Skip to main content

Help us improve the Digital Marketplace - send your feedback

Axians Networks Limited

Axians Network as a Service (NaaS)

Axians Network as a Service (NAAS) delivers end-to-end components, 24/7 support and lifecycle management to deliver a continuously-fast online user experience. NaaS offers a global network infrastructure solution and services by subscription, meaning that you no longer have to invest in rapidly depreciating network equipment or manage maintenance and upgrades.

Features

  • Functional, Technical advisory & Pay per use
  • Lease option
  • Fully Managed Service
  • Break-fix services
  • Hardware/Licenses
  • LAN, WLAN, Security & SDWAN
  • 24 x 7 service
  • ISO 27001 and ISO 9001 certified
  • Realtime status insight
  • ITIL based Servicedesk

Benefits

  • Rapid implementation of new components, departments or branches
  • Easy & fast up and down scaling
  • Maintained network relevancy and provision of ongoing functional advise
  • Complete end-to-end visibility of all factors determining network experience
  • True root cause analysis of SaaS application performance issues
  • Optimised wireless network health
  • No hardware investment means costs can be spread over time
  • Reduced operational cost of performing regular network management tasks
  • Benefit from automation of process to free up staff resource

Pricing

£27.30 to £74.02 a device a month

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at neil.polson@axians.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

7 4 9 8 6 3 6 4 7 5 1 9 2 7 5

Contact

Axians Networks Limited Neil Polson
Telephone: 07788317802
Email: neil.polson@axians.co.uk

Service scope

Service constraints
None
System requirements
N/A This is a Cloud based service

User support

Email or online ticketing support
Email or online ticketing
Support response times
Severity Level 1 Acknowledgement Response Time One (1) hour, Severity Level 2 Acknowledgement Response Time Four (4) hours, Severity Level 3 Acknowledgement Response Time Eight (8) hours. All available 24x7x365
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Standard support included as part of the service is based on: P1 response 30 mins, restoration 4 hours; P2 response 60 mins, restoration 8 hours; P3 response 4 hours, restoration 48 hours; P4 response 8 hours, restoration 72 hours.
Changes to the support levels can be discussed which may impact on the service cost per device.
A Technical Account Manager can be made availabel as part of the service where necessary. This would be charged based on our standard GCloud rate card.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Customer Services Handbook
Training
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Only telemetry & configuration data is held, no user data is held. This can be provided in a CSV / other report as needed
End-of-contract process
Customers will be notified well in advanced of contract end. If a customer wishes to renew or terminate, they can arrange this via their Account Manager.

Using the service

Web browser interface
Yes
Using the web interface
N/A
Web interface accessibility standard
None or don’t know
How the web interface is accessible
N/A
Web interface accessibility testing
N/A
API
Yes
What users can and can't do using the API
N/A
API automation tools
Ansible
API documentation
Yes
API documentation formats
  • HTML
  • PDF
Command line interface
No

Scaling

Scaling available
Yes
Scaling type
  • Automatic
  • Manual
Independence of resources
The service is closely monitored real time to maximise user expérience and network performance. When thresholds are met, alerts will be triggered and the service desk will react accordingly or automatic updates will be applied to the service
Usage notifications
No

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Cisco (Meraki), Juniper (MIST), Aruba

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with CSA CCM v3.0
Data sanitisation process
No
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • All configuratoin of physical components (WAPs, routers & switches)
  • All virtual cloud components
  • All physical components as part of a break-fix process
Backup controls
Thiswould be defined in a Staement of Works as part of the process to stand up the service
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Axians is able to guarantee availability of 99,9% and 99,99% depending on chosen architecture in network profiles.

The technology solution includes the following components:
SD-WAN
Security
Monitoring
Guest Access (BYOD)
Location analytics services
Voice/Video over the wireless network
API connections
Approach to resilience
Information available on request
Outage reporting
The service can be designed to include reporting via any of the following methods: SMS, API, email or via a portal. Monthly reports will also be provided by the Service Delivery Manager.

Identity and authentication

User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels
Role based access control methods would be used to ensure users are given appropriate access to the service
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Devices users manage the service through
Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users receive audit information on a regular basis
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
United Registrar of Systems
ISO/IEC 27001 accreditation date
30/10/2001
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Axians adheres to the ISO27001 standard when designing, deploying and managing customer data and information.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Standard changes are included in the service and can be requested through the customer portal.

To minimise the risks and reduce the number of Incidents:

• Change requests may arise reactively in response to problems.
• Authorised representatives of the Customer can request changes under the scope of service contracted.
• All change requests are subject to technical review by Axians
• Axians will agree priorities for all change requests with the Customer.
• All change requests will have defined acceptance criteria and back-out plans.
Axians uses the Service Desk application to manage the workflow of change management
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
This will be dependent on the underlying vendor's process. Based on the Juniper Mist System, vulnerability scans are performed regularly. Mist performs web security testing right from the development to production stages. Mist uses automated tools to scan for SQL injections, XSS and 700+ other vulnerabilities, including OWASP Top 10. Depending on the severity of vulnerability, patches are applied
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
This will be dependent on the underlying vendor's process. Based on the Juniper Mist System, Mist has deployed monitoring system to check for anomalies. Also, Mist checks for suspicious activities in logs. An internal Incident Management policy is followed should there be a customer data breach. Customers are notified within 24 hours if a data breach has been found. In such a case, corrective actions are taken immediately.
Incident management type
Supplier-defined controls
Incident management approach
An internal incident management process is followed. Users can report incident by opening a case through online portal or by sending a mail with the URGENT in the subject line. Once an incident is investigated, a solution is put in place and RCA is conducted. Customers, upon request, can be provided the RCA.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Third-party
Third-party virtualisation provider
Cisco, Juniper or Aruba
How shared infrastructure is kept separate
This is achieved by Secure Multi-Tenancy architectures

Energy efficiency

Energy-efficient datacentres
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Tackling economic inequality
  • Wellbeing

Fighting climate change

Axians is the ICT brand of VINCI Energies. VINCI Energies carries out numerous projects that contribute to improving everyday life and to shaping the world of tomorrow. The Axians approach has aligned with the Group, based on a Green IT audit and leading to an operational action plan. The solutions deployed by Axians are at the heart of the operational activities of the clients, and they are part of their journey towards sustainability. Thanks to our understanding of customers’ needs and our different expertise areas (including IoT and Business Applications), Axians can help our customers save water in cities, reduce their fuel consumption and optimize the energy efficiency of their sites and buildings.

Tackling economic inequality

Enhancing the regional economy, staying competitive and increasing quality of public service. We help the Public Sector to improve citizen well-being with proven expertise in deploying, scaling, operating and maintaining any digital infrastructure at a large, city-scale

Wellbeing

Citizens are expecting more from the places they live in, and the relationship with government and local authorities to deliver efficient, quality digital services. As well as needing fast, reliable and scalable technology infrastructure to ensure public sector teams can serve citizens effectively, these authorities also need to adopt solutions to support and respond to sustainable and inclusivity.

Pricing

Price
£27.30 to £74.02 a device a month
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at neil.polson@axians.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.