Cross-domain Applications
Collaborating confidently on your most valuable information across organisational, technical and geographical boundaries gives your organisation a strategic advantage. For 15 years Surevine has specialised in software solutions for seamless collaboration across trust boundaries, wherever you are, and no matter how sensitive your information.
Features
- Supports a wide range of business processes
- Configurable to conform with your enterprise security requirements
- Enables managed information sharing with your partners and supply chain
- Integrates with audit and SOC monitoring
- Cross-domain instant-messenger and calendar synchronisation
- Cross-domain web form submission and validation
- Cross-domain software development tools and processes
- Cross-domain data query and retrieval
- Cross-domain Large Language Model (LLM) management
- Conforms to best-practice Cross-Domain NCSC-approved design patterns
Benefits
- Works with diverse hardware and software gateways/diodes (vendor agnostic)
- Secure your journey to the cloud
- A key enabler for implementing Zero-Trust
- Gives you tools for seamless data-centric working
- Enables working at mixed security classifications
- Get your work done, wherever you are
- Intuitive user experience: your users won’t need extensive training
- Ongoing support available at competitive rates
- Used by government clients with stringent security requirements
- Enables secure and effective remote and hybrid working
Pricing
£50,000 an instance
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 5 4 2 0 2 1 1 1 6 8 7 9 7 6
Contact
Surevine
Commercial team
Telephone: 0845 4681066
Email: tenders@surevine.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- We can integrate with existing commercial data diodes and other gateway solutions.
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- The service design will be based on customer requirements.
- System requirements
- Domain isolation
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- SLA's are negotiable. During engagement, support is provided Monday to Friday during standard business hours. Standard support response times: 1 business day
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Your license comes with Surevine Bronze support built in. This is a 9am to 5pm UK Business Days, service fulfilled by email, ticketing system, or phone. With each license you will receive a named technical account manager. Other enhanced support services can be purchased via our related GCloud services.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Depending on the security requirements of your deployment, users can enrol through self-service. We will provide training for the customer's administration teams in how to configure the system, manage users, and how to manage the community. The platform includes an integrated onboarding guide called "Getting Started" which guides new users through the primary functions of the platform. Platform administrators will have access to our documentation knowledge base and part of the support function is to help administrators get the best out of the platform.
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- Users will be able to export their data at the end of the contract upon request. Multiple options are available and we will work directly with the customer to ensure their data export needs are met.
- End-of-contract process
- At the end of the contract there are three options: Erasure of all the Buyer's Data, or Export of Buyer's data with as a data-base export in a limited set of standard formats, or Assistance in data migration to other formats and system as a consultancy service at our standard SFIA rates.
Using the service
- Web browser interface
- No
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- Yes
- What users can and can't do using the API
- Send and receive data across the gateway.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- ODF
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Filter and policy rules can be customised.
Scaling
- Independence of resources
- Dedicated hardware.
Analytics
- Service usage metrics
- Yes
- Metrics types
- API metrics available.
- Reporting types
-
- API access
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- No data is stored other than configuration which can be exported on request.
- Data export formats
- Other
- Other data export formats
- Configuration files
- Data import formats
- Other
- Other data import formats
- Configuration files
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Bonded fibre optic connections
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- Availability depends on the service plan you purchase. The entry level availability is 99.5%. Our payment of Service Credits shall be your sole remedy in full and final settlement of Our liability in respect of any failure to meet or delay in meeting Service Levels.
- Approach to resilience
- We have a range of resilience options including real-time data mirroring at a second site, hot fail over and DDOS protection. These are available as individually priced options. Resilience is built in. Further information is available on request.
