boxxe Palo Alto Prisma Access
Prisma Access is a cloud-based security service that provides organizations with secure access to applications and data from anywhere. It offers advanced security features like threat prevention, URL filtering, and encryption to protect against cyber threats.
Features
- Cloud-based security
- Secure remote access
- Threat prevention
- URL filtering
- Advanced encryption
- Zero-trust network security
- Cloud-delivered firewall
- Global scalability
- Application segmentation
- Centralized management and visibility
Benefits
- Improved security posture
- Enhanced remote workforce productivity
- Simplified network infrastructure
- Reduced complexity and operational costs
- Scalability for business growth
- Protection against advanced cyber threats
- Seamless user experience
- Elimination of backhauling traffic
- Centralized policy management and visibility
- Compliance with regulatory requirements
Pricing
£0 a unit
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 4 3 4 6 6 3 9 2 7 5 3 3 0 1
Contact
BOXXE LIMITED
Gemma Franklin
Telephone: 01347 812100
Email: tenders@boxxe.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- No, but can be extended to Palo Alto Networks Platform
- Cloud deployment model
- Public cloud
- Service constraints
-
Yes, like any technology or service, Prisma Access does have some constraints. :
1. Dependency on internet connectivity
2. Compatibility
3. Cost: Implementing and maintaining Prisma Access may involve additional expenses for licensing, infrastructure, and ongoing support.
4. Configuration and setup
5. User training
6. Geographic coverage
7. Service provider dependencyt.
It is recommended to review the product documentation or consult with Palo Alto Networks, the provider of Prisma Access, for specific constraints and limitations. - System requirements
-
- Laptops, desktops, mobile devices, and IoT devices.ne
- Windows, macOS, Linux, iOS, and Android
- A stable and reliable internet connection
- Google Chrome, Mozilla Firefox, Microsoft Edge, and Safari.
- VPN Client Software
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
24x7x365 Support
Priority 1 (Critical) - < 1 Hour
Priority 2 (High) - 2 Hours
Priority 3 (Medium) - 4 Hours
Priority 4 (Low) - 8 Business Hours
Support Service Level Agreements (SLA) are identical for Monday to Friday and Weekends/Public Holidays - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
- Palo Alto Networks offers three support levels: Standard, Premium, and Elite. The Standard level provides 8x5 access to technical support, software updates, and hardware replacement. The Premium level offers 24x7 access to technical support, along with additional features such as designated support engineers and proactive monitoring. The Elite level includes all Premium features, as well as faster response times and personalized support services. Each level is designed to meet varying customer needs and service level requirements.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Palo Alto Networks assists users in starting to use Prisma Access through comprehensive documentation, technical support, training programs, and professional services. They provide step-by-step guides for setup and configuration, offer assistance and troubleshooting, educate users through training resources, and offer consulting services for a smooth deployment. Additionally, they foster a user community for collaboration and knowledge sharing. These efforts ensure that users have the necessary resources and support to effectively implement and utilize Prisma Access.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
-
At the end of a Prisma Access contract, the services provided by Prisma Access will cease. The contract will reach its agreed-upon end date, and the customer will no longer have access to the Prisma Access platform and its associated features and benefits. The customer will need to make alternative arrangements for their network security needs.
Prior to the contract end date, the customer and the service provider may engage in discussions regarding contract renewal. If both parties agree, they may negotiate new terms and conditions for a renewed contract. If no agreement is reached, the contract will terminate as scheduled.
During the contract termination process, the customer may be required to complete certain tasks. These tasks may include retrieving any data or information stored within the Prisma Access system, ensuring that critical information is not lost. The customer will need to transition to an alternative solution or provider for their network security requirements.
It is important for the customer to review the contract terms and conditions to understand the specific obligations and requirements at the end of the Prisma Access contract. Each contract may have its own provisions and procedures for termination or renewal. - End-of-contract process
-
At the end of a Prisma Access contract, the services provided by Prisma Access will cease. The contract will reach its agreed-upon end date, and the customer will no longer have access to the Prisma Access platform and its associated features and benefits. The customer will need to make alternative arrangements for their network security needs.
