Barrier Networks Centri for Cisco Security Service Edge (SSE)
Managed Security Service Edge from Barrier helps organizations provide secure connectivity for hybrid workforces, protecting corporate resources from cyberattacks and data-loss. Cisco Powered Service.
Features
- Zero Trust Network Architecture: secure, remote access to private apps.
 - Secure Web Gateway defending users and resources from malware.
 - Cloud Access Security Broker discovers/controls SaaS cloud apps.
 - Firewall As a Service examines non-web traffic.
 
Benefits
- Minimise risk with advanced cybersecurity protection.
 - Streamline the end-user experience with a common approach.
 - Simplify IT operations via a single console, single client.
 - Preserve business continuity and avoid reputational/financial impact of a breach.
 - Securely protect all private applications.
 - Obtain visibility into cloud application usage.
 
Pricing
£3 a unit a month
- Education pricing available
 - Free trial available
 
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 9 9 1 9 2 9 1 7 6 1 2 0 3 8
Contact
    Barrier Networks
    
    Iain Slater
    
    
    Telephone: 0141 356 0101
    
    
    Email: info@barriernetworks.com
    
  
Service scope
- Software add-on or extension
 - Yes, but can also be used as a standalone service
 - What software services is the service an extension to
 - Network Security and Monitoring, Web and Email Security
 - Cloud deployment model
 - 
      
- Public cloud
 - Private cloud
 - Hybrid cloud
 
 - Service constraints
 - Some restrictions on mobile devices and OS, available on request
 - System requirements
 - Available on request
 
User support
- Email or online ticketing support
 - Email or online ticketing
 - Support response times
 - See service definition
 - User can manage status and priority of support tickets
 - Yes
 - Online ticketing support accessibility
 - None or don’t know
 - Phone support
 - Yes
 - Phone support availability
 - 24 hours, 7 days a week
 - Web chat support
 - No
 - Onsite support
 - Yes, at extra cost
 - Support levels
 - See service definition
 - Support available to third parties
 - Yes
 
Onboarding and offboarding
- Getting started
 - See service description
 - Service documentation
 - Yes
 - Documentation formats
 - End-of-contract data extraction
 - See service definition
 - End-of-contract process
 - See service definition
 
Using the service
- Web browser interface
 - Yes
 - Supported browsers
 - 
      
- Internet Explorer 11
 - Microsoft Edge
 - Firefox
 - Chrome
 
 - Application to install
 - Yes
 - Compatible operating systems
 - 
      
- Android
 - IOS
 - Linux or Unix
 - MacOS
 - Windows
 
 - Designed for use on mobile devices
 - No
 - Service interface
 - No
 - User support accessibility
 - None or don’t know
 - API
 - No
 - Customisation available
 - Yes
 - Description of customisation
 - A variety of customisation is available and captured during on-boarding.
 
Scaling
- Independence of resources
 - Dependent on deployment option
 
Analytics
- Service usage metrics
 - Yes
 - Metrics types
 - User count, incidents, and other metrics are defined at on-boarding
 - Reporting types
 - 
      
- Regular reports
 - Reports on request
 
 
Resellers
- Supplier type
 - Reseller providing extra features and support
 - Organisation whose services are being resold
 - Cisco
 
Staff security
- Staff security clearance
 - Other security clearance
 - Government security clearance
 - Up to Developed Vetting (DV)
 
Asset protection
- Knowledge of data storage and processing locations
 - Yes
 - Data storage and processing locations
 - 
      
- United Kingdom
 - European Economic Area (EEA)
 
 - User control over data storage and processing locations
 - Yes
 - Datacentre security standards
 - Supplier-defined controls
 - Penetration testing frequency
 - At least once a year
 - Penetration testing approach
 - Another external penetration testing organisation
 - Protecting data at rest
 - 
      
- Encryption of all physical media
 - Scale, obfuscating techniques, or data storage sharding
 
 - Data sanitisation process
 - Yes
 - Data sanitisation type
 - Deleted data can’t be directly accessed
 - Equipment disposal approach
 - A third-party destruction service
 
Data importing and exporting
- Data export approach
 - Contact Barrier Networks
 - Data export formats
 - CSV
 - Data import formats
 - Other
 - Other data import formats
 - Agreed at On-boarding
 
