Skip to main content

Help us improve the Digital Marketplace - send your feedback

TRUSTED TECHNOLOGY PARTNERSHIP LTD

Cloud Edge Security

Secure application, infrastructure, and network access, purpose-built for enterprises
Banyan replaces your traditional security appliances – VPNs, bastion hosts, proxies, and gateways – with a cloud-based zero trust access solution. Easy. Fast. Secure.

Features

  • Secure Web Gateway, SWG
  • Cloud Access Security Broker, CASB
  • Zero Trust Network Access, ZTNA
  • Virtual Private Network as a Service, VPNaaS

Benefits

  • Secure Web Gateway guards against internet threats
  • CASB enforce controls for Saas applications
  • ZTNA simple least priviledge access to applications and services
  • VPNaaS modern cloud-based VPN delivery enhanced performance

Pricing

£90 to £300 a user a year

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sales@trusted-technology.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

7 2 6 8 5 7 9 0 7 3 8 4 0 4 5

Contact

TRUSTED TECHNOLOGY PARTNERSHIP LTD Sales Account
Telephone: 01425 470888
Email: sales@trusted-technology.co.uk

Service scope

Service constraints
No
System requirements
Dependant on platform, requirements are available in our documentation

User support

Email or online ticketing support
Email or online ticketing
Support response times
Acknowledgement is automated and instant. Response times vary depending on the SLA category assigned
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 A
Phone support
Yes
Phone support availability
9 to 5 (UK time), 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
We provide an service / account manager on all G-Cloud engagements with responsibility for ensuring customer objectives are met, and that there are no issues with service delivery and customer satisfaction is maximised. Our service / account managers act as an escalation point, and can be reached via phone or email, to respond to issues beyond the control of the team providing the service. Service / account management is included within our service pricing. Onsite technical support would be charged as per our SFIA rate card.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Partner Support and SonicWall online support. Knowledge base on Sonicwall.com is also available along with technical documentation.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
N/A
End-of-contract process
Security services and support functions cease to be updated. Users can expect significantly reduced functionality and/or interruption to service.

Using the service

Web browser interface
Yes
Using the web interface
Administrators can configure, manage and investigate all aspects off the service from the interface.
Web interface accessibility standard
None or don’t know
How the web interface is accessible
Access is provided via a supported web browser.
Web interface accessibility testing
Unknown
API
Yes
What users can and can't do using the API
API objects are persistent entities in the platform. It uses these entities to represent the state of your organization’s connectivity and security. To work with API objects - whether to create, modify, or delete them - you use the Restful API.
API automation tools
Terraform
API documentation
Yes
API documentation formats
HTML
Command line interface
No

Scaling

Scaling available
No
Independence of resources
The Cloud Command Center is our cloud-based management and visibility platform which integrates with various services, such as IdP, EDR, and UEM to learn about the user and devices. It also integrates with threat feeds to provide enforcement policies on outbound traffic. It also provides discover and publish functionality, allowing enterprises to quickly locate resources and create least privilege access to them, whether they are on-premises, in SaaS, or IaaS.
Flexible Edge enables deployment anywhere your resources live. The Flexible Edge provides a multi-cloud identity-aware access proxy that securely cloaks cloud applications and servers from malicious attacks or inadvertent exposure.
Usage notifications
No

Analytics

Infrastructure or application metrics
No

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
SonicWall

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
Never
Protecting data at rest
Other
Other data at rest protection approach
Location data
The Banyan apps do not access or store location data of the devices.
Web traffic and network activity
The Banyan apps do not intercept or monitor network activity to/from the device.
Standard, OS-specific messages are shown to end users when installing any root certificates to their device. In this case, Banyan leverages the root certificate to validate downstream intermediate and client certificates.
Data sanitisation process
No
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery
No

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
N/A
Approach to resilience
Available on request
Outage reporting
Available on request

