Consulting Services
A powerful client based platform that provides the management of time and costs across a wide range of consultancy, including security, operations and strategy.
Examples include penetration testing, compliance certifications, Operational Technology (OT), 24x7 365 SOC Services.
Features
- Centrally managed Cyber & Information Security Services
- Streamline and consolidated all your requirements into one dashboard
- IT Health Checks and OT Health Checks
- Approvals and time writing including cyber security consultancy
- Engaging, Flexible Cyber Associates working with you
- Attack path management, Exposure Management and Continous controls monitoring
- Reduction of Costs by up to 40%
Benefits
- Simplify Cyber & Information Security processes
- Quickly manage requirements via the client management dashboard
- Reduce Client operational costs
- Streamline Operational Expenditure process saving up to 40% in costs
- Driving consistency of reporting in one single place
Pricing
£650 to £650 a unit
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 1 0 8 6 3 6 9 2 0 8 4 4 3 1
Contact
AVORD Limited
AVORD Support team
Telephone: +44 (0) 07736449004
Email: mike.gordon@avord.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
-
Timesheet and Expense writing, approval and billing
Consultancy
Vulnerability and code scanning - Cloud deployment model
-
- Private cloud
- Hybrid cloud
- Service constraints
- No Constraints identified
- System requirements
-
- Approvals and time writing including cyber security consultancy
- Ttack path management, Exposure Management and Continous controls monitoring
- Consolidation of all projects and Services via online scheduler
- Streamline and consolidated all your requirements into one dashboard
- Entrally managed Cyber & Information Security Services
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Primary support hours are 9am-5pm local time Monday through Friday, excluding statutory holidays.
Optional support hours can be discussed outside of the above times - User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- To ensure the accessibility of our web chat service, we have conducted thorough testing with assistive technology users. Our testing process involves engaging individuals who rely on various assistive technologies such as screen readers, voice recognition software, and keyboard navigation.
- Onsite support
- Yes, at extra cost
- Support levels
-
We offer tailored support levels to meet diverse client needs, both remote and onsite:
Basic Support: Included with standard subscriptions, providing essential assistance during regular hours.
Premium Support: offering extended coverage with priority response times.
Enterprise Support: Customised pricing based on 24/7 coverage and dedicated resources for large enterprises.
Our transparent cost structure ensures clients only pay for the support they need. Additionally, clients opting for Premium or Enterprise onsite support can benefit from the option of a dedicated Technical Account Manager (TAM) or Cloud Support Engineer. These experts serve as singular points of contact, ensuring personalized assistance for technical guidance and proactive issue resolution. For more information on pricing and support features, please contact our sales team at [graham,rowe@avord.com. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
As part of the onboarding experience. Full presentation and awareness sessions are provided.
Full support is provided thereafter - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
At the end of the contract, we prioritize a smooth and transparent data extraction process to ensure a seamless transition for our users
Users have the flexibility to choose from a variety of downloadable formats for their data, such as CSV, JSON, or Excel. This versatility ensures compatibility with a wide range of external systems and platforms.
We understand the urgency of data access, especially at the end of a contract. Our system is designed to expedite the data extraction process, ensuring users can retrieve their information promptly. - End-of-contract process
-
At the conclusion of the contract, we aim to facilitate a straightforward and transparent transition for our users.
As the contract approaches its end, users receive notifications, reminding them of the impending expiration. This allows for sufficient time to review the terms and consider renewal options.
For data continuity, users have the opportunity to extract their information using our data export tools . We prioritise data security and assist users in retrieving their data promptly.
The contract price typically covers the core services outlined in the subscription agreement. This includes access to the platform, standard support services, and features specified in the chosen plan.
Certain features, services, or customisations beyond the standard offering may incur additional costs. These could include premium support, extended storage, specialised integrations, or other optional add-ons. Users are provided with transparent pricing details for any extras not included in the base contract.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- No functional differences
- Service interface
- No
- User support accessibility
- WCAG 2.1 AAA
- API
- Yes
- What users can and can't do using the API
-
Users can set up our service seamlessly through the API by following our comprehensive documentation. The API provides endpoints for account creation, configuration, and initial setup. Authentication mechanisms, such as API keys or OAuth tokens, are utilised to ensure secure access during the setup process. Detailed instructions are available to guide users through the necessary steps, facilitating a straightforward integration.
Making Changes through the API:
Our API empowers users to make dynamic changes to their service configurations efficiently. Users can update scope details, modify preferences, and adjust settings through the designated API endpoints. This flexibility allows for real-time customization, enhancing user control and adaptability. - API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
- The architecture is designed to scale horizontally, allowing us to seamlessly adapt to varying workloads and increasing demands. This scalability not only enhances performance but also contributes to overall system resilience.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Dashboard driven
The ability to show KPI's of platform usage,
Financial Costs
Projects
Completion, in progress, not started, cancelled - Reporting types
-
- API access
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
We prioritise user autonomy and data accessibility.
Our platform features a user-friendly interface designed for ease of navigation. Users can access the data export functionality through their account settings or a dedicated export section using API's. - Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Measurement Definition
Software Availability
The periods of time that the Software is available for use by the Client not including scheduled downtime is 24 x 7 x 365, 99.8% average over a month not including scheduled downtime.
