowed functionalities are visible to the user. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Bureau Veritas
- ISO/IEC 27001 accreditation date
- 16/10/2020
- What the ISO/IEC 27001 doesn’t cover
- Intec is a Platinum Parter of HCL's and the software security standards and certifications relate to HCL.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Intec is an HCL Business Partner - HCL has adopted ISO/ IEC 27001: 2013 standard for ensuring protection from a variety of threats and minimising the business damage in its endeavour to provide Mobile Application implementation and support services.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
A repository maintains all versions of individual work products to help/ permit developers to revert to previous versions during testing and debugging.
Dependency tracking and change management covers relationships between enterprise entities and processes, parts of an application design, design components and the enterprise information architecture, design elements and other work products.
HCL tracks all the requirements, design and construction components and deliverables that result from a requirements specification.
An audit trail is maintained about when, why and by whom changes are made, with source information of changes as specific objects in the repository. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
HCL performs quarterly and/or annual vulnerability scans to get a snapshot at that point in time. Regular scanning ensures new vulnerabilities are detected in a timely manner and are fixed before they occur. The HCL vulnerability management process consists of the following phases:
1. Preparation
2. Vulnerability scan
3. Define remediating actions
4. Implement remediating actions
5. Rescan. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- N/a
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Incident management is designed with a goal to restore normal service operation as quickly as possible and to minimise the impact on business operations. The incident management process follows these steps:
1. Incident identification and logging by the customer
2. Incident categorisation and prioritisation by the customer
3. HCL works on the incident response performing diagnosis and investigation followed by resolution and bringing the incident to closure
4. Corrective and preventive action are taken to avoid repeat or similar incident in future.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Intec is a small business but can contribute to climate emergency by adopting best practice in business operations. The business looks to optimise transportation through car sharing whenever possible, offering working from home and holding at least 50% of client meetings via web meeting when they would have previously been held in person.
Our business solutions are focused on Software-as-a-Service (SaaS), adopting server and storage capacity from key vendors, thus reducing footprint of servers in our clients' businesses and reducing energy consumption. Internally, replacing appliances with more efficient devices and adopting 'green' energy tariffs.
Promote recycling and reducing all forms of waste - educating employees to be more effective and adopting best practice at work and home.Covid-19 recovery
Intec can play a part in supporting COVID-19 recovery by promoting and maintaining effective hygiene levels, continuing to offer remote working and sustainable travel solutions, particularly for those employees who are vulnerable or shielding. Taking on employee feedback to assess and improve workplace conditions and offer staff training to raise awareness on health and wellbeing. Reviewing status at monthly management reviews to ensure any improvements can be implemented quickly. Providing effective support to employees affected by COVID-19 either directly or family members.Tackling economic inequality
The purpose of this policy is to provide equality and fairness for all in our employment and not to discriminate because of age, disability, gender reassignment, marriage and civil partnership, pregnancy and maternity, race, ethnic origin, colour, nationality, national origin, religion or belief, sex and sexual orientation. We oppose all forms of unlawful and unfair discrimination.
All employees, whether part-time, full-time or temporary, will be treated fairly and with respect. Selection for employment, promotion, training or any other benefit will be on the basis of aptitude and ability. All employees will be helped and encouraged to develop their full potential and the talents and resources of the workforce will be fully utilised to maximise the efficiency of the organisation.
Intec support decent working conditions for all employees throughout the business and wider supply chain where possible.
Continually provide education and training to improve skills of the workforce.
Invest in R&D which aligns to sustainable development to drive economic growth and improve productivity.Equal opportunity
Intec Systems Limited is committed to eliminating discrimination and encouraging diversity amongst our workforce. Our aim is that our workforce will be truly representative of all sections of society and each employee feels respected and able to give their best.
To that end the purpose of this policy is to provide equality and fairness for all in our employment and not to discriminate because of age, disability, gender reassignment, marriage and civil partnership, pregnancy and maternity, race, ethnic origin, colour, nationality, national origin, religion or belief, sex and sexual orientation. We oppose all forms of unlawful and unfair discrimination.
All employees, whether part-time, full-time or temporary, will be treated fairly and with respect. Selection for employment, promotion, training or any other benefit will be on the basis of aptitude and ability. All employees will be helped and encouraged to develop their full potential and the talents and resources of the workforce will be fully utilised to maximise the efficiency of the organisation.
Our commitment:
To create an environment in which individual differences and the contributions of all our staff are recognised and valued.
Every employee is entitled to a working environment that promotes dignity and respect to all. No form of intimidation, bullying or harassment will be tolerated.
Training, development and progression opportunities are available to all staff.
Equality in the workplace is good management practice and makes sound business sense.
We will review all our employment practices and procedures to ensure fairness.
Breaches of our equality policy will be regarded as misconduct and could lead to disciplinary proceedings.Wellbeing
Intec adopts inclusive and accessible recruitment practices, development practices and retention focused activities including recruiting, managing and developing people with a disability or health condition.
Investing in the physical and mental health and wellbeing of the workforce. Employees have a clear process of raising concerns or ideas to the management team. Monthly management meetings and weekly 'check-in' calls ensure requests and ideas can be considered and actioned quickly and effectively.
Improving Mental Health at work by offering flexibility and working from home to enable employees to manage work/life balance effectively.
Providing 25 day holiday entitlement plus Bank Holidays (33 days total)
Providing family healthcare cover
Intec recently transitioned to become an employee-owned business run through an employee ownership trust (EOT), which enabled the company to be acquired by a Trust which exists for the benefit of all the company employees, who will then indirectly own the business. EOTs were established in the Finance Act 2014 to encourage companies to become employee owned. This ownership model is seen by the government as having an enduring ownership structure and tangible employee benefits, resulting in a long-term strategic view and increased business investment, to the benefit of not just the employees, but customers and business partners also.
Pricing
- Price
- £20.02 a device a year
- Discount for educational organisations
- No
- Free trial available
- No