Skip to main content

Help us improve the Digital Marketplace - send your feedback

Phoenix Software Ltd

Palo Alto Prisma Access

Prisma Access provides flexible and consistent security for all applications, branch offices and mobile users. It helps organisations quickly deploy and scale security around the world for rapid time-to-protection. It avoids the complexity and administrative costs that are normally associated with managing security at a large scale.

Features

  • App-ID: Complete network visibility of all applications regardless of port
  • User-ID: Visibility of all users and groups for policy, logging
  • Threat Prevention: Prevention of known threats and malware
  • WildFire: Identification and analysis of unknown malware
  • URL Filtering: Customisable and rapid-responding URL filtering engine
  • DNS Security service applies predictive analytics, machine learning, and automation
  • Address global expansion and mobile workforce security
  • Provides security for direct-to-internet and SD-WAN projects
  • Rapidly deploy consistent security following a recent merger or acquisition
  • Natively integrated with the Palo Alto Networks Security Operating Platform

Benefits

  • Reduce your risk of attack by identifying/blocking zero-day malware
  • Collapse multiple separate security services onto a single platform
  • Cost effective service supporting all environments (small or large)
  • Flexible policy-based access for different user group requirements
  • Proactive approach to detection and prevention of cyber-attacks
  • Detailed malware and threat analysis and reporting
  • Control access and protect data in sanctioned, tolerated SaaS applications
  • Block access to unsanctioned SaaS applications
  • Connect branch offices to GlobalProtect cloud service over standard IPsec
  • Connect mobile users on any supported device, anywhere and anytime

Pricing

£73.77 a unit

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ccs@phoenixs.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

6 8 4 3 7 7 2 6 7 7 1 5 8 6 0

Contact

Phoenix Software Ltd Jonny Scott
Telephone: 01904 562200
Email: ccs@phoenixs.co.uk

Service scope

Service constraints
N/A
System requirements
  • A Panorama instance to configure and manage GPCS
  • For remote networks: An IPSec site-to-site capable device
  • For remote users: A supported operating system
  • Microsoft Windows
  • Apple iOS and MacOS
  • Google Android and Chrome OS
  • Linux: CentOS, RHEL, Ubuntu

User support

Email or online ticketing support
Email or online ticketing
Support response times
24x7x365 Support
Priority 1 (Critical) - < 1 Hour
Priority 2 (High) - 2 Hours
Priority 3 (Medium) - 4 Hours
Priority 4 (Low) - 8 Business Hours
Support Service Level Agreements (SLA) are identical for Monday to Friday and Weekends/Public Holidays.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AAA
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Onsite support
Support levels
All products come with a standard support offering included which entitles the customer to 24x7x365 email, telephone and web support.
A dedicated "Resident Engineer" is available as an additional purchase at $443,000 USD (List Price)
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Palo Alto Networks offers on-site training (EDU-210, EDU-214, EDU-220, EDU-330, and more) and online training (EDU-110, EDU-114, EDU-120, etc.).
In addition, publicly accessible user-documentation which details everything from initial setup through to ongoing maintenance & usage and how to use the API.
Professional Services are also available in the form of "Quickstart" packages to rapidly onboard organisations.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
All customer data is exportable should the contract come to an end.
Cloud data that Palo Alto Networks hold on an organisation/tenant can be exported and deleted by contacting Palo Alto Networks support. If no contact is made data will automatically be purged after 90 days post cessation of the contract(s).
End-of-contract process
At the end of the contract, if the organisation chooses not to renew and continue with the service all data pertaining to the organisation is deleted. If the organisation chooses to renew then the service continues as normal. 90-days prior to the contract expiration date an initial reminder email is sent, followed up by gradually increasing reminders until the date of expiration.

Using the service

Web browser interface
Yes
Using the web interface
The web interface is accessible either by the dedicated management interface or by enabling web management capabilities on a traffic-processing (dataplane) interface.

