Skip to main content

Help us improve the Digital Marketplace - send your feedback

Telefonica UK Limited

Secure Mobility – Harmony Mobile from Virgin Media O2 Business

Harmony Mobile (previously SandBlast) provides powerful and continuous levels of security across organisations’ mobile device real-estate. The solution provides an always-on, always up-to-date protection for your smartphone and tablet users against known and unknown threats before any damage can be caused.

Features

  • Cloud protection for data including Anti-Bot protection
  • On-device network protection
  • URL Filtering
  • Conditional access - restrict access to corporate resources
  • Cloud based management portal with detailed reporting
  • Clear user alerts with remediation recommendations

Benefits

  • Stay ahead of new and emerging Gen V threats
  • Constant real-time protection against the latest threats
  • Device protection regardless of how the device is connected
  • Network security policies can be replicated on mobile devices
  • Works across a wide range of mobile devices
  • No additional hardware or software installation required
  • Proactive device lock down when threats are detected

Pricing

£23.40 a device a year

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at publicprocurement@virginmediao2.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

8 7 0 0 1 7 5 9 4 5 9 0 1 8 2

Contact

Telefonica UK Limited Steve Smith
Telephone: 07834 571216
Email: publicprocurement@virginmediao2.co.uk

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Harmony Mobile can be integrated with UEM and data governance solutions to create the basis for a digital workplace
Cloud deployment model
  • Community cloud
  • Hybrid cloud
Service constraints
None
System requirements
No special requirements defined

User support

Email or online ticketing support
Email or online ticketing
Support response times
24 hours
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AAA
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Harmony Mobile includes Helpdesk-to-Helpdesk support at a "Break/Fix" level. Initial issue triage is to be conducted by the customer helpdesk prior to escalation to the Supplier, who in turn will escalate to Check Point as required depending on the severity of the issue.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Harmony Mobile has a simple on-boarding process that can be managed either via a UEM solution or direct download and email enrolment of the "protect" app. Once the end-user has the "protect" app installed and correctly registered, no other action is required by the end-user
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
No user data is stored in this SaaS solution. Only binary code from the app is shared with the cloud risk engines.
End-of-contract process
Delete device list from database in SaaS solution and remove app from device. The instance will then be disposed of with no data persistence.
There is no automatic renewal for Harmony licences. At the end of the contract, unless renewed, the device list is deleted and the ""protect"" app is deactivated and removed.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • MacOS
  • Windows
  • Windows Phone
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Harmony Mobile has two distinct elements;
1) On device application
Which monitors device and App performance for threats.
2) Desktop admin portal
Which provide a reporting mechanism for administrators to monitor devices and threats.
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
The end-user requires the "protect" app on their device and the device to be registered within the admin portal.
Once registered, the end-users device behaviour and performance s being monitored against potential threats.
Accessibility standards
None or don’t know
Description of accessibility
The end-user requires the "protect" app on their device and the device to be registered within the admin portal.
Once registered, the end-users device behaviour and performance s being monitored against potential threats."
Accessibility testing
Not applicable to the service.
API
Yes
What users can and can't do using the API
REST API allows the customer to create integration and automate actions by collecting or injecting data classes and attribute values to/from the cloud service.
API documentation
Yes
API documentation formats
PDF
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
"Service requests from customers are typically supplied for alteration of risk levels associated with specific detection events.
e.g. an organisation wishes to detect network packet capture apps on android phones as high risk rather than medium risk."

Scaling

Independence of resources
The Harmony service is delivered via the European AWS infrastructure, a leading technology that provides assurances that scalability is readily available to ensure that customer requirements are met through comprehensive load-balancing protocols.

Analytics

Service usage metrics
No

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Check Point Technologies (UK) Ltd

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Physical access control, complying with CSA CCM v3.0
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Not applicable, no user data is stored by this solution.
Data export formats
Other
Other data export formats
No application data can be extracted
Data import formats
Other
Other data import formats
No application data can be extracted

Data-in-transit protection

Data protection between buyer and supplier networks
Other
Other protection between networks
Harmony Mobile is hosted on AWS in either London or Dublin on a separate network to the Supplier and Checkpoint. Your unique Harmony Mobile instance is hosted on AWS infrastructure to which no other individual has access.
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
99.99%
Approach to resilience
AWS HA measures.

Customers will be notified of any planned service outages via the Admin portal, any unplanned outages will be managed within the standard AWS policies and processes.
Outage reporting
AWS HA measures.