Prior to the contract end date, the customer and the service provider may engage in discussions regarding contract renewal. If both parties agree, they may negotiate new terms and conditions for a renewed contract. If no agreement is reached, the contract will terminate as scheduled.
During the contract termination process, the customer may be required to complete certain tasks. These tasks may include retrieving any data or information stored within the Prisma Access system, ensuring that critical information is not lost. The customer will need to transition to an alternative solution or provider for their network security requirements.
It is important for the customer to review the contract terms and conditions to understand the specific obligations and requirements at the end of the Prisma Access contract. Each contract may have its own provisions and procedures for termination or renewal
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Architectural differences between platforms create natural functional differences for applications generally, with Cortex XSIAM being no different. Handheld platforms such as iOS and Android are more limited in overall functionality than a Desktop OS so therefore a more limited service is provided and required.
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- The service interface for Prisma Access is primarily accessed and managed through the Strata Cloud Management console, which is a web-based interface. The management console provides a centralized platform for administrators to configure and monitor the Prisma Access service. Through this interface, administrators can manage security policies, view logs and analytics, configure user access, and perform other administrative tasks related to the Prisma Access service.
- Accessibility standards
- None or don’t know
- Description of accessibility
- In the Prisma Access Strata Cloud Manager, users have the ability to configure and manage security policies, monitor network and security events, view and manage user and device information, generate reports, and integrate with other security solutions and platforms. They can define policies for secure access, monitor logs and alerts, access user and device information, generate reports for insights, and integrate with other tools.
- Accessibility testing
- Not applicable
- API
- Yes
- What users can and can't do using the API
-
With Prisma Access APIs, users can programmatically interact with and automate various aspects of the Prisma Access service.
1. Configuration Management
2. User Provisioning and Authentication
3. Reporting and Analytics
4. Integration with Security Ecosystem:
5. Monitoring and Alerting
Users can refer to the official Prisma Access API documentation provided by Palo Alto Networks for detailed information on available APIs, their capabilities, and usage guidelines. - API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- Yes, users can customize the Prisma Access service to align with their specific requirements. They can define and customize security policies, user access controls, network segmentation, and integrate it with their existing security ecosystem. Additionally, users can customize reporting and analytics to generate insights based on their unique needs. It's important to note that the extent of customization may vary based on the specific features and licensing agreement. Users should refer to the documentation provided by Palo Alto Networks for detailed information on customization options and limitations.
Scaling
- Independence of resources
- Prisma Access utilizes a distributed architecture and scalable infrastructure to ensure that users are not affected by the demand placed by other users on the service. It dynamically allocates resources based on demand to maintain optimal performance and availability. Load balancing techniques are employed to distribute traffic evenly across multiple servers and data centers. Additionally, Prisma Access leverages advanced traffic management and prioritization mechanisms to ensure that critical applications and users receive the necessary resources and are not negatively impacted by other users' activities.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
1. User activity and behavior monitoring.
2. Application usage and performance tracking.
3. Network bandwidth consumption analysis.
4. Threat detection and prevention metrics.
5. VPN tunnel utilization and performance monitoring.
6. User authentication and access control metrics.
7. Firewall rule effectiveness and usage metrics.
8. Web filtering and content inspection statistics.
9. Incident response and security incident metrics.
10. Compliance and regulatory reporting metrics. - Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Palo Alto
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Other
- Other data at rest protection approach
-
Service are supplied from Google and Amazon Data centers (further information to follow)
Google Security statement
https://cloud.google.com/security/overview/
https://cloud.google.com/security/
AWS Security Statement
https://aws.amazon.com/compliance/data-center/controls/
https://d1.awsstatic.com/whitepapers/aws-security-whitepaper
https://aws.amazon.com/compliance/data-center/data-centers/
All logs are stored in the Cortex data lake, user activity is monitored and stored in the Cortex data lake for the agreed retention period. - Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Users can export data from Prisma Access by logging into the management console, navigating to the desired data section, selecting the export format (e.g., CSV, PDF, JSON), specifying any parameters, and initiating the export process. Upon completion, users can download the exported file or receive a download link via email. Specific steps and options may vary, so it's advisable to consult the official documentation or Palo Alto Networks support for detailed instructions based on the specific setup.
