Private Mobile Network
Telent’s cloud controlled private 4G/5G mobile network service uses Nokia’s Digital Automation Cloud (DAC) technology. DAC provides enterprises with their own secure private network, offering reliable, ultra-low latency with unlimited bandwidth to support customer applications and services operating at 4G/5G performance, all operating on customer’s shared spectrum (Ofcom supplied).
Features
- Private 4G/5G mobile network, accessible to only your devices
- Ease of management: Multiple sites from single cloud management platform
- Wireless connection (75 to 500m radius)
- Up to 800 connections per access point
- Secure and reliable high-capacity connectivity, 5G and 4G/LTE capabilities
- Plug & play private wireless network solution with analytics capabilities
- Support applying to Ofcom for licensed LTE radio spectrum
- Subscription to our Cloud and an ongoing software subscription
- Suitable and deployable for indoors, outdoors and multi-sector environments
- Applications: Indoor Location-Positioning, Video Analytics, Drone and Push-to- Talk/Video
Benefits
- Flexible, pay-as-you-grow model with a Cloud subscription
- The wireless benefits of Wi-Fi with the security of Ethernet
- Designed for High-speed mobility and with high level capacity
- Protected capacity: the spectrum is for you and only you
- Carrier class level of operability, maximising security and reliability
- Out of the box IoT and Drone integration
- Management Information allows in-depth analysis, e.g. number of active SIMs
- Continuous software improvements to ensure high levels of cyber-security
- Complete control over device’s access to/removal from the network
- Significantly more capacity available compared to a Wi-Fi network
Pricing
£73,029 a unit
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
6 7 1 3 9 2 4 7 1 1 0 5 7 1 9
Contact
telent Technology Services Ltd
Sales
Telephone: 01926693000
Email: salessupport@telent.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- Range of pre-verified hardware configurations have been specified but multiple options may be available subject to testing
- System requirements
-
- Subscriber should have internet connectivity
- Requires shared access spectrum license from Ofcom
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Various options exists so as best to fit each clients' requirement.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Support options are available from a basic to premium level of service. This changes the response time frames and fault resolutions based upon the support package obtained.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We will help you to apply for the Ofcom license. Professional Services such as site surveys and network design shall be supplied. Online and onsite training is available. We assist our clients in the use, administration and operation of our services by providing relevant and comprehensive documentation as well as online and phone support.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Data is held in Nokia Digital Automation Cloud and can be extracted on demand by authorised customer administrators.
- End-of-contract process
- Customers can extract the service data at no charge at the end of the service period
Using the service
- Web browser interface
- No
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- The service interfaces with the cloud management system. The service is accessible via a web browser interface.
- Accessibility standards
- None or don’t know
- Description of accessibility
- N/A
- Accessibility testing
- N/A
- API
- Yes
- What users can and can't do using the API
- Users can: Access all of the service features via the API. For example, authorised administrators: monitor the service, add and remove access points, add and remove subscribers.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- Access policies can be customised by the subscriber. Control delegation. Customise and brand Dashboard.
Scaling
- Independence of resources
- This is a fully scalable cloud- based service
Analytics
- Service usage metrics
- Yes
- Metrics types
- Statistics about traffic, security and performance
- Reporting types
-
- API access
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- No
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- The Customer should request a data export via a CSV file
- Data export formats
- CSV
- Data import formats
- Other
- Other data import formats
- Interfaces with the cloud management system
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- As with our other Services
- Approach to resilience
- This is a cloud-based service.
- Outage reporting
- A public dashboard - an API - email alerts - delegate controller
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
-
Available via user name and password.
Access to the relevant data for the user only. - Access restriction testing frequency
- Less than once a year
- Management access authentication
-
- Username or password
- Other
- Description of management access authentication
- We plan to introduce 2-factor authentication during the course of 2020
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 23/05/2018
- What the ISO/IEC 27001 doesn’t cover
- Available on request
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Our policies are in line with industry standards such as ISO 27001. They are reviewed and updated regularly to ensure they conform with changing technologies, threats and industry best practices.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- We have a comprehensive software configuration and change management process. Changes are assessed for potential security impact.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- We conducts both Internal/ external assessments and Audits to test vulnerability in system and networks wherever feasible. We have Security Vulnerability Monitoring (SVM) Process which refers to the gathering of information on attacks, vulnerabilities and available, correction patches from various information sources, including RSS feeds form the Internet, and OEM partners and customers. The process assesses the relevance of this information to our Network products and issues corresponding security recommendations for further actions within our Networks. The process is continuous and concurrent to the Product Life Cycle.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
We embed security into all our products and services. The following are the key measures in place to ensure securing the information ecosystem. Our Design for Security approach ensures that security is built into products from the start of the development and maintained throughout the lifecycle.
We proactively use audits, checks and threat analysis throughout the lifecycle to identify and fix vulnerabilities.
We receive incident and vulnerability information from many sources to identify emerging vulnerabilities and develop countermeasures.
We carefully manage patches and upgrades and work with customers to ensure these are applied as necessary. - Incident management type
- Undisclosed
- Incident management approach
-
Our Information Security is responsible for developing, implementing, maintaining and communicating our Threat and Incident Response process for information security incidents This process includes the following but is not limited to:
1. When and under what circumstances to invoke the incident response activities, and how to ensure the proper workers are available and notified
2. How and what to communicate inside and outside the Company
3. Incident closure process ensures corrective actions taken and information recorded are consistent and readable
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Equal opportunity
-
Equal opportunity
Telent promotes a culture of diversity and ensures equality of opportunity by building respect, dignity and appreciation, valuing everyone as an individual and creating an environment where individuals can realise their potential. Equality, Diversity and Inclusion (EDI) are core elements of Telent’s brand as reflected in Telent’s behaviour framework and employees have a responsibility to demonstrate behaviours that support these principles.
EDI Policy & Code of Practice
Our Equality Diversity and Inclusion (D&I) Policy sets out Telent’s EDI objectives in respect of employees, suppliers and contractors reflecting current legislation and covering protected characteristics including race, gender, disability, age, faith and sexual orientation.
Our EDI Code of Practice sets out implementation of the policy in all aspects of employment, particularly recruitment, as well as business operations.
Local Opportunities
Telent is committed to adding measurable value to the communities we operate in. We have a strong track record of making positive contributions to improving the economic, social and environmental wellbeing of local communities. We have already set sustainability objectives and targets which closely reflect those of our customers. We will monitor and measure our performance through meaningful KPI’s, regularly reviewing progress against our objectives.
At Telent our work in the communities we share is important to us. To fulfil our social responsibilities, we continue to engage with local communities, provide employment and training opportunities to underrepresented groups, develop our Graduates and Apprenticeship programmes and support the work our STEM Ambassadors carry out with local schools. Telent also supports a single corporate charity and actively supports other individual employee fund-raising activities.
Pricing
- Price
- £73,029 a unit
- Discount for educational organisations
- No
- Free trial available
- No