Skip to main content

Help us improve the Digital Marketplace - send your feedback

BOXXE LIMITED

boxxe Palo Alto Prisma Access

Prisma Access is a cloud-based security service that provides organizations with secure access to applications and data from anywhere. It offers advanced security features like threat prevention, URL filtering, and encryption to protect against cyber threats.

Features

  • Cloud-based security
  • Secure remote access
  • Threat prevention
  • URL filtering
  • Advanced encryption
  • Zero-trust network security
  • Cloud-delivered firewall
  • Global scalability
  • Application segmentation
  • Centralized management and visibility

Benefits

  • Improved security posture
  • Enhanced remote workforce productivity
  • Simplified network infrastructure
  • Reduced complexity and operational costs
  • Scalability for business growth
  • Protection against advanced cyber threats
  • Seamless user experience
  • Elimination of backhauling traffic
  • Centralized policy management and visibility
  • Compliance with regulatory requirements

Pricing

£0 a unit

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@boxxe.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

5 4 3 4 6 6 3 9 2 7 5 3 3 0 1

Contact

BOXXE LIMITED Gemma Franklin
Telephone: 01347 812100
Email: tenders@boxxe.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
No, but can be extended to Palo Alto Networks Platform
Cloud deployment model
Public cloud
Service constraints
Yes, like any technology or service, Prisma Access does have some constraints. :

1. Dependency on internet connectivity
2. Compatibility
3. Cost: Implementing and maintaining Prisma Access may involve additional expenses for licensing, infrastructure, and ongoing support.
4. Configuration and setup
5. User training
6. Geographic coverage
7. Service provider dependencyt.

It is recommended to review the product documentation or consult with Palo Alto Networks, the provider of Prisma Access, for specific constraints and limitations.
System requirements
  • Laptops, desktops, mobile devices, and IoT devices.ne
  • Windows, macOS, Linux, iOS, and Android
  • A stable and reliable internet connection
  • Google Chrome, Mozilla Firefox, Microsoft Edge, and Safari.
  • VPN Client Software

User support

Email or online ticketing support
Email or online ticketing
Support response times
24x7x365 Support
Priority 1 (Critical) - < 1 Hour
Priority 2 (High) - 2 Hours
Priority 3 (Medium) - 4 Hours
Priority 4 (Low) - 8 Business Hours
Support Service Level Agreements (SLA) are identical for Monday to Friday and Weekends/Public Holidays
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Onsite support
Support levels
Palo Alto Networks offers three support levels: Standard, Premium, and Elite. The Standard level provides 8x5 access to technical support, software updates, and hardware replacement. The Premium level offers 24x7 access to technical support, along with additional features such as designated support engineers and proactive monitoring. The Elite level includes all Premium features, as well as faster response times and personalized support services. Each level is designed to meet varying customer needs and service level requirements.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Palo Alto Networks assists users in starting to use Prisma Access through comprehensive documentation, technical support, training programs, and professional services. They provide step-by-step guides for setup and configuration, offer assistance and troubleshooting, educate users through training resources, and offer consulting services for a smooth deployment. Additionally, they foster a user community for collaboration and knowledge sharing. These efforts ensure that users have the necessary resources and support to effectively implement and utilize Prisma Access.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
At the end of a Prisma Access contract, the services provided by Prisma Access will cease. The contract will reach its agreed-upon end date, and the customer will no longer have access to the Prisma Access platform and its associated features and benefits. The customer will need to make alternative arrangements for their network security needs.

Prior to the contract end date, the customer and the service provider may engage in discussions regarding contract renewal. If both parties agree, they may negotiate new terms and conditions for a renewed contract. If no agreement is reached, the contract will terminate as scheduled.

During the contract termination process, the customer may be required to complete certain tasks. These tasks may include retrieving any data or information stored within the Prisma Access system, ensuring that critical information is not lost. The customer will need to transition to an alternative solution or provider for their network security requirements.

It is important for the customer to review the contract terms and conditions to understand the specific obligations and requirements at the end of the Prisma Access contract. Each contract may have its own provisions and procedures for termination or renewal.
End-of-contract process
At the end of a Prisma Access contract, the services provided by Prisma Access will cease. The contract will reach its agreed-upon end date, and the customer will no longer have access to the Prisma Access platform and its associated features and benefits. The customer will need to make alternative arrangements for their network security needs.

