Software Product Suite
A suite of products that includes but not limited to the following products: an intelligent automated technology policy management, a network security product using advanced AI and Edge data monitoring, network communications software, a DCS based data storage solution using dynamic Attribute-Based Access Control, and a zero-trust development environment.
Features
- Secure by design
- Automation and Policy Management
- Edge node security
- Zero Trust Development Environment
- AI and Edge data monitoring
Benefits
- Secure by design
- Protection of data at rest
- Secure development environment
- Automate policies
Pricing
£100 a unit
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 6 9 9 8 8 3 4 7 4 6 0 8 6 8
Contact
ESPANARO LTD
Dan Edmunds
Telephone: +44 20 3011 1359
Email: contracts@espanaro.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- No, can be configured as needed
- System requirements
- Can be configured as per customer need
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 24h
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Contact equivalent to phone chat
- Web chat accessibility testing
- N/A
- Onsite support
- Yes, at extra cost
- Support levels
- As per customer requirements
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Tailored to customer needs
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Tailored to customer needs
- End-of-contract process
- Tailored to customer needs
Using the service
- Web browser interface
- No
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- N/A
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- As per the customer requirements
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- As per customer requirements
Scaling
- Independence of resources
- Tailored to customer needs
Analytics
- Service usage metrics
- Yes
- Metrics types
- Tailored to customer needs
- Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- Never
- Protecting data at rest
- Other
- Other data at rest protection approach
- Tailored to customer needs
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Tailored to customer needs
- Data export formats
-
- CSV
- ODF
- Data import formats
-
- CSV
- ODF
Data-in-transit protection
- Data protection between buyer and supplier networks
- Other
- Other protection between networks
- Tailored to customer needs
- Data protection within supplier network
- Other
- Other protection within supplier network
- Tailored to customer needs
Availability and resilience
- Guaranteed availability
- Tailored to customer needs
- Approach to resilience
- Tailored to customer needs
- Outage reporting
- Tailored to customer needs
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Other
- Other user authentication
- Tailored to customer needs
- Access restrictions in management interfaces and support channels
- Tailored to customer needs
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Other
- Description of management access authentication
- Tailored to customer needs
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Beginning process of ISO 27001
- Information security policies and processes
- Cyber Security Essentials Plus, ISO 9000 series, ISO 27000 series
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Tailored to customer needs
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Tailored to customer needs
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- Tailored to customer needs
- Incident management type
- Undisclosed
- Incident management approach
- Tailored to customer needs
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Automation tools enable smart towns to be implemented through intelligent management of resources.
Pricing
- Price
- £100 a unit
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Tailored to customer needs