Private Mobile Network
Telent’s cloud controlled private 4G/5G mobile network service uses Ericsson Private Mobile Network (EP5G) technology. EP5G provides enterprises with their own secure private network, offering reliable, ultra-low latency with unlimited bandwidth to support customer applications and services operating at 4G/5G performance, all operating on customer’s shared spectrum (Ofcom supplied).
Features
- Private 5G mobile network, accessible to only your devices
- Ease of management: Multiple sites from single cloud management platform
- Cellular connection (75 to 500m radius)
- Up to 800 connections per access point
- Secure and reliable high-capacity connectivity, 5G and 4G/LTE capabilities
- Plug & play private wireless network solution with analytics capabilities
- Support applying to Ofcom for licensed LTE radio spectrum
- Subscription to our Cloud and an ongoing software subscription
- Suitable and deployable for indoors, outdoors and multi-sector environments
- Applications: Indoor Location-Positioning, Video Analytics, Drone and Push-to- Talk/Video
Benefits
- Flexible, pay-as-you-grow model with a Cloud subscription
- The wireless benefits of Wi-Fi with the security of Ethernet
- Designed for High-speed mobility and with high level capacity
- Protected capacity: the spectrum is for you and only you
- Carrier class level of operability, maximising security and reliability
- Out of the box IoT and Drone integration
- Management Information allows in-depth analysis, e.g. number of active SIMs
- Continuous software improvements to ensure high levels of cyber-security
- Complete control over device’s access to/removal from the network
- Significantly more capacity available compared to a Wi-Fi network
Pricing
£73,029 a unit
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 1 0 1 9 8 3 1 2 1 5 1 3 1 4
Contact
telent Technology Services Ltd
Sales
Telephone: 01926693000
Email: salessupport@telent.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- Range of pre-verified hardware configurations have been specified but multiple options may be available subject to testing
- System requirements
-
- Subscriber should have internet connectivity
- Requires shared access spectrum license from Ofcom
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Various options exists so as best to fit each clients' requirement.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Support options are available from a basic to premium level of service. This changes the response time frames and fault resolutions based upon the support package obtained.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We make it easy to on board your services through Telent’s ITIL aligned and ISO20000 accredited transition process. We utilise Customer Readiness Checklists and Acceptance Criteria to ensure a smooth on boarding takes place. Telent’s operational support teams are also briefed to enable Knowledge Transfer about your service. Once successfully on boarded, Telent’s operational support and management will be active.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Data is held in Ericsson Private Mobile Network (EP5G) technology and can be extracted on demand by authorised customer administrators.
- End-of-contract process
- Customers can extract the service data at no charge at the end of the service period
Using the service
- Web browser interface
- No
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- The service interfaces with the cloud management system. The service is accessible via a web browser interface.
- Accessibility standards
- None or don’t know
- Description of accessibility
- N/A
- Accessibility testing
- N/A
- API
- Yes
- What users can and can't do using the API
- Users can: Access all of the service features via the API. For example, authorised administrators: monitor the service, add and remove access points, add and remove subscribers.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- Access policies can be customised by the subscriber. Control delegation. Customise and brand Dashboard.
Scaling
- Independence of resources
- This is a fully scalable cloud- based service
Analytics
- Service usage metrics
- Yes
- Metrics types
- Statistics about traffic, security and performance
- Reporting types
-
- API access
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- No
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- The Customer should request a data export via a CSV file
- Data export formats
- CSV
- Data import formats
- Other
- Other data import formats
- Interfaces with the cloud management system
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- As with our other Services
- Approach to resilience
- This is a cloud-based service.
- Outage reporting
- A public dashboard - an API - email alerts - delegate controller
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
-
Available via user name and password.
Access to the relevant data for the user only. - Access restriction testing frequency
- Less than once a year
- Management access authentication
-
- Username or password
- Other
- Description of management access authentication
- We plan to introduce 2-factor authentication during the course of 2020
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 23/05/2018
- What the ISO/IEC 27001 doesn’t cover
- Available on request
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Our policies are in line with industry standards such as ISO 27001. They are reviewed and updated regularly to ensure they conform with changing technologies, threats and industry best practices.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- We have a comprehensive software configuration and change management process. Changes are assessed for potential security impact.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- We conducts both Internal/ external assessments and Audits to test vulnerability in system and networks wherever feasible. We have Security Vulnerability Monitoring (SVM) Process which refers to the gathering of information on attacks, vulnerabilities and available, correction patches from various information sources, including RSS feeds form the Internet, and OEM partners and customers. The process assesses the relevance of this information to our Network products and issues corresponding security recommendations for further actions within our Networks. The process is continuous and concurrent to the Product Life Cycle.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
We embed security into all our products and services. The following are the key measures in place to ensure securing the information ecosystem. Our Design for Security approach ensures that security is built into products from the start of the development and maintained throughout the lifecycle.
We proactively use audits, checks and threat analysis throughout the lifecycle to identify and fix vulnerabilities.
We receive incident and vulnerability information from many sources to identify emerging vulnerabilities and develop countermeasures.
We carefully manage patches and upgrades and work with customers to ensure these are applied as necessary. - Incident management type
- Undisclosed
- Incident management approach
-
Our Information Security is responsible for developing, implementing, maintaining and communicating our Threat and Incident Response process for information security incidents This process includes the following but is not limited to:
1. When and under what circumstances to invoke the incident response activities, and how to ensure the proper workers are available and notified
2. How and what to communicate inside and outside the Company
3. Incident closure process ensures corrective actions taken and information recorded are consistent and readable
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Telent’s vision is to be a leading partner on the road to net zero, providing outstanding service and solution offerings that help deliver the customers climate action ambitions
As part of our commitment, we aim to:
-Make effective preparations for climate change and manage -associated operational and financial risks.