- Data export formats
-
- CSV
- Other
- Other data export formats
- JSON (via the API), and some PDF reports
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- Other
- Other protection between networks
- N/A
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
- Palo Alto Networks uses a proprietary encryption layer for API calls, telemetry and update services.
Availability and resilience
- Guaranteed availability
- Palo Alto Networks aims to maintain at least 99.99% availability for Prisma Access. If this commitment is not met, customers may be eligible for a service credit. Monthly uptime availability is calculated by subtracting the percentage of downtime, excluding planned or emergency outages. To claim a service credit, customers must open a case within 24 hours of an outage and submit a claim within 5 business days. Palo Alto Networks will promptly review the claim within 15 days after determining the root cause and closing the case
- Approach to resilience
- Palo Alto Networks delivers the Cortex XSIAM service utilising public cloud providers Amazon Web Services and Google Compute Platform. Within each of these providers the use of “availability zones” (AZ) to ensure geo and service redundancy and resiliency within a region (e.g. United Kingdom) and at a regional level with traffic being able to be steered to another region/availability zone/location should an incident occur.
- Outage reporting
-
Prisma Access is designed with built-in resiliency to ensure continuous and reliable network security. It employs several key mechanisms to enhance its resilience.
Firstly, Prisma Access utilises a global network of Points of Presence (PoPs) strategically distributed across different regions. This distributed architecture enables load balancing and automatic failover, ensuring uninterrupted service even in the event of a localised failure.
Secondly, Prisma Access incorporates redundant components and multiple layers of fault tolerance. This includes redundant hardware, network connections, and power supplies, minimising the impact of hardware failures and ensuring high availability.
Thirdly, Prisma Access leverages dynamic routing protocols and intelligent traffic management algorithms. These mechanisms allow for efficient rerouting of traffic in the event of network congestion or failure, optimising performance and maintaining connectivity.
Moreover, Prisma Access employs proactive monitoring and alerting systems to promptly detect and respond to any issues or anomalies. This enables quick identification and resolution of potential problems, minimising downtime and maximising uptime.
Overall, the combination of distributed architecture, redundancy, fault tolerance, intelligent routing, and proactive monitoring makes Prisma Access resilient to disruptions, ensuring continuous and reliable network security for organisations.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- User authentication in Prisma Access involves users providing their username and password, followed by multi-factor authentication (MFA) using methods like one-time passwords (OTPs) or biometric identifiers. Device verification may also be performed to ensure compliance with security standards. Access control is then applied based on predefined policies, granting or denying access to resources and applications.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Bureau Veritas
- ISO/IEC 27001 accreditation date
- 23/1/2022
- What the ISO/IEC 27001 doesn’t cover
- Not applicable
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- Security Standards Council
- PCI DSS accreditation date
- 10/2008
- What the PCI DSS doesn’t cover
- Not applicable
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- ISO/IEC 27001
- Information security policies and processes
- Palo Alto Networks has a formal Enterprise Risk Management program, which includes the performance of an annual risk assessment, with periodic updates, as applicable, to identify and assess key risks and their mitigation approaches. The scope of the program encompasses information security risks and product risks. Our security program consists of a risk-based approach that includes administrative, technical and physical safeguards reasonably designed to protect the confidentiality, integrity and availability of customer data. Palo Alto Network's information security program is aligned to ISO 27001/2, and includes key controls from HIPAA, PCI and SOC2.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Both Palo Alto Networks and the end-user organisation are in full control of their relevant and respective change control processes.
Additional details are available upon request. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Applications and software that collect, transmit or display, or process End User Data, Palo Alto Networks conducts an application security assessment review to identify common security vulnerabilities as identified by industry recognized organizations annually or for all major releases, whichever occurs first. The scope of the security assessment will primarily focus on application security, including, but not limited to, a penetration test of the application, as well as a code review.
Palo Alto Networks utilizes a qualified third party to conduct the application security assessments. Palo Alto Networks may conduct the security assessment review directly, following industry standard best practices. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Applications and software that collect, transmit or display, or process End User Data, Palo Alto Networks conducts an application security assessment review to identify common security vulnerabilities as identified by industry recognized organizations annually or for all major releases, whichever occurs first. The scope of the security assessment will primarily focus on application security, including, but not limited to, a penetration test of the application, as well as a code review.
