Cisco Security from Virgin Media O2 Business
Cisco leads the way with solutions that are driving the industry in SASE, XDR, and zero trust. Integrating it all is Cisco SecureX, Cisco's security platform that provides simplicity, visibility and efficiency across the Buyer's security infrastructure.
Features
- Cisco Secure Access by Duo
- Cisco Secure Email
- Kenna Security
- Cisco Secure Endpoint
- Next-Generation Firewalls (Firepower)
- Cisco Identity Service Engine (ISE)
- Cisco Umbrella
- Cisco Cloudlock
- Cisco AnyConnect
- Cisco Secure Workload
Benefits
- Improved Security Posture
- Reduced System Complexity
- Improved, Simplified Security Management
- Automated alerts and monitoring
- Consolidate platforms and reduce security spend
- Improved threat visibility and control
- Significantly reduce time to detect breaches
- Reduce time to respond
Pricing
£10 a user a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 3 0 9 1 8 7 3 1 6 2 1 7 1 6
Contact
Virgin Media Business
Diane Murray
Telephone: 07973 622296
Email: publicprocurement@virginmedia.co.uk
Service scope
- Service constraints
- Service constraints listed per Cisco products.
- System requirements
-
- Administrators of the service interact via web browser only
- An industry standard web browser that support TLS 1.0+
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Yes, email support is provided for Cisco Security product suites. http://www.cisco.com/c/dam/en_us/about/doing_business/legal/docs/omnibus-cloud-security.pdf
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Details on Cisco Technical Support Offerings can be found here: http://www.cisco.com/c/dam/en_us/about/doing_business/legal/docs/omnibus-cloud-security.pdf
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Cisco Security Cloud Solutions are sold as standalone resell only. Professional Services and installation services are available at additional costs.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Cisco does not store any customer information except metadata. All audit logs, incidents, activities can be exported at anytime to a CSV file and/or PDF when the contract ends at which time Cisco's Dev Ops team will delete customer audit data from its databases.
- End-of-contract process
- Standard Terms and Conditions require that data is deleted upon contract termination.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Administrators of the service interact with the customer dashboard via web browser only, no client side software required. An industry standard web browser that support TLS 1.0, 1.1, or 1.2 is sufficient. We support the last major version and 1 previous major version of the big 3: IE, Chrome, Firefox.
- Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- Not applicable.
- Web interface accessibility testing
- Not applicable.
- API
- Yes
- What users can and can't do using the API
- See setup for more details.
- API automation tools
- Other
- Other API automation tools
- Postman
- API documentation
- Yes
- API documentation formats
-
- HTML
- Other
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- With no hardware to deploy, the company can configure new offices, remote branches and stores quickly. Cisco does not require the need to backhaul traffic to your headquarters location or major data centres. Connections to our Cisco cloud can go straight out to the internet. As the company shifts to a decentralized model, this will be a crucial value add.
- Usage notifications
- No
Analytics
- Infrastructure or application metrics
- No
Resellers
- Supplier type
- Reseller (no extras)
- Organisation whose services are being resold
- Cisco Security
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Other
- Other data at rest protection approach
- When leveraging the virtual appliance or roaming client, all data is encrypted from the UK Government to Cisco datacenters. No data is stored locally at the UK Government, Data in the backend database is not encrypted. A customer's dashboard password is BCrypt hashed prior to storage in the database.
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- In-house destruction process
Backup and recovery
- Backup and recovery
- No
Data-in-transit protection
- Data protection between buyer and supplier networks
- Other
- Other protection between networks
- Where possible, best of breed encryption is used to protect customer queries in transit.
- Data protection within supplier network
- Other
- Other protection within supplier network
- Where possible, best of breed encryption is used to protect customer queries in transit.
Availability and resilience
- Guaranteed availability
- For Service Availability Commitments, please see the following: http://www.cisco.com/c/dam/en_us/about/doing_business/legal/docs/omnibus-cloud-security.pdf
- Approach to resilience
- For Service Availability Commitments, please see the following: http://www.cisco.com/c/dam/en_us/about/doing_business/legal/docs/omnibus-cloud-security.pdf
- Outage reporting
- Email alerts.
