Axians Network as a Service (NaaS)
Axians Network as a Service (NAAS) delivers end-to-end components, 24/7 support and lifecycle management to deliver a continuously-fast online user experience. NaaS offers a global network infrastructure solution and services by subscription, meaning that you no longer have to invest in rapidly depreciating network equipment or manage maintenance and upgrades.
Features
- Functional, Technical advisory & Pay per use
- Lease option
- Fully Managed Service
- Break-fix services
- Hardware/Licenses
- LAN, WLAN, Security & SDWAN
- 24 x 7 service
- ISO 27001 and ISO 9001 certified
- Realtime status insight
- ITIL based Servicedesk
Benefits
- Rapid implementation of new components, departments or branches
- Easy & fast up and down scaling
- Maintained network relevancy and provision of ongoing functional advise
- Complete end-to-end visibility of all factors determining network experience
- True root cause analysis of SaaS application performance issues
- Optimised wireless network health
- No hardware investment means costs can be spread over time
- Reduced operational cost of performing regular network management tasks
- Benefit from automation of process to free up staff resource
Pricing
£27.30 to £74.02 a device a month
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 4 9 8 6 3 6 4 7 5 1 9 2 7 5
Contact
Axians Networks Limited
Neil Polson
Telephone: 07788317802
Email: neil.polson@axians.co.uk
Service scope
- Service constraints
- None
- System requirements
- N/A This is a Cloud based service
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Severity Level 1 Acknowledgement Response Time One (1) hour, Severity Level 2 Acknowledgement Response Time Four (4) hours, Severity Level 3 Acknowledgement Response Time Eight (8) hours. All available 24x7x365
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Standard support included as part of the service is based on: P1 response 30 mins, restoration 4 hours; P2 response 60 mins, restoration 8 hours; P3 response 4 hours, restoration 48 hours; P4 response 8 hours, restoration 72 hours.
Changes to the support levels can be discussed which may impact on the service cost per device.
A Technical Account Manager can be made availabel as part of the service where necessary. This would be charged based on our standard GCloud rate card. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Customer Services Handbook
Training - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Only telemetry & configuration data is held, no user data is held. This can be provided in a CSV / other report as needed
- End-of-contract process
- Customers will be notified well in advanced of contract end. If a customer wishes to renew or terminate, they can arrange this via their Account Manager.
Using the service
- Web browser interface
- Yes
- Using the web interface
- N/A
- Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- N/A
- Web interface accessibility testing
- N/A
- API
- Yes
- What users can and can't do using the API
- N/A
- API automation tools
- Ansible
- API documentation
- Yes
- API documentation formats
-
- HTML
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
-
- Automatic
- Manual
- Independence of resources
- The service is closely monitored real time to maximise user expérience and network performance. When thresholds are met, alerts will be triggered and the service desk will react accordingly or automatic updates will be applied to the service
- Usage notifications
- No
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Cisco (Meraki), Juniper (MIST), Aruba
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- No
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- All configuratoin of physical components (WAPs, routers & switches)
- All virtual cloud components
- All physical components as part of a break-fix process
- Backup controls
- Thiswould be defined in a Staement of Works as part of the process to stand up the service
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
Axians is able to guarantee availability of 99,9% and 99,99% depending on chosen architecture in network profiles.
The technology solution includes the following components:
SD-WAN
Security
Monitoring
Guest Access (BYOD)
Location analytics services
Voice/Video over the wireless network
API connections - Approach to resilience
- Information available on request
- Outage reporting
- The service can be designed to include reporting via any of the following methods: SMS, API, email or via a portal. Monthly reports will also be provided by the Service Delivery Manager.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
- Access restrictions in management interfaces and support channels
- Role based access control methods would be used to ensure users are given appropriate access to the service
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
- Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users receive audit information on a regular basis
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- United Registrar of Systems
- ISO/IEC 27001 accreditation date
- 30/10/2001
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Axians adheres to the ISO27001 standard when designing, deploying and managing customer data and information.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Standard changes are included in the service and can be requested through the customer portal.
To minimise the risks and reduce the number of Incidents:
• Change requests may arise reactively in response to problems.
• Authorised representatives of the Customer can request changes under the scope of service contracted.
• All change requests are subject to technical review by Axians
• Axians will agree priorities for all change requests with the Customer.
• All change requests will have defined acceptance criteria and back-out plans.
Axians uses the Service Desk application to manage the workflow of change management - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- This will be dependent on the underlying vendor's process. Based on the Juniper Mist System, vulnerability scans are performed regularly. Mist performs web security testing right from the development to production stages. Mist uses automated tools to scan for SQL injections, XSS and 700+ other vulnerabilities, including OWASP Top 10. Depending on the severity of vulnerability, patches are applied
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- This will be dependent on the underlying vendor's process. Based on the Juniper Mist System, Mist has deployed monitoring system to check for anomalies. Also, Mist checks for suspicious activities in logs. An internal Incident Management policy is followed should there be a customer data breach. Customers are notified within 24 hours if a data breach has been found. In such a case, corrective actions are taken immediately.
- Incident management type
- Supplier-defined controls
- Incident management approach
- An internal incident management process is followed. Users can report incident by opening a case through online portal or by sending a mail with the URGENT in the subject line. Once an incident is investigated, a solution is put in place and RCA is conducted. Customers, upon request, can be provided the RCA.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Third-party
- Third-party virtualisation provider
- Cisco, Juniper or Aruba
- How shared infrastructure is kept separate
- This is achieved by Secure Multi-Tenancy architectures
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Wellbeing
Fighting climate change
Axians is the ICT brand of VINCI Energies. VINCI Energies carries out numerous projects that contribute to improving everyday life and to shaping the world of tomorrow. The Axians approach has aligned with the Group, based on a Green IT audit and leading to an operational action plan. The solutions deployed by Axians are at the heart of the operational activities of the clients, and they are part of their journey towards sustainability. Thanks to our understanding of customers’ needs and our different expertise areas (including IoT and Business Applications), Axians can help our customers save water in cities, reduce their fuel consumption and optimize the energy efficiency of their sites and buildings.Tackling economic inequality
Enhancing the regional economy, staying competitive and increasing quality of public service. We help the Public Sector to improve citizen well-being with proven expertise in deploying, scaling, operating and maintaining any digital infrastructure at a large, city-scaleWellbeing
Citizens are expecting more from the places they live in, and the relationship with government and local authorities to deliver efficient, quality digital services. As well as needing fast, reliable and scalable technology infrastructure to ensure public sector teams can serve citizens effectively, these authorities also need to adopt solutions to support and respond to sustainable and inclusivity.
Pricing
- Price
- £27.30 to £74.02 a device a month
- Discount for educational organisations
- Yes
- Free trial available
- No