Heimdal Security
At Heimdal Security, we specialize in automation and consolidation, offering automated smart solutions that deliver immediate ROI by tackling key challenges such as alert fatigue, resource allocation, Automated D&R and compliance reporting.
Features
- 2-way DNS Filter for Endpoints & Network
- Automated secure patching for 3rd party applications
- Script deployment, License Management and IPXE/OS Deployment)
- MDE Based AV with Advanced detection, Telemetry Analytics, Firewall Management
- Kernel-based encryption protection, 0-trust metholodgy - last line of defense
- Secure elevation management for user-elevation with audit logs built-in
- Control both execution and elevation for applications
- Control internal and external access to your estate
- MX Record based email filter with advanced detection mechanisms
- Remote desktop tool secure connections
Benefits
- Proactively prevent communicate with malicious infrastructure
- No manual interaction and zero disruptions.
- Gain complete control with realtime deployments and cloud based infrastructure
- Keep your Microsoft defender AV, with additional security
- Last line of defence block unauthorized encryptions
- UI, can run automated in the background
- Allow applications rights without the user being admin
- Easy to manage and cost efficient
- Intuitive platform and easy to manage
- Very easy and cost-efficient tool. Enables support anywhere to anyone.
Pricing
£2.51 a unit
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 2 6 8 0 5 4 9 9 8 0 7 4 2 5
Contact
Softcat Limited
Charles Harrison
Telephone: 01628 403403
Email: psitq@softcat.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- DNS security, Patch and Asset Management, Inifinity Management, Next-Gen AV, Ransomware Encryption Protection, Privilege Elevation & Delegation Management, Application Control, Privileged Account and Session Management, Email security, Remote Desktop
- Cloud deployment model
- Public cloud
- Service constraints
- No
- System requirements
- Various requirements for Windows, macOS and Linux (Ubuntu)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We have a 20 minute response time
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
-
The PS service shall generally perform to the levels as set forth below:
a. Heimdal’s software management and protection infrastructure must have a guaranteed up time of minimum 99,9% at all times.
b. Heimdal backend and management portal services must have a guaranteed up-time of
minimum 99,5%. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Included in any license procured customers will have the following services included: 1. Admin Training 2. End-user Training Material 3. On-site Deployment & Configuration Services 4. Enterprise Support 24/7 - 365
- Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
-
- Online Training videos
- In person trainings
- End-of-contract data extraction
- By Request to Heimdal
- End-of-contract process
- Customers need to advice 3 months in advance to subscription end that they will not be renewing. If they do not the license automatically gets renewed. Heimdal Customer Service Manager will be in contact with customer and notify them upon renewal or termination, whatever the customer chooses to do
Using the service
- Web browser interface
- No
- Application to install
- Yes
- Compatible operating systems
-
- Android
- Linux or Unix
- MacOS
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- On Android we only support DNS protection, Anti-Virus and locating the device.
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Heimdal empowers Security & IT professionals with a resilient XDR - a Unified Security Platform that guards against next-gen threats. Our award-winning line-up of 10+ fully integrated security solutions span the entire IT estate, allowing organizations to be proactive and compliant - remote or onsite. Heimdal products & managed services contain a solution for every problem, be it at the endpoint or network, cloud, identity & access management, emails, applications, and beyond.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- N/A
- API
- Yes
- What users can and can't do using the API
- External JSON REST
- API documentation
- Yes
- API documentation formats
-
- Other
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- The Heimdal services follow a modular approach, so you can tailer the services according to your current needs and extend them in the future without any problems by just activating them in the dashboard.
Scaling
- Independence of resources
- Cloud work load runs in clusters and will expand per default to more servers in case data consumption exceeds service level. Automatic and no noise
Analytics
- Service usage metrics
- Yes
- Metrics types
- NEED the services
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller (no extras)
- Organisation whose services are being resold
- Heimdal
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Other
- Other data at rest protection approach
-
• Data at rest is encrypted with double layer of encryption: 1st layer provided and managed by Azure/ Amazon and 2nd layer of encryption is fully managed by Heimdal in a completely autonomous and secure environment
• Both layers of encryption are Federal Information Processing Standards (FIPS) 140-2 compliant and for both encryption keys we are using Advanced Encryption Standard AES-256 (256-bit key length) - Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Heimdal offers two options to export data, 1) directly from the dahboard within the module as direct CSV download or 2) via a free of charge usable JSON REST API
- Data export formats
-
- CSV
- Other
- Other data export formats
- JSON REST API
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Heimdal’s software management and protection infrastructure must have a guaranteed up time of minimum 99,9% at all times.