- Outage reporting
- We report availability performance at our service reviews with the buyer. In the event of an outage, our monitoring systems will alert us and we notify the named point of contact in our Customer. Optional alerts, including enterprise options, can be integrated depending on customer need.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- We use role based access control which is tied to user accounts.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- LRQA Limited
- ISO/IEC 27001 accreditation date
- 30/01/2022
- What the ISO/IEC 27001 doesn’t cover
- Certification applies to the whole of Surevine's business activities.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- The Information Security Management System is owned by the Information Security Manager who report to the CIO. Security reports are provided to every board by the CIO, with twice yearly management review by CEO and CIO. External audit is completed by the ISO 27001:2013 auditor.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Software versioning is managed via Git. The release management of software is managed via ticketing system. Security assessment is done by in-house specialist.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Threat and vulnerability information is monitored from a variety of industry standard sources. Automated vulnerability scanning in software pipelines. Vulnerabilities are managed via same ticketing as software development and release.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- The protective monitoring is typically on a per client basis. The default stance is to deploy into Amazon AWS with CloudWatch. Other configurations are deployed to meet the client's requirement.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Incident management follows an adaptive framework which can be triggered from a variety of alert sources, enables management of evolving situations and a controlled, risk-based response. Escalation to customer points of contact are severity-based. Incidents are typically summarised to clients via the SLA report.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
We describe Surevine's way of working as "sustainable software development". All of our people have always worked as a distributed team since we founded the company in 2008. This means no impact on their environment as a result of commuting and no offices to heat, light and clean. Surevine build and deliver collaboration solutions and use those ourselves and with our suppliers and customers to minimize the need for unnecessary travel. We actively encourage the use of walking, cycling and the use of public transport in preference to cars where people do need to to travel to the occasional meeting. We offer a company cycle purchase scheme but do not have a company car scheme as a benefit. Surevine offset the carbon of any flights which need to be taken for business. We have initiatives in the business to ensure that the computing resources we use are minimized and the approach we take to designing the systems is designed to bear that in mind when delivering solutions for our clients. We look to select suppliers whose own approach aligns with ours to climate change.Covid-19 recovery
Surevine's fully distributed way of working meant that our team were in a stronger position than many others to be prepared to be able to continue to work during COVID lockdowns. In fact, we were consulted by our customers (including large public sector organisations) on how we managed our way of working. We changed our policies in advance of national policies changing and completely closed down our physical offices in March 2022. We cancelled all travel (national and international) for work reasons. People were able to socially distance and shield with no change to their working patterns. We then monitored and managed cautious changes to that in response to pandemic. We supported local communities through the donation of equipment to support households who did not have the same levels of digital connectivity and did what we could to continue to contribute to our Industry through online meetups, conference etc. We actively incentivised immunisation. Our way of working meant that our business continuity was relatively unaffected, and as the restrictions have been lifted have meant that people are able to safely continue working with almost no impact. There has been no return to the office or hybrid working for most people (unless they specifically requested and needed it) as most people have always worked from home.Tackling economic inequality
Surevine have always operated as a fully-distributed company. This has allowed us to employ people from across the UK, including some regions that are more economically disadvantaged. We pay for our employees to have the best possible internet connectivity to their homes, and ensure that all of their expenses incurred in setting up their working environment are covered. For those whose home working environment is not adequate, we fund their set-up and use of the a nearby office space so as to ensure that there are no commuting costs to consider. Our approach to flexible working means that those who have caring responsibilities are to the greatest extent possible able to undertake those whilst continuing to fully contribute to their work commitments. We encourage and support our team members to take a visible role in the community, acting as role models for young people in their community. Members of leadership team take active roles working in schools in economically disadvantaged wards, encouraging young people through Cadets or Duke of Edinburgh schemes, and coding clubs. We donated significant amounts of IT equipment during the pandemic to support homes without adequate resources.Equal opportunity
Surevine are committed to increasing the diversity of our people. We periodically survey our people against a number of criteria to measure our progress. Our distributed business model means we are able to actively recruit employees from economically challenged parts of the UK. Our involvement in mentoring programmes means that we are able to act as role models in those communities. Surevine are committed to increasing the number of women in our workforce and in the industry. One third of our board of directors are women and over a third of our workforce overall. We supported the Cyber Girls First initiative since its inception, and are signed up to the Tech Talent Charter, committing to more representation from women in our industry. We have benefitted from the neuro-diversity of our employees over time, and our mental health support initiatives are geared towards inclusivity. Due to the distributed way of working, we have likewise been able to support those with disabilities that limit their mobility.Wellbeing
Surevine's approach to wellbeing starts with a genuinely flexible approach to working. There are no core hours Company-wide, teams agree locally what works for them, taking into consideration the needs of each individual. This flexibility means that people wanting to take more active roles in - for example - shared parental responsibilities, or having other caring duties are routinely able to do so as a matter of course. Indeed, we have a number of people who have reduced working weeks by default. Across the company we try and promote health and wellbeing, with a whole company "step challenge" having being well established (those without step trackers have them provided by us.) Surevine are distributed by default, so people don't have a stressful commute to get to work. Many Surevine employees do, though, have standing desks to encourage them to spend less time sitting and everyone nominates an alternate co-working space locally which they can use as often as they need to get some human contact. In order to maintain a sense of team spirit, we have quarterly all-hands residential meetings and at these we often focus on wellbeing. We have company 5k runs at each of those (with Surevine team running kit!) We have a particular focus on mental health, including training in mental health first aid and company-wide awareness events. Surevine's cycle purchase scheme has proved popular, and for those who do occasionally need to travel to client or team meetings are incentivised to do so by walking, cycling or using public transport. Breakfast is on us for those that do!
Pricing
- Price
- £50,000 an instance
- Discount for educational organisations
- No
- Free trial available
- No