Skip to main content

Help us improve the Digital Marketplace - send your feedback

Xalient Holdings Limited

SD-WAN Professional and Managed Services

Xalient's SD-WAN may operate over any network provider's infrastructure and support various vendor offerings, including Fortinet, HPE Aruba Networking (Silverpeak), and Meraki. Customers can use it to their fullest potential to utilize the bandwidth that is available at sites and to add low-cost Internet and cellular connections to private connections.

Features

  • Choice of market leading SD-WAN vendor solutions,
  • Fortinet, HPE Aruba EdgeConnect (Silverpeak) and Meraki.
  • Bespoke design for optimised solution
  • Wide range of CPE options to cater for all site-types
  • Feature rich SD-WAN solution
  • Highly customisable
  • Zero-Touch Provisioning for quick deployment
  • Per application tuning and traffic steering ensures application efficiency
  • Facilitates local Internet breakout, providing the most optimal path
  • Detailed reports on traffic use and SD-WAN functionality

Benefits

  • Highly performant SD-WAN solutions, maximising ROI
  • Optimised solution catering for all sites
  • Highly resilient solution with multiple CPE and connectivity options
  • Flexibility and scalability to solutions built in to ensure futureproofing
  • Close partnership with vendors
  • Flexible customer engagement allows customers co-management of solution
  • Leverage connectivity to its best possible use
  • Increased visibility of application use and performance

Pricing

£0 a unit

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at bidmanagement@xalient.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

6 5 8 8 9 3 4 8 1 6 7 9 9 2 3

Contact

Xalient Holdings Limited Sherry Vaswani
Telephone: +44 (0)207 096 3100
Email: bidmanagement@xalient.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Additional services such as Security and WAN Optimisation can be added
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
No know constraints, any customer specific limitation will be discovered during the design phase
System requirements
None

User support

Email or online ticketing support
Email or online ticketing
Support response times
Email generated tickets will fall into one of the four call statuses and be provided a response within the times outlined below:
• P1 - Critical: 30 Minutes
• P2 - Major: 4 Hours
• P3 - Low: 12 Hours
• P4 - Minor: 24 Hours
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Fully managed service. Support is commercially scoped pending a full discovery workshop phase Cloud support
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Xalient will provide professional services to assist the customer with the service activation. This will encompass, but is not limited to, project management and service setup. Xalient will setup the mitigation service as part of the service activation. User documentation will be provided during the deployment of the service and training if required can be provided at an additional cost.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
We explore this at a contract closure meeting.
End-of-contract process
Any existing hosted services are transitioned to the customer. All existing support contracts are terminated.

Using the service

Web browser interface
No
Application to install
No
Designed for use on mobile devices
No
Service interface
No
User support accessibility
None or don’t know
API
No
Customisation available
No

Scaling

Independence of resources
Xalient will work with the customer to understand the criticality of the service. Where required Xaalient can build a private service dedicated to the customer. This would not follow our standard pricing model and would be POA. Due to the restrictions of G-Cloud a private version is available through alternative frameworks.

Analytics

Service usage metrics
Yes
Metrics types
Service metrics are developed on a per customer basis
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with CSA CCM v3.0
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
CSV
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Standard SLA's are as follows:
P1 - Critical: 30 Minutes,
P2 - Major: 4 Hours,
P3 - Low: 12 Hours,
P4 - Minor: 24 Hours,
Service credits are assigned on a customer by customer basis
Approach to resilience
Each solution is designed and built as per the customers requirements. Resilience such as HA appliances can be built into any design and would be scoped with the customer.
Outage reporting
Outages are displayed within the orchestration platform with automated email alerts.

Identity and authentication

User authentication needed
Yes
User authentication
Dedicated link (for example VPN)
Access restrictions in management interfaces and support channels
Management access is limited to users within the customers network and restricted per login and further with orchestrated access via individual accounts. Support access is federated via vendor support and live chat.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users receive audit information on a regular basis
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users receive audit information on a regular basis
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
31/12/2017
What the ISO/IEC 27001 doesn’t cover
All serviced offered are covered
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
ISMS ITIL ISO27001

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
ITSM keeps CMDB. All changes logged and tracked through ITSM. All change control are set against customer SLA's, OLA's and underpinning contracts.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Threats are managed via proactive alerting with vendors. Internal and external penetration tests. Patches are assessed through dev and test stages then deployed as quickly as possible.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
This is handled by our proactive monitoring software which is tuned to identify threats based on specific customer requirements. Incident response is SLA dependant.
Incident management type
Supplier-defined controls
Incident management approach
Incidents are categorized by priority (P1,2 ,3 etc.) Common events are defined as part of a discovery phase and kept within the ITSM tool. Incidents are reported via the service desk. Reports are provided by the ITSM.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

We recognise our long-term responsibility to benefit our environment, society, and our key stakeholders – employees, clients, and the communities in which we operate.
We take our responsibilities towards sustainability very seriously, encouraging all staff members to adopt sustainable practices. Our aim is to engage our staff and stakeholders in identifying and delivering environmental objectives which will eliminate, or at least minimise as far as possible any impact we have on the environment.
To date, we have offset 100 tonnes of Co2, partnering with Make It Wild who have planted trees on our behalf. We plan to offset a further 100 tonnes again this year, as we work towards achieving a carbon-neutral status.
Alongside this, we apply a ‘circular economy’ approach to the re-use of IT equipment, scalability of solutions, flexibility of services and reduction of e-waste as well as operating a paperless office environment.
Furthermore, we are helping our customers migrate their existing power-hungry, on-premises workloads to the cloud, providing scalable, secure solutions that enable them to achieve ESG compliance.
Travel
We encourage our employees to take public transport where possible and have strategically picked our office locations to ensure they are easily accessible via public transport for commuting.
Where possible, we minimise the amount of business travel undertaken, promoting the use of online meetings where appropriate to reduce emissions produced by business travel.
Waste Management
We are aware that paper waste forms most of the office waste, and we are committed to recycling all white office paper, including photocopy paper, computer paper, letterheads, and laser prints. All unused carboard is also recycled.
We endeavour to upgrade our equipment wherever possible. Where this is not possible, IT and electrical equipment is either donated or will be given to the Local Authority under the ‘IT reuse and recycling scheme’.

Pricing

Price
£0 a unit
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at bidmanagement@xalient.com. Tell them what format you need. It will help if you say what assistive technology you use.