Skip to main content

Help us improve the Digital Marketplace - send your feedback

Creative Networks

Endpoint Detection and Response (EDR)

Endpoint Detection and Response (EDR) services protect individual devices within a network by continuously monitoring for suspicious activities such as malware and unauthorised access attempts. With real-time detection and response capabilities, EDR helps prevent data breaches and maintains the integrity of IT systems.

Features

  • Live monitoring for suspicious activity.
  • Behavioural analytics to detect endpoint anomalies.
  • Swift incident detection and response.
  • Detection and prevention of malware.
  • Assessing endpoint vulnerability and patching.
  • Integration with current security infrastructure.
  • Forensic tools for post-incident analysis.
  • Monitoring user activity and detecting anomalies.
  • Automated responses to mitigate threats.
  • Customisable alerts and reporting for informed decisions.

Benefits

  • Heightened security, less susceptible to cyber threats.
  • Rapid incident response, minimises damage and disruption.
  • Enhances network resilience, effectively safeguards sensitive data.
  • Simplifies security management, reduces workload and complexity.
  • Offers insights for proactive threat prevention and mitigation.
  • Ensures regulatory compliance with robust endpoint protection.
  • Decreases downtime, boosts user productivity.
  • Fosters trust, credibility through strengthened security measures.
  • Mitigates business risk, financial losses from security breaches.
  • Optimises security investments with efficient resource allocation.

Pricing

£6.00 a user

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at aj@creative-n.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

5 6 0 8 4 4 4 0 0 3 8 9 3 5 1

Contact

Creative Networks Azeem Javed
Telephone: 03303337337
Email: aj@creative-n.com

Planning

Planning service
Yes
How the planning service works
Creative Networks provide planning services for cloud hosting and software implementation. This includes thorough business analysis, solution design tailored to your needs, and robust security architecture to safeguard your data and operations.
Planning service works with specific services
No

Training

Training service provided
Yes
How the training service works
We deliver comprehensive training, tailored to the needs of users. We provide clear guidance on set up and configuration as well as best practice. Through practical demonstrations and hands-on exercises, users gain confidence in using the software effectively. We also offer instruction on troubleshooting common issues and addressing security concerns. Our goal is to empower users with the knowledge and skills they need to maximise the benefits of software and ensure a smooth and secure authentication experience.
Training is tied to specific services
No

Setup and migration

Setup or migration service available
Yes
How the setup or migration service works
As an IT Managed Service Provider (MSP), we assist buyers in migrating to the cloud or between cloud services. Our process begins with evaluating the current IT infrastructure, including authentication systems and security measures. We then develop a comprehensive migration plan tailored to the buyer's needs, considering factors like data sensitivity and compliance. Next, we seamlessly deploy in the cloud, ensuring integration and minimal disruption. Data migration is handled with care to maintain integrity and security. Thorough testing verifies functionality, followed by user training sessions. During the transition, we offer ongoing support for a smooth experience. Continual monitoring and optimisation enhance performance and security. Overall, our expertise ensures a successful transition to the cloud.
Setup or migration service is for specific cloud services
No

Quality assurance and performance testing

Quality assurance and performance testing service
Yes
How the quality assurance and performance testing works
We assist buyers in conducting quality assurance and performance testing to ensure optimal functionality and reliability. Our approach begins with thorough planning, identifying key performance metrics and testing criteria. We then execute rigorous testing procedures, simulating real-world scenarios to assess performance under various conditions. This includes testing authentication speeds, system response times, and scalability. Through meticulous analysis of test results, we identify any potential issues or areas for improvement, providing actionable insights to enhance performance and reliability. Our goal is to ensure we meet the highest standards of quality and performance, providing buyers with a robust and dependable authentication solution.

Security testing

Security services
Yes
Security services type
  • Security strategy
  • Security risk management
  • Security design
  • Cyber security consultancy
  • Security incident management
  • Security audit services

Ongoing support

Ongoing support service
Yes
Types of service supported
  • Buyer hosting or software
  • Hosting or software provided by your organisation
  • Hosting or software provided by a third-party organisation
How the support service works
We provide comprehensive support for cloud hosting and software services. Our support encompasses all aspects of deploying, managing, and optimising software within cloud environments. Firstly, we assist in the initial setup and configuration of your software, ensuring seamless integration with existing systems and applications. Throughout the deployment process, our team offers guidance and expertise to address any challenges and ensure a smooth transition to the cloud. Once your software is operational, we provide ongoing support and maintenance to optimise its performance and reliability. This includes monitoring system health, troubleshooting issues, and implementing necessary updates and patches. Additionally, we offer proactive guidance on best practices for using your software effectively, as well as training for administrators and end-users to maximise its benefits. In the event of any issues or concerns, our support team is readily available to provide assistance and resolve issues promptly. We understand the critical role that your software plays in securing access to cloud resources, and we are committed to delivering the highest level of support to ensure the success of our clients' cloud hosting and software services.

Service scope

Service constraints
There are no constraints to this Service.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Support response times - 08:30 - 18:00 Weekdays, excluding Bank Holidays. Out of hours support available where necessary. 30 minutes to 8 hour response dependent on priority call, P1 - 30 mins, P2 - 1 hour, P3 - 4 hours, and P4 - 8 hours.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 A
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 A
Web chat accessibility testing
We have not conducted any testing of web chat accessibility with users employing assistive technology.
Support levels
End-user training can be provided at an ad hoc cost. We provide a UK based Service Desk for support. Out of hours support is available. Our helpdesk is made up of 1st, 2nd and 3rd Line technical expertise. A Technical Account Manager will be assigned as standard as a part of our standard and premium IT Support, see our pricing schedule and SFIA Rate Card for details.

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
UKAS
ISO/IEC 27001 accreditation date
24/10/2022
What the ISO/IEC 27001 doesn’t cover
Areas not covered by ISO/IEC 27001 certification include specific business processes unrelated to information security, certain third-party services or suppliers, or compliance with other industry-specific regulations.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Social Value

Social Value

Social Value

Wellbeing

Wellbeing

An Endpoint Detection and Response (EDR) service aligns with the theme of "Wellbeing" by providing enhanced security for remote workforces, reducing stress and anxiety related to cybersecurity incidents, protecting personal data, mitigating cybersecurity risks, and promoting work-life balance among employees.

Pricing

Price
£6.00 a user
Discount for educational organisations
Yes

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at aj@creative-n.com. Tell them what format you need. It will help if you say what assistive technology you use.