Prior to the contract end date, the customer and the service provider may engage in discussions regarding contract renewal. If both parties agree, they may negotiate new terms and conditions for a renewed contract. If no agreement is reached, the contract will terminate as scheduled.

During the contract termination process, the customer may be required to complete certain tasks. These tasks may include retrieving any data or information stored within the Prisma Access system, ensuring that critical information is not lost. The customer will need to transition to an alternative solution or provider for their network security requirements.

It is important for the customer to review the contract terms and conditions to understand the specific obligations and requirements at the end of the Prisma Access contract. Each contract may have its own provisions and procedures for termination or renewal

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Architectural differences between platforms create natural functional differences for applications generally, with Cortex XSIAM being no different. Handheld platforms such as iOS and Android are more limited in overall functionality than a Desktop OS so therefore a more limited service is provided and required.
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
The service interface for Prisma Access is primarily accessed and managed through the Strata Cloud Management console, which is a web-based interface. The management console provides a centralized platform for administrators to configure and monitor the Prisma Access service. Through this interface, administrators can manage security policies, view logs and analytics, configure user access, and perform other administrative tasks related to the Prisma Access service.
Accessibility standards
None or don’t know
Description of accessibility
In the Prisma Access Strata Cloud Manager, users have the ability to configure and manage security policies, monitor network and security events, view and manage user and device information, generate reports, and integrate with other security solutions and platforms. They can define policies for secure access, monitor logs and alerts, access user and device information, generate reports for insights, and integrate with other tools.
Accessibility testing
Not applicable
API
Yes
What users can and can't do using the API
With Prisma Access APIs, users can programmatically interact with and automate various aspects of the Prisma Access service.
1. Configuration Management
2. User Provisioning and Authentication
3. Reporting and Analytics
4. Integration with Security Ecosystem:
5. Monitoring and Alerting

Users can refer to the official Prisma Access API documentation provided by Palo Alto Networks for detailed information on available APIs, their capabilities, and usage guidelines.
API documentation
Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
Yes, users can customize the Prisma Access service to align with their specific requirements. They can define and customize security policies, user access controls, network segmentation, and integrate it with their existing security ecosystem. Additionally, users can customize reporting and analytics to generate insights based on their unique needs. It's important to note that the extent of customization may vary based on the specific features and licensing agreement. Users should refer to the documentation provided by Palo Alto Networks for detailed information on customization options and limitations.

Scaling

Independence of resources
Prisma Access utilizes a distributed architecture and scalable infrastructure to ensure that users are not affected by the demand placed by other users on the service. It dynamically allocates resources based on demand to maintain optimal performance and availability. Load balancing techniques are employed to distribute traffic evenly across multiple servers and data centers. Additionally, Prisma Access leverages advanced traffic management and prioritization mechanisms to ensure that critical applications and users receive the necessary resources and are not negatively impacted by other users' activities.

Analytics

Service usage metrics
Yes
Metrics types
1. User activity and behavior monitoring.
2. Application usage and performance tracking.
3. Network bandwidth consumption analysis.
4. Threat detection and prevention metrics.
5. VPN tunnel utilization and performance monitoring.
6. User authentication and access control metrics.
7. Firewall rule effectiveness and usage metrics.
8. Web filtering and content inspection statistics.
9. Incident response and security incident metrics.
10. Compliance and regulatory reporting metrics.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Palo Alto

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least every 6 months
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
  • Other
Other data at rest protection approach
Service are supplied from Google and Amazon Data centers (further information to follow)
Google Security statement
https://cloud.google.com/security/overview/
https://cloud.google.com/security/

AWS Security Statement
https://aws.amazon.com/compliance/data-center/controls/
https://d1.awsstatic.com/whitepapers/aws-security-whitepaper
https://aws.amazon.com/compliance/data-center/data-centers/

All logs are stored in the Cortex data lake, user activity is monitored and stored in the Cortex data lake for the agreed retention period.
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users can export data from Prisma Access by logging into the management console, navigating to the desired data section, selecting the export format (e.g., CSV, PDF, JSON), specifying any parameters, and initiating the export process. Upon completion, users can download the exported file or receive a download link via email. Specific steps and options may vary, so it's advisable to consult the official documentation or Palo Alto Networks support for detailed instructions based on the specific setup.
Data export formats
  • CSV
  • Other
Other data export formats
JSON (via the API), and some PDF reports
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
Other
Other protection between networks
N/A
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network
Palo Alto Networks uses a proprietary encryption layer for API calls, telemetry and update services.

