Skip to main content

Help us improve the Digital Marketplace - send your feedback

Softcat Limited

Heimdal Security

At Heimdal Security, we specialize in automation and consolidation, offering automated smart solutions that deliver immediate ROI by tackling key challenges such as alert fatigue, resource allocation, Automated D&R and compliance reporting.

Features

  • 2-way DNS Filter for Endpoints & Network
  • Automated secure patching for 3rd party applications
  • Script deployment, License Management and IPXE/OS Deployment)
  • MDE Based AV with Advanced detection, Telemetry Analytics, Firewall Management
  • Kernel-based encryption protection, 0-trust metholodgy - last line of defense
  • Secure elevation management for user-elevation with audit logs built-in
  • Control both execution and elevation for applications
  • Control internal and external access to your estate
  • MX Record based email filter with advanced detection mechanisms
  • Remote desktop tool secure connections

Benefits

  • Proactively prevent communicate with malicious infrastructure
  • No manual interaction and zero disruptions.
  • Gain complete control with realtime deployments and cloud based infrastructure
  • Keep your Microsoft defender AV, with additional security
  • Last line of defence block unauthorized encryptions
  • UI, can run automated in the background
  • Allow applications rights without the user being admin
  • Easy to manage and cost efficient
  • Intuitive platform and easy to manage
  • Very easy and cost-efficient tool. Enables support anywhere to anyone.

Pricing

£2.51 a unit

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at psitq@softcat.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

7 2 6 8 0 5 4 9 9 8 0 7 4 2 5

Contact

Softcat Limited Charles Harrison
Telephone: 01628 403403
Email: psitq@softcat.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
DNS security, Patch and Asset Management, Inifinity Management, Next-Gen AV, Ransomware Encryption Protection, Privilege Elevation & Delegation Management, Application Control, Privileged Account and Session Management, Email security, Remote Desktop
Cloud deployment model
Public cloud
Service constraints
No
System requirements
Various requirements for Windows, macOS and Linux (Ubuntu)

User support

Email or online ticketing support
Email or online ticketing
Support response times
We have a 20 minute response time
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Onsite support
Support levels
The PS service shall generally perform to the levels as set forth below:
a. Heimdal’s software management and protection infrastructure must have a guaranteed up time of minimum 99,9% at all times.
b. Heimdal backend and management portal services must have a guaranteed up-time of
minimum 99,5%.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Included in any license procured customers will have the following services included: 1. Admin Training 2. End-user Training Material 3. On-site Deployment & Configuration Services 4. Enterprise Support 24/7 - 365
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
  • Online Training videos
  • In person trainings
End-of-contract data extraction
By Request to Heimdal
End-of-contract process
Customers need to advice 3 months in advance to subscription end that they will not be renewing. If they do not the license automatically gets renewed. Heimdal Customer Service Manager will be in contact with customer and notify them upon renewal or termination, whatever the customer chooses to do

Using the service

Web browser interface
No
Application to install
Yes
Compatible operating systems
  • Android
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
On Android we only support DNS protection, Anti-Virus and locating the device.
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
Heimdal empowers Security & IT professionals with a resilient XDR - a Unified Security Platform that guards against next-gen threats. Our award-winning line-up of 10+ fully integrated security solutions span the entire IT estate, allowing organizations to be proactive and compliant - remote or onsite. Heimdal products & managed services contain a solution for every problem, be it at the endpoint or network, cloud, identity & access management, emails, applications, and beyond.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
N/A
API
Yes
What users can and can't do using the API
External JSON REST
API documentation
Yes
API documentation formats
  • PDF
  • Other
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
The Heimdal services follow a modular approach, so you can tailer the services according to your current needs and extend them in the future without any problems by just activating them in the dashboard.

Scaling

Independence of resources
Cloud work load runs in clusters and will expand per default to more servers in case data consumption exceeds service level. Automatic and no noise

Analytics

Service usage metrics
Yes
Metrics types
NEED the services
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller (no extras)
Organisation whose services are being resold
Heimdal