All features and functionality are primarily delivered through the web interface.
This includes the initial setup, system-configuration, network-configuration, supporting objects configuration, security policy creation, monitoring and reporting.

A role-based access control mechanism is available if desired to restrict certain users/roles to only certain configuration functions or views.
Web interface accessibility standard
WCAG 2.1 AA or EN 301 549
Web interface accessibility testing
The web interface is accessible either by the dedicated management interface or by enabling web management capabilities on a traffic-processing (dataplane) interface.

Access to this management interface can be restricted by IP address if desired.
API
Yes
What users can and can't do using the API
The RESTful API has near full-functionality of what is available through the command-line interface (CLI) or the web-interface. The API can be used to program practically any aspect of the platform and then be used to monitor and report the health and data the platform itself holds. The API can also be used to “Bootstrap” or provision the NGFW to cut-down on deployment time. There are prebuilt examples of using the API to integrate with other third-party services to streamline operations and improve efficiency.
API automation tools
  • Ansible
  • Chef
  • OpenStack
  • SaltStack
  • Terraform
  • Puppet
  • Other
Other API automation tools
  • Python/Go Libraries available
  • Demisto (Cortex XSOAR)
API documentation
Yes
API documentation formats
  • HTML
  • PDF
Command line interface
Yes
Command line interface compatibility
  • Linux or Unix
  • Windows
  • MacOS
Using the command line interface
The command-line interface (CLI) used by the NGFW is accessible via telnet, SSH and serial.
The CLI can be utilised to configure and manage all aspects of the platform.
The CLI has two primary operating modes, an “operator” read-only mode which is used to display information and configuration, the other being a “configurator” read-write mode which can be used to make configuration changes.
The CLI also supports role-based access control (RBAC) allowing for more granular control over what can and cannot be done per user.

Scaling

Scaling available
Yes
Scaling type
Automatic
Independence of resources
Quality of service policies can be leveraged to restrict and control/shape traffic using Layer 3-4, user and application information to ensure that no single entity/user can abuse the available bandwidth and processing power available.
The service constantly checks various health metrics to determine if extra capacity is needed. If needed, the service will automatically add compute resource to support the additional load.
Usage notifications
Yes
Usage reporting
Other
Other usage reporting
N/A

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
  • Other
Other metrics
  • Current active sessions
  • Layer-7 application statistics: bandwidth, sessions, users etc.
  • User statistics: bandwidth, sessions, threats, etc.
  • Known malware and IPS events
  • Benign, Grayware and Malicious files
  • File transfer activity
  • URL Filtering activity
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Palo Alto

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
  • Other
Other data at rest protection approach
Service are supplied from Google and Amazon Data centers (further information to follow)
Google Security statement
https://cloud.google.com/security/overview/
https://cloud.google.com/security/

AWS Security Statement
https://aws.amazon.com/compliance/data-center/controls/
https://d1.awsstatic.com/whitepapers/aws-security-whitepaper
https://aws.amazon.com/compliance/data-center/data-centers/

All logs are stored in the Cortex data lake, user activity is monitored and stored in the Cortex data lake for the agreed retention period.
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
  • Hardware containing data is completely destroyed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • Only data within the service provided can be backed up
  • And restored, no external entity can be backed up/restored.
Backup controls
The service configuration can be backed up via API on demand or via the CLI or web interface.
The central managed platform (Panorama) can be scheduled to export configuration data of managed devices via SCP or FTP to an external storage repository.
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Users schedule backups through a web interface
Backup recovery
  • Users can recover backups themselves, for example through a web interface
  • Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection between networks
Palo Alto Networks uses a proprietary encryption layer for telemetry and update services.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection within supplier network
Palo Alto Networks uses a proprietary encryption layer for telemetry and update services.

Availability and resilience

Guaranteed availability
Palo Alto Networks will use commercially reasonable efforts to make its Prisma Access
service (formerly GlobalProtect Cloud Service, “Service”) available at least 99.99%
during any calendar month. In the unlikely event that Palo Alto Networks does not meet
this service level commitment, Customer will be eligible to receive a service credit.