Availability and resilience

Guaranteed availability
Palo Alto Networks aims to maintain at least 99.99% availability for Prisma Access. If this commitment is not met, customers may be eligible for a service credit. Monthly uptime availability is calculated by subtracting the percentage of downtime, excluding planned or emergency outages. To claim a service credit, customers must open a case within 24 hours of an outage and submit a claim within 5 business days. Palo Alto Networks will promptly review the claim within 15 days after determining the root cause and closing the case
Approach to resilience
Palo Alto Networks delivers the Cortex XSIAM service utilising public cloud providers Amazon Web Services and Google Compute Platform. Within each of these providers the use of “availability zones” (AZ) to ensure geo and service redundancy and resiliency within a region (e.g. United Kingdom) and at a regional level with traffic being able to be steered to another region/availability zone/location should an incident occur.
Outage reporting
Prisma Access is designed with built-in resiliency to ensure continuous and reliable network security. It employs several key mechanisms to enhance its resilience.
Firstly, Prisma Access utilises a global network of Points of Presence (PoPs) strategically distributed across different regions. This distributed architecture enables load balancing and automatic failover, ensuring uninterrupted service even in the event of a localised failure.

Secondly, Prisma Access incorporates redundant components and multiple layers of fault tolerance. This includes redundant hardware, network connections, and power supplies, minimising the impact of hardware failures and ensuring high availability.

Thirdly, Prisma Access leverages dynamic routing protocols and intelligent traffic management algorithms. These mechanisms allow for efficient rerouting of traffic in the event of network congestion or failure, optimising performance and maintaining connectivity.

Moreover, Prisma Access employs proactive monitoring and alerting systems to promptly detect and respond to any issues or anomalies. This enables quick identification and resolution of potential problems, minimising downtime and maximising uptime.

Overall, the combination of distributed architecture, redundancy, fault tolerance, intelligent routing, and proactive monitoring makes Prisma Access resilient to disruptions, ensuring continuous and reliable network security for organisations.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
User authentication in Prisma Access involves users providing their username and password, followed by multi-factor authentication (MFA) using methods like one-time passwords (OTPs) or biometric identifiers. Device verification may also be performed to ensure compliance with security standards. Access control is then applied based on predefined policies, granting or denying access to resources and applications.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Bureau Veritas
ISO/IEC 27001 accreditation date
23/1/2022
What the ISO/IEC 27001 doesn’t cover
Not applicable
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
Yes
Who accredited the PCI DSS certification
Security Standards Council
PCI DSS accreditation date
10/2008
What the PCI DSS doesn’t cover
Not applicable
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • CSA CCM version 3.0
  • ISO/IEC 27001
Information security policies and processes
Palo Alto Networks has a formal Enterprise Risk Management program, which includes the performance of an annual risk assessment, with periodic updates, as applicable, to identify and assess key risks and their mitigation approaches. The scope of the program encompasses information security risks and product risks. Our security program consists of a risk-based approach that includes administrative, technical and physical safeguards reasonably designed to protect the confidentiality, integrity and availability of customer data. Palo Alto Network's information security program is aligned to ISO 27001/2, and includes key controls from HIPAA, PCI and SOC2.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Both Palo Alto Networks and the end-user organisation are in full control of their relevant and respective change control processes.
Additional details are available upon request.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Applications and software that collect, transmit or display, or process End User Data, Palo Alto Networks conducts an application security assessment review to identify common security vulnerabilities as identified by industry recognized organizations annually or for all major releases, whichever occurs first. The scope of the security assessment will primarily focus on application security, including, but not limited to, a penetration test of the application, as well as a code review.

Palo Alto Networks utilizes a qualified third party to conduct the application security assessments. Palo Alto Networks may conduct the security assessment review directly, following industry standard best practices.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Applications and software that collect, transmit or display, or process End User Data, Palo Alto Networks conducts an application security assessment review to identify common security vulnerabilities as identified by industry recognized organizations annually or for all major releases, whichever occurs first. The scope of the security assessment will primarily focus on application security, including, but not limited to, a penetration test of the application, as well as a code review.