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Other
Other data at rest protection approach
• Data at rest is encrypted with double layer of encryption: 1st layer provided and managed by Azure/ Amazon and 2nd layer of encryption is fully managed by Heimdal in a completely autonomous and secure environment
• Both layers of encryption are Federal Information Processing Standards (FIPS) 140-2 compliant and for both encryption keys we are using Advanced Encryption Standard AES-256 (256-bit key length)
Data sanitisation process
No
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Heimdal offers two options to export data, 1) directly from the dahboard within the module as direct CSV download or 2) via a free of charge usable JSON REST API
Data export formats
  • CSV
  • Other
Other data export formats
JSON REST API
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Heimdal’s software management and protection infrastructure must have a guaranteed up time of minimum 99,9% at all times.
Heimdal backend and management portal services must have a guaranteed up-time of minimum 99,5%. The uptime calculated as follows (rounded to
the nearest one-tenth of one percent): Availability % = 100% x (Total Minutes in the Month – Total
Minutes Unavailable in the Month) / Total Minutes in the Month. The PS Services level will not be
deemed unavailable for any downtime or outages relating to: (i) a Customer Outage Event, (ii)
equipment, applications, interfaces, integrations, or systems not owned by Heimdal, or service not
offered by Heimdal or (iii) a Force Majeure Event. “Customer Outage Event” means a period of time
in which the Services are not available due to acts, omissions or requests of Customer, including
without limitation (a) configuration changes in, or failures of, the Customer end of the network
connection, (b) work performed by Heimdal at Customer’s request, (c) Customer’s unavailability
or untimely response to incidents that require its participation for source identification and/or
resolution or (d) Customer’s failure to provide Heimdal with any requested physical or remote
access to any Customer facilities, equipment or personnel emergency
Approach to resilience
Please see here: https://learn.microsoft.com/en-us/azure/architecture/checklist/resiliency-per-service and https://aws.amazon.com/resilience/.
Outage reporting
E-mail alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
  • Other
Other user authentication
Agent-to-Dashboard
The agent uses mutual (two-way authentication)
both sides of the communications channel verify each other's identity based on certificates.
Access restrictions in management interfaces and support channels
We provide ACL and RBAC
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
  • Other
Description of management access authentication
Agent-to-Dashboard
The agent uses mutal (two-way authetication)
both sides of the communications channel verify each other's identity based on certificates.

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 6 months and 12 months
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
  • ISAE 3000
  • SOC 2 Type I and Type II

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
ISAE 3000 SOC 2 Type I and Type II
Information security policies and processes
Heimdal Security has established an Information Security Program that provides documented management
direction and support for implementing information security within the Heimdal Security environment. The
design and implementation of applicable controls are defined based on the architecture of Heimdal Security’s
environments.
The objective of the Information Security Program is to maintain the confidentiality, integrity, and availability of information while complying with applicable legislative, regulatory and contractual requirements.
The Information Security Program consists of the following components:
1. Policy and procedures
2. Risk assessment
3. Training and awareness
4. Security implementation
5. Review and compliance
6. Management reporting

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
The change management process has been established to plan, schedule, approve, apply, distribute and track
changes to the production environment through designated responsibilities with the objective of minimising
risk and customer impact. Software and configuration changes within Heimdal Security are managed through a formal change and release management procedure and tracked using a
centralised ticketing system and development tools. Changes are requested, approved, tracked and implemented throughout
the release life cycle which includes product and engineering planning, release management, deployment
and post-deployment support phases. Change requests are documented, assessed for their risks, and evaluated/approved for acceptance by designated change manager.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Threat and vulnerability management
The IT administrator carries out frequent internal and external scans to identify vulnerabilities and assess
the effectiveness of the patch management process. Identified threats and vulnerabilities are assessed and
mitigated according to their criticality.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
At our organization, we adhere to a comprehensive set of protective monitoring processes to safeguard our systems and data. These processes include:
Continuous Monitoring, Vulnerability Management, Access Control and Privileged Account Management, Incident Response Plan, Employee Training and Awareness,

These processes are continually reviewed and updated to ensure that we remain aligned with industry best practices and regulatory requirements. Additionally, we conduct periodic audits and assessments to validate the effectiveness of our protective monitoring measures.
Incident management type
Supplier-defined controls
Incident management approach
Heimdal Security has implemented an incident management framework that includes defined processes,
roles, communications, responsibilities and procedures for detection, escalation and response to incidents
and security incidents internally and to customers.
Responsible teams use the established incident classification, escalation and notification process for assessing an incident’s criticality and severity and escalate accordingly to the appropriate groups for timely
action.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Softcat are dedicated to reducing our environmental impact and actively promoting sustainability. Our commitment to sustainability is a core aspect of our business strategy, driving us to innovate and lead in the creation of a more sustainable future for our company and the communities we serve. This commitment is embedded in our policies, operating procedures, and training programs.