“Monthly Uptime Availability” is calculated by subtracting from 100% the percentage
of minutes during any calendar month that the Service is not available, excluding
downtime resulting from any planned outage wherein Palo Alto Networks had provided
prior notice or any emergency outage making it impracticable for Palo Alto Networks to
issue advance notice.

If Customer believes it is entitled to a service credit, it must: (a) open a case on the Customer Support Portal (http://support.paloaltonetworks.com) within 24 hours of an outage; and (b) submit a claim on the Claim Dashboard (https://supportcases.paloaltonetworks.com/apex/Communities_Claims) within 5 business days of the outage. When properly submitted, Palo Alto Networks shall use commercially reasonable efforts to adjudicate the claim promptly, no later than 15 days after root cause of the outage has been determined and the case closed.
Approach to resilience
Palo Alto Networks delivers the Prisma Access service utilising public cloud providers Amazon Web Services and Google Compute Platform. Within each of these providers the use of “availability zones” (AZ) to ensure geo and service redundancy and resiliency within a region (e.g. United Kingdom) and at a regional level with traffic being able to be steered to another region/availability zone/location should an incident occur.
Outage reporting
A public dashboard available at status.paloaltonetworks.com and via email alerting

Identity and authentication

User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Users authenticate to the service utilising the ""GlobalProtect"" software package using any other methods described above.
For users at remote branch locations, authentication can be handed off to local means or to the ""GlobalProtect"" software package.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device on a government network (for example PSN)
  • Dedicated device over multiple services or networks
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
  • Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Available on request
ISO/IEC 27001 accreditation date
Available on request
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
Yes
CSA STAR accreditation date
Available on request
CSA STAR certification level
Level 1: CSA STAR Self-Assessment
What the CSA STAR doesn’t cover
N/A
PCI certification
Yes
Who accredited the PCI DSS certification
Available on request
PCI DSS accreditation date
Available on request
What the PCI DSS doesn’t cover
N/A
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Palo Alto Networks has a formal Enterprise Risk Management program, which includes the performance of an annual risk assessment, with periodic updates, as applicable, to identify and assess key risks and their mitigation approaches. The scope of the program encompasses information security risks and product risks. Our security program consists of a risk-based approach that includes administrative, technical and physical safeguards reasonably designed to protect the confidentiality, integrity and availability of customer data. Palo Alto Network's information security program is aligned to ISO 27001/2, and includes key controls from HIPAA, PCI and SOC2.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Both Palo Alto Networks and the end-user organisation are in full control of their relevant and respective change control processes.
Additional details are available upon request.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Applications and software that collect, transmit or display, or process End User Data, Palo Alto Networks conducts an application security assessment review to identify common security vulnerabilities as identified by industry recognized organizations annually or for all major releases, whichever occurs first. The scope of the security assessment will primarily focus on application security, including, but not limited to, a penetration test of the application, as well as a code review.

Palo Alto Networks utilizes a qualified third party to conduct the application security assessments. Palo Alto Networks may conduct the security assessment review directly, following industry standard best practices.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Applications and software that collect, transmit or display, or process End User Data, Palo Alto Networks conducts an application security assessment review to identify common security vulnerabilities as identified by industry recognized organizations annually or for all major releases, whichever occurs first. The scope of the security assessment will primarily focus on application security, including, but not limited to, a penetration test of the application, as well as a code review.

Palo Alto Networks utilizes a qualified third party to conduct the application security assessments. Palo Alto Networks may conduct the security assessment review directly, following industry standard best practices.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
This information is available upon request

Secure development

Approach to secure software development best practice
Supplier-defined process

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Supplier
Virtualisation technologies used
Other
Other virtualisation technology used
Amazon Web Services, Google Compute Platform
How shared infrastructure is kept separate
Each organisations compute instances are unique to that individual organisation with logical separation being achieved at the cloud provider level. This ensures that no virtualised infrastructure is shared organisation to organisation and each respective organisations data and network traffic is isolated from one another.

