Skip to main content

Help us improve the Digital Marketplace - send your feedback

AVORD Limited

Consulting Services

A powerful client based platform that provides the management of time and costs across a wide range of consultancy, including security, operations and strategy.
Examples include penetration testing, compliance certifications, Operational Technology (OT), 24x7 365 SOC Services.

Features

  • Centrally managed Cyber & Information Security Services
  • Streamline and consolidated all your requirements into one dashboard
  • IT Health Checks and OT Health Checks
  • Approvals and time writing including cyber security consultancy
  • Engaging, Flexible Cyber Associates working with you
  • Attack path management, Exposure Management and Continous controls monitoring
  • Reduction of Costs by up to 40%

Benefits

  • Simplify Cyber & Information Security processes
  • Quickly manage requirements via the client management dashboard
  • Reduce Client operational costs
  • Streamline Operational Expenditure process saving up to 40% in costs
  • Driving consistency of reporting in one single place

Pricing

£650 to £650 a unit

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at mike.gordon@avord.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

7 1 0 8 6 3 6 9 2 0 8 4 4 3 1

Contact

AVORD Limited AVORD Support team
Telephone: +44 (0) 07736449004
Email: mike.gordon@avord.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Timesheet and Expense writing, approval and billing
Consultancy
Vulnerability and code scanning
Cloud deployment model
  • Private cloud
  • Hybrid cloud
Service constraints
No Constraints identified
System requirements
  • Approvals and time writing including cyber security consultancy
  • Ttack path management, Exposure Management and Continous controls monitoring
  • Consolidation of all projects and Services via online scheduler
  • Streamline and consolidated all your requirements into one dashboard
  • Entrally managed Cyber & Information Security Services

User support

Email or online ticketing support
Email or online ticketing
Support response times
Primary support hours are 9am-5pm local time Monday through Friday, excluding statutory holidays.
Optional support hours can be discussed outside of the above times
User can manage status and priority of support tickets
No
Phone support
No
Web chat support
Yes, at an extra cost
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AAA
Web chat accessibility testing
To ensure the accessibility of our web chat service, we have conducted thorough testing with assistive technology users. Our testing process involves engaging individuals who rely on various assistive technologies such as screen readers, voice recognition software, and keyboard navigation.
Onsite support
Yes, at extra cost
Support levels
We offer tailored support levels to meet diverse client needs, both remote and onsite:

Basic Support: Included with standard subscriptions, providing essential assistance during regular hours.

Premium Support: offering extended coverage with priority response times.

Enterprise Support: Customised pricing based on 24/7 coverage and dedicated resources for large enterprises.

Our transparent cost structure ensures clients only pay for the support they need. Additionally, clients opting for Premium or Enterprise onsite support can benefit from the option of a dedicated Technical Account Manager (TAM) or Cloud Support Engineer. These experts serve as singular points of contact, ensuring personalized assistance for technical guidance and proactive issue resolution. For more information on pricing and support features, please contact our sales team at [graham,rowe@avord.com.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
As part of the onboarding experience. Full presentation and awareness sessions are provided.
Full support is provided thereafter
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
At the end of the contract, we prioritize a smooth and transparent data extraction process to ensure a seamless transition for our users
Users have the flexibility to choose from a variety of downloadable formats for their data, such as CSV, JSON, or Excel. This versatility ensures compatibility with a wide range of external systems and platforms.

We understand the urgency of data access, especially at the end of a contract. Our system is designed to expedite the data extraction process, ensuring users can retrieve their information promptly.
End-of-contract process
At the conclusion of the contract, we aim to facilitate a straightforward and transparent transition for our users.

As the contract approaches its end, users receive notifications, reminding them of the impending expiration. This allows for sufficient time to review the terms and consider renewal options.

For data continuity, users have the opportunity to extract their information using our data export tools . We prioritise data security and assist users in retrieving their data promptly.

The contract price typically covers the core services outlined in the subscription agreement. This includes access to the platform, standard support services, and features specified in the chosen plan.

Certain features, services, or customisations beyond the standard offering may incur additional costs. These could include premium support, extended storage, specialised integrations, or other optional add-ons. Users are provided with transparent pricing details for any extras not included in the base contract.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
No functional differences
Service interface
No
User support accessibility
WCAG 2.1 AAA
API
Yes
What users can and can't do using the API
Users can set up our service seamlessly through the API by following our comprehensive documentation. The API provides endpoints for account creation, configuration, and initial setup. Authentication mechanisms, such as API keys or OAuth tokens, are utilised to ensure secure access during the setup process. Detailed instructions are available to guide users through the necessary steps, facilitating a straightforward integration.

Making Changes through the API:
Our API empowers users to make dynamic changes to their service configurations efficiently. Users can update scope details, modify preferences, and adjust settings through the designated API endpoints. This flexibility allows for real-time customization, enhancing user control and adaptability.
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • PDF
API sandbox or test environment
Yes
Customisation available
No

Scaling

Independence of resources
The architecture is designed to scale horizontally, allowing us to seamlessly adapt to varying workloads and increasing demands. This scalability not only enhances performance but also contributes to overall system resilience.

Analytics

Service usage metrics
Yes
Metrics types
Dashboard driven
The ability to show KPI's of platform usage,
Financial Costs
Projects
Completion, in progress, not started, cancelled
Reporting types
  • API access
  • Real-time dashboards

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
We prioritise user autonomy and data accessibility.
Our platform features a user-friendly interface designed for ease of navigation. Users can access the data export functionality through their account settings or a dedicated export section using API's.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Measurement Definition
Software Availability
The periods of time that the Software is available for use by the Client not including scheduled downtime is 24 x 7 x 365, 99.8% average over a month not including scheduled downtime.
Where the Service is unavailable AVORD will aim to restore all services within a period of 48hrs. Note that if the Platform is unavailable, this will not impact the client usage.
Note: The platform is non chargeable to the client at this present time
Approach to resilience
Our service is meticulously designed with a focus on resilience to ensure uninterrupted availability and reliability.