Identity and authentication
- User authentication
- 2-factor authentication
- Access restrictions in management interfaces and support channels
- On request.
- Access restriction testing frequency
- Less than once a year
- Management access authentication
- 2-factor authentication
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Dedicated device on a government network (for example PSN)
- Dedicated device over multiple services or networks
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- British Standards Institution
- What the ISO/IEC 27001 doesn’t cover
- The ISO 27001 certificate covers the protection of Buyer and Supplier employee information that is managed within the Supplier's organisation.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- ISO 22301 Business Continuity Management
- ISO 20000 IT Service Management
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- • Cyber Essentials Plus • ISO 20000 IT Service Management • ISO 22301 Business Continuity Management • ISO 9001 Quality Management System
- Information security policies and processes
- The Supplier and Cisco's information security policies are designed to meet the ISO/IEC 27001 Information Security Management Systems (ISMS) requirements and are available on the respective intranets to all employees, contractors, consultants, temporary and other workers. In certain cases, we have implemented more stringent internal controls to comply with legal, regulatory or customer security requirements. Information Security policies and supporting standards are reviewed and approved by cross-functional groups including IT, Legal, Information Security, and HR. Policies are reviewed biennially and standards are reviewed annually.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Cisco uses a formal change management system that documents, maintains, and archives changes made to the IT infrastructure. All the Changes go through Risk and Business Impact assessment via the Change Management process and CAB. Each change request is assigned risk/impact score (high, medium, low or very low) based on the answers to the risk assessment questions, the number of resources included as affected resources, and the priority of the listed resources.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- The Corporate Information Security team performs periodic vulnerability analysis, penetration testing, and risk assessments to determine areas of vulnerability and to initiate appropriate remediation. Policies, standards, and guidelines are classified Cisco Confidential and cannot be redistributed. The Security Alert tiger team evaluates vulnerabilities which are identified through various organizations, categorizes them as applicable to Cisco's environment and rates them using the CVSS scale. These ratings are reviewed with the appropriate support teams who analyze business impact and collectively determine implementation timeframes (i.e. in next patch cycle or immediate fix required).
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
-
The Cisco Computer Security Incident Response (CSIRT) monitors Intrusion Detection Systems (IDS) using various Security Information Management Systems (SIMS). Cisco uses both network- and host-based IDS. Cisco has deployed IDS at the perimeter and other internal network choke points to provide alerts for security incidents. The audit log reviews determine the level of monitoring and controls in place to ensure authorized activity. The following activities are reviewed:
Authorized access information including user ID, files accessed, and event notifications
Use of administrative/root accounts
Unauthorized access attempts including failed attempts
System alerts and failures - Incident management type
- Undisclosed
- Incident management approach
- The Cisco Computer Security Incident Response monitors Intrusion Detection Systems using various Security Information Management Systems. Cisco uses both network- and host-based IDS. Cisco has deployed IDS at the perimeter and other internal network choke points to provide alerts for security incidents. CSIRT has full-time, dedicated resources that run daily reports for potentially dangerous activities. The audit log reviews determine the level of monitoring and controls in place to ensure authorized activity. The activities are reviewed: Authorized access information including user ID, files accessed, event notifications Use of administrative/root accounts Unauthorized access attempts including failed attempts System alerts and failures.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- Hyper-V
- How shared infrastructure is kept separate
- On request.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- ISO14001 certified with energy-efficient processes in place such as water, lighting and recycling.
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
The Supplier’s approach to protecting the environment is detailed in our Environment Policy and guided by certification to internationally recognised standards and systems including ISO14001:2015. The Supplier has internal policies regulating water usage, waste disposal, minimising single-use plastics and carbon emission reduction.
In April 2023, we received validation from the Science Based Target initiative (SBTi) for the following carbon-reduction goals:
• Net zero by 2040 with a 90% reduction in value chain emissions (Scope 1, 2 and 3).
• Reducing operational emissions (scopes 1 and 2) by 90% and scope 3 emissions by 50% by the end of 2030.
