Fujitsu Software Defined Networking (SD–WAN) High Assurance
Fujitsu’s SD-WAN High Assurance solution offers Cloud and Sovereign deployed platforms at scale delivering solutions from OFFICIAL up to SECRET aligned to NCSC and Cloud Security Principles. Managed and operated in the UK from assured facilities. Enabling Buyers to deploy a disaggregated and cloud complaint network solutions.
Features
- Fully resilient, High Availability Platform
- Choice of Cloud or Sovereign platforms deployed in certified datacentres
- In house Management or Managed Service Options from Fujitsu
- Service support 24x7x365.
- Full catalogue service approach.
- Edge devices appliance/NFV/ Vendor choices supporting upto50Gbps
- Choice of standard or High Availability edge site deployments.
- Protective Monitoring based on defined user cases
- Standard APIs for customer tooling and service management platforms.
Benefits
- COTS designed SD-WAN
- Unlocks circa 30-40% savings from removing dependency on legacy infrastructure/services.
- Meeting Customer Information Assurance requirements with design, documentation/deployment skills.
- Low start-up and deployment costs.
- A catalogue approach to services and functionality.
- Allows customer self-management of aspects of the SDN service
- Evergreen with updates and functionality added automatically.
- Choice of Service management options.
- Cloud and Fabric supporting deployment options
- • Deployed across the for HM Government Departments
Pricing
£380.00 to £1,970.00 an instance a day
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 3 0 4 7 9 7 0 4 0 7 6 6 2 6
Contact
Fujitsu Services Limited
Sam Skinner
Telephone: 07867829234
Email: government.frameworks@fujitsu.com
Service scope
- Service constraints
- Planned maintenance and software updates is performed and designed to have zero impact and will be advised to the Customer in advance. Ongoing certification obligations means it may not be possible for users to remain on the previous version. In the unlikely instance downtime is required this will be advised to the Customer in advance for service continuity purposes.
- System requirements
- Please refer to the Servic Definition documentation
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 30 minutes
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- Customer may access web chat through standard web browser interfaces via the Fujitsu online service management portal, full functionality provided (subject to security handling requirements)
- Onsite support
- Yes, at extra cost
- Support levels
- Fujitsu provides help desk support via the Service Management Centre (SMC) which offers 24/7/365 support. Our SMC provides a single point of contact basis, all incident and query calls made and all are logged with the SMC operation. Technical Support Analysts (TSAs) are skilled to support all aspects of the SD-WAN Service. The TSAs are located within the SMC and it is from here that the incident or query is managed. A TSA will provide proactive or reactive updates, carry out first and second level diagnostics, assign the fault or query to technical teams, on-site engineering groups or 3rd party suppliers and manage the end-to-end flow of the incident or query during its active life until resolution. In all cases Fujitsu will call back within two contracted hours after the fault or query has been logged with hourly updates given to the Buyer until incident or query has been resolved. Escalations can be raised by email, phone call, through our self-service incident portal Engage, or via our website.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Access to Fujitsu SME is provided and to all documentation including HLD's from the Fujitsu Customer Service Portal Access is also granted to online documentation and training material / courses
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
- Should the Customer wish to extract configuration data and or other information held by Fujitsu a service ticket must be raised with notification of requirements with a minimum of 60 days notice . The transfer of data will be in an agreed format with the Customer and charged for in accordance with the relevant man days charge
- End-of-contract process
- At the end of the contract Fujitsu shall decommission the storage and services that have been allocated to specific customer which shall include all customer owned data and any backups. Should the data be required to be extracted prior to decommissioning this service, please contact Fujitsu to discuss your specific requirements. The cost for extracting data from the service has not been included in the price and will attract an additional charges based on the SFIA rate card.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Full access is provided based on agreed roles based access control (RBAC) to the service orchestration platform. The limit in functionality is agreed between the Customer and Fujitsu and is set against RBAC profiles. Functionality is limited to first and second line capability.
- Web interface accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web interface accessibility testing
- Web interface will access the Service Orchestration platform (or other service management platform such as Service Now, Remedy or Broadcom CA Service Desk) where upon the Authorised User (role based access control) may perform moves adds changes and activation of the Customer users based on the access levels agreed. Note; access granted will be limited to the Customer database and not the full platform.
- API
- Yes
- What users can and can't do using the API
-
Fujitsu provides off the shelf API software supporting for example but not limited too ServiceNow, Remedy and CA Service Desk.
