Skip to main content

Help us improve the Digital Marketplace - send your feedback

Southern Communications Corporate Solutions T/A SCG Corporate

Sophos Endpoint Security, Intercept X, XDR & MTR

Sophos Intercept X is the world’s best endpoint protection, combining ransomware protection, deep learning malware detection, exploit prevention, EDR, and more in a single solution. Get complete protection for all your endpoints. Works across all your desktops, laptops, servers, tablets, and mobile devices. Works across all major operating systems.

Features

  • Endpoint Detection & Response
  • Anti Ransomware
  • Exploit Prevention
  • Encryption
  • Mobile Security & Management
  • Managed Threat Response
  • Synchronize Your Firewall and Endpoint Security
  • Anti Virus & Anti Malware
  • Centralised Management
  • Web & Email Security

Benefits

  • Easy to Manage
  • Prevent Ransonware Attacks
  • Deep Learning Neural Network
  • Protect endpoints, servers and virtual environments
  • Train Users on phishing
  • Protect against Viruses, Trojans and Exploits

Pricing

£19.64 a user

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at rebecca.rowarth@southern-comms.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

5 8 3 2 1 5 5 5 9 5 8 0 0 1 1

Contact

Southern Communications Corporate Solutions T/A SCG Corporate Rebecca Rowarth
Telephone: 01372 385715
Email: rebecca.rowarth@southern-comms.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
None
System requirements
  • Windows 7, 8 , 8.1, 10
  • Server 2008 or above
  • Disk space: 2 GB free RAM: 2 GB Cores: 2
  • MacOS 10.13, 10.14 and 10.15 Intel-based Macs (64-bit)
  • Amazon Linux, Amazon Linux 2 CentOS 6/7/8 Debian 9, 1

User support

Email or online ticketing support
Email or online ticketing
Support response times
4 hours response - Monday to Friday 9 X 5
2 hour response 24X7X365 at an additional cost
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AAA
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
9 X 5 Monday to Friday 4 hour respone
24X7X365 4 hour response at additional cost
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Onsite training, installation and configuration available upon request at an additional cost.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Users to export data to various sources
End-of-contract process
The service and software are subscription based at the end os the contract the technology stops working and users can request data to be deleted.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
  • Other
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
No difference
Service interface
No
User support accessibility
WCAG 2.1 AAA
API
No
Customisation available
No

Scaling

Independence of resources
The technology is designed with loadbalancing and can allocate resources accordingly, in addition uptimes are 99.99%

Analytics

Service usage metrics
Yes
Metrics types
Various report and metrics can be accessed via the dashboard as per the users requirements.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Sophos

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
They have functionality on the console to export data
Data export formats
  • CSV
  • ODF
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Bonded fibre optic connections
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
Uptime is garaunteed st 99.99% - SLA's are negotiated on a case by case basis based on the clients requirements. Every piece of data is stored in database clusters that is, at a minimum, triplicated. Event-driven clustered replication, with a replication factor of at least three, ensures two database instances in our cluster can fail and data will still remain available. Being event-driven, any database change is immediately pushed to all instances in the cluster, rather than changes being replicated on a schedule, making sure that even when an instance fails, the full dataset is available on failover instances.
Approach to resilience
As the physical infrastructure for Sophos Central is maintained by Amazon, there is a separation of responsibilities. In brief, Amazon take responsibility for security of the cloud itself, and Sophos take responsibility for security in the cloud. The AWS Shared Responsibility Model details these responsibilities: https://aws.amazon.com/compliance/shared-responsibility-model/

For details on what steps Amazon takes to secure the infrastructure and services they offer, see their security whitepaper: https://d1.awsstatic.com/whitepapers/Security/AWS_Security_Whitepaper.pdf
Outage reporting
Email alerts as well as public dashbaord , Sophos’ global security team monitor all logging data from Sophos Central and its related services 24/7/365. Central has forensic capabilities in the event of a data breach for rapid incident response.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
A number of pre-defined administrative roles can be assigned to admins that can restrict access to sensitive log data as well as restrict them from making changes to settings and configurations. MFA can be enabled for all administrators of a Sophos Central account, a subset of administrators, or disabled completely. We strongly recommend the use of MFA to ensure that, in the event of credentials becoming compromised, Sophos Central account access is not possible.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
03/07/2022
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
ISO2700, GDPR & Various industry standards

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
A change management policy exist that is based on industry standards such as ISO27001, in addition a data protection impact assessment is carried out to ensure that security impacts are mitigated.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Every 3 weeks, the gold images for virtual machines are upgraded with the latest software libraries and applications. No virtual machine instance exists for longer than 3 weeks, with old instances being destroyed and new instances deployed based on the new gold images.

