telent Technology Services Ltd

Private Mobile Network

Telent’s cloud controlled private 4G/5G mobile network service uses Nokia’s Digital Automation Cloud (DAC) technology. DAC provides enterprises with their own secure private network, offering reliable, ultra-low latency with unlimited bandwidth to support customer applications and services operating at 4G/5G performance, all operating on customer’s shared spectrum (Ofcom supplied).

Features

  • Private 4G/5G mobile network, accessible to only your devices
  • Ease of management: Multiple sites from single cloud management platform
  • Wireless connection (75 to 500m radius)
  • Up to 800 connections per access point
  • Secure and reliable high-capacity connectivity, 5G and 4G/LTE capabilities
  • Plug & play private wireless network solution with analytics capabilities
  • Support applying to Ofcom for licensed LTE radio spectrum
  • Subscription to our Cloud and an ongoing software subscription
  • Suitable and deployable for indoors, outdoors and multi-sector environments
  • Applications: Indoor Location-Positioning, Video Analytics, Drone and Push-to- Talk/Video

Benefits

  • Flexible, pay-as-you-grow model with a Cloud subscription
  • The wireless benefits of Wi-Fi with the security of Ethernet
  • Designed for High-speed mobility and with high level capacity
  • Protected capacity: the spectrum is for you and only you
  • Carrier class level of operability, maximising security and reliability
  • Out of the box IoT and Drone integration
  • Management Information allows in-depth analysis, e.g. number of active SIMs
  • Continuous software improvements to ensure high levels of cyber-security
  • Complete control over device’s access to/removal from the network
  • Significantly more capacity available compared to a Wi-Fi network

Pricing

£73,029 a unit

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at salessupport@telent.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

6 7 1 3 9 2 4 7 1 1 0 5 7 1 9

Contact

telent Technology Services Ltd Sales
Telephone: 01926693000
Email: salessupport@telent.com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
Range of pre-verified hardware configurations have been specified but multiple options may be available subject to testing
System requirements
  • Subscriber should have internet connectivity
  • Requires shared access spectrum license from Ofcom

User support

Email or online ticketing support
Email or online ticketing
Support response times
Various options exists so as best to fit each clients' requirement.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Support options are available from a basic to premium level of service. This changes the response time frames and fault resolutions based upon the support package obtained.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We will help you to apply for the Ofcom license. Professional Services such as site surveys and network design shall be supplied. Online and onsite training is available. We assist our clients in the use, administration and operation of our services by providing relevant and comprehensive documentation as well as online and phone support.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Data is held in Nokia Digital Automation Cloud and can be extracted on demand by authorised customer administrators.
End-of-contract process
Customers can extract the service data at no charge at the end of the service period

Using the service

Web browser interface
No
Application to install
No
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
The service interfaces with the cloud management system. The service is accessible via a web browser interface.
Accessibility standards
None or don’t know
Description of accessibility
N/A
Accessibility testing
N/A
API
Yes
What users can and can't do using the API
Users can: Access all of the service features via the API. For example, authorised administrators: monitor the service, add and remove access points, add and remove subscribers.
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • PDF
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
Access policies can be customised by the subscriber. Control delegation. Customise and brand Dashboard.

Scaling

Independence of resources
This is a fully scalable cloud- based service

Analytics

Service usage metrics
Yes
Metrics types
Statistics about traffic, security and performance
Reporting types
  • API access
  • Real-time dashboards

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
No
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
The Customer should request a data export via a CSV file
Data export formats
CSV
Data import formats
Other
Other data import formats
Interfaces with the cloud management system

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
As with our other Services
Approach to resilience
This is a cloud-based service.
Outage reporting
A public dashboard - an API - email alerts - delegate controller

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Available via user name and password.
Access to the relevant data for the user only.
Access restriction testing frequency
Less than once a year
Management access authentication
  • Username or password
  • Other
Description of management access authentication
We plan to introduce 2-factor authentication during the course of 2020

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
23/05/2018
What the ISO/IEC 27001 doesn’t cover
Available on request
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Our policies are in line with industry standards such as ISO 27001. They are reviewed and updated regularly to ensure they conform with changing technologies, threats and industry best practices.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We have a comprehensive software configuration and change management process. Changes are assessed for potential security impact.
Vulnerability management type
Undisclosed
Vulnerability management approach
We conducts both Internal/ external assessments and Audits to test vulnerability in system and networks wherever feasible. We have Security Vulnerability Monitoring (SVM) Process which refers to the gathering of information on attacks, vulnerabilities and available, correction patches from various information sources, including RSS feeds form the Internet, and OEM partners and customers. The process assesses the relevance of this information to our Network products and issues corresponding security recommendations for further actions within our Networks. The process is continuous and concurrent to the Product Life Cycle.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We embed security into all our products and services. The following are the key measures in place to ensure securing the information ecosystem. Our Design for Security approach ensures that security is built into products from the start of the development and maintained throughout the lifecycle.
We proactively use audits, checks and threat analysis throughout the lifecycle to identify and fix vulnerabilities.
We receive incident and vulnerability information from many sources to identify emerging vulnerabilities and develop countermeasures.
We carefully manage patches and upgrades and work with customers to ensure these are applied as necessary.
Incident management type
Undisclosed
Incident management approach
Our Information Security is responsible for developing, implementing, maintaining and communicating our Threat and Incident Response process for information security incidents This process includes the following but is not limited to:
1. When and under what circumstances to invoke the incident response activities, and how to ensure the proper workers are available and notified
2. How and what to communicate inside and outside the Company
3. Incident closure process ensures corrective actions taken and information recorded are consistent and readable

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Equal opportunity

Equal opportunity

Telent promotes a culture of diversity and ensures equality of opportunity by building respect, dignity and appreciation, valuing everyone as an individual and creating an environment where individuals can realise their potential. Equality, Diversity and Inclusion (EDI) are core elements of Telent’s brand as reflected in Telent’s behaviour framework and employees have a responsibility to demonstrate behaviours that support these principles.

EDI Policy & Code of Practice

Our Equality Diversity and Inclusion (D&I) Policy sets out Telent’s EDI objectives in respect of employees, suppliers and contractors reflecting current legislation and covering protected characteristics including race, gender, disability, age, faith and sexual orientation.
Our EDI Code of Practice sets out implementation of the policy in all aspects of employment, particularly recruitment, as well as business operations.

Local Opportunities

Telent is committed to adding measurable value to the communities we operate in. We have a strong track record of making positive contributions to improving the economic, social and environmental wellbeing of local communities. We have already set sustainability objectives and targets which closely reflect those of our customers. We will monitor and measure our performance through meaningful KPI’s, regularly reviewing progress against our objectives.
At Telent our work in the communities we share is important to us. To fulfil our social responsibilities, we continue to engage with local communities, provide employment and training opportunities to underrepresented groups, develop our Graduates and Apprenticeship programmes and support the work our STEM Ambassadors carry out with local schools. Telent also supports a single corporate charity and actively supports other individual employee fund-raising activities.

Pricing

Price
£73,029 a unit
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at salessupport@telent.com. Tell them what format you need. It will help if you say what assistive technology you use.