• Reducing operational emissions (scopes 1 and 2) by 60% and scope 3 emissions by 25% by the end of 2025.
As of February 2024, the Supplier has reduced operational emissions by 45% (baseline FY2020). Here are some examples of the actions we’re implementing to achieve our goals:
• A stringent Code of Conduct requiring suppliers to have a board-approved carbon reduction plan with SBTi-aligned Net Zero goals and interim targets.
• Continuing to source 100% renewable electricity to power our network where we control the bill.
• Delivering a Mast De-Carbonisation Project to drive the landlords of third-party sites to source green electricity. In 2023, the Supplier has de-carbonised 1,128 masts.
• Transitioning our fleet of over 4,000 vehicles to electric by the end of 2030.
• Free-of-charge carbon footprint estimations for our solutions, so customers are better equipped to implement technology sustainably. Our model has been certified by the Carbon Trust.
The Supplier also aims to achieve zero waste operations and zero waste products by the end of 2025. To support this, all customers (including public sector organisations) can receive cash for trading in their unwanted devices and a minimum of 95% of this waste is recycled.Covid-19 recovery
Immediate response to the pandemic:
The Supplier’s priority during the COVID-19 pandemic was to ensure that communities were safe and supported. Actions included:
• Providing 40GB of free data a month to support home-schooling families struggling to connect during lockdown.
• Offering any customer who worked for the NHS an extra 10GB of data monthly for six months from Summer 2020.
• Partnering with environmental charity, Hubbub, to launch ‘Community Calling’, which works with 400+ local community organisations to re-distribute smartphones to people who need them most.
• Offering vulnerable customers on mobile contracts unlimited minutes and an extra 10GB of data
• Launching an Essential Broadband tariff for existing customers who receive Universal Credit, Pension Credit, Income Support, Income-based Jobseekers Allowance and/or Income-based Employment Support.
Continued support for those impacted by COVID-19:
The Supplier recognises that COVID-19 exacerbated existing economic and social challenges, and created new ones, so we’re continuing to contribute to economic recovery and support the most vulnerable. Actions include:
• Continuing to provide return-to-work opportunities – the Supplier recently announced 200 new entry-level positions being created in 2024.
• To ensure our customers can access the information they need, the Supplier offers over 60 zero-rate sites including National Energy Action, Citizens Advice and National Debtline.
• 9.7 million people are now eligible to benefit from the Supplier’s Essential Broadband tariff.
• In 2022, the Supplier provided a £400,000 grant fund to launch the Tech Lending Community. This initiative makes tablets and free data available to community organisations supporting vulnerable individuals across the UK, all while extending the life of second-hand tech.
• In June 2021, the Supplier announced its support for the ‘Together Coalition’, by offering grants of £1,000 to 400 small charities that champion and celebrate the community spirit, belonging and togetherness across the UK.Tackling economic inequality
The Supplier is committed to tackling economic inequality across the UK. This includes:
• Hiring over 2,600 apprentices since our award-winning scheme began in 2008. Our ‘blind recruitment’ process opens opportunities to those who have potential but may lack relevant experience.
• Working with organisations, such as ‘Blind in Business’ and ‘Step into STEM’ to help create opportunities for groups often facing barriers to employment.
• Supporting business creation and growth, through Wayra (start-up cohort) and 5G accelerator hubs.
• Hosting a virtual work experience programme for 14–16-year-olds, focused on driving diversity in STEM careers.
The Supplier works directly with our customers to provide employment and upskilling opportunities in their communities. For example, our nationwide network of 170+ ‘Future Careers Ambassadors’ provides support and guidance to pupils from groups traditionally underrepresented in STEM. The Supplier pays around £2.5m every year through the Apprenticeship Levy and has spent 55% of the levy to date on apprenticeships (versus a UK average of 39%).
Additionally, the Supplier has a significant focus on addressing digital exclusion since this is a key barrier to economic equality. By 2025, we aim to:
• Connect 1 million digitally excluded individuals.
• Equip 6 million people with digital skills, confidence, and tools.
