Skip to main content

Help us improve the Digital Marketplace - send your feedback

BITZ 'N' PC'Z LIMITED

Heimdal Security - Next-gen Antivirus, Ransomware Encryption Protection & Patch and Asset Manager

Heimdal Security elevates your digital defense, seamlessly integrating powerful anti-virus and firewall capabilities with cutting-edge ransomware protection and vulnerability management, ensuring unparalleled security for your data and systems.

This bundle includes:
• Next-Gen Anti-Virus, Firewall & MDM
• Ransomware Encryption Protection
• Patch & Asset Management

Features

  • Utilises machine learning to detect and neutralise viruses.
  • Monitors and controls incoming and outgoing network traffic.
  • Automatically blocks ransomware threats and prevents file encryption attempts.
  • Automatically updates software and applications to close security gaps/vulnerabilities.
  • Remote-wipe or lock all stolen devices.
  • Monitors applications and files in real-time to detect suspicious behaviour.

Benefits

  • Safeguards critical business data from malware and ransomware attacks.
  • Prevents unauthorised access and potential intrusions.
  • Automates the update process, ensuring software less vulnerable to exploits.
  • Advanced detection of abnormal activities and potential threats.
  • Ensures compliance with industry regulations and standards.
  • Scalable solution that can easily adapt to increasing security needs.

Pricing

£4 a device a month

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@bitznpcz.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

7 8 1 7 4 0 4 5 7 1 2 2 7 2 8

Contact

BITZ 'N' PC'Z LIMITED Kevin Walker
Telephone: 01246791947
Email: info@bitznpcz.co.uk

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Heimdal’s unified platform is built to defend against next-gen threats and provide comprehensive protection across multiple fronts. From endpoints and networks to emails, identities, and beyond.

Additional modules can be added to improve the security posture as and when required,
Cloud deployment model
Public cloud
Service constraints
None at this time
System requirements
  • Windows 10 or 11
  • MacOS 10.15 to 14
  • Microsoft .NET Framework 4.8
  • Up to 640 MB of disk space
  • At least 4 GB of RAM
  • Local administrator or domain administrator permissions

User support

Email or online ticketing support
Email or online ticketing
Support response times
Email and online ticketing is responded to within 4 hours Monday-Friday, 9am to 5pm. No response over the weekend.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
No
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
A technical account manager will provide support for all products we provide during business hours (Monday to Friday only).
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Implementation and onboarding are fully included as part of our comprehensive managed service. This includes training for administrators on how to effectively use the service.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
No user data is held within the platform so there is nothing to extract. Reporting data can be provided in an exported PDF.
End-of-contract process
We will collaborate closely with the customer to facilitate a seamless transition away from the Heimdal product, providing all necessary support and guidance on removing the clients from the endpoints.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
The mobile version has a simplified interface and only includes the Next-Gen Antivirus module (it does not include the Patch Management or Ransomware Encryption Protection modules).
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
The Heimdal Dashboard is essentially the control center for Heimdal Security's software, designed to make managing your cybersecurity simple and efficient. Here’s how it works in simple terms:

• When you first log in, the dashboard provides a quick summary or overview of your system’s security status;

• Real-Time Data: It displays real-time data about the health and security of your devices;

• Updates and Patches: It keeps you informed about necessary software updates or patches and can automate these updates;

• Reports and Analytics: The dashboard provides detailed reports and analytics about any security events and incidents.
Accessibility standards
None or don’t know
Description of accessibility
The Heimdal Dashboard is designed to be accessible in several ways to accommodate various users, from IT professionals to small business owners with minimal technical background.

• Web-Based Interface: The dashboard is accessible via a web browser, meaning you can access it from anywhere at any time, as long as you have an internet connection.

• Intuitive Layout: The layout of the dashboard is designed to be intuitive, with clear labels, easy navigation, and a logical organisation of information.

• Customisable Views: Users can often customize the dashboard to highlight the information that is most important to them.
Accessibility testing
None
API
No
Customisation available
Yes
Description of customisation
Buyers can customise the settings to fit their specific security needs and preferences. Templated policies will also be provided to ensure a robust security posture.

Scaling

Independence of resources
We maintain stringent Service Level Agreements (SLAs) that ensure rapid response times for any issues identified.

Analytics

Service usage metrics
Yes
Metrics types
Heimdal Security allows you to easily access statistics about your endpoints, found detections, and applications deployed via the Heimdal Agent.

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Heimdal Security

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
Never
Protecting data at rest
Other
Other data at rest protection approach
All data is securely stored in public cloud environments, equipped with robust security and protection measures.
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Not applicable
Data export formats
Other
Other data export formats
Not applicable
Data import formats
Other
Other data import formats
Not applicable

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
The Heimdal client uses cloud-native architecture with 99.9% uptime. Access to the Heimdal Dashboard is available through any web-enabled device and comes with a guarantee of 95% availability.
Approach to resilience
Further information around the architecture of the solution is available on request.
Outage reporting
Outages are reported via email to a nominated contacted within the buyers company.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
The user will need to authenticate by username and password with an additional MFA prompt. We will restrict access to only named personnel.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
Between 6 months and 12 months
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
All of our security policies are in alignment with with ISO27001
Information security policies and processes
The following policies are in use and reviewed annually:

AI Usage Policy
Communications, Email & Internet Policy
Data Breach Reporting
Data Protection Policy
Data Protection Complaints Procedure
Information Security Policy
Password Policy
Patch Management Policy

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Our configuration and change management approach adheres to best practices in operational security by documenting all changes, requiring approval through a strict governance process, and continuously monitoring for compliance. This ensures integrity and security across all systems, minimising risks associated with unauthorised changes.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Our vulnerability management approach aligns with best practices by employing regular, automated scans to detect vulnerabilities, prioritising risks based on severity, and promptly applying patches and updates. We ensure continuous improvement through periodic reviews and adaptation to emerging threats, safeguarding system integrity and data security.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Our protective monitoring approach utilises Heimdal Security and Huntress Labs' Security Operations Centers (SOCs) to provide 24/7 surveillance and real-time threat detection. By leveraging advanced analytics and threat intelligence, we quickly identify and respond to potential security incidents, ensuring robust defense and system resilience.
Incident management type
Supplier-defined controls
Incident management approach
Our incident management approach ensures rapid response and resolution of security events. We employ a structured protocol that includes immediate incident identification, thorough investigation, effective containment, and clear communication. Post-incident analysis and continuous process improvement are integral to our strategy to enhance resilience and prevent future occurrences.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Wellbeing

Wellbeing

Bitz 'n' PC'z Ltd recognises its employees as its most valuable asset and understands that their well-being is crucial for effective performance and the delivery of high-quality services. Accordingly, the company is dedicated to creating and sustaining a healthy and supportive work environment.

Pricing

Price
£4 a device a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
30 day free trial

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@bitznpcz.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.