Broadcom/Symantec Protection Engine
Symantec Protection Engine (SPE) for Cloud Services 8.2 is a flexible and feature-rich client/server application that allows customers to incorporate malware and threat detection technologies into almost any application. SPE for Cloud Services provides access to innovative security that helps to ensure the safety of incoming content to your environment.
Features
- Rich, easy-to-use centralized console for managing and monitoring all instances
- Advanced Machine Learning capability
- Detect both known and unknown malware
- Innovative URL filtering technology
- Mobile data scanning capabilities for APK files
- Console provides scan statistics, system information, policy-control, and user management
- Supports secure ICAP
- Syslog support
- Specify both time and time ranges in LiveUpdate Triggers
Benefits
- Simple integration with third-party applications
- Embeddable, industry-leading malware detection technologies
- Integrated rich URL categorization and filtering
- Protect applications and storage from hosting and distributing malware
Pricing
£1 a licence
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 0 5 2 4 8 4 0 4 7 3 9 7 3 1
Contact
Gradian Systems Ltd
Stuart Case
Telephone: 07770 377936
Email: stuart.case@gradian.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- N/A
- System requirements
-
- Microsoft Windows 2019, 2016, 2012 R2, 2012
- Red Hat Enterprise Linux 7.x, 8.x
- CentOS 7.x, 8.x
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Please see Gradian Support guide
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Please see Gradian Support guide
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- All documentation provided at start of contract
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Available on request
- End-of-contract process
- Available on request
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- Available on request
- API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- Can set custom policies
Scaling
- Independence of resources
- Available on request
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Reseller (no extras)
- Organisation whose services are being resold
- Broadcom/Symantec
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- Other locations
- User control over data storage and processing locations
- No
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Available on request
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- Available on request
- Approach to resilience
- Available on request
- Outage reporting
- Dashboard and email
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Available on request
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Unknown
- ISO/IEC 27001 accreditation date
- May 2016
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Available on request
- Information security policies and processes
- Available on request
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Available on request
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Available on request
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Available on request
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Available on request
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
Gradian are very proud to be an equal opportunity employer.
Pricing
- Price
- £1 a licence
- Discount for educational organisations
- No
- Free trial available
- No