Skip to main content

Help us improve the Digital Marketplace - send your feedback

Xpertex

Juniper Security Director Cloud service

Network security management is how administrators operationalize their firewall architecture, provide visibility across individual deployments, policies, and traffic, and gain insight from threat analytics across the entire network traffic.

Features

  • Security Director Insights
  • Policy Enforcer
  • Firewall policy analysis
  • Firewall rule placement guidance
  • Firewall policy hit count
  • Live threat map
  • Simplified threat management
  • Policy lifecycle management
  • VPN auto provisioning and import
  • REST APIs for automation

Benefits

  • Collects and automatically correlates data across multiple security layers
  • Creates and centrally manages security policies
  • Provides the ability to schedule reports
  • Analyzes the existing firewall rule base to recommend optimal position
  • Shows hit counts for each firewall
  • Displays where threats originate
  • Automate security policies across the network
  • Reports where threats are originating
  • Provides the ability to manage all phases of security policy
  • Provides RESTful APIs used in conjunction with automation tools.

Pricing

£191 to £18,983 a device a year

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at louise.carter@xpertex.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

8 0 9 2 4 6 1 0 4 7 2 0 0 0 1

Contact

Xpertex Louise Carter
Telephone: 08450341412
Email: louise.carter@xpertex.com

Service scope

Service constraints
Requires Juniper Networks devices
System requirements
Juniper SRX devices and/or Secure Service Edge

User support

Email or online ticketing support
Email or online ticketing
Support response times
We offer 4hr, 8hr or Next Business Day (NBD) SLA's according to the customer requirements and in line with ITIL processes.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Web chat is available either via our ticketing portal, or direct supplier to customer Teams instant messaging.
Web chat accessibility testing
None.
Onsite support
Yes, at extra cost
Support levels
Xpertex can provide 4hr, 8hr, or NBD on site support. Pricing varies, but please refer to the SFIA rate card for engineer rates to give indicative pricing.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Customer can use our Managed Solutions team and/or Juniper online documentation - https://www.juniper.net/documentation/us/en/quick-start/software/sd-cloud/sd-cloud-quick-start/topics/topic-map/step-1-begin.html
Juniper offers an "all you can eat" training pass for circa £5500 for access to all Juniper online and in -person training courses.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
  • Online
  • Helpdesk
  • Online or onsite training
End-of-contract data extraction
Device configurations can be exported and some analytics via report export. The users can then delete the firewalls and their configuration data is deleted.
End-of-contract process
Configuration can be exported. Cloud instance can be wiped clean if desired.

Using the service

Web browser interface
Yes
Using the web interface
Full configuration and management of Juniper SRX firewalls and security policies, including UTM features.
Web interface accessibility standard
None or don’t know
How the web interface is accessible
Delivers full-stack Security Service Edge (SSE) capabilities, including FWaaS, SWG, CASB with DLP, ZTNA, and advanced threat protection to protect access to web, SaaS, and on-premises applications and provide users with security that follows them wherever they go.
Collects and automatically correlates data across multiple security layers— email, endpoint, server, cloud workloads and network—so threats are detected faster, and security teams can improve investigation and response times. Prevents future attacks with mitigation rules.
Creates and centrally manages security policies through a user intentbased system, evaluating threat intelligence from multiple sources while dynamically enforcing policies in near real-time across the network.
Enforces threat management policies at firewalls and access switches, aggregating threat feeds from Advanced Threat Prevention Cloud, SecIntel, and on-premises custom threat intelligence solutions with allow list and blocklist support.
Provides the ability to schedule reports that show shadow or where
redundant firewall rules are and recommends actions to fix all reported issues.
Displays where threats originate in near real-time and allow you to take action to stop them.
Automate security policies across the network, including firewalls and routers, for accurate enforcement, consistent security, and compliance
Web interface accessibility testing
N/A
API
Yes
What users can and can't do using the API
Provides RESTful APIs used in conjunction with automation tools. Automates configuration and management of physical, virtual, or containerized SRX Series firewalls.
API automation tools
  • Ansible
  • Chef
  • OpenStack
  • Puppet
API documentation
Yes
API documentation formats
  • HTML
  • PDF
Command line interface
Yes
Command line interface compatibility
  • Linux or Unix
  • Windows
  • MacOS
  • Other
Using the command line interface
Full management and configuration, complete control of the platform.