Palo Alto Networks utilizes a qualified third party to conduct the application security assessments. Palo Alto Networks may conduct the security assessment review directly, following industry standard best practices. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- This information is available upon request
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
boxxe is committed to supporting environmental protection and improvement and to delivering and influencing environmentally conscious solutions to address the critical issue of climate change, focusing on achieving net zero greenhouse gas emissions and influencing all stakeholders towards environmental protection and improvement.
Our latest Carbon Reduction Plan, available on our website confirms we are carbon neutral across all sources of emissions through investing in the Carbon Exchange-Traded Commodity. We aim to reach Net Zero by 2050 at the latest through emissions reduction initiatives e.g. renewable electricity procurement and supplier engagement.
Environmental protection is embedded in everything boxxe does and offers and we are proud to have been named as a finalist in the Best Value Chain Initiative category at the CRN Sustainability in Tech Awards 2024.
We maintain an accredited ISO 14001 Environmental Management System covering the entire scope of our business, and our goal is to be recognized as the UK’s most sustainable IT reseller and service provider.
boxxe is committed to adopting, promoting, and implementing the principles of a Circular Economy and have developed a Circular Management Plan which articulates our strategy for waste minimisation and the enhancement of material reuse and recycling in our operations and the products we supply. This underscores our dedication to environmental stewardship, resource efficiency, and sustainable growth, driven by innovative and accountable resource and waste management practices.
We ensure that our supply chain is aware of and understand our environmental policies and we work with them to manage and continuously improve their environmental performance. We prioritise the purchase of recycled, recyclable, or re-furbished products and materials where these alternatives are available, economical, and suitable.
We conform to WEEE regulations and seek to sustainably reduce, reuse, and recycle, to ensure we and our customers minimise the impact of IT waste on the environment.Covid-19 recovery
The COVID-19 pandemic fundamentally changed boxxe’s ways of working, leading us to implement a fully remote workforce to maintain customer service and operational functionality during the crisis. This transition enabled us to develop and implement a "Work from Anywhere in the UK" policy. By allowing our employees to work from any location, we have broadened our recruitment reach, enabling us to attract the best talent regardless of their geographic location. This approach has reduced barriers to inclusion, enhanced employee retention, and supported a healthier work-life balance. Additionally, remote recruitment strategies have allowed us to target candidates from areas particularly impacted by Covid-19, thereby positively contributing to their local economic recovery.
Recognising the significant skills shortages highlighted by the pandemic within the IT industry, we have taken proactive steps to retain and enhance our workforce's capabilities. We encourage continuous training and development in our employees' respective fields of expertise. Experienced staff and external specialists provide mentoring, offering a hands-on learning experience that ensures the effective application of newly acquired skills. Moreover, we are committed to inspiring the next generation by inviting local youth to experience the day-to-day life of our tech teams and organising regular hackathons and think tanks for soon-to-be graduates, providing them with career guidance.
Building on our pandemic experiences, we have developed a robust business continuity plan, ensuring that we are well-prepared to maintain uninterrupted service in the event of a similar crisis. It is worth noting that during the height of COVID-19, our strategies allowed us to maintain seamless business operations, underscoring our resilience and adaptability in challenging times. This foundation not only prepares us for future challenges but also reinforces our commitment to innovation and excellence in a post-pandemic world.Tackling economic inequality
boxxe is committed to addressing disparities in employment, skills, and pay within our workforce and across our supply chain. Our ‘Work from Anywhere in the UK’ policy allows us to recruit the best talent regardless of their geographic location, removing barriers to inclusion, improving retention, and promoting a healthier work-life balance. By enabling staff to work remotely, we foster collaboration and create more equitable opportunities for all potential and current boxxe employees.
To address the skills shortages in tech industry, we invest in our staff’s continuous in-work skills development, facilitating career progression and helping retain talent. All staff have access to on-demand learning opportunities, available irrespective of role or seniority. We provide funding for a variety of training programs: specialist vendor/industry accreditations and professional qualifications. Experienced staff provide mentoring, ensuring that newly acquired skills are applied effectively.