There are no limitations; Fujitsu provides via configured portals access to the SD-WAN orchestrator to perform full system administration and service management, in addition to the support provided by Fujitsu's NOC - API automation tools
-
- OpenStack
- Other
- Other API automation tools
-
- Restful API
- Fujitsu provides off the shelf API software supporting:
- -ServiceNow Remedy and CA Service Desk (Broadcom)
- API documentation
- Yes
- API documentation formats
-
- HTML
- ODF
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
-
- Automatic
- Manual
- Independence of resources
- The SDN solution has inbuilt capacity to support a 50% increase in traffic. Capacity is continuously monitored by Fujitsu and added as and when required.
- Usage notifications
- Yes
- Usage reporting
-
- API
- SMS
- Other
- Other usage reporting
-
• Bandwidth used per-location top users and
• History file of all traffic statics
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- Network
- Number of active instances
- Other
- Other metrics
-
- Bandwidth used per-location top users and
- History file of all traffic statics
- Network Analytics from SD-WAN Manager
- Or via LiveNX Manager provided with the service.
- Visibility across on-premises, SD-WAN, cloud, and hybrid networks;
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Multivendor based
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Scale, obfuscating techniques, or data storage sharding
- Other
- Other data at rest protection approach
- Fujitsu deploys "Fujitsu Enterprise data Encryption service", which is based on proven KMS platform, available as a physical or virtual appliance, which are cloud agnostic. The Customer has full ownership of the encryption keys and broad portfolio of third-party integrations including and beyond the cloud environment. It is fully compliant with FIPS 140-2 for a centralised solution for detail logging, audit tracking of al key state changes, administration access and policy changes.
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Hardware containing data is completely destroyed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Server OS used in the service for recovery
- Configuration for servers and appliances
- Database used in the service
- Network Configuration
- Backup controls
- Back up policies are defined by Fujitsu and published in accordance with the service management responsibilities. The user has no control over the content of the backup performed.
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
-
- Users can recover backups themselves, for example through a web interface
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Bonded fibre optic connections
- Other
- Other protection between networks
-
ISO/IEC 27001:2013 certified ISMS and using inherent security features of an MPLS WAN such as Virtual Routing and Forwarding Tables (VRFs) and VLAN separation. Or SDN and SD-WAN based connectivity as an option by use of Foundation or PRIME based encryption as an overlay meeting NSCS guidelines.
Encrypts all customer-data in transit by default.
Configures data in transit encryption, and defaults to the latest industry standards.
Adopts understood algorithms and protocols (such as TLS and IPsec) to protect data.
Supports Customers to implement good data in transit protections in your application. - Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Other
- Other protection within supplier network
- ISO/IEC 27001:2013 certified ISMS and using inherent security features of an MPLS WAN such as Virtual Routing and Forwarding Tables (VRFs) and VLAN separation. Or SDN and SD-WAN based connectivity as an option by use of Foundation or PRIME based encryption as an overlay meeting NSCS guidelines.
Availability and resilience
- Guaranteed availability
- 99.99%
- Approach to resilience
- Availability and Resilience built in as standard mapping to IA or security requirements of customer. Availability targets defined in each Service Pack. SLA supports 99.99% availability for core service a range of availability targets for edge device as standard Note solution orchestration is active active across two data centres / cloud nodes.
- Outage reporting
- In the event of event of an outage of the SDN service, the Customer shall be notified via an email alert and other service management tooling as provided. In addition the Customer may register or view our on-line portal where they will be able to monitor their services in real time. All monitoring is performed by the Fujitsu Service Desk. The Service Desk provides a single point of contact which operates 24x7x365 and provides; Availability proactively monitor all managed services and report on availability against contracted service levels. Incident resolution – the operation of real-time automated traffic light reporting indicators, enabling jeopardy management of incidents. Quality – real time dashboard monitoring of queue status and time to answer. Reporting on the quality requirements against contracted service levels.
Identity and authentication
- User authentication
- Dedicated link (for example VPN)
- Access restrictions in management interfaces and support channels
- By use of a dedicated management network operations centre.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Dedicated device on a government network (for example PSN)
- Dedicated device over multiple services or networks
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Bureau Veritas
- ISO/IEC 27001 accreditation date
- Recertification cycle start date: 06/01/2022 Certification expiry date: 04/12/2024
- What the ISO/IEC 27001 doesn’t cover
-
Our certificate covers:
The information security management, security governance and security risk management of Fujitsu in
Europe, including the provision of corporate functions and infrastructure to enable activities in scope:
A. Design, delivery, support and management of:-
- Outsourcing and managed services for customers; including hosting operations virtualization
and end user support including service desk;
- IT solutions including applications development, hosting and database maintenance and,
where appropriate sales, leasing and consulting.
