Cloud Edge Security
Secure application, infrastructure, and network access, purpose-built for enterprises
Banyan replaces your traditional security appliances – VPNs, bastion hosts, proxies, and gateways – with a cloud-based zero trust access solution. Easy. Fast. Secure.
Features
- Secure Web Gateway, SWG
- Cloud Access Security Broker, CASB
- Zero Trust Network Access, ZTNA
- Virtual Private Network as a Service, VPNaaS
Benefits
- Secure Web Gateway guards against internet threats
- CASB enforce controls for Saas applications
- ZTNA simple least priviledge access to applications and services
- VPNaaS modern cloud-based VPN delivery enhanced performance
Pricing
£90 to £300 a user a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 2 6 8 5 7 9 0 7 3 8 4 0 4 5
Contact
TRUSTED TECHNOLOGY PARTNERSHIP LTD
Sales Account
Telephone: 01425 470888
Email: sales@trusted-technology.co.uk
Service scope
- Service constraints
- No
- System requirements
- Dependant on platform, requirements are available in our documentation
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Acknowledgement is automated and instant. Response times vary depending on the SLA category assigned
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 A
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- We provide an service / account manager on all G-Cloud engagements with responsibility for ensuring customer objectives are met, and that there are no issues with service delivery and customer satisfaction is maximised. Our service / account managers act as an escalation point, and can be reached via phone or email, to respond to issues beyond the control of the team providing the service. Service / account management is included within our service pricing. Onsite technical support would be charged as per our SFIA rate card.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Partner Support and SonicWall online support. Knowledge base on Sonicwall.com is also available along with technical documentation.
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- N/A
- End-of-contract process
- Security services and support functions cease to be updated. Users can expect significantly reduced functionality and/or interruption to service.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Administrators can configure, manage and investigate all aspects off the service from the interface.
- Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- Access is provided via a supported web browser.
- Web interface accessibility testing
- Unknown
- API
- Yes
- What users can and can't do using the API
- API objects are persistent entities in the platform. It uses these entities to represent the state of your organization’s connectivity and security. To work with API objects - whether to create, modify, or delete them - you use the Restful API.
- API automation tools
- Terraform
- API documentation
- Yes
- API documentation formats
- HTML
- Command line interface
- No
Scaling
- Scaling available
- No
- Independence of resources
-
The Cloud Command Center is our cloud-based management and visibility platform which integrates with various services, such as IdP, EDR, and UEM to learn about the user and devices. It also integrates with threat feeds to provide enforcement policies on outbound traffic. It also provides discover and publish functionality, allowing enterprises to quickly locate resources and create least privilege access to them, whether they are on-premises, in SaaS, or IaaS.
Flexible Edge enables deployment anywhere your resources live. The Flexible Edge provides a multi-cloud identity-aware access proxy that securely cloaks cloud applications and servers from malicious attacks or inadvertent exposure. - Usage notifications
- No
Analytics
- Infrastructure or application metrics
- No
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- SonicWall
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- Never
- Protecting data at rest
- Other
- Other data at rest protection approach
-
Location data
The Banyan apps do not access or store location data of the devices.
Web traffic and network activity
The Banyan apps do not intercept or monitor network activity to/from the device.
Standard, OS-specific messages are shown to end users when installing any root certificates to their device. In this case, Banyan leverages the root certificate to validate downstream intermediate and client certificates. - Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- No
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- N/A
- Approach to resilience
- Available on request
- Outage reporting
- Available on request
Identity and authentication
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Available on request
- Access restriction testing frequency
- Never
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- SOC 2 Type 1
- SOC 2 Type 2
Security governance
- Named board-level person responsible for service security
- No
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- SOC2 Type 1 & Type 2 Compliant
- Information security policies and processes
- Not known
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Published in our documentation, includes General Availablility, Preview, Labs and Releases. Features are fully QA Tested and fully supported in General Availability.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Available on request
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Availabile on request
- Incident management type
- Supplier-defined controls
- Incident management approach
- Availabile on request
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
At TT we are committed to tackling the challenges of sustainable development and we operate as a responsible corporate business. We implement practices that promote economic security, social and environmental responsibility and we continuously seek to improve performance in these areas. We are committed to working with our suppliers and customers to improve sustainability performance throughout all our activities. We recycle printer toners, IT waste and cardboard through our partner Restore and the Council Recycling Scheme. Respecting the environment, TT is focused on reducing the environmental footprint of our customers by innovating highly efficient, integrated appliances and cloud-based security solutions at TT, we understand the unprecedented challenge that our customers face in continually improving their sustainability. We utilise innovation to drive environmental responsibility at the core of our strategy. We strive to minimize our environmental impact throughout our value chain, to ensure we are driving the best possible outcomes for sustainability goals and for the planet. We try to demonstrate this commitment in everything we do, by reducing the footprint of our partners products, ensuring they lead the way with energy efficiency, and adhere to compliance and regulations worldwide, and adopting responsible approaches across our daily business operations. We are also currently working on an independently validated and publicly available Carbon Reduction Plan, due to be completed and published mid-2024.Tackling economic inequality
In addressing economic inequality, we must begin by fostering equal opportunities for all, starting from the grassroots level. One effective approach we undertake is to introduce mock interviews for school children, providing them with essential skills and confidence needed to navigate the professional world regardless of their background. Additionally, we offer work experience opportunities and apprenticeships to bridge the gap between education and employment, empowering individuals from diverse socio-economic backgrounds to access valuable hands-on training and networking opportunities.Equal opportunity
Trusted Technology is an equal opportunity employer and is fully committed to a policy of treating all its employees and job applicants equally. TT will take all reasonable steps to employ, train and promote employees on the basis of their experience, abilities and qualifications without regard to race, colour, ethnic origin, nationality, national origin, religion or belief, sex, sexual orientation, marital status, age or disability. TT will also take all reasonable steps to provide a work environment in which all employees are treated with respect and dignity and that is free of harassment based upon an employee’s race, colour, ethnic origin, nationality, national origin, religion or belief, sex, sexual orientation, marital status, age or disability. TT will not condone any form of harassment, whether engaged in by employees or by outside third parties who do business with TT. We regularly carry out diversity surveys to ensure we are an ethical and diverse employer, these survey results are publicly available.Wellbeing
A recent development is our premises move; we have recently moved building to a brand-new, open office space in an environmentally friendly building. Our new building has an open office space for socialising with lots of natural light and quiet meeting rooms to work in, we even have a pool table for leisure! We provide our colleagues with a weekly delivery of “wonky fruit”, offering a healthy snack option for colleagues and utilising fruit which supermarkets reject. Furthermore, Trusted Technology operates a hybrid working environment, with two days a week in the office. This allows individuals to spend less time commuting but also offers a healthy balance of remote and office working. We offer tangible rewards to colleagues to incentivise responsible, hardworking behaviour. Some examples of this are an equally divided profits share, extra days of annual leave if certain criteria are met and a one off £500 Cost of Living payment. Furthermore, Trusted Technology has certified mental and physical health first aiders and we also release a monthly newsletter with features on mental and physical health.
Pricing
- Price
- £90 to £300 a user a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Cloud VPN trial available for 30 days