The Supplier’s customers benefit from access to subject matter experts in this space, as well as our established partnerships. Our digital inclusion initiatives include:
• Partnership with the Good Things Foundation to create the National Databank, which provides free-of-charge SIMs for individuals experiencing data poverty. Since 2022, over 78,568 SIMs have been distributed.
• The Supplier’s nationwide ‘Connect More’ programme enables our employees to use their five paid volunteering days to deliver digital skills training through local authority and third-sector drop-in centres.
• As part of our ‘Community Calling’ initiative, over 18,292 phones have been re-homed.Equal opportunity
The Supplier is dedicated to tackling inequality and enabling everyone across the UK to fulfil their potential.
The Supplier’s diversity, equity, and inclusion strategy, ‘All In’, sets bold ambitions to be achieved by 2027. These are measured and reviewed regularly to ensure that the Supplier is on track.
To support ‘All In’, the Supplier has created an Inclusive Recruitment Programme to ensure our end-to-end recruitment journey for internal/external talent is fully inclusive.
The Supplier also reduces barriers through our policies aimed at providing the right support and flexibility for all employees. This includes:
• Industry-leading Family Friendly people policies which include up to 26 weeks’ paid maternity and adoption leave, 14 weeks’ paternity leave and up to 12 weeks’ paid neonatal leave, plus paid time off for caring, bereavement, emergencies, and more.
• Optimising our workplace adjustment process in collaboration with industry leaders, ‘Microlink’.
• Our ‘Work Smarter, Live Better’ hybrid working policy empowers our people to work in a way that helps them thrive.
• Integrating an ‘Adjustment Passport’ into our HR system, which provides comprehensive documentation of the accommodations provided for employees. This eliminates the necessity to divulge personal information.
• Regularly collaborating with our employee networks which represent the LGBTQ+ community, gender, disabled people, people who are neurodivergent, unpaid carers, and underrepresented ethnic groups.
• Signing up to the Government’s Disability Confident scheme and working towards achieving the Level 2 Disability Confident Leader standard.
• Attaining the 'Carers Confident' Level 1 classification and actively progressing toward Level 2.
• Funding gender transition treatment for our transgender and non-binary employees and helping them access medical care and support.
Additionally, all our suppliers must provide a Modern Slavery Transparency Statement detailing the actions they have taken to minimise the risk of Modern Slavery in their operations and supply chains.Wellbeing
Improving Health and Wellbeing:
The Supplier promotes a culture of health, education, and wellbeing so that we can support all employees, both personally and professionally.
Our ‘Thrive’ programme provides a comprehensive range of advice, tools and policies to ensure our people can be their best at work. As part of Thrive, our employees have free 24/7 access to confidential support and advice from trained therapists via Bupa Healthy Minds. Our people can also access free online treatment, such as Computerised Cognitive Behavioural Therapy.
The Supplier offers the following management development modules:
1) Stamp Out Stigma: Managers’ mental health awareness
2) Anxiety and Depression: Managers’ toolkit
3) Workplace Stress: Managers’ survival kit.
To support physical wellbeing, the Supplier’s employees are enrolled on the Bupa Medical plan from day one. Our people can even choose to extend this to their partner and/or children by paying an amount every month. The Supplier also offers a Ride-to-Work scheme to help our people improve their fitness, reduce their carbon footprint, and save money on the cost of a bike.
Personal development also has a crucial role in wellbeing, so the Supplier ensures that our people have the right knowledge, skills and behaviours to reach their full potential. We have a wealth of learning and development tools available, including unlimited access to 16,000+ online courses on LinkedIn Learning, which are taught by passionate real-world professionals.
Community Integration:
When delivering social value propositions, the Supplier prioritises collaborating with the community to help deliver a shared vision for the area. This includes partnering with the public sector, private sector, and third sector.
Additionally, all the Supplier's employees have five paid volunteering days per year to support and connect with their local communities, digitally and in person. Since 2023 alone, our people have supported over 443 charitable causes.
Pricing
- Price
- £10 a user a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- On request.