Cross Domain Gateway Solution CDS
Xcalator™ series of products are High Security Gateway Cross Domain Solutions - CDS. Utilising NCSC approved data diode and firewalls, our solutions support a wide range of high security, one way (one-way ) data transfer use-cases:
Files
Import/export
Documents
Browse-down
OoB Management
Network segregation
Safe internet browsing
Cross classification gateway
Features
- Secure web internet browsing
- Prevent malware risk and share data with customers and suppliers
- CAPS approved data diode
- Prevent document-based malware O365 M365 Microsoft Office
- Safely import and export known and unknown data
- Secure your SOC or CSOC service syslog and pcap data
- Prevent image-based malware JPG, PNG, GIF
- Data transfer automation
- Secure Out of Band OoB Management using VNC or RDP
- Content Disarm and Reconstruction (CDR) technology Glasswall
Benefits
- High security and high assurance data sharing
- Highly secure; no network path open to attack
- Secure supply chain
- Safe business to business (b2b) data sharing
- Prevent Data Leaks
- Zero Trust Networking
- Zero Trust Cloud
- Securing the use of web and cloud based applications.
- Zero Trust Network Access
- Fast implementaion, easy to use
Pricing
£995 to £2,750 a licence a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 1 5 5 5 3 5 4 8 6 9 9 6 7 0
Contact
Xpertex
Louise Carter
Telephone: 08450341412
Email: louise.carter@xpertex.com
Service scope
- Service constraints
- Requires hardware diode devices
- System requirements
-
- Data sharing and the need to share data
- Virtual machines (Windows Server 2012+) to host transfer software.
- Browse down gateway requires a Remote Desktop (RDP) server
- Secure internet broswing requires Virtual Desktop Infrastructure (VDI)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We offer 4hr, 8hr or Next Business Day (NBD) SLA's according to the customer requirements and in line with ITIL processes.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 A
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Web chat is available either via our ticketing portal, or direct supplier to customer Teams instant messaging.
- Web chat accessibility testing
- None.
- Onsite support
- Yes, at extra cost
- Support levels
- We can provide 4hr, 8hr, or NBD on site support. Pricing varies, but please refer to the SFIA rate card for engineer rates to give indicative pricing.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Telephone, remote and onsite support and delivery services, backed up by manufacturer (SonicWall, Juniper and OakDoor) support.
- Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
-
- Online
- Helpdesk
- Bespoke Build Guides
- Bespoke Operations Guides
- End-of-contract data extraction
- There is no data stored in the Xcalator™ CDS solution itself, only the file transfer software. For automated file transfer, the "sent files" folder is deleted every 30 days (configurable). when the contract ends, the software will continue to function but will not be supported.
- End-of-contract process
- All components will continue to operate, but will be out of support. Customer has the chance to renew support at additional cost.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Full configuration of boundary firewall component management only. High Security data diodes and gateways are NOT user-manageable for security reasons.
- Web interface accessibility standard
- WCAG 2.1 A
- Web interface accessibility testing
- N/A
- API
- Yes
- What users can and can't do using the API
- Boundary firewall component management only. High Security data diodes and gateways are NOT user-manageable for security reasons.
- API automation tools
- Other
- Other API automation tools
- SonicOS API
- API documentation
- Yes
- API documentation formats
-
- Other
- Command line interface
- Yes
- Command line interface compatibility
- Other
- Using the command line interface
- Boundary firewall component management only. High Security data diodes and gateways are NOT user-manageable for security reasons.
Scaling
- Scaling available
- No
- Independence of resources
- This is controlled by the Cloud service, not the CDS solution.
- Usage notifications
- No
Analytics
- Infrastructure or application metrics
- No
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- SonicWall, Juniper and OakDoor
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Backup and recovery
- Backup and recovery
- No
Data-in-transit protection
- Data protection between buyer and supplier networks
- Other
- Other protection between networks
- EAL7+ Data diode technology.
- Data protection within supplier network
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- Xcalator™ CDS supplements the customers existing Cloud services so relies on the underlying cloud availability and resilience.
- Approach to resilience
- Uses underlying cloud resilience and all hardware components (where relevant) are deployed as fully resilient pairs.
- Outage reporting
- Via cloud service emails, status alerts, API and dashboards.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
-
Cloud boundary firewall management interfaces can be restricted by protocol, physical interface, source IP address and confined to uswers with an administrative role.
Data diodes are only managable at the DC location and in person using a specific cable. - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Dedicated device over multiple services or networks
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- QMS Internation
- ISO/IEC 27001 accreditation date
- 30/01/2020
- What the ISO/IEC 27001 doesn’t cover
- Customer technology services, such as cloud services.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
- ISO9001
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
As an ISO 27001 certified organisation, Xpertex follow processes that support our policies that themselves have been derived from our Statement of Applicability (SoA).
