Skip to main content

Help us improve the Digital Marketplace - send your feedback

Barrier Networks

Barrier Networks Secure Data Workflow (OPSWAT MetaDefender)

MetaDefender is used by organizations that require the highest level of security, including critical infrastructure, government agencies, and financial institutions, to enable a secure way to get files in and out of an organization, and prevent cyber security threats.

Features

  • Protect against threats in portable devices and media
  • Ability to block or quarantine malicious files
  • Secures the endpoint against portable media /device attacks
  • Provides a second layer of defense against threats
  • Files can be transferred using a browser
  • Multi-Scanning
  • Data Sanitization (CDR)
  • Vulnerability Scanning
  • File Handling Options
  • File Type Verification

Benefits

  • Enable visibility and auditing of file transfers
  • Prevent known and unknown threats using multi-scanning,
  • data sanitization (CDR), and vulnerability detection.

Pricing

£4,884.00 an instance a year

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@barriernetworks.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

8 4 2 4 4 8 6 0 6 4 2 4 9 4 5

Contact

Barrier Networks Iain Slater
Telephone: 0141 356 0101
Email: info@barriernetworks.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
May require specific hardware supplied by OPSWAT depending on Use Case
System requirements
  • Windows 7/8/8.1/10/2008
  • R2/2012/2012 R2/2016
  • 10GB Storage
  • 4GB RAM

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 48 working hours
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Onsite support
Support levels
OPSWAT Portal: Create and manage tickets with OPSWAT Support, download products and version updates, and view your license information

OPSWAT Knowledge Center: View product user guides, KB articles, release notes, and featured articles

Standard Support: 0800-1700 1 - 3 BUsiness Days SLA PORTAL ACCESS ONLY

Gold Support: Support Account Manager, Quarterly Reports, 0700-1900, Portal Access, Telephone SUpport Mon-Fri, SLA 2 Hours - 2 Business Days

Premium Support: Weekly Reports, Monthly Conference Call Reviews, Support Account Manager, Quarterly Reports, 24/7, Portal Access, Telephone Support, SLA 1 Hour - 1 Business Day
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Barrier Networks onboards customers by gathering all key information required to bring the service live. All system information and supporting documentation is developed and distributed to the customer as part of the onboarding process. Detailed design documentation is derived from this initial documentation. The detailed design is agreed and signed off by both parties prior to implementation. A full copy of the system documentation is provided following user acceptance testing.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Data is provided upon request by Barrier Networks once the contract has ceased.
End-of-contract process
All Software functionality is provided for the duration of the contract with Barrier Networks. Once the contract has ceased, the organisation will be off-boarded, information securely deleted from the Barrier Networks database, and tenant is removed at no extra cost. Bespoke off-boarding requirements can be purchased via "Barrier Networks Cyber Security Consultancy Services".

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Chrome
Application to install
Yes
Compatible operating systems
  • Linux or Unix
  • Windows
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
The OPSWAT Portal provides:
Product releases and documentation
Support and ticketing system
Channel partner resources
Security applications certification program
Accessibility standards
None or don’t know
Description of accessibility
Available on request
Accessibility testing
None
API
Yes
What users can and can't do using the API
MetaDefender API allows you to integrate advanced malware protection and detection into your IT solutions and applications, for instance to secure web portals from file upload attacks, enhance cyber security products, and develop malware analysis systems.
Using our REST API, you can easily leverage MetaDefender’s high-speed multi-scanning, data sanitization, and vulnerability assessment technologies, preventing zero-day attacks and unknown threats as well as providing close to 100% known threat detection, without affecting performance. MetaDefender API also includes data loss prevention (DLP) capabilities to detect and block sensitive content in files.
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • ODF
  • PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Customisation is available for
- GUI
- Policy
- Deployment

Scaling

Independence of resources
Service is either deployed in customer / private cloud or single tenant public cloud.

Analytics

Service usage metrics
Yes
Metrics types
Users
Transactions
Files scanned
Files allowed/sanitised/blocked
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller (no extras)
Organisation whose services are being resold
OPSWAT

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
The method of exporting data is agreed during implementation.
Data export formats
Other
Other data export formats
Agreed at the time of implementation
Data import formats
Other
Other data import formats
Agreed at the point of implementation

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
99.50%
Approach to resilience
Autoscaling, details available on request
Outage reporting
Email & trust.opswat.com

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Management interfaces are governed by role based access control. Support access is via registered accounts
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 6 months and 12 months
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Schellman
ISO/IEC 27001 accreditation date
Sep 2020
What the ISO/IEC 27001 doesn’t cover
N/a
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
SOC 2

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
Cyber Essentials Plus
Information security policies and processes
All employees of Barrier Networks must abide by the Barrier Networks Information Security Policy and Acceptable Use Policy. Barrier Networks follow the processesCyber Essentials as well as key processes and procedures from ISO27001.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All changes and configuration management follow ITIL V3 best practice.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
All external facing services are subject to monthly vulnerability scans. Patching takes place monthly with emergency patching taking place within 1 week of the vulnerability detection. In extreme circumstances and to protect the security of the organisation and customer, Barrier Networks will patch on the same day.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Our SOC provides Intrusion Detection Vulnerability Assessment and security alerting for malicious activity. IDS and Network Monitoring component provides real-time detection of security incidents. If an intrusion/breach is detected, a security alert is issued which generates an automatic ticket within the SOC Helpdesk software. These tickets are classified based on the Priority. Our incident response process is designed in alignment with NIST Special Publication 800-61 Revision 2 and is a service that is available to customers
Incident management type
Supplier-defined controls
Incident management approach
Incident Response Service for managing security incident and is based on NIST Special Publication 800-61 Revision 2 . Incidents are logged with a unique case reference number and tracked from triage through to resolution via our service desk platform. We have pre-approved processes / changes for certain tasks, however day to day operation is bespoke per customer and may change depending on the organisation’s needs. Users can report incidents via email, web or telephone. Reports are provided via email upon request. Major incident reports are provided within 48 hours of the incident resolution. Updates available upon request.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

OPSWAT continues its drive to run a sustainable business. Our policy of ensuring our global offices meet the highest level of environmental credentials is key to our sustainability commitments. e.g. SkyCenter ONE, our new US global HQ is Tampa's first LEED Platimum-certified building - the highest ranking offered by the US Green Building Council.

Covid-19 recovery

OPSWAT remained fully operational across all nine of our global locations. Our business continuity plans were activated and our systems and personnel operated as planned. We are working with our employees to help ensure they remain both productive and safe at all times. Our teams are fully equipped with remote access capabilities can seamlessly work across all geographic regions where we have employees.

Tackling economic inequality

Opswat believes one of the best tools to tackle inequality around the world is education. OPSWAT Academy continues to lead in cybersecurity education after surpassing 50,000 certified professionals, issuing more than 70,000 certifications, and expanding the course offerings with nine associate and seven professional training programs. We offer both on site and on line training to ensure optimal availability around the world.

Equal opportunity

OPSWAT believe that our diversity is our strength and we respect the unique knowledge of every team member. OPSWAT recognised as one the best companies to work for in Asia by HR Asia Magazine.

Wellbeing

Opswat implements programs and initiatives to safeguard our employees against work-related illnesses and accidents, and improve the wellness of staff, both physically and mentally. Our global offices offer green and clean environments to work with wellbeing areas and locality to health and fitness facilities. Our competitive compensation packages include health cover and guidance provisions.

Pricing

Price
£4,884.00 an instance a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Available on request

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@barriernetworks.com. Tell them what format you need. It will help if you say what assistive technology you use.