SOAR
SOAR is a powerful security orchestration, automation, and response platform designed to streamline incident response workflows, improve security operations efficiency, and enhance threat detection and response capabilities.
With SOAR, organisations can automate repetitive tasks, orchestrate complex workflows, and respond to security incidents rapidly and effectively.
Features
- Security Orchestration
- Automation
- Incident Response
- Integration
- Playbook Development
- Alert Triage
Benefits
- Improved Efficiency
- Enhanced Visibility
- Rapid Response
- Scalability
- Compliance
- Cost Savings
Pricing
£1,000 a unit a year
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 7 6 7 0 0 6 6 3 4 1 2 7 3 4
Contact
SECURE NEXUS LTD
Raymond Setchfield
Telephone: 07973573734
Email: rsetchfield@securenexus.co.uk
Planning
- Planning service
- Yes
- How the planning service works
-
When helping buyers plan the implementation of cloud hosting or software services, we engage in a collaborative and consultative approach aimed at ensuring a seamless transition and optimal utilisation of the chosen solution. Firstly, we conduct a thorough assessment of the buyer's current infrastructure, business requirements, and goals. This involves understanding their existing IT environment, data volumes, performance needs, security considerations, and regulatory compliance requirements.
Next, we work closely with the buyer to design a tailored implementation strategy that aligns with their specific needs and objectives. This includes determining the most suitable deployment model (e.g., public cloud, private cloud, hybrid), selecting appropriate resources and configurations, and outlining a phased implementation roadmap.
Throughout the planning process, we prioritise communication and transparency, keeping the buyer informed and involved at every stage. We address any concerns or questions they may have, providing expert guidance and recommendations based on industry best practices and our extensive experience.
Finally, we assist the buyer in executing the implementation plan, providing hands-on support, training, and documentation as needed. Our goal is to ensure a smooth and successful deployment, minimise disruptions, and empower the buyer to maximise the value of their investment in cloud hosting or software services. - Planning service works with specific services
- No
Training
- Training service provided
- No
Setup and migration
- Setup or migration service available
- Yes
- How the setup or migration service works
-
When guiding buyers through cloud migration or transitioning between cloud services, we employ a methodical and collaborative approach to ensure a seamless transition. Beginning with a thorough assessment of their current infrastructure, applications, and requirements, we develop a detailed migration plan tailored to their objectives and constraints. This includes evaluating cloud readiness, selecting suitable cloud service providers, and developing a data migration strategy that prioritises security and efficiency.
Throughout the migration process, we assist with application refactoring, optimisation, and rigorous testing to ensure compatibility and performance in the cloud environment. We provide comprehensive training and support to facilitate adoption and mitigate resistance to change among stakeholders. Post-migration, we continue to monitor and optimise the cloud environment, providing ongoing guidance and support to maximize the buyer's return on investment.
By following this structured approach and leveraging our expertise, we enable buyers to navigate the complexities of cloud migration with confidence, minimising disruption to business operations and realising the full benefits of cloud technology. - Setup or migration service is for specific cloud services
- No
Quality assurance and performance testing
- Quality assurance and performance testing service
- Yes
- How the quality assurance and performance testing works
-
In assisting buyers with quality assurance (QA) and performance testing, we prioritise a meticulous and collaborative approach to ensure the reliability, efficiency, and effectiveness of their solutions. Initially, we collaborate closely with buyers to define clear testing objectives, requirements, and success criteria, aligning our efforts with their business goals and expectations. We meticulously design test cases, scenarios, and data sets tailored to the buyer's specific use cases and requirements, ensuring comprehensive coverage of functional, performance, security, and usability aspects.
Throughout the testing process, we leverage industry-standard tools and methodologies to execute tests rigorously, monitor results diligently, and identify any discrepancies or anomalies promptly. We facilitate transparent communication and collaboration, providing regular updates, progress reports, and actionable insights to keep buyers informed and involved at every stage. Additionally, we offer expert guidance and support to address any issues, challenges, or optimization opportunities that may arise during testing, ensuring a thorough and effective QA and performance testing process.
By employing this collaborative and detail-oriented approach, we empower buyers to validate the quality, reliability, and performance of their solutions comprehensively, mitigating risks, and maximising the value of their investments.
Security testing
- Security services
- Yes
- Security services type
-
- Security strategy
- Security risk management
- Security design
- Cyber security consultancy
- Security testing
- Security incident management
- Security audit services
- Certified security testers
- Yes
- Security testing certifications
- Other
- Other security testing certifications
-
- Certified Ethical Hacker v11
- CISSP
Ongoing support
- Ongoing support service
- Yes
- Types of service supported
-
- Buyer hosting or software
- Hosting or software provided by your organisation
- Hosting or software provided by a third-party organisation
- How the support service works
-
Deployment Assistance: Guiding clients through setup processes for seamless implementation.
Configuration and Customisation: Tailoring services to meet specific client needs and preferences.
Technical Support: Dedicated team available to address issues promptly for uninterrupted service.
Performance Optimisation: Identifying and resolving bottlenecks to enhance service efficiency.
Security and Compliance: Advising on robust security measures and regulatory compliance.
Scalability Planning: Helping clients prepare for growth and workload fluctuations.
Monitoring and Maintenance: Proactively monitoring services and performing maintenance to ensure reliability and availability.
Service scope
- Service constraints
- While our service offers significant benefits, buyers should consider potential constraints. These include reliance on internet connectivity, data security responsibilities, occasional service downtime, integration complexity, scalability limits, vendor lock-in risks, and regulatory compliance requirements. By acknowledging these constraints, buyers can make informed decisions and take appropriate measures to mitigate risks. We remain committed to addressing any concerns and collaborating with clients to ensure a positive and successful experience.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Our response time to questions depends on Service Level Agreement (SLA) agreements and the ticket's priority. We prioritise swift responses based on the urgency and criticality defined in SLAs, ensuring timely resolution of inquiries. The specific SLA terms and ticket priorities guide our commitment to providing efficient and effective support to address questions promptly.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Support levels
- Our Support Level Agreements (SLAs) are designed to deliver timely and effective assistance. Users benefit from dedicated cloud engineers available to answer calls and address inquiries. Our SLA categorises issues into four priority levels, each with a corresponding response time commitment. Priority 1 (P1) urgent issues receive a rapid response within 30 minutes, ensuring critical problems are swiftly addressed. High-priority (P2) concerns are attended to within 2 hours, maintaining a prompt response for significant issues. Medium (P3) priority issues receive attention within 4 hours, and low-priority (P4) matters are addressed within 8 hours. These SLAs aim to provide a structured and responsive support framework, allowing users to receive assistance tailored to the urgency and criticality of their specific needs.
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Fortinet
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BRITISH ASSESSMENT BUREAU LTD
- ISO/IEC 27001 accreditation date
- 01/05/2024
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- Fortinet Certified Fundamentals in Cybersecurity
- Fortinet Certified Network Security Professional
Social Value
- Social Value
-
Social Value
Tackling economic inequalityTackling economic inequality
Tackling economic inequality within the secure nexus framework involves strategic procurement practices aimed at promoting fair wages, supporting local businesses, and fostering job opportunities for marginalized communities. By prioritizing contracts with suppliers who demonstrate commitment to equitable employment practices and investing in initiatives that uplift disadvantaged groups, the secure nexus approach not only enhances economic stability but also cultivates a more inclusive and resilient society.
Pricing
- Price
- £1,000 a unit a year
- Discount for educational organisations
- Yes