SD-WAN Professional and Managed Services
Xalient's SD-WAN may operate over any network provider's infrastructure and support various vendor offerings, including Fortinet, HPE Aruba Networking (Silverpeak), and Meraki. Customers can use it to their fullest potential to utilize the bandwidth that is available at sites and to add low-cost Internet and cellular connections to private connections.
Features
- Choice of market leading SD-WAN vendor solutions,
- Fortinet, HPE Aruba EdgeConnect (Silverpeak) and Meraki.
- Bespoke design for optimised solution
- Wide range of CPE options to cater for all site-types
- Feature rich SD-WAN solution
- Highly customisable
- Zero-Touch Provisioning for quick deployment
- Per application tuning and traffic steering ensures application efficiency
- Facilitates local Internet breakout, providing the most optimal path
- Detailed reports on traffic use and SD-WAN functionality
Benefits
- Highly performant SD-WAN solutions, maximising ROI
- Optimised solution catering for all sites
- Highly resilient solution with multiple CPE and connectivity options
- Flexibility and scalability to solutions built in to ensure futureproofing
- Close partnership with vendors
- Flexible customer engagement allows customers co-management of solution
- Leverage connectivity to its best possible use
- Increased visibility of application use and performance
Pricing
£0 a unit
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 5 8 8 9 3 4 8 1 6 7 9 9 2 3
Contact
Xalient Holdings Limited
Sherry Vaswani
Telephone: +44 (0)207 096 3100
Email: bidmanagement@xalient.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Additional services such as Security and WAN Optimisation can be added
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- No know constraints, any customer specific limitation will be discovered during the design phase
- System requirements
- None
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Email generated tickets will fall into one of the four call statuses and be provided a response within the times outlined below:
• P1 - Critical: 30 Minutes
• P2 - Major: 4 Hours
• P3 - Low: 12 Hours
• P4 - Minor: 24 Hours - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Fully managed service. Support is commercially scoped pending a full discovery workshop phase Cloud support
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Xalient will provide professional services to assist the customer with the service activation. This will encompass, but is not limited to, project management and service setup. Xalient will setup the mitigation service as part of the service activation. User documentation will be provided during the deployment of the service and training if required can be provided at an additional cost.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- We explore this at a contract closure meeting.
- End-of-contract process
- Any existing hosted services are transitioned to the customer. All existing support contracts are terminated.
Using the service
- Web browser interface
- No
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- Xalient will work with the customer to understand the criticality of the service. Where required Xaalient can build a private service dedicated to the customer. This would not follow our standard pricing model and would be POA. Due to the restrictions of G-Cloud a private version is available through alternative frameworks.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Service metrics are developed on a per customer basis
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- CSV
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
Standard SLA's are as follows:
P1 - Critical: 30 Minutes,
P2 - Major: 4 Hours,
P3 - Low: 12 Hours,
P4 - Minor: 24 Hours,
Service credits are assigned on a customer by customer basis - Approach to resilience
- Each solution is designed and built as per the customers requirements. Resilience such as HA appliances can be built into any design and would be scoped with the customer.
- Outage reporting
- Outages are displayed within the orchestration platform with automated email alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Dedicated link (for example VPN)
- Access restrictions in management interfaces and support channels
- Management access is limited to users within the customers network and restricted per login and further with orchestrated access via individual accounts. Support access is federated via vendor support and live chat.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users receive audit information on a regular basis
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users receive audit information on a regular basis
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 31/12/2017
- What the ISO/IEC 27001 doesn’t cover
- All serviced offered are covered
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- ISMS ITIL ISO27001
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- ITSM keeps CMDB. All changes logged and tracked through ITSM. All change control are set against customer SLA's, OLA's and underpinning contracts.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Threats are managed via proactive alerting with vendors. Internal and external penetration tests. Patches are assessed through dev and test stages then deployed as quickly as possible.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- This is handled by our proactive monitoring software which is tuned to identify threats based on specific customer requirements. Incident response is SLA dependant.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Incidents are categorized by priority (P1,2 ,3 etc.) Common events are defined as part of a discovery phase and kept within the ITSM tool. Incidents are reported via the service desk. Reports are provided by the ITSM.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
We recognise our long-term responsibility to benefit our environment, society, and our key stakeholders – employees, clients, and the communities in which we operate.
We take our responsibilities towards sustainability very seriously, encouraging all staff members to adopt sustainable practices. Our aim is to engage our staff and stakeholders in identifying and delivering environmental objectives which will eliminate, or at least minimise as far as possible any impact we have on the environment.
To date, we have offset 100 tonnes of Co2, partnering with Make It Wild who have planted trees on our behalf. We plan to offset a further 100 tonnes again this year, as we work towards achieving a carbon-neutral status.
Alongside this, we apply a ‘circular economy’ approach to the re-use of IT equipment, scalability of solutions, flexibility of services and reduction of e-waste as well as operating a paperless office environment.
Furthermore, we are helping our customers migrate their existing power-hungry, on-premises workloads to the cloud, providing scalable, secure solutions that enable them to achieve ESG compliance.
Travel
We encourage our employees to take public transport where possible and have strategically picked our office locations to ensure they are easily accessible via public transport for commuting.
Where possible, we minimise the amount of business travel undertaken, promoting the use of online meetings where appropriate to reduce emissions produced by business travel.
Waste Management
We are aware that paper waste forms most of the office waste, and we are committed to recycling all white office paper, including photocopy paper, computer paper, letterheads, and laser prints. All unused carboard is also recycled.
We endeavour to upgrade our equipment wherever possible. Where this is not possible, IT and electrical equipment is either donated or will be given to the Local Authority under the ‘IT reuse and recycling scheme’.
Pricing
- Price
- £0 a unit
- Discount for educational organisations
- No
- Free trial available
- No