Should a vulnerability be found via the vulnerability dependency framework, internal or external testing, bug bounty program, or other means, patching and redeployment take place as part of the vulnerability response program.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Sophos Central is architected so that all machines are user-less, requiring no interaction, allowing machines to be locked down and hardened.
Similarly, to database server instances, machines that comprise Sophos Central can be destroyed and rebuilt at any time without data loss. Detect network traffic to command and control servers
Sophos’ global security team monitor all logging data from Sophos Central and its related services 24/7/365. Central has forensic capabilities in the event of a data breach for rapid incident response.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Sophos’ global security team monitor all logging data from Sophos Central and its related services 24/7/365. Central has forensic capabilities in the event of a data breach for rapid incident response. Sophos regularly undergoes SOC Type 1 auditing and can provide access to the report under NDA. SOC Type 2 auditing is currently in progress. We regularly conduct both internal and external penetration testing with reputable third-parties and can provide attestation under NDA.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
Yes
Connected networks
  • Public Services Network (PSN)
  • Police National Network (PNN)
  • NHS Network (N3)
  • Joint Academic Network (JANET)
  • Scottish Wide Area Network (SWAN)
  • Health and Social Care Network (HSCN)

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Equal opportunity
  • Wellbeing

Fighting climate change

SCCS has undertaken an action plan (published carbon reduction plan) on how we can reduce our environmental impact. Whilst we don’t produce any products directly, we do undertake several recycling initiatives to ensure waste products are recycled where possible: • Paper – aim to work as a paperless company, meaning any hard paper documents are scanned and then placed into the shredding bin’s located on site, shredded and disposed of securely via a third party company. • Plastic– This is collected from site and recycled. • Print Cartridges – This is collected from site and recycled. • Staff commuting – SCCS adopts a 'green travel plan' for staff commuting to work. This means that we encourage staff to use public transport, car share and walk/cycle to work schemes. SCCS do not manufacture products directly as we are a reseller, thus reducing the number of raw materials needed to produce devices. As part of environmental promise, we offer all our customers the option to recycle devices, which can be done through a selected third party. SCCS also aims towards ensuring we are always working in accordance with the procedures of ISO 14001 - Environmental Management System. SCCS operates an Environmental Management System within our office and as part of that process, SCCS is rolling out improved energy efficiency measures to reduce impact on the environment and our carbon footprint: • Lighting – moving all lighting towards LED, which if more efficient for the environment, as well as cost saving. • Implementing Smart metering into our office facility. • Air Conditioning – Units are being changed to newer, more energy efficient models. • Additional Heaters – Heaters within the office are only used in extremes of temperature to prevent large fluctuations in temperature. We also use carbon neutral couriers for all deliveries.

Covid-19 recovery

Covid-19 had a big impact on the world and many businesses and as such, SCCS, much like everyone else, had to adapt on how we worked throughout this period. As an information technology business, we were already equipped with things such as Teams, work mobiles, work laptops etc so the transition from office to home working didn’t have a large impact on our business like it might have on other businesses. Our recovery to Covid-19 has been very smooth in the sense that we are now working as a hybrid business, meaning that staff have the flexibility to work 2 days in the office and 3 days from home. By reducing the number of staff within the office, we are able to spread desks out further and provide less contact with large numbers of people which we believe helps prevent the spread of Covid and other illnesses. We continue to provide hand sanitising stations throughout the office, and have cleaners come in on a regular basis. By implementing hybrid working as a permanent process, this also helps with the environmental aspect of the business as staff are not having to come into the office every day, meaning less travel is required, thus reducing our carbon footprint as a business. SCCS have supported hundreds of charities and voluntary organisations in recovering from the impacts of Covid but also managing and leading that response. This includes explaining and supporting the implementation of solutions in the short, medium and long term. The deployment of Microsoft Teams Voice, Cloud Telephony solutions and mobiles on a short term contract have all helped customers support the recovery from Covid and are set to support any ongoing requirements.

Equal opportunity

SCCS provides a safe environment for all staff and we ensure that equal opportunities exist throughout the company, regardless of race, religion, age, sex or physical ability. When recruiting employee’s, SCCS will first post vacancies on local job boards and with local recruitment agencies to ensure that the pool of candidates we receive are from the local community, however, we would not discriminate if a candidate came from further afield if suitable for the role. The reason for recruiting local is that 1, it contributes towards the local community, both helping towards less unemployment, and also spend in the community, and 2, we believe that by recruiting local helps with our carbon footprint as employees have the option to walk to work, and also car share where possible. SCCS contributes towards the work experience scheme. Over the past several years we have given placement to students who are looking to gain experience within the telecommunication’s sector. When employing staff at SCCS, we ensure that both men and woman feel equally empowered and as such, we have both non-discrimination and equal opportunity policies in place throughout the business. We also believe in equal pay and hold annual pay reviews to ensure that our staff fell they are being paid the correct salary based on their role and skills. SCCS have provided several local projects to support the local community to include but not limited to staff volunteering days, hardware recycling schemes to support local businesses, and consultancy time for local projects. The availability of services is based on the requirements of the customer and how best SCCS can support the request.

Wellbeing

SCCS can confirm that in 2021, amidst the presence of COVID-19, we rolled out an opportunity to our employees to become a Mental Health First Aider’s. We are pleased to say that several staff wanted to be involved with this and as such, we teamed up with St. John’s Ambulance and put selected staff members on a week’s course to become qualified FAQ Level 3 Mental Health Workplace First Aiders. Both the physical and mental health of all our employees is at the forefront of our business as we understand how important it is for our employees to be well, and to feel happy and comfortable in the workplace. Since implementing mental health workplace first aiders, we have also made several changes internally to assess and improve the mental health and well being of all staff. These changes include but not limited to: • Fresh Fruit available every morning in the office • Dedicated zone’s and times that a mental health first aider is available should anyone wish to speak with one of them. • Well-being weeks which include various activities for the staff members to enjoy. • Posters added to all the communal area’s with support numbers should someone feel the need they need to speak with someone. In addition to the above, the mental health first aiders have been trained to look out for the common signs and symptoms of someone who may be struggling with their mental health and how to deal with this situation.

Pricing

Price
£19.64 a user
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Full working version for up to 30 days

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at rebecca.rowarth@southern-comms.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.