Forcepoint Data Guard (FDG)
Forcepoint Data Guard delivers zero trust, bi-directional, automated data and file transfers between physically separated networks. Data Guard leverages a trusted operating system and security policies enforcing role and process separation/isolation for automated, byte-level content inspection and sanitisation, with customisable rules handling the most specialised data types and protocols.
Features
- DLP on streaming protocols and log data
- Redact/replace text in Office, PDF, and ascii text files
- TCP/IP Packet transformation
- Validate simple to complex XML down to field level values
- One way, network isolating file transfer between networks
- Zero trust security on files transferred
- Antivirus on data in motion including embedded content
- DLP, Schema Validation, Redaction, CDR, Antivirus, Controls, and Protocol Break
- Access and control CCTV systems between networks securely
- Full protocol inspection and validation
Benefits
- Zero Trust TCP/IP vulnerability protection
- CDR provides guaranteed protections for common file types
- DLP and data visibility and protection on data in motion
- Defence grade network separation with zero trust data protections
- View/manage multiple CCTV networks while maintaining isolation of networks
- Securely move event/log data to centralised SOC environment
- Data visibility and control for high assurance API regulation protection
- Ensure data moved into sensitive networks is safe
Pricing
£1 a unit
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 4 1 6 7 9 2 0 4 3 2 2 2 6 4
Contact
Gradian Systems Ltd
Stuart Case
Telephone: 07770 377936
Email: stuart.case@gradian.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- Software is EAR99. Cannot be sold/used in certain sanctioned countries.
- System requirements
-
- FDG Small - 4 CPU CORE, 64GB RAM, 2x240GB SSD
- FDG Medium - 8 CPU CORE, 128GB RAM, 2x480GB SSD
- FDG Large 16 CPU CORE, 256GB RAM, 2x480GB SSD
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Forcepoint offers a range of support and SLA options with 24/7 online coverage available on all plans. For more details please see https://www.forcepoint.com/support/forcepoint-technical-support
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Forcepoint Technical Support Offerings are backed by highly skilled professional service teams with knowledge and experience across Forcepoint’s entire product portfolio. Please use link for more detail and SIFA card for cost. https://www.forcepoint.com/support/forcepoint-technical-support
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Forcepoint offers onsite training, remote training, user documentation, and professional services support. A customer can choose one or more of these options to understand and utilise the services.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Configuration files and log files can be exported manually at any time or done automatically through scheduled backups. Data extraction utilises SFTP or SCP.
- End-of-contract process
- At the end of the contract, the Data Guard will still be accessible so that log files and configuration files can be accessed and extracted, but data will no longer flow through the Data Guard.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- The interface is a command line interface created based off of common networking CLI interfaces. This interface offers help, autofilling, and guidance as a user interacts with the system.
- Accessibility standards
- None or don’t know
- Description of accessibility
- The terminal used to access the command line can be configured with user selected font size, text colours, and background colours
- Accessibility testing
- N/A
- API
- No
- Customisation available
- Yes
- Description of customisation
- Users can customise the service by selecting the combination of security filters that are utilised. They can also create their own custom Lua scripts for inspection/validation rules.
Scaling
- Independence of resources
- Through load balancing between multiple devices and system alerts providing information regarding resource utilization.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Reseller (no extras)
- Organisation whose services are being resold
- Forcepoint
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Users export their data through either automated backup processes or manual backup and export jobs. The data is moved via SCP or SFTP.
- Data export formats
- Other
- Other data export formats
- ASCII Text file
- Data import formats
- Other
- Other data import formats
- DataGuard itself does not require the upload of any files
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- 99.999% availability - SLA detail available upon request
- Approach to resilience
- Data Guard cloud offering is run on the AWS environment. This utilizes the AWS resiliency capabilities.
- Outage reporting
- Data Guard will report outages via email or through log messages sent to a log collector.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Data Guard offers Role Based Access Controls (RBAC) allowing for the separation of configuration and monitoring used for support.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Coalfire
- ISO/IEC 27001 accreditation date
- 03/11/2021
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- Yes
- CSA STAR accreditation date
- 25/06/2019
- CSA STAR certification level
- Level 2: CSA STAR Attestation
- What the CSA STAR doesn’t cover
- N/A
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- Common Criteria EAL 4+
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- ISO/IEC 27001
- Other
- Other security governance standards
- ISO 27018 and SOC 2 type II
- Information security policies and processes
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Available on request (not public)
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Available on request (not public)
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Available on request (not public)
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Available on request (not public)
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
Gradian are very proud to be an equal opportunity employer.
Pricing
- Price
- £1 a unit
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Please contact us for more details