Multifactor Authentication
Provides clients with a cloud based authentication system across their organisation.
Verifies the identity of all users with strong two-factor authentication before granting access to corporate applications to protect against phishing and other access threats.
Features
- Contextual user access policies
- verifies the identities of your users quickly and easily
- zero-trust security model
Benefits
- protect against remote attacks such as phishing
- attackers unable to access accounts without possessing your physical device
Pricing
£750 a unit a day
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 1 4 5 4 6 1 1 9 2 8 8 7 6 2
Contact
Cysiam Limited
Rupert Ryan
Telephone: 07376019394
Email: rupert.ryan@cysiam.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Hybrid cloud
- Service constraints
- None known
- System requirements
-
- Must not be air-gapped networks
- Needs internet connectivity
User support
- Email or online ticketing support
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Onsite support at daily consultancy rates.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Onsite training on enrolment is provided with additional user documentation and online resources.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- No data is stored after the contract ends.
- End-of-contract process
-
At the end of the contract the service will finish providing mfa.
cost includes set up of MFA dashboard and integration with systems requiring MFA with user training provided.
Using the service
- Web browser interface
- No
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- MacOS
- Windows
- Windows Phone
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The phone is the device that users use to authenticate access and verify their identity.
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- Yes
- Description of customisation
- Service is entirely bespoke to the deployment.
Scaling
- Independence of resources
- Service provision is on the local device only so no issues with high demand on the service.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Login location data including time and date stamp and unsuccessful authentication attempts.
- Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- DUO
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- No data is stored by the system.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Supplier provided.
- Approach to resilience
- Hosted by DUO - Cysiam are the reseller and don't have access to the security information. DUO make this available on request.
- Outage reporting
- DUO website, email and push notifications.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
- Access restrictions in management interfaces and support channels
- Hosted by DUO - Cysiam are the reseller and don't have access to the security information. DUO make this available on request.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Less than 1 month
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- SGS
- ISO/IEC 27001 accreditation date
- 19/10/2023
- What the ISO/IEC 27001 doesn’t cover
- The whole business is covered
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Cyber Essentials
- Information security policies and processes
-
We have policies and processes for the following:
IT Usage Policy
HR onboarding and release process
Remote working policy
Vulnerability and Patch Management Policy
Cyber Security Incident policy and procedure
All members of staff are required to read and sign all policies and procedures on induction and also every 12 moths.
All incidents or or nonconformity to policy or procedure are to be reported to the Chief Technology Officer
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Hosted by DUO - Cysiam are the reseller and don't have access to the security information. DUO make this available on request.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Hosted by DUO - Cysiam are the reseller and don't have access to the security information. DUO make this available on request.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- Hosted by DUO - Cysiam are the reseller and don't have access to the security information. DUO make this available on request.
- Incident management type
- Undisclosed
- Incident management approach
- Hosted by DUO - Cysiam are the reseller and don't have access to the security information. DUO make this available on request.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Equal opportunity
Fighting climate change
CYSIAM is a proud member of the SME Climate Hub, a global initiative that empowers small to medium sized companies to take climate action and build more resilient businesses. Through the SME Climate Hub, we commit to lowering our impact on the environment through authentic action, halving our emissions by 2030. In making the commitment, we have joined the United Nations Race to Zero campaign.
The initiative is supported at board level in the company and having calculated our baseline emissions, we report progress against our action plan on an annual basis.
We run several initiatives throughout the year to support our climate commitment and try to involve our staff as much as possible.Equal opportunity
CYSIAM is an equal opportunities employer and has a clear policy on equality of opportunity which is available to all staff and briefed to new entrants as part of the onboarding activity. We are also a member of the Armed Forces Covenant which aims to assist forces leavers in the transition into civilian life, giving them an opportunity to compete on an equal footing with those more used to participating in the workplace.
Pricing
- Price
- £750 a unit a day
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- DUO defined