B. Design, delivery, operation, support and management of telecommunication and network solutions,
including repair and refurbishment of equipment;
C. Cloud Hosting services/Service Hub;
D. Managed Security Services from Security Operations Centres/Advanced Threat Centres;
E. Product, sales, installation and maintenance;
F. Digitization services - document scanning and digitization of sensitive personal data and personal
medical data;
G. Provision of ICT services related to Workplace services/managed office and Multi-vendor support
services/managed maintenance;
H. Productivity Center Services; Mobile and Internet Services; Logistics and Installation Services
I. The management and operation of the secure network environment provided by the Defense and National Security Business - ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- ISO/IEC 27001
- Information security policies and processes
- ISO/IEC 27001
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- We follow an ITIL - based formal change request process. Customers can raise MACs using either over the telephone or through the portal. Once raised, these requests are scheduled, managed and executed.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Fujitsu subscribe and is involved in a number of external services to obtain information about potential threats; Industry bodies (ITSPA, Ofcom), Security forums (CNR by CiSP/NCSC), and Penetration testing (External, Network, Website). Potential new threats are logged as Incidents and an assessment of the threat is immediately performed based on a Risk Assessment Methodology and Operational IT Security defined within our ISO27001. High/Critical patches will be applied immediately. Patches to the system to remediate threats are subject to the change management process.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Fujitsu employ systems to identify and automatically block attempted compromises and unauthorised access , and to provide systems for audit logging. These include IDS, Two-Factor authentication, and Firewall Policy. When a compromise or attack is detected it alerts IT operational staff and either automated action or immediate manual intervention is taken to block the occurrence. Incidents are managed in accordance with the Incident Management Procedure.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Knowledge based articles and FAQs are created for support teams for common incidents. This ensures incidents are dealt with as quickly and as efficiently as possible. Incidents can be logged via the Portal, email and telephone. Incident reports are generated by Service Management Team. Our portal also provides a standard set of reports which authorised customers can use to look at incidents raised.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- The Strategic Fujitsu Datacentres are registered “participants” in the EU Code of Conduct for datacentres, complying with their energy efficiency guidelines conforming to ISO50001 Energy Management. The Supplier’s infrastructure planners have used optimal layouts, as determined by the EU Code of Conduct to build the service within these datacentres.
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Fujitsu operates a Dual Delivery approach to Social Value (SV). Our Responsible Business Programme, developed on the principles of the Public Sector (SV Act 2013) delivers our corporate employee and community programme. Running parallel to the corporate programme, we deliver bespoke client-facing SV programmes within each call off contract. Programmes are fully aligned to the requirements of PPN06/20. Using our co-creation process, we undertake both local and national initiatives, jointly developed with clients and partners, that ensure Economic, Social and Environmental benefit to communities.Covid-19 recovery
Fujitsu operates a Dual Delivery approach to Social Value (SV). Our Responsible Business Programme, developed on the principles of the Public Sector (SV Act 2013) delivers our corporate employee and community programme. Running parallel to the corporate programme, we deliver bespoke client-facing SV programmes within each call off contract. Programmes are fully aligned to the requirements of PPN06/20. Using our co-creation process, we undertake both local and national initiatives, jointly developed with clients and partners, that ensure Economic, Social and Environmental benefit to communities.Tackling economic inequality
Fujitsu operates a Dual Delivery approach to Social Value (SV). Our Responsible Business Programme, developed on the principles of the Public Sector (SV Act 2013) delivers our corporate employee and community programme. Running parallel to the corporate programme, we deliver bespoke client-facing SV programmes within each call off contract. Programmes are fully aligned to the requirements of PPN06/20. Using our co-creation process, we undertake both local and national initiatives, jointly developed with clients and partners, that ensure Economic, Social and Environmental benefit to communities.Equal opportunity
Fujitsu operates a Dual Delivery approach to Social Value (SV). Our Responsible Business Programme, developed on the principles of the Public Sector (SV Act 2013) delivers our corporate employee and community programme. Running parallel to the corporate programme, we deliver bespoke client-facing SV programmes within each call off contract. Programmes are fully aligned to the requirements of PPN06/20. Using our co-creation process, we undertake both local and national initiatives, jointly developed with clients and partners, that ensure Economic, Social and Environmental benefit to communities.Wellbeing
Fujitsu operates a Dual Delivery approach to Social Value (SV). Our Responsible Business Programme, developed on the principles of the Public Sector (SV Act 2013) delivers our corporate employee and community programme. Running parallel to the corporate programme, we deliver bespoke client-facing SV programmes within each call off contract. Programmes are fully aligned to the requirements of PPN06/20. Using our co-creation process, we undertake both local and national initiatives, jointly developed with clients and partners, that ensure Economic, Social and Environmental benefit to communities.
Pricing
- Price
- £380.00 to £1,970.00 an instance a day
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Please refer to the Service Definition document
- Link to free trial
- Not applicable