Skip to main content

Help us improve the Digital Marketplace - send your feedback

Intercity Technology Limited

Managed Anti-Malware (AppGuard)

Managed Anti Malware (AppGuard) provides proactive endpoint security against advanced threats. It utilises zero-trust application control to prevent malware and ransomware attacks. Centralised management provides real-time monitoring and automatic updates. Enhance your defence without impacting performance. Ideal for businesses prioritizing robust, cloud-managed cybersecurity solutions.

Features

  • Uses an allowed actions profile for every application
  • Stops an application from trying to do something it shouldn't
  • Does not reveal to the attacker what it's done
  • Works on Windows XP3, 7 and above
  • Works on Windows Server 2008 R2 and above
  • Works on Linux Red Hat, CentOS and Amazon
  • Works with Windows Defender and Linux antivirus
  • Includes MSSP deployment, monitoring and reporting
  • Use to check new software applications before rolling them out
  • Does not need to identify the attack, only its activity

Benefits

  • Protects against ransomware
  • Suitable for protecting current and legacy Windows devices
  • Infected devices can continue to operate normally
  • Minimal management overhead
  • Proven to prevent the latest attacks, e.g. HermeticWiper
  • Track record of successful use by security services, e.g. CIA
  • Zero trust within the endpoint or server
  • Proof of concept includes policy creation
  • Protects against techniques, not signatures
  • MSSP is like having a monitored burglar alarm system

Pricing

£65.86 a device a year

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@intercity.technology. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

8 2 7 7 3 9 6 1 4 5 8 8 4 2 6

Contact

Intercity Technology Limited Elise Sheridon
Telephone: 0330 332 7933
Email: tenders@intercity.technology

Service scope

Software add-on or extension
No
Cloud deployment model
Hybrid cloud
Service constraints
It is not an antivirus product but can be used with Windows Defender and Linux antivirus products
System requirements
  • Windows workstation: XP SP3, Windows 7 and above
  • Windows server: Windows Server 2008 R2 and above
  • Limitations for Microsoft RDS owing to concurrent session limits
  • Red Hat Enterprise Linux 7.4 7.5 7.6 7.7 (Kernel v3.10)
  • Red Hat Enterprise Linux 8.1 (Kernel versions 4.18)
  • CentOS Linux 7.4, 7.5, 7.6, 7.7 (Kernel versions 3.10)
  • CentOS Linux 8.1 (Kernel version 4.18)
  • AWS Linux 2 (Kernel version v.14)

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 4 hours.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
No
Support levels
Help Desk provides 24 x 7 x 365 support

Level 1 - direct support to Authorised Users
Level 2 - direct support to Customer Administrators only
Level 3 - escalation from Help Desk to AppGuard developers
Support provided by a Help Desk cyber security specialist
Support available to third parties
Yes

Onboarding and offboarding

Getting started
* Provide users with .exe or .msi to install on their devices
* Discovery period used to define the customer's policy
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
There is no data to extract - users uninstall the client from their devices, and the service no longer functions.
End-of-contract process
* Users uninstall the client from their devices
* Final report provided (PDF) and raw data files (CSV)
* Customer removed from Intercity and third-party MSSP's CRM systems
* The onboarding charge includes offboarding

Using the service

Web browser interface
No
Application to install
Yes
Compatible operating systems
  • Linux or Unix
  • Windows
  • Other
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
The client for personal computers is a Windows-style app.
Accessibility standards
None or don’t know
Description of accessibility
Users can set the protection level on their Windows workstations (subject to company policy).
Accessibility testing
None
API
No
Customisation available
Yes
Description of customisation
They can ask for the security policy to be modified.

Scaling

Independence of resources
Autonomous client installed on devices and servers.

Analytics

Service usage metrics
Yes
Metrics types
* Licence information
* Managed service overview
* Company overview
* Quantities of blocked and prevented events
* Device information
* Devices
* Prevented activities search results
* Blocked activities search results
Reporting types
Regular reports

Resellers

Supplier type
Reseller (no extras)
Organisation whose services are being resold
Assurity Systems Limited

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Monthly report provided
Data export formats
  • CSV
  • Other
Other data export formats
PDF
Data import formats
Other
Other data import formats
Not Applicable

Data-in-transit protection

Data protection between buyer and supplier networks
IPsec or TLS VPN gateway
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
The management server availability is 99.999%
Approach to resilience
The management platform is built on a resilient cluster
Outage reporting
Outage reports are provided via email

Identity and authentication

User authentication needed
No
Access restrictions in management interfaces and support channels
Username and password and 2FA
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users receive audit information on a regular basis
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Intercity's Head of Governance and Assurance reports directly into the Board and is responsible for managing Intercity's fully integrated management system with includes ISMS, QMS, BCM, SMS and EMS. Intercity is committed to ensure the Confidentiality, Integrity and Availability of all systems and the data that resides within them. Core to the principles is compliance to ISO27001 which provides a sound basis for our security policies and managing risk to information assets. A schedule of both internal and external audits is in place along with a program of continual improvement to ensure policies are appropriate to the requirement and that policies, processes and work instructions are being followed. Key objectives and KPIs are tracked and monitored which are relevant to policy performance. Policies which make up our ISMS include: Information Security Policy; Information Security Employee Handbook; Physical and Environmental Security Policy; Information Security Incident Management Policy; Data Protection Policy; Access Control Policy; Computer Disposal Policy and Controlled Waste; Information Classification & Control Procedure; Cryptography Policy; Emergency Preparedness and Response Policy; Virus Protection Policy; Internet Usage Policy; Mobile Computing & Teleworking Policy; Company Asset Usage Policy; Whistleblowing Policy.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Supplier defined controls
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Supplier defined controls
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Supplier defined controls
Incident management type
Supplier-defined controls
Incident management approach
Customers raise incidents via phone. Incident reports are provided ad-hoc and monthly.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

We are committed to reducing our environmental impact and continually improving our environmental performance as an integral and fundamental part of our business strategy and operating methods.

Our policy is to:

• Support and comply with or exceed the requirements of current environmental legislation and codes of practice.
• Minimise our waste and reuse or recycle as much of it as possible.
• Minimise energy and water usage in our buildings, vehicles, and processes to conserve supplies, and minimise our consumption of natural resources, especially where they are non-renewable.
• Apply the principles of continuous improvement in respect of air, water, noise, and light pollution from our premises and reduce any impacts from our operations on the environment and local community.
• As far as possible purchase products and services that do the least damage to the environment and encourage others to do the same.
• Assess the environmental impact of any new processes or products we intend to introduce in advance.

We’re certified to ISO140001:2015 and a member of two Corporate Social Responsibility (CSR) initiatives - Global Compact and Eco Vadis.

• The EcoVadis sustainability assessment methodology evaluates how well a company has integrated the principles of Sustainability/CSR into their business and management system.
• The methodology is built on international sustainability standards, including the Global Reporting Initiative, the United Nations Global Compact, and the ISO 26000, covering 200 spend categories and 160+ countries.
• The Sustainability Scorecard illustrates performance across 21 indicators in four themes: Environment, Labour and Human Rights, Ethics, and Sustainable Procurement.
• Intercity Technology’s current EcoVadis score for 2022 – 2023 is 81% (up from 68% in previous years).
• We have been awarded by EcoVadis a platinum medal in recognition of our sustainability achievement for our score which is in the top 1%.

Pricing

Price
£65.86 a device a year
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
* Proof of value
* Up to 5 user endpoints
* Up to 30 days duration

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@intercity.technology. Tell them what format you need. It will help if you say what assistive technology you use.