Data-in-transit protection
- Data protection between buyer and supplier networks
 - 
      
- TLS (version 1.2 or above)
 - IPsec or TLS VPN gateway
 
 - Data protection within supplier network
 - 
      
- TLS (version 1.2 or above)
 - IPsec or TLS VPN gateway
 
 
Availability and resilience
- Guaranteed availability
 - Dependent on deployment
 - Approach to resilience
 - Available on request
 - Outage reporting
 - Emails, dependent on technology selected
 
Identity and authentication
- User authentication needed
 - Yes
 - User authentication
 - 
      
- 2-factor authentication
 - Username or password
 
 - Access restrictions in management interfaces and support channels
 - Management is achieved via changed requests from verified individuals
 - Access restriction testing frequency
 - At least once a year
 - Management access authentication
 - 
      
- 2-factor authentication
 - Username or password
 
 
Audit information for users
- Access to user activity audit information
 - Users have access to real-time audit information
 - How long user audit data is stored for
 - At least 12 months
 - Access to supplier activity audit information
 - Users have access to real-time audit information
 - How long supplier audit data is stored for
 - At least 12 months
 - How long system logs are stored for
 - At least 12 months
 
Standards and certifications
- ISO/IEC 27001 certification
 - Yes
 - Who accredited the ISO/IEC 27001
 - 360 Certification Ltd
 - ISO/IEC 27001 accreditation date
 - 28th June 2019
 - What the ISO/IEC 27001 doesn’t cover
 - N/A
 - ISO 28000:2007 certification
 - No
 - CSA STAR certification
 - No
 - PCI certification
 - No
 - Cyber essentials
 - Yes
 - Cyber essentials plus
 - Yes
 - Other security certifications
 - No
 
Security governance
- Named board-level person responsible for service security
 - Yes
 - Security governance certified
 - Yes
 - Security governance standards
 - ISO/IEC 27001
 - Information security policies and processes
 - ISO27001 & NIST
 
Operational security
- Configuration and change management standard
 - Supplier-defined controls
 - Configuration and change management approach
 - Available on request
 - Vulnerability management type
 - Supplier-defined controls
 - Vulnerability management approach
 - Available on request
 - Protective monitoring type
 - Supplier-defined controls
 - Protective monitoring approach
 - Available on request
 - Incident management type
 - Supplier-defined controls
 - Incident management approach
 - Available on request
 
Secure development
- Approach to secure software development best practice
 - Supplier-defined process
 
Public sector networks
- Connection to public sector networks
 - No
 
Social Value
- Social Value
 - 
      
Social Value
- Equal opportunity
 - Wellbeing
 
Equal opportunity
• To create an environment in which individual differences and the contributions of all our staff are recognised and valued.
• Every employee is entitled to a working environment that promotes dignity and respect to all. No form of intimidation, bullying or harassment will be tolerated.
• Training, development and progression opportunities are available to all staff.
• To promote equality in the workplace which we believe is good management practice and makes sound business sense.
• We will review all our employment practices and procedures to ensure fairness.
• Breaches of our Equality Policy will be regarded as misconduct and could lead to disciplinary proceedings.
• This policy is fully supported by Senior Management.
• The policy will be monitored and reviewed regularly.Wellbeing
• We promote an open, supportive company culture where employees look out for one another and feel comfortable discussing any difficulties. Mental health is valued equally to physical health.
• Employees have access to confidential counselling, therapy, and other mental health resources through our employee assistance program.
• We encourage taking time off when needed for mental health days in addition to sick days. Employees are trusted to manage their time off responsibly.
• Training is provided to managers on recognizing signs of burnout,
work overload, and other mental health concerns. Managers work to
proactively address issues and reduce employee stress.
• Employee workloads and schedules are designed to be reasonable
and sustainable.
• Wellness initiatives like meditation breaks, stress management
workshops, mindfulness programs, and social events are offered
throughout the year. 
Pricing
- Price
 - £3 a unit a month
 - Discount for educational organisations
 - Yes
 - Free trial available
 - Yes
 - Description of free trial
 - Please contact Barrier Networks, all components are availble for a 14 day trial.