Claroty xDome OT/IT Security
Claroty xDome spans the entire cybersecurity journey, from empowering organisations with comprehensive OT (operational techncology) / ICS (Industrial Control Systems) asset visibility, identifying, measuring, and prioritising risk, to deploying Zero Trust-based protective controls, to optimising threat detection through a vast network of integrations. xDome is a modular SaaS platform.
Features
- Asset Discovery
- Vulnerability & Risk Management
- Network Protection
- Threat Detection
- Asset Management
- Change Management
Benefits
- Extends cybersecurity across industrial-XIoT: PLCs, RTUs, actuators, smart HVAC, lighting.
- Supports your industrial cybersecurity journey: automate asset-discovery, combat zero-day attacks
- Designed for scalability, flexibility, and ease-of-use
- SaaS solution with a flexible UI
- Built to adapt to all OT, security, and executive needs
Pricing
£20.24 a device a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 4 5 1 8 6 4 3 2 9 6 6 8 2 4
Contact
Barrier Networks
Iain Slater
Telephone: 0141 356 0101
Email: info@barriernetworks.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- N/a
- System requirements
- N/a
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Claroty’s response times will be prioritised based on the Severity Levels - https://claroty.com/support-policy
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Severity Levels dictate the need for a TAM or CSE
Severity 1 - Critical: Product is entirely inaccessible < 4 hours
Severity 2 - High: Operational but missing features are impacting operation < 8 hours
Severity 3 - Medium: Operational but degraded < 1 business day
Severity 4 - Low: Questions and/or defects noted but minimal disruption < 2 business day - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- PDF's and online training provided.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Delete instance of xDome
- End-of-contract process
- End of contract process included in the terms of the contract. No additional costs involved.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- We use an open API standard
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- ODF
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Admin users can customise system preferences such as login times, password rules, logon messages.
Scaling
- Independence of resources
- Multi tenant designed to isolate user querys and guarantee performance.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Usage metrics
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Claroty
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- CSV
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- SaaS Service Level: Claroty’s Medigate and xDome service will be available 99.5% of the time except during Weekly scheduled upgrades (between Sunday 08:00 AM GMT - Sunday 9:00 PM GMT);
- Approach to resilience
- Available on request
- Outage reporting
- Updates on app and email alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- ...
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- ICQ Institute of Quality and Control
- ISO/IEC 27001 accreditation date
- 25/02/2016
- What the ISO/IEC 27001 doesn’t cover
- N/a
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- SOC2
- ISO/IEC 27017
- ISO/IEC 27018
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- We follow the full suite of ISO 27001:2013 policies and corresponding procedures.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Our configuration and change mangement policy contains the foillowing elements:
Scope/Impact
Roles and responsibilities
Change control process
Configuration management
Version Control
Testing And Validation
Backout Procedures
Documentation - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
We have continuous scanning in place which directly automates with tickets for our IT and devops teams to patch vulnerabilities based on SLA.
Our SLA's are: Critical within 7 business days, Highs 30 days, Medium 90 days, Low/Informational - depending on risk
We also perform annual third party penetration tests on our developed applications by an accredited third party - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Claroty has a defense in depth approach to security threat management. Security and system logs are sent to a Secrity Information Event Management (SIEM) system to correately, analyze, and alert on potential security events/incidents. Alerts from the SIEM are handled by a dedicated 24x7x365 security operations center (SOC).
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
We have a formal process which will focuses on the below phases/steps of incident
management and response:
- Identification
- Logging/Categorization
- Initial triage/response
- Investigation
- Resolution
- Communication
- Documentation
- Post incident response review
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Equal opportunity
- Wellbeing
Equal opportunity
• To create an environment in which individual differences and the contributions of all our staff are recognised and valued.
• Every employee is entitled to a working environment that promotes dignity and respect to all. No form of intimidation, bullying or harassment will be tolerated.
• Training, development and progression opportunities are available to all staff.
• To promote equality in the workplace which we believe is good management practice and makes sound business sense.
• We will review all our employment practices and procedures to ensure fairness.
• Breaches of our Equality Policy will be regarded as misconduct and could lead to disciplinary proceedings.
• This policy is fully supported by Senior Management.
• The policy will be monitored and reviewed regularly.Wellbeing
• We promote an open, supportive company culture where employees look out for one another and feel comfortable discussing any difficulties. Mental health is valued equally to physical health.
• Employees have access to confidential counselling, therapy, and other mental health resources through our employee assistance program.
• We encourage taking time off when needed for mental health days in addition to sick days. Employees are trusted to manage their time off responsibly.
• Training is provided to managers on recognizing signs of burnout,
work overload, and other mental health concerns. Managers work to
proactively address issues and reduce employee stress.
• Employee workloads and schedules are designed to be reasonable
and sustainable.
• Wellness initiatives like meditation breaks, stress management
workshops, mindfulness programs, and social events are offered
throughout the year.
Pricing
- Price
- £20.24 a device a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Proof of Value (PoV) available. Time limited as agreed with end user client.