Our system is built with redundancy at multiple layers, including hardware, network, and storage. This ensures that in the event of a failure or disruption, there are redundant components ready to seamlessly take over, minimising downtime.

To evenly distribute workloads and optimise resource utilisation, we employ load balancing mechanisms. This not only enhances performance but also contributes to the overall resilience of the system by preventing single points of failure.

Regular and automated data backups are a cornerstone of our resilience strategy. These backups are stored in geographically diverse locations, facilitating quick and secure data recovery in case of any unforeseen incidents.

The architecture is designed to scale horizontally, allowing us to seamlessly adapt to varying workloads and increasing demands. This scalability not only enhances performance but also contributes to overall system resilience.
Outage reporting
Any alerts raised are communicated via Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
We prioritise the security and integrity, including management interfaces and support channels. Our access restriction measures are designed to ensure that only authorised personnel can access sensitive areas.

MFA is enforced throughout the platform for all users, together with access to critical management interfaces and support channels. This adds an extra layer of security by requiring additional verification steps beyond a username and password, such as a temporary code from a mobile app.

Regular access reviews and audits are conducted to ensure that access privileges align with current job responsibilities. Any unnecessary or outdated access permissions are promptly revoked
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Qualitas Veritas
ISO/IEC 27001 accreditation date
17 february 2023
What the ISO/IEC 27001 doesn’t cover
Secure military grade Email platform which is separate from the Platform of services.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
  • ISO9001
  • CREST Accreditation

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
At AVORD, we prioritise the highest standards of information security to safeguard the confidentiality, integrity, and availability of user data.

We maintain a set of well-defined information security policies covering areas such as data handling, access controls, encryption, incident response, and more. These policies are regularly reviewed and updated to align with evolving security standards.

Our information security framework operates under the guidance of a dedicated Chief Information Security Officer (CISO) . The CISO reports directly to leadership team, ensuring a clear reporting structure for security matters

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Our robust configuration and change management processes are integral to maintaining the stability, security, and reliability of our services.

Every component of our services is meticulously tracked through its entire lifecycle. This includes hardware, software, network devices, and configurations. A centralized configuration management database (CMDB) is maintained to document and track the state of each component.

Changes to any component or system undergo a formal change request process. Users or teams seeking to implement changes must submit detailed change requests, outlining the scope, purpose, and potential impact of the proposed modifications.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Our vulnerability management process is a proactive and dynamic approach to safeguarding our services.

We employ continuous monitoring tools to actively scan our systems for potential vulnerabilities. Automated scans, coupled with manual assessments, provide a comprehensive view of our security landscape.

Our process includes the integration of threat intelligence feeds from reputable sources. This ensures that we stay informed about emerging threats, zero-day vulnerabilities, and evolving attack vectors.

We prioritise rapid response to identified vulnerabilities. Automated Critical patches are deployed promptly to mitigate potential risks. Our process includes an escalation mechanism to address high-severity vulnerabilities urgently.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Our protective monitoring processes are designed to swiftly identify and respond to potential compromises, ensuring the security and integrity of our services.

We employ continuous monitoring tools and technologies to actively analyse network traffic, system logs, and user activities in real-time. This enables us to detect anomalies, unauthorised access attempts, and potential security incidents promptly.

Behavioral analytics are integrated into our monitoring processes to identify deviations from normal patterns of user behavior. This helps in detecting potential insider threats or compromised accounts.

Our monitoring systems incorporate threat intelligence feeds to enhance the identification of known malicious entities, patterns, or IoCs.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Our incident management processes are structured to efficiently and effectively handle a range of events, ensuring minimal disruption and prompt resolution.

We have pre-defined incident categories and severity levels to quickly assess the nature and impact of each incident. This categorisation guides the response strategy and escalation procedures.

Clear escalation protocols are established to facilitate the swift escalation of incidents to the appropriate teams or individuals based on severity and impact.

Incident Response and Resolution:

Incident Triage
Root Cause Analysis
Regular Incident Reporting
Communication Protocols
Continuous Improvement

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Equal opportunity

Equal opportunity

Our commitment to inclusivity and equal opportunities extends to our access restriction measures in management interfaces and support channels. We understand the importance of providing a secure environment while ensuring fairness and accessibility for all users.

Our RBAC system ensures that access rights are assigned based on job roles, promoting an equal opportunities approach. All team members, regardless of position, receive access privileges tailored to their responsibilities.

Our support channels are not only secure but also designed to be accessible to everyone. Encrypted communication protects the privacy of all users, and secure verification protocols ensure equal treatment for all support requests

Our security awareness training is designed to be inclusive, emphasising the equal importance of access control and the secure handling of information for all employees.

In Summary, our commitment to equal opportunities and inclusivity is ingrained in our access restriction strategy, fostering a secure and accessible environment for all users.

Pricing

Price
£650 to £650 a unit
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
Access to the platform is free of Charge, with no defined contractual ending.
This allows the client to utilise the full benefits of the platform whilst achieving the most favourable terms for services required,

Ultimatley putting giving back control to clients operational needs, capital expenditure and operational expenditure

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at mike.gordon@avord.com. Tell them what format you need. It will help if you say what assistive technology you use.