Network Defence as a Service (CyGlass. A WatchGuard Brand)
Network Defence as a Service (CyGlass, a WatchGuard Brand) offers proactive cybersecurity monitoring and threat detection. You gain real-time visibility into network behaviour, identify anomalies, and block threats. Leverage AI-driven insights and expert analysis to protect against cyberattacks. Ideal for businesses seeking comprehensive, cloud-managed network security solutions.
Features
- Network threat detection
- Complete visibility into your network
- Asset identification and priority tagging
- Cyber risk score
- Customization policy engine
- Alerting and email notification
- SOC productivity and threat hunting
- Detect rogue assets
- Remote working visibility into threats
- Policy violations
Benefits
- Continuously analyses billions of conversations happening on your network
- Baselining behaviour, looking for deviations or threats
- Deploys in minutes, with no additional hardware or software required
- Uses AI and ML to learn and surface threats
- Takes remediation automatically by disabling traffic at the firewall
- Provides compliance and audit features
- Monitors your VPN and looks for unusual behaviour
- Reports and delivers actionable intelligence in a CyberScore form
Pricing
£62.28 a user a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 1 9 8 5 6 7 0 3 9 5 8 6 7 8
Contact
Intercity Technology Limited
Elise Sheridon
Telephone: 0330 332 7933
Email: tenders@intercity.technology
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Findings can be sent to a SIEM, EDR, SOAR or other security product.
- Cloud deployment model
- Public cloud
- Service constraints
- CyGlass processes NetFlow from an egress point on a network, so the firewall, switch or router should ideally be able to emit NetFlow. Also processes S-Flow.
- System requirements
- Facility to collect NetFlow traffic from private network egress point
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- End of next working day, where working days are defined by the support level taken by the customer.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- 24/7 monitoring and escalation of security alerts via email to the customer resolver group. Follow-up via phone call during UK business hours on business days. SOC analysts available during UK business hours on business days.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide user training and documentation.
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- Users can request an archive of data when they terminate their contact.
- End-of-contract process
- CyGlass is a yearly Software as a Service application. The software is turned off and access prohibited. Customers can arrange to retrieve any achieved or stored NetFlow traffic within 30 days of contract termination.
Using the service
- Web browser interface
- No
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Alerts and notifications can be sent to a mobile device.
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Web browser GUI
- Accessibility standards
- None or don’t know
- Description of accessibility
- The service is set up by configuring an edge device on the customer's network to send NetFlow data to CyGlass. Users do not access the service; the data that their conversations generate is collected and analysed. We monitor CyGlass' findings and alert the customer about significant incidents, also providing regular reports.
- Accessibility testing
- None
- API
- Yes
- What users can and can't do using the API
-
CyGlass NDaaS has an extensible set of APIs to facilitate self-service, automation, and integration. The APIs include onboarding, notification, and asset lifecycle management.
For users to set up a new service, CyGlass supplies an onboarding API. Users can initiate their instance from the API as well as change roles in the system.
For users that want to add, modify, or change assets CyGlass has the following APIs:
*POST /v2/asset: create an asset
*GET /v2/asset/{asset_id}: retrieves an asset
*PUT /v2/asset/{asset_id}: update an existing asset
*DELETE /v2/asset/{asset_id}: delete an existing asset
All APIs use an access control model to enforce the least privilege. - API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Selected threat event reporting alerts
Scaling
- Independence of resources
- A separate instance of CyGlass is set up in public cloud for each customer.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
* Executive Summary Report
* Ransomware Prevention Report - Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- CyGlass - A WatchGuard Brand
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Data export is restricted to permissions.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
-
"Monthly Uptime Percentage" means the percentage of time that the CyGlass service is available to customer calculated using the following formula: (total number of minutes in a calendar month - the total number of minutes of Downtime suffered in such calendar month due solely to CyGlass error) ÷ the total number of minutes in such calendar month. Monthly Uptime Percentage shall not include downtime during planned system maintenance or outage due to non-CyGlass issues.
Monthly Uptime Percentage No. of days of service (per each affected month) added to the end of the subscription term at no charge to customer
< 99.9% - >= 99.0% 1
< 99.0% - >= 95.0% 5
< 95.0% 7*
*Maximum
Days of services shall be added as a credit to the next subscription period payable by Customer.