We are proud to be the first FTSE 250 company to be awarded 5-star status in relation to the United Nations Sustainable Development Goals.

We aim to achieve a Carbon Net-Zero Value Circle by 2040 by prioritising renewable energy, reducing natural resource use, minimising waste, and safeguarding biodiversity in compliance with environmental legislation.

At Softcat, we have taken significant steps towards securing renewable energy across our organisation, reducing our scope 1 & 2 emissions. We had the target of using 100% Renewable Energy across all our locations by 2024. We successfully delivered against this target ~2 years early.

In May 2023 we took delivery of 15 electric vehicles, replacing all existing fossil-fuelled company cars used by employees for business means. The implementation of the EV pool fleet will see a saving of over 80 tons of CO2e per year. A huge impact on our Net Zero targets.

Tackling economic inequality

As a value-add reseller, Softcat outsources the products, services, and solutions through our extensive network of partners, to best suit the needs of our broad client base. We always consider and promote SMEs and local providers where appropriate, particularly for the products and services we offer via the G Cloud framework.

We remain dedicated to improving employability and educational awareness across schools, colleges, and universities to help break down the barriers to joining technology organisations.

We work collaboratively with many schools that are close in proximity to our offices, to ensure we are actively supporting the community as well as schools from lower socio-economic backgrounds.

We visit the schools to talk about the IT sector and the roles in our organisation, as well as promoting work-experience opportunities during the summer. In particular, we actively encourage students from diverse backgrounds to engage in work experience to appreciate the roles available in our sector.

For ambitious school and college leavers, a Softcat Apprenticeship is a great first step into the world of work, with 94% of our apprentices offered a permanent position at Softcat post apprenticeships, which goes to show the amazing opportunity available with us.

We were ranked 1st in IT & Consultancy, and 10th overall in by RateMyApprenticeship.com - Best 100 Apprenticeship Employers 2023-2024 list.

Softcat now also offer 12 month paid internships to University students looking to complete a year in industry as part of their undergraduate studies.

Equal opportunity

Our approach to diversity and inclusion is introduced first during our induction training, as part of our Softcat values, outlining responsibility to uphold our principles. This message is reinforced by our process and policies, networks, Allyship Training and Inclusion Awareness campaigns.

Softcat supports diversity and inclusion through various networks including:
- Supporting Women in Business (SWIB)
- The Ethnic and Cultural Network
- The Pride Network
- The Family Network
- The Empowering Disability and Neurodiversity Network (EDN)
- The Faith at Work Network
- Armed Forces & Veterans Network
These networks aim to create a supportive and inclusive work environment for all employees, regardless of gender, ethnicity, sexual orientation, disability, or family commitments.

Our allyship programme, Stronger Together, is a mixture of event and workshop-based training available to all staff. Programme topics include, bias, power, privilege, and being a greater ally.

Inclusion Awareness campaigns include race, disability, sexual orientation, gender, faith, and caring responsibilities. These sessions highlight and celebrate minority groups, through panel sessions, Q&A sessions and training, providing an opportunity to discuss and understand ways to be more inclusive.

Our efforts to improve diversity and inclusion have been incredibly successful. Since 2020, the number of female employees below management level has increased to 35%, and the number of ethnic minority employees rose to 17%.

Wellbeing

At Softcat, all employees are provided with access to our multidimensional wellbeing programme which includes flexible work arrangements, free nutritious breakfast, mental health support, employee benefits scheme, health and wellbeing week activities, and online workshops.

Giving back to the community is an innate part of who we are as a company. All Softcat employees are therefore given two volunteer days per year to support a charitable or community cause.

Each of our 10 regional offices also support local charities through fundraising, donations and events. For example, our Manchester office has raised over £30,000 for the WeLoveMCR charity. This funding has supported young, disadvantaged Manchester citizens in gaining qualifications to broaden their work opportunities and supporting local groups in delivering indispensable services that enable community cohesion.

Pricing

Price
£2.51 a unit
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Heimdal provides free of charge POC services with full platform access and integration option. Standard run time for POC is 4 weeks and will be assisted from Heimdal by both technical and commercials ressources to support a smooth trial with zero interruption and a well-documented trial period delievered by Heimdal

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at psitq@softcat.com. Tell them what format you need. It will help if you say what assistive technology you use.