-Ensure our products and services support customers’ adaptations to climate change.
-Meet all environmental compliance obligations, including customer requirements.
-Promote economic security, social betterment, and environmental stewardship with awareness/guidance campaigns
-Minimise waste generation and reduce waste disposal to achieve zero non-hazardous waste to landfill by 2025 through effective, reuse, recovery and recycling activity.
-Minimise energy consumption and achieve a year-on-year reduction in carbon emissions.
-Use resources efficiently through a life cycle approach from design to decommissioning.
-Embed circular economy practices in decision making and service delivery
-Ensure responsible, sustainable, and ethical procurement of all goods and services.
Telent’s credentials are validated through our ISO14001:2015 certification and 2022 Ecovardis Silver Award.
In 2016 Telent set a 2020 objective (extended to 2022 until such time science-based targets (SBTs) were available) to maintain a zero increase in its carbon footprint measures despite corporate growth against a 2015 benchmark of its Scope 1 and 2 emissions. Telent has achieved a 2% overall reduction in Scope 1 and 2 emissions against the 2015 baseline.
In 2021 we committed to developing science-based targets and we are committed to the UK Government target of Net Zero Carbon by 2050. We have therefore defined our short-term SBTs aligned to not more than 1.5oC. The targets which are being validated by the SBTi are:
Scope 1 and Scope 2 – 46% absolute reduction by 2030 from an FY20 baseline
Scope 3 – 55% reduction by 2030 from an FY20 baseline using intensity metric of TCo2e per £ turnover.Tackling economic inequality
At Telent, our strategy is to achieve maximum social value on a whole-life basis. This is by generating benefits not only for Telent and our customers, but also society and the economy, whilst minimising damage to the environment.
Fair Share: Supporting MSMEs
• Telent is committed to inclusive procurement and supplier diversity.
• In FY23, our direct expenditure with Micro, Small, and Medium Enterprises (MSMEs) across the UK exceeded £181 million.
• This spending creates socio-economic benefits for the suppliers’ communities, demonstrating real Social Return on Investment (SROI).
Fair Payment Practices
• To ensure fair business relationships, our customer payment terms always flow-down to our subcontractors. We do not impose onerous terms on our small business suppliers, or unjustifiably withhold payment.
• In FY23, 90% of the MSMEs we collaborated with had 30-day payment terms or less.
• We have also committed to signing the Prompt Payment Code (PPC) to work towards paying 100% of MSME’s in 30 days.
Fair Terms and MSME Participation
• Our contracts prioritise fairness and balance, reflecting individual scopes of work.
• All UK businesses have access to our supply chain.
• Our MSME Action Plan focuses on generating employment, skills development, and business-building opportunities.
• Where possible, we continue to break down packages of work to provide as many local subcontracting opportunities as we can.Equal opportunity
Telent promotes a culture of diversity and ensures equality of opportunity by building respect, dignity and appreciation, valuing everyone as an individual and creating an environment where individuals can realise their potential. Equality, Diversity, and Inclusion (EDI) are core elements of Telent’s brand as reflected in Telent’s behaviour framework and employees have a responsibility to demonstrate behaviours that support these principles.
EDI Policy & Code of Practice
Our Equality Diversity and Inclusion (D&I) Policy sets out Telent’s EDI objectives in respect of employees, suppliers and contractors reflecting current legislation and covering protected characteristics including race, gender, disability, age, faith and sexual orientation.
Our EDI Code of Practice sets out implementation of the policy in all aspects of employment, particularly recruitment, as well as business operations.
Local Opportunities
Telent is committed to adding measurable value to the communities we operate in. We have a strong track record of making positive contributions to improving the economic, social and environmental wellbeing of local communities. We have already set sustainability objectives and targets which closely reflect those of our customers. We will monitor and measure our performance through meaningful KPI’s, regularly reviewing progress against our objectivesWellbeing
Telent is dedicated to the health and wellbeing of its employees, with a commitment to ‘Preventing injury and ill health and continually improving our performance and management of Health, Safety and Welfare’.
This commitment is delivered through HR and QEHS teams, with Line Managers trained to manage wellbeing effectively. The employee journey begins with a pre-employment screening, including a health questionnaire and, if necessary, industry-specific health and medical screening. Support is provided based on individual needs. Telent’s arrangements, documented in an ISO45001:2018 certified management system, fulfil legal obligations and support a Wellbeing Strategy that promotes a caring, healthy, and inclusive work environment.
This includes a proactive programme for physical and emotional wellbeing. A dedicated Occupational Health service provides full support, and a team of over 40 Wellbeing Champions offers guidance to tools and resources from the Employee Assistance Programme.
Our Health and Wellbeing programmes includes, but are not limited to:
• Display Screen Equipment Assessments
• Eye and Hearing Tests
• Role Specific Health Surveillance
• Support during absence and illness
• Access to life counselling services
• Wellbeing Webinars
• Monthly and Quarterly Awareness Campaigns
Examples of previous campaigns include:
• Mental Wellbeing – Loneliness: As part of Pride Month and Loneliness Awareness Week, Telent published an article highlight the importance of talking about loneliness to help remove the stigma around it.
• Adapting Wellbeing In Times of Change Webinar (March 2021): a webinar on why it is important to take the time to focus on physical and mental wellbeing, particularly in times of change.
• Men’s Health and Women’s Health Workshops (May 2021) – while some health matters are universal to both men and women, others are more specific to each. These workshops provided education and insights focused on physical health to inspire improved wellbeing.
Pricing
- Price
- £73,029 a unit
- Discount for educational organisations
- No
- Free trial available
- No