Palo Alto Networks utilizes a qualified third party to conduct the application security assessments. Palo Alto Networks may conduct the security assessment review directly, following industry standard best practices.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
This information is available upon request

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

boxxe is committed to supporting environmental protection and improvement and to delivering and influencing environmentally conscious solutions to address the critical issue of climate change, focusing on achieving net zero greenhouse gas emissions and influencing all stakeholders towards environmental protection and improvement.
Our latest Carbon Reduction Plan, available on our website confirms we are carbon neutral across all sources of emissions through investing in the Carbon Exchange-Traded Commodity. We aim to reach Net Zero by 2050 at the latest through emissions reduction initiatives e.g. renewable electricity procurement and supplier engagement.
Environmental protection is embedded in everything boxxe does and offers and we are proud to have been named as a finalist in the Best Value Chain Initiative category at the CRN Sustainability in Tech Awards 2024.
We maintain an accredited ISO 14001 Environmental Management System covering the entire scope of our business, and our goal is to be recognized as the UK’s most sustainable IT reseller and service provider.
boxxe is committed to adopting, promoting, and implementing the principles of a Circular Economy and have developed a Circular Management Plan which articulates our strategy for waste minimisation and the enhancement of material reuse and recycling in our operations and the products we supply. This underscores our dedication to environmental stewardship, resource efficiency, and sustainable growth, driven by innovative and accountable resource and waste management practices.
We ensure that our supply chain is aware of and understand our environmental policies and we work with them to manage and continuously improve their environmental performance. We prioritise the purchase of recycled, recyclable, or re-furbished products and materials where these alternatives are available, economical, and suitable.
We conform to WEEE regulations and seek to sustainably reduce, reuse, and recycle, to ensure we and our customers minimise the impact of IT waste on the environment.

Covid-19 recovery

The COVID-19 pandemic fundamentally changed boxxe’s ways of working, leading us to implement a fully remote workforce to maintain customer service and operational functionality during the crisis. This transition enabled us to develop and implement a "Work from Anywhere in the UK" policy. By allowing our employees to work from any location, we have broadened our recruitment reach, enabling us to attract the best talent regardless of their geographic location. This approach has reduced barriers to inclusion, enhanced employee retention, and supported a healthier work-life balance. Additionally, remote recruitment strategies have allowed us to target candidates from areas particularly impacted by Covid-19, thereby positively contributing to their local economic recovery.
Recognising the significant skills shortages highlighted by the pandemic within the IT industry, we have taken proactive steps to retain and enhance our workforce's capabilities. We encourage continuous training and development in our employees' respective fields of expertise. Experienced staff and external specialists provide mentoring, offering a hands-on learning experience that ensures the effective application of newly acquired skills. Moreover, we are committed to inspiring the next generation by inviting local youth to experience the day-to-day life of our tech teams and organising regular hackathons and think tanks for soon-to-be graduates, providing them with career guidance.
Building on our pandemic experiences, we have developed a robust business continuity plan, ensuring that we are well-prepared to maintain uninterrupted service in the event of a similar crisis. It is worth noting that during the height of COVID-19, our strategies allowed us to maintain seamless business operations, underscoring our resilience and adaptability in challenging times. This foundation not only prepares us for future challenges but also reinforces our commitment to innovation and excellence in a post-pandemic world.