We are dedicated to maintaining a robust and diverse supply chain by actively supporting SMEs, startups, and specialist suppliers. We invite these partners to collaborate with us, providing them with a route to market and guidance on best practices in industry and environmental, social, and governance (ESG) standards. Moreover, we have created the boxxe Community, where every employee can contribute 11½ days each year to support community and social value activities. We prioritise a local-first approach to giving, ensuring that support reaches grassroots charities and local causes where it is needed most. This includes our involvement in the 'Graduation to Employment' programme where experienced personnel volunteer to provide career coaching to university graduates.
Through the boxxe Academy, we offer apprenticeships and seasonal internships to encourage the next generation into IT. We welcome interns and apprentices to our customer service, HR, service delivery, and service delivery teams, providing them with all-round experience to kick-start a career in tech.Equal opportunity
Equal opportunities, and our dedication to DEI are rooted in our mission to Making Tech Human.
boxxe is committed to a workforce that reflects diverse populations with the skills to drive a compassionate and inclusive culture and a genuine sense of belonging. We embed inclusivity, celebrate uniqueness, and foster collaboration to eradicate inequalities in employment, skills, and pay in our workforce and our supply chain.
Recruitment is focused on inclusivity and fairness, encouraging diversity in ethnicity, gender, sexuality, and socio-economic backgrounds by anonymising our candidates, concentrating on the alignment of their skills and experience, reducing conscious or unconscious bias. Our Competency Framework gives employees clear guidance on progression and developing the necessary competencies for higher level roles, integrating both technical and behavioural aspects in a Skills Matrix, and mapping out potential career paths. We offer online training and invest in our staff’s professional qualifications. Our annual pay review maintains market-aligned salaries, and we are a certified Real Living Wage employer. We offer enhanced, inclusive family policies including maternity, parental, and fertility-treatment paid leave.
We hold Flexa accreditation and operate a ‘Work from Anywhere in the UK’ policy which enhances accessibility for candidates facing barriers to inclusion, bolsters retention and facilitates a healthier work-life balance. We are a Level 1 Disability Confident Committed employer, aiming to achieve Level 2 by 2025. We actively address underrepresentation, particularly women in tech, and racial inequality as a founding member of Technology, Community for Racial Equality. We are proud of our advancement of female leadership, recognised at the CRN Women & Diversity in Channel Awards 2023. Our involvement with the Stonewall Diversity Champions reflects our dedication to LGBTQ+ allyship.
As a silver accredited Armed Forces Covenant member, we work to help create employment opportunities for ex-service personnel and support staff who are military reservists.Wellbeing
boxxe’s Wellbeing Strategy, built on direct feedback from our employees, reflects our dedication to prioritising our workforce’s mental, physical, social, and financial wellbeing. This holistic approach recognises the importance of a comprehensive support system for overall health, satisfaction, and effectiveness of the workforce. We adhere to the Mental Health at Work Commitment and incorporate elements from the Thriving at Work guidance, despite being an organisation of less than 500 employees. This includes tailored mental health support, financial advice and low interest support loans, an EPA, occupational health support, and counselling services provided in-house by Mental Health First Aiders.
We champion a healthy workplace environment through the Mindful Business Charter, which emphasises removing unnecessary stress and promoting mental wellbeing with strategies including smart meetings, respecting rest periods, and mindful delegation. This charter serves as a guideline for all employees on small, practical changes to safeguard personal and colleague health.
To encourage open discussions about health, we foster a supportive culture where physical and mental health issues can be openly discussed, creating a safe space for employees to express concerns. We encourage our staff to participate in the boxxe Community programme, which has been shown to positively impact physical and mental wellbeing.
Our proactive engagement with the workforce includes regular wellbeing surveys, specialised training for managing stress at work, and comprehensive health benefits that cover physical and mental resources. We promote active lifestyles through incentivised physical activities, and we maintain health and safety standards in line with our ISO 45001 accreditation. We ensure wellbeing extends to our supply chain through our Supplier Code of Conduct, emphasising the importance of ethical standards and worker health and wellbeing, demonstrating our dedication to fostering a culture of health and wellbeing across all facets of our operations.
Pricing
- Price
- £0 a unit
- Discount for educational organisations
- Yes
- Free trial available
- No