Customers will be notified of any planned service outages via the Admin portal, any unplanned outages will be managed within the standard AWS policies and processes

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Role and scope based access

User access is based upon the individual role assigned by the Primary Admin.
Access restriction testing frequency
At least every 6 months
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
Between 6 months and 12 months
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
23/01/2022
What the ISO/IEC 27001 doesn’t cover
Certification covers the protection of all Buyer and employee information that is managed by the Supplier.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
  • SOC1
  • SOC2

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
The Supplier's internal model is based on and implemented through managed change procedures and appropriate ISO 27001-based Policies, but built on legacy HMG CAS(T) principles (more rigor than ISO 27001 baseline).

In addition, Checkpoint complies with a variety of internationally recognised security standards, approval processes and independent security industry tests.
Information security policies and processes
As above, the Supplier observes the highest levels of security and as such follow the processes and standards set out within ISO/IEC27001.

Checkpoint is a company founded on key security principals and they constantly monitor security governance.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
SOC2: http://www.ssae16.org/important-elements-ssae16/what-is-a-service-organization.html

Our aim is to ensure that we follow the latest standards and best practice within all of our processes, to this end we follow SOC2 standards More information can be found here: http://www.ssae16.org/important-elements-ssae16/what-is-a-service-organization.html
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
SOC1 pen testing audits.

We adhere to guidelines set out within SOC1 for penetration testing audits
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
As a leading supplier of internet security products, Check Point uses many of its own products, such as the latest firewalls and IPS solutions to protect all their systems against unauthorized access, these include endpoint gateways and mobile devices protection; software blades to manage access to applications; anti-malware; encryption technology; user authentication via password and certificates; access control to corporate resources; data labeling, document control and logging. Check Point also employs physical security procedures such as security guards, electronic access devices, video cameras and restricted access areas.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
For incident management the support desk operates within standard ITIL processes. Support is offered on a helpdesk-to-helpdesk basis ONLY.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Fighting climate change

Fighting climate change

The Supplier has a track record of driving positive change for our people, communities and our planet. For example: Through the Supplier's "Meaningful Connections Plan" and "Blueprint" sustainability strategies, the Supplier sets long-term goals to reduce emissions, protect our natural resources, and create a meaningful impact on society. The Supplier has a made huge progress towards the company's Net Zero ambitions in our own operations and making significant headway in our supply chain. Progress is summarised below; these learnings and best practice can be shared with Buyers when awarded a new contract. Carbon Neutrality Target: net zero operations by 2025. Net zero operations, products and supply chain by 2040. 10 years ahead of the Paris Agreement. Renewables By the end of 2025: • Change masts on landlord sites to renewable energy • 40% of the Suppliers vehicles will be electric By the end of 2030 the Supplier will use 100% green energy. Decarbonisation The Supplier is investing in carbon-removal projects and supporting the decarbonisation of the UK economy by providing the connectivity to underpin a low-carbon digital revolution. Carbon Footprint The Supplier has commissioned consultancy to calculate the company's footprint in line including the standards below: • World Resources Institute/World Business Council for Sustainable Development, 2004 • Greenhouse Gas Protocol: A Corporate Accounting and Reporting Standard, Revised Edition Carbon offsetting The Supplier plans to reduce full value chain emissions by at least 90% by 2040, in line with science-based targets. Some residual carbon emissions are expected that will be difficult to completely eliminate (e.g. flights). When 90% is reached, the plan is to offset the rest, using gold standard offsets (usually investing in nature-based solutions, such as tree planting).
Covid-19 recovery

Covid-19 recovery

The Supplier continues to contribute to economic recovery and ambitions to level up society following Covid-19. Examples include:
In 2020, as part of the Supplier’s COVID-19 response, we co-launched ‘Community Calling’, a phone gifting scheme focusing on deprived areas within the UK, aiming to donate 10,000 smartphones to those who were shielding and needed support. That target has been reached so the project has expanded to more vulnerable people in need across the UK.
The Supplier’s Essential Broadband (EB) tariff was launched in November 2020 for new and existing customers who are in receipt of Universal Credit. The tariff offers 15Mbps for £15 per month, with no prices rises, and no fixed-term contract length. Since its launch, feedback has led to the development of a new and improved customer acquisition journey, now with an automatic live chat feature to simplify the process for eligible customers. Thousands of customers use this and the Supplier is working with government to understand who is eligible so those who need it most know about the offer and how to access it.
Tech-Lending Community Hubs: In January 2022, the Supplier launched a new project that will see grant funding of £400,000 become available to organisations interested in setting up tech lending hubs. This fund will provide one-off grants to organisations who work with temporary accommodation services, that could feasibly set up a lending hub, whereby residents can borrow tablets on a short-term basis. The tablets will be loaded with free data provided by the Supplier through the National Data Bank. Funding has now been awarded to five beneficiaries throughout the UK, which will see pilots operated with all five. Once this process continues to establish, the target is to expand this in collaboration with more customers, as part of the Buyer’s social value partnership.
Tackling economic inequality