Where the Service is unavailable AVORD will aim to restore all services within a period of 48hrs. Note that if the Platform is unavailable, this will not impact the client usage.
Note: The platform is non chargeable to the client at this present time - Approach to resilience
-
Our service is meticulously designed with a focus on resilience to ensure uninterrupted availability and reliability.
Our system is built with redundancy at multiple layers, including hardware, network, and storage. This ensures that in the event of a failure or disruption, there are redundant components ready to seamlessly take over, minimising downtime.
To evenly distribute workloads and optimise resource utilisation, we employ load balancing mechanisms. This not only enhances performance but also contributes to the overall resilience of the system by preventing single points of failure.
Regular and automated data backups are a cornerstone of our resilience strategy. These backups are stored in geographically diverse locations, facilitating quick and secure data recovery in case of any unforeseen incidents.
The architecture is designed to scale horizontally, allowing us to seamlessly adapt to varying workloads and increasing demands. This scalability not only enhances performance but also contributes to overall system resilience. - Outage reporting
- Any alerts raised are communicated via Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
-
We prioritise the security and integrity, including management interfaces and support channels. Our access restriction measures are designed to ensure that only authorised personnel can access sensitive areas.
MFA is enforced throughout the platform for all users, together with access to critical management interfaces and support channels. This adds an extra layer of security by requiring additional verification steps beyond a username and password, such as a temporary code from a mobile app.
Regular access reviews and audits are conducted to ensure that access privileges align with current job responsibilities. Any unnecessary or outdated access permissions are promptly revoked - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Qualitas Veritas
- ISO/IEC 27001 accreditation date
- 17 february 2023
- What the ISO/IEC 27001 doesn’t cover
- Secure military grade Email platform which is separate from the Platform of services.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- ISO9001
- CREST Accreditation
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
At AVORD, we prioritise the highest standards of information security to safeguard the confidentiality, integrity, and availability of user data.
We maintain a set of well-defined information security policies covering areas such as data handling, access controls, encryption, incident response, and more. These policies are regularly reviewed and updated to align with evolving security standards.
Our information security framework operates under the guidance of a dedicated Chief Information Security Officer (CISO) . The CISO reports directly to leadership team, ensuring a clear reporting structure for security matters
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Our robust configuration and change management processes are integral to maintaining the stability, security, and reliability of our services.
Every component of our services is meticulously tracked through its entire lifecycle. This includes hardware, software, network devices, and configurations. A centralized configuration management database (CMDB) is maintained to document and track the state of each component.
Changes to any component or system undergo a formal change request process. Users or teams seeking to implement changes must submit detailed change requests, outlining the scope, purpose, and potential impact of the proposed modifications. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Our vulnerability management process is a proactive and dynamic approach to safeguarding our services.
We employ continuous monitoring tools to actively scan our systems for potential vulnerabilities. Automated scans, coupled with manual assessments, provide a comprehensive view of our security landscape.
Our process includes the integration of threat intelligence feeds from reputable sources. This ensures that we stay informed about emerging threats, zero-day vulnerabilities, and evolving attack vectors.
We prioritise rapid response to identified vulnerabilities. Automated Critical patches are deployed promptly to mitigate potential risks. Our process includes an escalation mechanism to address high-severity vulnerabilities urgently. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Our protective monitoring processes are designed to swiftly identify and respond to potential compromises, ensuring the security and integrity of our services.
We employ continuous monitoring tools and technologies to actively analyse network traffic, system logs, and user activities in real-time. This enables us to detect anomalies, unauthorised access attempts, and potential security incidents promptly.
Behavioral analytics are integrated into our monitoring processes to identify deviations from normal patterns of user behavior. This helps in detecting potential insider threats or compromised accounts.
Our monitoring systems incorporate threat intelligence feeds to enhance the identification of known malicious entities, patterns, or IoCs. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Our incident management processes are structured to efficiently and effectively handle a range of events, ensuring minimal disruption and prompt resolution.
We have pre-defined incident categories and severity levels to quickly assess the nature and impact of each incident. This categorisation guides the response strategy and escalation procedures.
Clear escalation protocols are established to facilitate the swift escalation of incidents to the appropriate teams or individuals based on severity and impact.
Incident Response and Resolution:
Incident Triage
Root Cause Analysis
Regular Incident Reporting
Communication Protocols
Continuous Improvement
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
Our commitment to inclusivity and equal opportunities extends to our access restriction measures in management interfaces and support channels. We understand the importance of providing a secure environment while ensuring fairness and accessibility for all users.
Our RBAC system ensures that access rights are assigned based on job roles, promoting an equal opportunities approach. All team members, regardless of position, receive access privileges tailored to their responsibilities.
Our support channels are not only secure but also designed to be accessible to everyone. Encrypted communication protects the privacy of all users, and secure verification protocols ensure equal treatment for all support requests
Our security awareness training is designed to be inclusive, emphasising the equal importance of access control and the secure handling of information for all employees.
In Summary, our commitment to equal opportunities and inclusivity is ingrained in our access restriction strategy, fostering a secure and accessible environment for all users.
Pricing
- Price
- £650 to £650 a unit
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
-
Access to the platform is free of Charge, with no defined contractual ending.
This allows the client to utilise the full benefits of the platform whilst achieving the most favourable terms for services required,
Ultimatley putting giving back control to clients operational needs, capital expenditure and operational expenditure