Heimdal Security - Next-gen Antivirus, Ransomware Encryption Protection & Patch and Asset Manager
Heimdal Security elevates your digital defense, seamlessly integrating powerful anti-virus and firewall capabilities with cutting-edge ransomware protection and vulnerability management, ensuring unparalleled security for your data and systems.
This bundle includes:
• Next-Gen Anti-Virus, Firewall & MDM
• Ransomware Encryption Protection
• Patch & Asset Management
Features
- Utilises machine learning to detect and neutralise viruses.
- Monitors and controls incoming and outgoing network traffic.
- Automatically blocks ransomware threats and prevents file encryption attempts.
- Automatically updates software and applications to close security gaps/vulnerabilities.
- Remote-wipe or lock all stolen devices.
- Monitors applications and files in real-time to detect suspicious behaviour.
Benefits
- Safeguards critical business data from malware and ransomware attacks.
- Prevents unauthorised access and potential intrusions.
- Automates the update process, ensuring software less vulnerable to exploits.
- Advanced detection of abnormal activities and potential threats.
- Ensures compliance with industry regulations and standards.
- Scalable solution that can easily adapt to increasing security needs.
Pricing
£4 a device a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 8 1 7 4 0 4 5 7 1 2 2 7 2 8
Contact
BITZ 'N' PC'Z LIMITED
Kevin Walker
Telephone: 01246791947
Email: info@bitznpcz.co.uk
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
-
Heimdal’s unified platform is built to defend against next-gen threats and provide comprehensive protection across multiple fronts. From endpoints and networks to emails, identities, and beyond.
Additional modules can be added to improve the security posture as and when required, - Cloud deployment model
- Public cloud
- Service constraints
- None at this time
- System requirements
-
- Windows 10 or 11
- MacOS 10.15 to 14
- Microsoft .NET Framework 4.8
- Up to 640 MB of disk space
- At least 4 GB of RAM
- Local administrator or domain administrator permissions
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Email and online ticketing is responded to within 4 hours Monday-Friday, 9am to 5pm. No response over the weekend.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- A technical account manager will provide support for all products we provide during business hours (Monday to Friday only).
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Implementation and onboarding are fully included as part of our comprehensive managed service. This includes training for administrators on how to effectively use the service.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- No user data is held within the platform so there is nothing to extract. Reporting data can be provided in an exported PDF.
- End-of-contract process
- We will collaborate closely with the customer to facilitate a seamless transition away from the Heimdal product, providing all necessary support and guidance on removing the clients from the endpoints.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- Linux or Unix
- MacOS
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The mobile version has a simplified interface and only includes the Next-Gen Antivirus module (it does not include the Patch Management or Ransomware Encryption Protection modules).
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
-
The Heimdal Dashboard is essentially the control center for Heimdal Security's software, designed to make managing your cybersecurity simple and efficient. Here’s how it works in simple terms:
• When you first log in, the dashboard provides a quick summary or overview of your system’s security status;
• Real-Time Data: It displays real-time data about the health and security of your devices;
• Updates and Patches: It keeps you informed about necessary software updates or patches and can automate these updates;
• Reports and Analytics: The dashboard provides detailed reports and analytics about any security events and incidents. - Accessibility standards
- None or don’t know
- Description of accessibility
-
The Heimdal Dashboard is designed to be accessible in several ways to accommodate various users, from IT professionals to small business owners with minimal technical background.
• Web-Based Interface: The dashboard is accessible via a web browser, meaning you can access it from anywhere at any time, as long as you have an internet connection.
• Intuitive Layout: The layout of the dashboard is designed to be intuitive, with clear labels, easy navigation, and a logical organisation of information.
• Customisable Views: Users can often customize the dashboard to highlight the information that is most important to them. - Accessibility testing
- None
- API
- No
- Customisation available
- Yes
- Description of customisation
- Buyers can customise the settings to fit their specific security needs and preferences. Templated policies will also be provided to ensure a robust security posture.
Scaling
- Independence of resources
- We maintain stringent Service Level Agreements (SLAs) that ensure rapid response times for any issues identified.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Heimdal Security allows you to easily access statistics about your endpoints, found detections, and applications deployed via the Heimdal Agent.
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Heimdal Security
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- Never
- Protecting data at rest
- Other
- Other data at rest protection approach
- All data is securely stored in public cloud environments, equipped with robust security and protection measures.
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Not applicable
- Data export formats
- Other
- Other data export formats
- Not applicable
- Data import formats
- Other
- Other data import formats
- Not applicable
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- The Heimdal client uses cloud-native architecture with 99.9% uptime. Access to the Heimdal Dashboard is available through any web-enabled device and comes with a guarantee of 95% availability.
- Approach to resilience
- Further information around the architecture of the solution is available on request.
- Outage reporting
- Outages are reported via email to a nominated contacted within the buyers company.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- The user will need to authenticate by username and password with an additional MFA prompt. We will restrict access to only named personnel.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- All of our security policies are in alignment with with ISO27001
- Information security policies and processes
-
The following policies are in use and reviewed annually:
AI Usage Policy
Communications, Email & Internet Policy
Data Breach Reporting
Data Protection Policy
Data Protection Complaints Procedure
Information Security Policy
Password Policy
Patch Management Policy
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Our configuration and change management approach adheres to best practices in operational security by documenting all changes, requiring approval through a strict governance process, and continuously monitoring for compliance. This ensures integrity and security across all systems, minimising risks associated with unauthorised changes.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Our vulnerability management approach aligns with best practices by employing regular, automated scans to detect vulnerabilities, prioritising risks based on severity, and promptly applying patches and updates. We ensure continuous improvement through periodic reviews and adaptation to emerging threats, safeguarding system integrity and data security.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Our protective monitoring approach utilises Heimdal Security and Huntress Labs' Security Operations Centers (SOCs) to provide 24/7 surveillance and real-time threat detection. By leveraging advanced analytics and threat intelligence, we quickly identify and respond to potential security incidents, ensuring robust defense and system resilience.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Our incident management approach ensures rapid response and resolution of security events. We employ a structured protocol that includes immediate incident identification, thorough investigation, effective containment, and clear communication. Post-incident analysis and continuous process improvement are integral to our strategy to enhance resilience and prevent future occurrences.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
WellbeingWellbeing
Bitz 'n' PC'z Ltd recognises its employees as its most valuable asset and understands that their well-being is crucial for effective performance and the delivery of high-quality services. Accordingly, the company is dedicated to creating and sustaining a healthy and supportive work environment.
Pricing
- Price
- £4 a device a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- 30 day free trial