Tackling economic inequality

boxxe is committed to addressing disparities in employment, skills, and pay within our workforce and across our supply chain. Our ‘Work from Anywhere in the UK’ policy allows us to recruit the best talent regardless of their geographic location, removing barriers to inclusion, improving retention, and promoting a healthier work-life balance. By enabling staff to work remotely, we foster collaboration and create more equitable opportunities for all potential and current boxxe employees.
To address the skills shortages in tech industry, we invest in our staff’s continuous in-work skills development, facilitating career progression and helping retain talent. All staff have access to on-demand learning opportunities, available irrespective of role or seniority. We provide funding for a variety of training programs: specialist vendor/industry accreditations and professional qualifications. Experienced staff provide mentoring, ensuring that newly acquired skills are applied effectively.
We are dedicated to maintaining a robust and diverse supply chain by actively supporting SMEs, startups, and specialist suppliers. We invite these partners to collaborate with us, providing them with a route to market and guidance on best practices in industry and environmental, social, and governance (ESG) standards. Moreover, we have created the boxxe Community, where every employee can contribute 11½ days each year to support community and social value activities. We prioritise a local-first approach to giving, ensuring that support reaches grassroots charities and local causes where it is needed most. This includes our involvement in the 'Graduation to Employment' programme where experienced personnel volunteer to provide career coaching to university graduates.
Through the boxxe Academy, we offer apprenticeships and seasonal internships to encourage the next generation into IT. We welcome interns and apprentices to our customer service, HR, service delivery, and service delivery teams, providing them with all-round experience to kick-start a career in tech.

Equal opportunity

Equal opportunities, and our dedication to DEI are rooted in our mission to Making Tech Human.
boxxe is committed to a workforce that reflects diverse populations with the skills to drive a compassionate and inclusive culture and a genuine sense of belonging. We embed inclusivity, celebrate uniqueness, and foster collaboration to eradicate inequalities in employment, skills, and pay in our workforce and our supply chain.
Recruitment is focused on inclusivity and fairness, encouraging diversity in ethnicity, gender, sexuality, and socio-economic backgrounds by anonymising our candidates, concentrating on the alignment of their skills and experience, reducing conscious or unconscious bias. Our Competency Framework gives employees clear guidance on progression and developing the necessary competencies for higher level roles, integrating both technical and behavioural aspects in a Skills Matrix, and mapping out potential career paths. We offer online training and invest in our staff’s professional qualifications. Our annual pay review maintains market-aligned salaries, and we are a certified Real Living Wage employer. We offer enhanced, inclusive family policies including maternity, parental, and fertility-treatment paid leave.
We hold Flexa accreditation and operate a ‘Work from Anywhere in the UK’ policy which enhances accessibility for candidates facing barriers to inclusion, bolsters retention and facilitates a healthier work-life balance. We are a Level 1 Disability Confident Committed employer, aiming to achieve Level 2 by 2025. We actively address underrepresentation, particularly women in tech, and racial inequality as a founding member of Technology, Community for Racial Equality. We are proud of our advancement of female leadership, recognised at the CRN Women & Diversity in Channel Awards 2023. Our involvement with the Stonewall Diversity Champions reflects our dedication to LGBTQ+ allyship.
As a silver accredited Armed Forces Covenant member, we work to help create employment opportunities for ex-service personnel and support staff who are military reservists.

Wellbeing

boxxe’s Wellbeing Strategy, built on direct feedback from our employees, reflects our dedication to prioritising our workforce’s mental, physical, social, and financial wellbeing. This holistic approach recognises the importance of a comprehensive support system for overall health, satisfaction, and effectiveness of the workforce. We adhere to the Mental Health at Work Commitment and incorporate elements from the Thriving at Work guidance, despite being an organisation of less than 500 employees. This includes tailored mental health support, financial advice and low interest support loans, an EPA, occupational health support, and counselling services provided in-house by Mental Health First Aiders.
We champion a healthy workplace environment through the Mindful Business Charter, which emphasises removing unnecessary stress and promoting mental wellbeing with strategies including smart meetings, respecting rest periods, and mindful delegation. This charter serves as a guideline for all employees on small, practical changes to safeguard personal and colleague health.
To encourage open discussions about health, we foster a supportive culture where physical and mental health issues can be openly discussed, creating a safe space for employees to express concerns. We encourage our staff to participate in the boxxe Community programme, which has been shown to positively impact physical and mental wellbeing.
Our proactive engagement with the workforce includes regular wellbeing surveys, specialised training for managing stress at work, and comprehensive health benefits that cover physical and mental resources. We promote active lifestyles through incentivised physical activities, and we maintain health and safety standards in line with our ISO 45001 accreditation. We ensure wellbeing extends to our supply chain through our Supplier Code of Conduct, emphasising the importance of ethical standards and worker health and wellbeing, demonstrating our dedication to fostering a culture of health and wellbeing across all facets of our operations.

Pricing

Price
£0 a unit
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@boxxe.com. Tell them what format you need. It will help if you say what assistive technology you use.