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
Available on request

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Fighting climate change
Effective stewardship of the environment with activities that deliver additional environmental benefits in the performance of the contract including working towards net zero greenhouse gas emissions.
We can support customers environmental goals by providing annual carbon emissions on contract and reduction plans.

We will run free of charge sustainability infrastructure reviews for customers to understand how they can reduce carbon emissions of their IT services.

We are working towards 2040 Net-Zero GreenHouseGas emissions.
Since 2021 we have been Carbon Neutral with Gold Standard Certified carbon credits - partner Ecologi.
By 2026 we aimed to reduce Scope 1 and 2 emissions by 50% from a 20/21 baseline year and which we have now achieved.
By 2030 we aim to reduce all of our emissions (including Scope 3) by 50% this is from a 22/23 baseline year.

Achievement of 2030 50% reduction targets (based on last FY) would mean a minimum carbon reduction of 142tCO2e per year for the public sector.

We record and monitor our usage/ conversion to carbon emissions monthly and progress is published annually on the website in accordance with PPN06/21 and SECR guidelines. We are ISO14001 certified, and our targets are currently being verified by SBTi.

Overall, the business:
-Generates solar energy (85%) with REGO renewable purchased energy.
-Zero waste to landfill waste management
-Minimises travel emissions by 60%
-Uses water wisely – reduced by 15%

Influence staff, suppliers, customers and communities through the delivery of the contract to support environmental protection and improvement.

We work hard to influence others and change behaviours to help fight climate change.

Workforce:
-Sustainability inductions
-Sustainability training
-Staff campaigns
-Volunteering opportunities
-Family woodland tree planting

Suppliers:
-Supply-chain reviews
-Sustainability training
-Blogs/ media content
-Sustainability training

Customers:
-Sustainability Infrastructure Review
-Hardware Carbon-Assessments
-Circular-Economy support
-Sustainability training

Covid-19 recovery

COVID-19
Help local communities to manage and recover from the impact of COVID-19 with activities in the delivery of the contract which:
Create employment, re-training and other return to work opportunities for those left unemployed by COVID-19, particularly new opportunities in high growth sectors.
- Phoenix Employability Outreach Programme - Unique access to Microsoft Career Essentials programme
Support organisations and businesses to manage and recover from the impacts of COVID-19, including where new ways of working are needed to deliver services.
-Phoenix Small Business Digital Skills Outreach programme – webinars supporting cyber security, accessibility and licensing.
-Phoenix VCSE Digital Skills Outreach Programme – webinars supporting cyber security, accessibility and licensing.
Support the physical and mental health of people affected by COVID-19, including reducing the demand on health and care services.
-Phoenix Digital Skills Outreach Programme – Supporting people to access services services online e.g NHS app and Banking apps.
Examples of our working with London and Quadrant Housing Association to deliver befriending calls for tenants who were lonely and isolated as a result of Covid19.
We have also worked with Liverpool City Council to promote employability courses to those left unemployed by Covid-19 and who are now in employment.
We provided free of charge IT service desk to 15 charities during the pandemic and have worked closely with them to support them with returning to full operation again.