Scaling

Scaling available
Yes
Scaling type
Automatic
Independence of resources
Not really relevant as the portal is used only to adminster firewalls. No real user volumes, so the underlying Cloud platform manages this.
Usage notifications
Yes
Usage reporting
Other
Other usage reporting
Alert within portal

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • Memory
  • Network
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Juniper Networks

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
No
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery
No

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
Juniper Networks will use commercially reasonable efforts to make the Cloud Services fully available and operable over the internet in full conformity with the Cloud Service specifications for access and use by Customer, as measured over the course of each calendar month, an average of 99.99% of the time.
All scheduled maintenance work and planned downtime will be during the hours from 7:00 p.m. PST to 7:00 a.m. PST on any day. Planned downtime is not expected to occur more than once or twice per year and is not expected to exceed 120 minutes in any given month.
Note that availability of the Secure Edge service means the service is available to accept Customer’s end-user traffic, and Customer has properly configured its CPE (customer premises equipment) and end-user devices to leverage Secure Edge’s redundant infrastructure.
Juniper will use commercially reasonable efforts to enable Secure Edge to process Customer’s traffic with an average latency of 100 milliseconds or less for the 95th percentile of traffic. Processing latency of the Secure Edge means the time it takes for the incoming traffic to traverse the Secure Edge service.
Approach to resilience
By leveraging the public cloud, the infrastructure components and services of the Cloud Service are deployed redundantly (across AWS clusters and zones) in an effort to provide 24 x 7 availability. In addition, the Cloud Service is divided into microservices, so issues with one microservice do not directly affect other microservices. The
Cloud Service buffers data in the event of a component disaster, such as the loss of backend microservice. Once the disaster has been addressed, the data is replayed to fill in the lost analytics. System upgrades and feature introductions also benefit from microservices to avoid impact to the Cloud Service when performing either. This reduces the need for planned downtime. The Cloud Service has a scheduled downtime during the release upgrade, and Customers are notified 48 hours in advance of any such downtime. Minor updates and patches can be performed without any downtime.
Outage reporting
Via API, email and partner Slack channel

Identity and authentication

User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
This is a management service so ALL users perform management functions.
Access restriction testing frequency
Less than once a year
Management access authentication
  • 2-factor authentication
  • Username or password
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device on a government network (for example PSN)
  • Dedicated device over multiple services or networks
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
  • Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
QMS Internation
ISO/IEC 27001 accreditation date
30/01/2020
What the ISO/IEC 27001 doesn’t cover
Customer technology services, such as cloud services.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
  • ISO9001
  • FIPS 140-2
  • Common Criteria
  • DDIN APL
  • CSfC
  • USGv6
  • NDAA section 889 compliance
  • TAA compliance

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
As an ISO 27001 certified organisation Xpertex follow a suite of processes that support our policies that themselves have been derived from our Statement of Applicability (SoA).
Examples of our documentation suite –
1. Risk Assessment
2. Business Continuity and Disaster Recovery
3. Non-conformance and Breaches
4. Physical Security
5. Personnel Security including remote working
6. Network Security
7. Technology estate
8. Crypto Management (where required)
9. Supply Chain Assurance (via the Rizikon toolset)
8. User SyOps
10. Asset Management including safe Destruction and Disposal
11. Change Control
12. Data Classification and Handling

