Skip to main content

Help us improve the Digital Marketplace - send your feedback

FullProxy Ltd

Managed Services

Our Managed Service Desk offers expert support, proactive penetration testing, round-the-clock system monitoring, cyber security maintenance, and seamless technology implementation and change management. We're here to help you maintain optimal performance and security.

Features

  • Service desk for expert guidance and support with any issues.
  • Monitoring for your critical systems and applications
  • Keep your cyber security defences capable of withstanding emerging threats
  • Integrate upgraded and new technologies

Benefits

  • 24/7 expert support for prompt issue resolution
  • Proactive vulnerability detection and mitigation strategies
  • Continuous monitoring for optimal system availability.
  • Up-to-date cyber security defences against emerging threats.
  • Seamless technology integration and change management.

Pricing

£3,000 an instance a month

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at g-cloud@fullproxy.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

6 8 6 3 0 3 4 2 8 3 4 0 3 2 1

Contact

FullProxy Ltd Chris Templeton / Ewan Ferguson
Telephone: 0141 291 5500
Email: g-cloud@fullproxy.com

Planning

Planning service
Yes
How the planning service works
- Initial consultation: Work with the buyer to understand their IT environment, buyer objectives and security requirements.

- Risk assessment: Perform an analysis of the potential security risks associated with cloud deployments, considering factors such as data sensitivity, compliance and the threat landscape.

- Architecture design: Work with the buyer to develop a tailored security architecture that integrates with their chosen cloud hosting or software solution, incorporating encryption, access controls and anti-intrusion.

- Security policies: Assist in building security policies to govern access, use of systems, incident response and compliance management within the cloud environment or software.

- Ongoing training and support: Provide comprehensive training and support to the buyer's staff.
Planning service works with specific services
No

Training

Training service provided
Yes
How the training service works
- Security awareness training:

+ Educate staff on the importance of cybersecurity best practices, including password management, MFA, phishing awareness, and social engineering prevention.
Training is tied to specific services
No

Setup and migration

Setup or migration service available
Yes
How the setup or migration service works
- Initial assessment: Conduct an assessment of the buyer's current infrastructure, applications and data to determine the scope and requirements of the cloud migration.

- Develop strategy: Collaborate with the buyer to develop a migration strategy including timelines, resource allocation and risk mitigation plans.

- Cloud service selection: Assist the buyer in selecting the most appropriate cloud services or hosting for their needs.

- Security: Implement robust security solutions such as encryption, access controls and anti-intrusion systems to protect data and applications.

- Implementation/ migration: Provide professional services on-site or remotely to perform the migration work along with the IT team of the buyer if appropriate.

- Testing and validation: Conduct thorough testing to ensure functionality, performance and security in the cloud environment.

- Provide ongoing training, maintenance and support.
Setup or migration service is for specific cloud services
No

Quality assurance and performance testing

Quality assurance and performance testing service
Yes
How the quality assurance and performance testing works
- Initial assessment: Conduct an assessment of the buyer's current infrastructure, applications and data to determine the scope and requirements of the cloud migration.

- Develop strategy: Collaborate with the buyer to develop a strategy that allows us to perform testing and quality assurance with the least amount of disruption possible.

- Carry out testing: Perform load testing to assess system's behavior under unpredicted peak loads; stress testing to assess system's reliability and stability under extreme conditions; functional testing to ensure the system or software is performing as expected in normal conditions; security testing to identify and mitigate any potential vulnerabilities in the system

- Monitoring and analysis: Continuous monitoring of system performance before, during and after testing phase to ensure consistency and to be alerted to any unusual behavior.

- Ongoing training and support

Security testing

Security services
Yes
Security services type
  • Security strategy
  • Security risk management
  • Security design
  • Cyber security consultancy
  • Security incident management
  • Security audit services

Ongoing support

Ongoing support service
No

Service scope

Service constraints
No service constraints

User support

Email or online ticketing support
Email or online ticketing
Support response times
4 hour SLA between Mon-Fri 8am-5pm

24/7/365 support is available at an extra cost
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Support levels
Mon-Fri 8-5 helpdesk support
27/4 emergency helpdesk support (extra cost)
Senior consultant can be dispatched for strategy, design and maintenance
24/7 monitoring and alerting can be included (extra cost)

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Fortinet, f5, Palo Alto, AppViewX, Infoblox, Crowdstrike, Zscaler

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
QMS International Ltd
ISO/IEC 27001 accreditation date
30/11/2022
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

FullProxy's position on Social Values can be provided upon request

Covid-19 recovery

FullProxy's position on Social Values can be provided upon request

Tackling economic inequality

FullProxy's position on Social Values can be provided upon request

Equal opportunity

FullProxy's position on Social Values can be provided upon request

Wellbeing

FullProxy's position on Social Values can be provided upon request

Pricing

Price
£3,000 an instance a month
Discount for educational organisations
Yes

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at g-cloud@fullproxy.com. Tell them what format you need. It will help if you say what assistive technology you use.