Managed Anti-Malware (AppGuard)
Managed Anti Malware (AppGuard) provides proactive endpoint security against advanced threats. It utilises zero-trust application control to prevent malware and ransomware attacks. Centralised management provides real-time monitoring and automatic updates. Enhance your defence without impacting performance. Ideal for businesses prioritizing robust, cloud-managed cybersecurity solutions.
Features
- Uses an allowed actions profile for every application
- Stops an application from trying to do something it shouldn't
- Does not reveal to the attacker what it's done
- Works on Windows XP3, 7 and above
- Works on Windows Server 2008 R2 and above
- Works on Linux Red Hat, CentOS and Amazon
- Works with Windows Defender and Linux antivirus
- Includes MSSP deployment, monitoring and reporting
- Use to check new software applications before rolling them out
- Does not need to identify the attack, only its activity
Benefits
- Protects against ransomware
- Suitable for protecting current and legacy Windows devices
- Infected devices can continue to operate normally
- Minimal management overhead
- Proven to prevent the latest attacks, e.g. HermeticWiper
- Track record of successful use by security services, e.g. CIA
- Zero trust within the endpoint or server
- Proof of concept includes policy creation
- Protects against techniques, not signatures
- MSSP is like having a monitored burglar alarm system
Pricing
£65.86 a device a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 2 7 7 3 9 6 1 4 5 8 8 4 2 6
Contact
Intercity Technology Limited
Elise Sheridon
Telephone: 0330 332 7933
Email: tenders@intercity.technology
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Hybrid cloud
- Service constraints
- It is not an antivirus product but can be used with Windows Defender and Linux antivirus products
- System requirements
-
- Windows workstation: XP SP3, Windows 7 and above
- Windows server: Windows Server 2008 R2 and above
- Limitations for Microsoft RDS owing to concurrent session limits
- Red Hat Enterprise Linux 7.4 7.5 7.6 7.7 (Kernel v3.10)
- Red Hat Enterprise Linux 8.1 (Kernel versions 4.18)
- CentOS Linux 7.4, 7.5, 7.6, 7.7 (Kernel versions 3.10)
- CentOS Linux 8.1 (Kernel version 4.18)
- AWS Linux 2 (Kernel version v.14)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 4 hours.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- No
- Support levels
-
Help Desk provides 24 x 7 x 365 support
Level 1 - direct support to Authorised Users
Level 2 - direct support to Customer Administrators only
Level 3 - escalation from Help Desk to AppGuard developers
Support provided by a Help Desk cyber security specialist - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
* Provide users with .exe or .msi to install on their devices
* Discovery period used to define the customer's policy - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- There is no data to extract - users uninstall the client from their devices, and the service no longer functions.
- End-of-contract process
-
* Users uninstall the client from their devices
* Final report provided (PDF) and raw data files (CSV)
* Customer removed from Intercity and third-party MSSP's CRM systems
* The onboarding charge includes offboarding
Using the service
- Web browser interface
- No
- Application to install
- Yes
- Compatible operating systems
-
- Linux or Unix
- Windows
- Other
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- The client for personal computers is a Windows-style app.
- Accessibility standards
- None or don’t know
- Description of accessibility
- Users can set the protection level on their Windows workstations (subject to company policy).
- Accessibility testing
- None
- API
- No
- Customisation available
- Yes
- Description of customisation
- They can ask for the security policy to be modified.
Scaling
- Independence of resources
- Autonomous client installed on devices and servers.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
* Licence information
* Managed service overview
* Company overview
* Quantities of blocked and prevented events
* Device information
* Devices
* Prevented activities search results
* Blocked activities search results - Reporting types
- Regular reports
Resellers
- Supplier type
- Reseller (no extras)
- Organisation whose services are being resold
- Assurity Systems Limited
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Monthly report provided
- Data export formats
-
- CSV
- Other
- Other data export formats
- Data import formats
- Other
- Other data import formats
- Not Applicable
Data-in-transit protection
- Data protection between buyer and supplier networks
- IPsec or TLS VPN gateway
- Data protection within supplier network
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- The management server availability is 99.999%
- Approach to resilience
- The management platform is built on a resilient cluster
- Outage reporting
- Outage reports are provided via email
Identity and authentication
- User authentication needed
- No
- Access restrictions in management interfaces and support channels
- Username and password and 2FA
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users receive audit information on a regular basis
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Intercity's Head of Governance and Assurance reports directly into the Board and is responsible for managing Intercity's fully integrated management system with includes ISMS, QMS, BCM, SMS and EMS. Intercity is committed to ensure the Confidentiality, Integrity and Availability of all systems and the data that resides within them. Core to the principles is compliance to ISO27001 which provides a sound basis for our security policies and managing risk to information assets. A schedule of both internal and external audits is in place along with a program of continual improvement to ensure policies are appropriate to the requirement and that policies, processes and work instructions are being followed. Key objectives and KPIs are tracked and monitored which are relevant to policy performance. Policies which make up our ISMS include: Information Security Policy; Information Security Employee Handbook; Physical and Environmental Security Policy; Information Security Incident Management Policy; Data Protection Policy; Access Control Policy; Computer Disposal Policy and Controlled Waste; Information Classification & Control Procedure; Cryptography Policy; Emergency Preparedness and Response Policy; Virus Protection Policy; Internet Usage Policy; Mobile Computing & Teleworking Policy; Company Asset Usage Policy; Whistleblowing Policy.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Supplier defined controls
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Supplier defined controls
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Supplier defined controls
- Incident management type
- Supplier-defined controls
- Incident management approach
- Customers raise incidents via phone. Incident reports are provided ad-hoc and monthly.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
We are committed to reducing our environmental impact and continually improving our environmental performance as an integral and fundamental part of our business strategy and operating methods.
Our policy is to:
• Support and comply with or exceed the requirements of current environmental legislation and codes of practice.
• Minimise our waste and reuse or recycle as much of it as possible.
• Minimise energy and water usage in our buildings, vehicles, and processes to conserve supplies, and minimise our consumption of natural resources, especially where they are non-renewable.
• Apply the principles of continuous improvement in respect of air, water, noise, and light pollution from our premises and reduce any impacts from our operations on the environment and local community.
• As far as possible purchase products and services that do the least damage to the environment and encourage others to do the same.
• Assess the environmental impact of any new processes or products we intend to introduce in advance.
We’re certified to ISO140001:2015 and a member of two Corporate Social Responsibility (CSR) initiatives - Global Compact and Eco Vadis.
• The EcoVadis sustainability assessment methodology evaluates how well a company has integrated the principles of Sustainability/CSR into their business and management system.
• The methodology is built on international sustainability standards, including the Global Reporting Initiative, the United Nations Global Compact, and the ISO 26000, covering 200 spend categories and 160+ countries.
• The Sustainability Scorecard illustrates performance across 21 indicators in four themes: Environment, Labour and Human Rights, Ethics, and Sustainable Procurement.
• Intercity Technology’s current EcoVadis score for 2022 – 2023 is 81% (up from 68% in previous years).
• We have been awarded by EcoVadis a platinum medal in recognition of our sustainability achievement for our score which is in the top 1%.
Pricing
- Price
- £65.86 a device a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
-
* Proof of value
* Up to 5 user endpoints
* Up to 30 days duration