Heimdal backend and management portal services must have a guaranteed up-time of minimum 99,5%. The uptime calculated as follows (rounded to
the nearest one-tenth of one percent): Availability % = 100% x (Total Minutes in the Month – Total
Minutes Unavailable in the Month) / Total Minutes in the Month. The PS Services level will not be
deemed unavailable for any downtime or outages relating to: (i) a Customer Outage Event, (ii)
equipment, applications, interfaces, integrations, or systems not owned by Heimdal, or service not
offered by Heimdal or (iii) a Force Majeure Event. “Customer Outage Event” means a period of time
in which the Services are not available due to acts, omissions or requests of Customer, including
without limitation (a) configuration changes in, or failures of, the Customer end of the network
connection, (b) work performed by Heimdal at Customer’s request, (c) Customer’s unavailability
or untimely response to incidents that require its participation for source identification and/or
resolution or (d) Customer’s failure to provide Heimdal with any requested physical or remote
access to any Customer facilities, equipment or personnel emergency - Approach to resilience
- Please see here: https://learn.microsoft.com/en-us/azure/architecture/checklist/resiliency-per-service and https://aws.amazon.com/resilience/.
- Outage reporting
- E-mail alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Other
- Other user authentication
-
Agent-to-Dashboard
The agent uses mutual (two-way authentication)
both sides of the communications channel verify each other's identity based on certificates. - Access restrictions in management interfaces and support channels
- We provide ACL and RBAC
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Other
- Description of management access authentication
-
Agent-to-Dashboard
The agent uses mutal (two-way authetication)
both sides of the communications channel verify each other's identity based on certificates.
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- ISAE 3000
- SOC 2 Type I and Type II
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- ISAE 3000 SOC 2 Type I and Type II
- Information security policies and processes
-
Heimdal Security has established an Information Security Program that provides documented management
direction and support for implementing information security within the Heimdal Security environment. The
design and implementation of applicable controls are defined based on the architecture of Heimdal Security’s
environments.
The objective of the Information Security Program is to maintain the confidentiality, integrity, and availability of information while complying with applicable legislative, regulatory and contractual requirements.
The Information Security Program consists of the following components:
1. Policy and procedures
2. Risk assessment
3. Training and awareness
4. Security implementation
5. Review and compliance
6. Management reporting
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
The change management process has been established to plan, schedule, approve, apply, distribute and track
changes to the production environment through designated responsibilities with the objective of minimising
risk and customer impact. Software and configuration changes within Heimdal Security are managed through a formal change and release management procedure and tracked using a
centralised ticketing system and development tools. Changes are requested, approved, tracked and implemented throughout
the release life cycle which includes product and engineering planning, release management, deployment
and post-deployment support phases. Change requests are documented, assessed for their risks, and evaluated/approved for acceptance by designated change manager. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Threat and vulnerability management
The IT administrator carries out frequent internal and external scans to identify vulnerabilities and assess
the effectiveness of the patch management process. Identified threats and vulnerabilities are assessed and
mitigated according to their criticality. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
At our organization, we adhere to a comprehensive set of protective monitoring processes to safeguard our systems and data. These processes include:
Continuous Monitoring, Vulnerability Management, Access Control and Privileged Account Management, Incident Response Plan, Employee Training and Awareness,
These processes are continually reviewed and updated to ensure that we remain aligned with industry best practices and regulatory requirements. Additionally, we conduct periodic audits and assessments to validate the effectiveness of our protective monitoring measures. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Heimdal Security has implemented an incident management framework that includes defined processes,
roles, communications, responsibilities and procedures for detection, escalation and response to incidents
and security incidents internally and to customers.
Responsible teams use the established incident classification, escalation and notification process for assessing an incident’s criticality and severity and escalate accordingly to the appropriate groups for timely
action.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Softcat are dedicated to reducing our environmental impact and actively promoting sustainability. Our commitment to sustainability is a core aspect of our business strategy, driving us to innovate and lead in the creation of a more sustainable future for our company and the communities we serve. This commitment is embedded in our policies, operating procedures, and training programs.