The pro-rated value of any service credits will be refunded to Customer at the expiration of the subscription term (if not renewed). - Approach to resilience
- CyGlass is multi-tenant SaaS operating in Amazon AWS. System components are deployed for resiliency through redundancy. Customer data and configuration is maintained in highly available data stores and archived for recovery. Details are available on request.
- Outage reporting
- Email alerts from Intercity to customer.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- CyGlass restricts access to management interfaces with authentication and authorization. CyGlass implemented the OpenID Connect (OIDC) authentication protocol, which is based on the OAuth 2.0 family of specifications. It uses JSON Web Tokens (JWT), which you can obtain using flows conforming to the OAuth 2.0 specifications. CyGlass also supports multi-factor authentication (MFA) with a one-time password from the Google Authenticator application, Microsoft Authenticator application, and the Authy application.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- ISOQAR Limited
- ISO/IEC 27001 accreditation date
- 29/09/16
- What the ISO/IEC 27001 doesn’t cover
- Activities undertaken by CyGlass Inc.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
WISP Policies, Procedures and Practices - Massachusetts Data Protection Law 201 CMR 17,
a) Ensure the security and confidentiality of personal information;
b) Protect against any anticipated threats or hazards to the security or integrity of such information
c) Protect against unauthorized access to or use of such information in a manner that creates a substantial risk of identity theft or fraud,
These policies and practices ensure that CyGlass is in compliance with the CyGlass Information Security Policy.
Nelson Ronkin Vice President, CyGlass is responsible for ensuring compliance policies. Nelson reports to the CyGlass CEO.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- CyGlass has a defined production change management process and a defined software devleopment process.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Vulnerabilities are detected with CyGlass' internal ongoing testing processes.
CyGlass works on a 3-week development sprint. All patches are fixed within the current sprint. In the event of a severe vulnerability that needs immediate attention, patches are immediately applied. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Performance monitoring, service level agreements, and vulnerabilities are accomplished with internal tools monitoring cloud processes and connections.
- Incident management type
- Supplier-defined controls
- Incident management approach
- CyGlass works on a 3-week development sprint. All patches are fixed within the current sprint. In the event of a severe vulnerability that needs immediate attention, patches are immediately applied.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
- Public Services Network (PSN)
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
We are committed to reducing our environmental impact and continually improving our environmental performance as an integral and fundamental part of our business strategy and operating methods.
Our policy is to:
• Support and comply with or exceed the requirements of current environmental legislation and codes of practice.
• Minimise our waste and reuse or recycle as much of it as possible.
• Minimise energy and water usage in our buildings, vehicles, and processes to conserve supplies, and minimise our consumption of natural resources, especially where they are non-renewable.
• Apply the principles of continuous improvement in respect of air, water, noise, and light pollution from our premises and reduce any impacts from our operations on the environment and local community.
• As far as possible purchase products and services that do the least damage to the environment and encourage others to do the same.
• Assess the environmental impact of any new processes or products we intend to introduce in advance.
We’re certified to ISO140001:2015 and a member of two Corporate Social Responsibility (CSR) initiatives - Global Compact and Eco Vadis.
• The EcoVadis sustainability assessment methodology evaluates how well a company has integrated the principles of Sustainability/CSR into their business and management system.
• The methodology is built on international sustainability standards, including the Global Reporting Initiative, the United Nations Global Compact, and the ISO 26000, covering 200 spend categories and 160+ countries.
• The Sustainability Scorecard illustrates performance across 21 indicators in four themes: Environment, Labour and Human Rights, Ethics, and Sustainable Procurement.
• Intercity Technology’s current EcoVadis score for 2022 – 2023 is 81% (up from 68% in previous years).
• We have been awarded by EcoVadis a platinum medal in recognition of our sustainability achievement for our score which is in the top 1%.
Pricing
- Price
- £62.28 a user a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
-
* CyGlass set up to collect NetFlow from a device which handles significant data traffic
* weekly service management reviews
* excludes integration with Active Directory and DHCP logs
* limited to 30 calendar days