Identity and authentication

User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google apps)
  • Username or password
Access restrictions in management interfaces and support channels
Available on request
Access restriction testing frequency
Never
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Devices users manage the service through
Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
No audit information available
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
  • SOC 2 Type 1
  • SOC 2 Type 2

Security governance

Named board-level person responsible for service security
No
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
SOC2 Type 1 & Type 2 Compliant
Information security policies and processes
Not known

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Published in our documentation, includes General Availablility, Preview, Labs and Releases. Features are fully QA Tested and fully supported in General Availability.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Available on request
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Availabile on request
Incident management type
Supplier-defined controls
Incident management approach
Availabile on request

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
No

Energy efficiency

Energy-efficient datacentres
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

At TT we are committed to tackling the challenges of sustainable development and we operate as a responsible corporate business. We implement practices that promote economic security, social and environmental responsibility and we continuously seek to improve performance in these areas. We are committed to working with our suppliers and customers to improve sustainability performance throughout all our activities. We recycle printer toners, IT waste and cardboard through our partner Restore and the Council Recycling Scheme. Respecting the environment, TT is focused on reducing the environmental footprint of our customers by innovating highly efficient, integrated appliances and cloud-based security solutions at TT, we understand the unprecedented challenge that our customers face in continually improving their sustainability. We utilise innovation to drive environmental responsibility at the core of our strategy. We strive to minimize our environmental impact throughout our value chain, to ensure we are driving the best possible outcomes for sustainability goals and for the planet. We try to demonstrate this commitment in everything we do, by reducing the footprint of our partners products, ensuring they lead the way with energy efficiency, and adhere to compliance and regulations worldwide, and adopting responsible approaches across our daily business operations. We are also currently working on an independently validated and publicly available Carbon Reduction Plan, due to be completed and published mid-2024.

Tackling economic inequality

In addressing economic inequality, we must begin by fostering equal opportunities for all, starting from the grassroots level. One effective approach we undertake is to introduce mock interviews for school children, providing them with essential skills and confidence needed to navigate the professional world regardless of their background. Additionally, we offer work experience opportunities and apprenticeships to bridge the gap between education and employment, empowering individuals from diverse socio-economic backgrounds to access valuable hands-on training and networking opportunities.

Equal opportunity

Trusted Technology is an equal opportunity employer and is fully committed to a policy of treating all its employees and job applicants equally. TT will take all reasonable steps to employ, train and promote employees on the basis of their experience, abilities and qualifications without regard to race, colour, ethnic origin, nationality, national origin, religion or belief, sex, sexual orientation, marital status, age or disability. TT will also take all reasonable steps to provide a work environment in which all employees are treated with respect and dignity and that is free of harassment based upon an employee’s race, colour, ethnic origin, nationality, national origin, religion or belief, sex, sexual orientation, marital status, age or disability. TT will not condone any form of harassment, whether engaged in by employees or by outside third parties who do business with TT. We regularly carry out diversity surveys to ensure we are an ethical and diverse employer, these survey results are publicly available.

Wellbeing

A recent development is our premises move; we have recently moved building to a brand-new, open office space in an environmentally friendly building. Our new building has an open office space for socialising with lots of natural light and quiet meeting rooms to work in, we even have a pool table for leisure! We provide our colleagues with a weekly delivery of “wonky fruit”, offering a healthy snack option for colleagues and utilising fruit which supermarkets reject. Furthermore, Trusted Technology operates a hybrid working environment, with two days a week in the office. This allows individuals to spend less time commuting but also offers a healthy balance of remote and office working. We offer tangible rewards to colleagues to incentivise responsible, hardworking behaviour. Some examples of this are an equally divided profits share, extra days of annual leave if certain criteria are met and a one off £500 Cost of Living payment. Furthermore, Trusted Technology has certified mental and physical health first aiders and we also release a monthly newsletter with features on mental and physical health.

Pricing

Price
£90 to £300 a user a year
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
Cloud VPN trial available for 30 days

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sales@trusted-technology.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.