We are proud to be the first FTSE 250 company to be awarded 5-star status in relation to the United Nations Sustainable Development Goals.
We aim to achieve a Carbon Net-Zero Value Circle by 2040 by prioritising renewable energy, reducing natural resource use, minimising waste, and safeguarding biodiversity in compliance with environmental legislation.
At Softcat, we have taken significant steps towards securing renewable energy across our organisation, reducing our scope 1 & 2 emissions. We had the target of using 100% Renewable Energy across all our locations by 2024. We successfully delivered against this target ~2 years early.
In May 2023 we took delivery of 15 electric vehicles, replacing all existing fossil-fuelled company cars used by employees for business means. The implementation of the EV pool fleet will see a saving of over 80 tons of CO2e per year. A huge impact on our Net Zero targets.Tackling economic inequality
As a value-add reseller, Softcat outsources the products, services, and solutions through our extensive network of partners, to best suit the needs of our broad client base. We always consider and promote SMEs and local providers where appropriate, particularly for the products and services we offer via the G Cloud framework.
We remain dedicated to improving employability and educational awareness across schools, colleges, and universities to help break down the barriers to joining technology organisations.
We work collaboratively with many schools that are close in proximity to our offices, to ensure we are actively supporting the community as well as schools from lower socio-economic backgrounds.
We visit the schools to talk about the IT sector and the roles in our organisation, as well as promoting work-experience opportunities during the summer. In particular, we actively encourage students from diverse backgrounds to engage in work experience to appreciate the roles available in our sector.
For ambitious school and college leavers, a Softcat Apprenticeship is a great first step into the world of work, with 94% of our apprentices offered a permanent position at Softcat post apprenticeships, which goes to show the amazing opportunity available with us.
We were ranked 1st in IT & Consultancy, and 10th overall in by RateMyApprenticeship.com - Best 100 Apprenticeship Employers 2023-2024 list.
Softcat now also offer 12 month paid internships to University students looking to complete a year in industry as part of their undergraduate studies.Equal opportunity
Our approach to diversity and inclusion is introduced first during our induction training, as part of our Softcat values, outlining responsibility to uphold our principles. This message is reinforced by our process and policies, networks, Allyship Training and Inclusion Awareness campaigns.
Softcat supports diversity and inclusion through various networks including:
- Supporting Women in Business (SWIB)
- The Ethnic and Cultural Network
- The Pride Network
- The Family Network
- The Empowering Disability and Neurodiversity Network (EDN)
- The Faith at Work Network
- Armed Forces & Veterans Network
These networks aim to create a supportive and inclusive work environment for all employees, regardless of gender, ethnicity, sexual orientation, disability, or family commitments.
Our allyship programme, Stronger Together, is a mixture of event and workshop-based training available to all staff. Programme topics include, bias, power, privilege, and being a greater ally.
Inclusion Awareness campaigns include race, disability, sexual orientation, gender, faith, and caring responsibilities. These sessions highlight and celebrate minority groups, through panel sessions, Q&A sessions and training, providing an opportunity to discuss and understand ways to be more inclusive.
Our efforts to improve diversity and inclusion have been incredibly successful. Since 2020, the number of female employees below management level has increased to 35%, and the number of ethnic minority employees rose to 17%.Wellbeing
At Softcat, all employees are provided with access to our multidimensional wellbeing programme which includes flexible work arrangements, free nutritious breakfast, mental health support, employee benefits scheme, health and wellbeing week activities, and online workshops.
Giving back to the community is an innate part of who we are as a company. All Softcat employees are therefore given two volunteer days per year to support a charitable or community cause.
Each of our 10 regional offices also support local charities through fundraising, donations and events. For example, our Manchester office has raised over £30,000 for the WeLoveMCR charity. This funding has supported young, disadvantaged Manchester citizens in gaining qualifications to broaden their work opportunities and supporting local groups in delivering indispensable services that enable community cohesion.
Pricing
- Price
- £2.51 a unit
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Heimdal provides free of charge POC services with full platform access and integration option. Standard run time for POC is 4 weeks and will be assisted from Heimdal by both technical and commercials ressources to support a smooth trial with zero interruption and a well-documented trial period delievered by Heimdal