Tackling economic inequality

The Supplier is building an ambitious new strategy that will deliver social, economic and environmental benefits so our people, customers and the communities we serve can continue to have confidence in our values, integrity and mission to create positive change. The Supplier has significant experiencing delivering social impact and social value programmes throughout the UK in collaboration with the public sector. The Supplier has a solid portfolio of social value initiatives, many of which promote an inclusive economy. These include: -Working with organisations such as LMP Education and JobSkilla to help unemployed people back into work -Creation of a National Databank, which aims to end data poverty in communities across the UK. The National Data Bank provides free of charge SIMS for residents experiencing data poverty. -A wealth of expertise in working with small businesses, through Wayra (start-up cohort) and 5G accelerator hubs. Public sector customers also benefit by having access to subject matter experts in this space, as well as partnerships such as the ones with Neighbourly, and Good Things Foundation. In addition, the Supplier has a significant focus on digital skills, being brought to the forefront through the launch of our new sustainability strategy. Volunteering Since February 2022, all of the Supplier's employees have five paid volunteering days per year to support and connect with their local communities, digitally and in person, and support brilliant organisations. The Supplier looks for volunteering opportunities where employees can share expertise with local community organisations and registered charities, focusing on resolving local issues.
Equal opportunity

Equal opportunity

The Supplier is an equal opportunities employer and is certified as Disability Confident Level 1; in the process to become Level 3 with a Guaranteed Interview Scheme, supporting disabled people throughout a recruitment and interview process. As part of the "Belonging Strategy", the Supplier will also ensure home-based working contracts will come into place across the business to offer more opportunities for disabled people, unpaid carers, and part-time workers without inhibiting and restricting career progression. The Supplier has a dedicated team responsible for diversity and inclusion. The Belonging Strategy underpins ambitions to ensure the creation and maintenance of a fair and inclusive workforce. To focus on supporting priority groups furthest from the labour market, the Supplier has created an Inclusive Recruitment Programme; to review all current processes that fall within our end-to-end recruitment journey for both internal and external talent and to ensure they are fully inclusive, equitable and accessible to all. The Supplier has made significant progress, partnering with Microlink, supporting workplace adjustments process; Implementation of Textio that is a platform which enables us to write inclusive and accessible job adverts and recruitment content; Creation of page specifically centred around Belonging and DEI on our external Careers Site. The Supplier has worked in partnership with Scope for the last five years, aligned with our Sustainability Strategy, supporting millions of disabled people into employment. The Supplier also has existing strategic partnerships with The Valuable 500, Business Disability Forum, Purple Space and have signed up to the Work With Me pledge.
Wellbeing

Wellbeing

The Supplier promotes a culture of health, education and wellbeing so that we can support all employees, both personally and professionally. We also want to extend this to our customers and the communities where we operate, supporting the wider ambition of a happier, healthier population. The Supplier is working with ‘Tickets for Good’ on a mission to make events more accessible and inclusive. The vision of the ticket donations service is to help event organisers/venues, sponsors and performers distribute surplus inventory, making sure it’s done in a fair and inclusive way. We have created a custom distribution system for the donation of unsold tickets to live experiences. Health and wellbeing at work The Supplier's "Thrive" programme provides a comprehensive range of advice, tools and policies to support our people and ensure they can be their best at work. As part of Thrive, the Supplier provides free health checks for all employees. The online MyWellbeingCheck© is available for all employees to access at any time. The Supplier also offers the following management development modules as part of learning and development programmes: • Stamp Out Stigma: Managers’ mental health awareness, • Anxiety and Depression: Managers’ toolkit, • Workplace Stress: Managers’ survival kit. From September 2020, employees have access to ‘Unmind’, a mobile app to help manage and track mental wellbeing. The Supplier's Ride-to-Work scheme helps employees enjoy all the benefits of cycling during the daily commute. Everyone can apply for it at any time throughout the year, reducing their carbon footprint, improving fitness and saving money. The Supplier works in collaboration with our Buyers, sharing and promote best practice on wellbeing, in the workplace and local communities.

Pricing

Price
£23.40 a device a year
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
Up to 50 users can get up to a 30 day trial, to test operational scope of the service.
Link to free trial
Please contact the Supplier for more information.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at publicprocurement@virginmediao2.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.