We have an over-arching Security Management Plan (SMP), that covers all aspects of our Information Security estate and is available upon request.
We re-certify to ISO 27001 every 3 years, but we are subject to annual maintenance audits (next audit due in June 2022).
The Security Controller has responsibility to audit compliance against the controls in the ISO standard, these audit records form part of continual improvement posture we have that is driven by our ISO 9001 Quality Management System (that has recently been recertified).
Monthly board meetings include a standing agenda from the security controller where all security matters are discussed and minuted.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All part of our standard Impact Assessment, ITL lifecycle management and Change Management processes.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Juniper PSIRT - https://www.juniper.net/security/report-vulnerability/
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Xpertex provide protective monitoring services to our customers. Internally, we use AlienVault software in line and accordance with our CE+ and ISO 27001 and ISO 9001 certfications.
Incident management type
Supplier-defined controls
Incident management approach
Details of impact of specific failures and associated priorities and SLA's are be discussed and agreed with customers in line with ITIL best practice. Our Service Manager will work to resolve service incidents to meet target performance level (KPI's and SLA's) and can escalate our response through the Service Director.
Incidents are reported by telephone our email through to our service desk and are reported in accordance with the support contract in place between us and the customer at that time.

Secure development

Approach to secure software development best practice
Supplier-defined process

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
No

Energy efficiency

Energy-efficient datacentres
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Xpertex is committed to continually improving our environmental performance and monitoring. Xpertex has started the process to gain the following two environmental ISO accreditations:

ISO 14001 Environmental Management System
ISO 50001 Energy Management System
This is on top of our existing ISO9001, ISO27001 and Cyber Essentials PLUS accreditations.

Critical to our core operation is our IT infrastructure and Data Centre, which house our IT equipment, along with connectivity to our cloud Infrastructure. Xpertex recognises that energy efficient practices, and reducing our carbon footprint, are paramount in achieving our corporate sustainability goals.

Xpertex also works with its customers to help them reduce their carbon footprint where appropriate.

Full social value statement https://xpertex.com/social-values/

Tackling economic inequality

We are committed to equal pay for our workforce. To address our gender pay gap, we have several initiatives in place, to not only attract more talent, but to encourage a more balanced, and rewarding workplace.

Working with educational institutions to help attract more women into STEM focused roles.
We have a mentoring programme available for all, to encourage progression into senior roles.
Training is available to cover areas like Equality & Diversity, Unconscious Bias, etc.
We have established a Women’s Working Group who assist in supporting the attraction, retention and promotion of our female talent across the business.

Full social value statement https://xpertex.com/social-values/

Equal opportunity

Xpertex is committed to developing, supporting and sustaining a diverse workforce. It strives to create a working environment where everyone can to do their job, to the best of their ability, without having to face discrimination, harassment or victimisation. Xpertex avoids unlawful discrimination in all aspects of employment including recruitment, promotion, training opportunities, pay and benefits, discipline and selection for redundancy. Any decisions concerning employment, promotion and training will be based on objective, job-related criteria and merit. Disability and personal/home commitments will not form the basis of employment decisions except where absolutely reasonable and permissible within anti-discrimination law.

Xpertex monitors the ethnic, gender, age composition of our existing workforce as well as the number of people with disabilities within these groups and will consider and take any appropriate action to address any problems that may be identified by the monitoring process.

Full social value statement https://xpertex.com/social-values/

Wellbeing

Xpertex has an Employee Assistance Programme available to all staff which provides access to advice, counselling and support. Workplace mental health is especially important to the company with information and advice issued on a regular basis. We give every employee a day off on their birthday and additional holiday allowances are in place to recognise length of service milestones. We conduct an annual staff survey which provides opportunity for any issues to be raised to the senior management. Processes exist where concerns can be raised without fear of negative consequences for the individual raising the concerns. Flexible working practises developed during the Covid pandemic are in place giving all staff the ability to work from home where possible. We are continuing to provide these flexible working practices post-pandemic. Flexible working hours are encouraged and were invaluable during the pandemic and enabled parents with school age children to home-school their children, and those with responsibilities to the elderly to provide the support they wish to give. Staff are also encouraged to volunteer to continue to volunteer in the community. Xpertex participated in a local initiative to offer IT equipment to under-privileged children in the local community allowing them to conduct their schooling from home. When staff started to return to the office, all sensible precautions have been maintained. A cycle to work and an electric car salary sacrifice scheme are also available to all employees.

Full social value statement https://xpertex.com/social-values/

Pricing

Price
£191 to £18,983 a device a year
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
30 day limited

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at louise.carter@xpertex.com. Tell them what format you need. It will help if you say what assistive technology you use.