Tackling economic inequality

Tackling economic inequality
Create new businesses, new jobs and new skills with activities that, in the delivery of the contract:
Create opportunities for entrepreneurship and help new, small organisations to grow, supporting economic growth and business creation.
-60% of our supply chain are SME’s
-We are signatories and adhere to the Prompt Payment Code
-Host Dragons Den SME supply chain sessions for new suppliers to showcase their services for our customers.
Create employment opportunities particularly for those who face barriers to employment and/or who are located in deprived areas.
- The Phoenix Employability Outreach Programme provide unique access to Microsoft Career Essentials digital literacy programme, career talks and employability advice.
Create employment and training opportunities, particularly for people in industries with known skills shortages or in high growth sectors.
-Graduate work placements
-Phoenix Employability Outreach Programme - Unique access to Microsoft Career Essentials programme for certifications to skill up for roles in the IT sector.
-We work with our supply-chain to create job roles with shared apprenticeship heads and promotion to permanent employment.
Support educational attainment relevant to the contract, including training schemes that address skills gaps and result in recognised qualifications.
-Apprenticeships whereby we aim for c.10 graduating apprentices and all are moved into permanent employment with Phoenix.
-Skills City Bootcamp where we deliver career talks and provide projects to 19+ year olds seeking to upskill for employment in the technology sector.
Influence staff, suppliers, customers and communities through the delivery of the contract to support employment and skills opportunities in high growth sectors.
-Our programmes are delivered in partnership with our customers, supply chain and workforce, including Career talks, mentoring and IT challenge activities.

Equal opportunity

Equal opportunity
Reduce the disability employment gap with activities that:
Demonstrate action to increase the representation of disabled people in the contract workforce.
-We are certified Disability Confident Employers (level 2).
-We provide Digital Accessibility training for all staff so we can communicate with each other and our customers in an inclusive manner.
-We are exploring the use of the Voluntary Reporting Framework for understanding the disability makeup of the workforce.
Tackling workforce inequalities with activities that demonstrate action to identify and tackle inequality in employment, skills and pay in the contract workforce.
- We focus on ensuring an inclusive and unbiased recruitment strategy, with unconscious-bias training, blind recruitment processes, and reviewing language and placement of advertisements.

-All staff trained receive mandatory EDI training annually.

Various initiatives include
-Signatories of the Race at Work Charter,
-Disability Confident Committed Employer
-Signatories of the Armed Forces Covenant
-Gender-Neutral toilets
-Prayer room
-Milk-pumping room
-Sponsor York Pride
-We have specific policies for Menopause, and LGBTQ+.
-We have established an Accessibility-Centre-of-Excellence to display the latest technology
-We monitor our workforce statistics and report on them:
Gender 65% male /35% female (industry-average 20%)
Ethnicity 5.6% (local-area 3.9%)
Staff turnover 12.3% (industry-average 13.2%)
Using the Voluntary Reporting Framework, we are working on what and how we can report metrics around disabled people in the workforce, including those with hidden disabilities.

We have been recertified as a Great Place to Work™ and UK's Best Workplaces™ for Women.

Wellbeing

Wellbeing
The mental health and well-being (MHWB) of our staff is of the utmost importance to us and our MHWB Policy aims to provide a working environment that promotes and supports the MHWB of all employees.
Activities that demonstrate action to support the health and wellbeing, including physical and mental health, in the contract workforce at Phoenix include:
-We utilise different resources not least those from Mental Health at Work Commitment, NHS Every Mind Matters, and the MIND employer toolkit to improve our employee MHWB programme.
-All our staff heavily discounted private health insurance includes mental wellness. Plan members access a range of health treatments including face to face counselling and cognitive behaviour therapy.
-Phoenix invests in the St Johns Ambulance Mental Health First Aid training course to ensure we have MH first aiders in the business and the skills to address MH in the workplace.
-The new challenges the pandemic has raised, on our employee’s MHWB, has led to the creation of a staff network group who meet monthly, to ensure that all we do and say truly covers all aspects of MHWB.
-All employees are given a monthly wellbeing hour to take for their own personal time and are also supported with monthly tea and toast sessions discussing and normalising MHWB topics.

We influence staff, suppliers, customers and communities through the delivery of the contract to support health and wellbeing, including physical and mental health.
-We provide Digital Accessibility training for all staff so we can communicate with each other and our customers in an inclusive manner.
-We have established an Accessibility-Centre-of-Excellence to display the latest technology to the workforce, supply chain and our customers
-We deliver digital accessibility training to customers
-We are sponsors of the Neurodiversity Awards

Pricing

Price
£73.77 a unit
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ccs@phoenixs.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.