Examples of our documentation suite –
1. Risk Assessment
2. Business Continuity and Disaster Recovery
3. Non-conformance and Breaches
4. Physical Security
5. Personnel Security including remote working
6. Network Security
7. Technology estate
8. Crypto Management (where required)
9. Supply Chain Assurance (via the Rizikon toolset)
8. User SyOps
10. Asset Management including safe Destruction and Disposal
11. Change Control
12. Data Classification and Handling
We have an over-arching Security Management Plan (SMP), that covers all aspects of our Information Security estate and is available upon request.
We re-certify to ISO 27001 every 3 years, but we are subject to annual maintenance audits (next audit due in June 2022).
The Security Controller has responsibility to audit compliance against the controls in the ISO standard, these audit records form part of continual improvement posture we have that is driven by our ISO 9001 Quality Management System (that has recently been recertified).
Monthly board meetings include a standing agenda from the security controller where all security matters are discussed and minuted.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All part of our standard Impact Assessment, ITL lifecycle management and Change Management processes.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Cloud boundary firewall vulnerabilities are managed using the standard manufacturer processes. Any and all potential vulnerabilities are published on the SonicWall psirt website - https://psirt.global.sonicwall.com/vuln-list.
Data Diodes have no remote attack vector so are immune to traditional vulnerabilities. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Xpertex provide protective monitoring services to our customers. Internally, we use AlienVault software in line and accordance with our CE+ and ISO 27001 and ISO 9001 certfications.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Details of impact of specific failures and associated priorities and SLA's are be discussed and agreed with customers in line with ITIL best practice. Our Service Manager will work to resolve service incidents to meet target performance level (KPI's and SLA's) and can escalate our response through the Service Director.
Incidents are reported by telephone our email through to our service desk and are reported in accordance with the support contract in place between us and the customer at that time.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Your answer must be at least 10 words
Xpertex is committed to continually improving our environmental performance and monitoring. Xpertex has started the process to gain the following two environmental ISO accreditations:
ISO 14001 Environmental Management System
ISO 50001 Energy Management System
This is on top of our existing ISO9001, ISO27001 and Cyber Essentials PLUS accreditations.
Critical to our core operation is our IT infrastructure and Data Centre, which house our IT equipment, along with connectivity to our cloud Infrastructure. Xpertex recognises that energy efficient practices, and reducing our carbon footprint, are paramount in achieving our corporate sustainability goals.
Xpertex also works with its customers to help them reduce their carbon footprint where appropriate.
Full social value statement https://xpertex.com/social-values/Tackling economic inequality
We are committed to equal pay for our workforce. To address our gender pay gap, we have several initiatives in place, to not only attract more talent, but to encourage a more balanced, and rewarding workplace.
Working with educational institutions to help attract more women into STEM focused roles.
We have a mentoring programme available for all, to encourage progression into senior roles.
Training is available to cover areas like Equality & Diversity, Unconscious Bias, etc.
We have established a Women’s Working Group who assist in supporting the attraction, retention and promotion of our female talent across the business.
Full social value statement https://xpertex.com/social-values/Equal opportunity
Xpertex is committed to developing, supporting and sustaining a diverse workforce. It strives to create a working environment where everyone can to do their job, to the best of their ability, without having to face discrimination, harassment or victimisation. Xpertex avoids unlawful discrimination in all aspects of employment including recruitment, promotion, training opportunities, pay and benefits, discipline and selection for redundancy. Any decisions concerning employment, promotion and training will be based on objective, job-related criteria and merit. Disability and personal/home commitments will not form the basis of employment decisions except where absolutely reasonable and permissible within anti-discrimination law.
Xpertex monitors the ethnic, gender, age composition of our existing workforce as well as the number of people with disabilities within these groups and will consider and take any appropriate action to address any problems that may be identified by the monitoring process.
Full social value statement https://xpertex.com/social-values/Wellbeing
Xpertex has an Employee Assistance Programme available to all staff which provides access to advice, counselling and support. Workplace mental health is especially important to the company with information and advice issued on a regular basis. We give every employee a day off on their birthday and additional holiday allowances are in place to recognise length of service milestones. We conduct an annual staff survey which provides opportunity for any issues to be raised to the senior management. Processes exist where concerns can be raised without fear of negative consequences for the individual raising the concerns. Flexible working practises developed during the Covid pandemic are in place giving all staff the ability to work from home where possible. We are continuing to provide these flexible working practices post-pandemic. Flexible working hours are encouraged and were invaluable during the pandemic and enabled parents with school age children to home-school their children, and those with responsibilities to the elderly to provide the support they wish to give. Staff are also encouraged to volunteer to continue to volunteer in the community. Xpertex participated in a local initiative to offer IT equipment to under-privileged children in the local community allowing them to conduct their schooling from home. When staff started to return to the office, all sensible precautions have been maintained. A cycle to work and an electric car salary sacrifice scheme are also available to all employees.
Full social value statement https://xpertex.com/social-values/
Pricing
- Price
- £995 to £2,750 a licence a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- We provide remote access to a fully featured, hosted demo service. Users can upload files for transfer and collect them from the demo destination repository.