Skip to main content

Help us improve the Digital Marketplace - send your feedback

Telefonica UK Limited

Cisco Security from Virgin Media O2 Business

Why Cisco Security? As the largest enterprise cybersecurity company in the world, Cisco lead the way with solutions that are driving the industry in SASE, XDR, and zero trust. Integrating it all is Cisco SecureX, Cisco security platform that provides simplicity, visibility and efficiency across your security infrastructure.

Features

  • Cisco Secure Access by Duo
  • Cisco Secure Email
  • Kenna Security
  • Cisco Secure Endpoint
  • Next-Generation Firewalls (Firepower)
  • Cisco Identity Service Engine (ISE)
  • Cisco Umbrella
  • Cisco Cloudlock
  • Cisco AnyConnect
  • Cisco Secure Workload

Benefits

  • Improved Security Posture
  • Reduced System Complexity
  • Improved, Simplified Security Management
  • Automated alerts and monitoring
  • Consolidate platforms and reduce security spend
  • Improved threat visibility and control
  • Significantly reduce time to detect breaches
  • Reduce time to respond

Pricing

£2.00 a user a month

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at publicprocurement@virginmediao2.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

8 8 7 5 5 1 0 5 7 1 6 6 7 0 6

Contact

Telefonica UK Limited Steve Smith
Telephone: 07834 571216
Email: publicprocurement@virginmediao2.co.uk

Service scope

Service constraints
Service constraints listed per Cisco products
System requirements
  • Administrators of the service interact via web brower only
  • An industry standard web browser that support TLS 1.0+

User support

Email or online ticketing support
Email or online ticketing
Support response times
Yes, email support is provided for Cisco Security product suites. http://www.cisco.com/c/dam/en_us/about/doing_business/legal/docs/omnibus-cloud-security.pdf
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Details on Cisco Technical Support Offerings can be found here: http://www.cisco.com/c/dam/en_us/about/doing_business/legal/docs/omnibus-cloud-security.pdf
Support available to third parties
No

Onboarding and offboarding

Getting started
Cisco Security Cloud Solutions are sold as standalone resell only. PS and installation services are available at additional costs
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Cisco does not store any customer information except metadata. All audit logs, incidents, activities can be exported at anytime to a CSV file and/or PDF when the contract ends at which time Cisco's Dev Ops team will delete customer audit data from its databases.
End-of-contract process
Standard T&C's require that data is deleted upon contract termination

Using the service

Web browser interface
Yes
Using the web interface
Administrators of the service interact with the customer dashboard via web brower only, no client side software required. An industry standard web browser that support TLS 1.0, 1.1, or 1.2 is sufficient. We support the last major version and 1 previous major version of the big 3: IE, Chrome, Firefox.
Web interface accessibility standard
None or don’t know
How the web interface is accessible
N/a
Web interface accessibility testing
N/a
API
Yes
What users can and can't do using the API
See setup for more details
API automation tools
Other
Other API automation tools
Postman
API documentation
Yes
API documentation formats
  • HTML
  • PDF
  • Other
Command line interface
No

Scaling

Scaling available
Yes
Scaling type
Automatic
Independence of resources
With no hardware to deploy, the company can configure new offices, remote branches and stores quickly. Cisco does not require the need to backhaul traffic to your headquarters location or major data centers. Connections to our Cisco cloud can go straight out to the internet. As the company shifts to a decentralized model, this will be a crucial value add.
Usage notifications
Yes
Usage reporting
Email

Analytics

Infrastructure or application metrics
No

Resellers

Supplier type
Reseller (no extras)
Organisation whose services are being resold
Cisco Security

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Other
Other data at rest protection approach
When leveraging the virtual appliance or roaming client, all data is encrypted from the UK Government to Cisco datacenters. No data is stored locally at the UK Government, Data in the backend database is not encrypted. A customer's dashboard password is BCrypt hashed prior to storage in the database.
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Backup and recovery

Backup and recovery
No

Data-in-transit protection

Data protection between buyer and supplier networks
Other
Other protection between networks
Where possible, best of breed encryption is used to protect customer queries in transit.
Data protection within supplier network
Other
Other protection within supplier network
Where possible, best of breed encryption is used to protect customer queries in transit.

Availability and resilience

Guaranteed availability
For Service Availability Commitments, please see the following: http://www.cisco.com/c/dam/en_us/about/doing_business/legal/docs/omnibus-cloud-security.pdf
Approach to resilience
For Service Availability Commitments, please see the following: http://www.cisco.com/c/dam/en_us/about/doing_business/legal/docs/omnibus-cloud-security.pdf
Outage reporting
Email Alerts

Identity and authentication

User authentication
2-factor authentication
Access restrictions in management interfaces and support channels
On request
Access restriction testing frequency
Less than once a year
Management access authentication
2-factor authentication
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device on a government network (for example PSN)
  • Dedicated device over multiple services or networks
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
  • Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
23/01/2022
What the ISO/IEC 27001 doesn’t cover
Certification covers the protection of all Buyer and employee information that is managed by the Supplier.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Cisco’s information security policies are designed to meet the ISO/IEC 27001 Information Security Management Systems (ISMS) requirements and are available on the Cisco intranet to all employees, contractors, consultants, temporary and other workers at Cisco. In certain cases, Cisco has implemented more stringent internal controls to comply with legal, regulatory or customer security requirements. Information Security policies and supporting standards are reviewed and approved by cross-functional groups including IT, Legal, Information Security, and HR. Policies are reviewed biennially and standards are reviewed annually.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Cisco uses a formal change management system that documents, maintains, and archives changes made to the IT infrastructure. All the Changes go through Risk and Business Impact assessment via the Change Management process and CAB . Each change request is assigned risk/impact score (high, medium, low or very low) based on the answers to the risk assessment questions, the number of resources included as affected resources, and the priority of the listed resources.
Vulnerability management type
Undisclosed
Vulnerability management approach
The Corporate Information Security team performs periodic vulnerability analysis, penetration testing, and risk assessments to determine areas of vulnerability and to initiate appropriate remediation. Policies, standards, and guidelines are classified Cisco Confidential and cannot be redistributed. The Security Alert tiger team evaluates vulnerabilities which are identified through various organizations, categorizes them as applicable to Cisco's environment and rates them using the CVSS scale. These ratings are reviewed with the appropriate support teams who analyze business impact and collectively determine implementation timeframes (i.e. in next patch cycle or immediate fix required).
Protective monitoring type
Undisclosed
Protective monitoring approach
The Cisco Computer Security Incident Response (CSIRT) monitors Intrusion Detection Systems (IDS) using various Security Information Management Systems (SIMS). Cisco uses both network- and host-based IDS. Cisco has deployed IDS at the perimeter and other internal network choke points to provide alerts for security incidents.

The audit log reviews determine the level of monitoring and controls in place to ensure authorized activity. The following activities are reviewed:

 Authorized access information including user ID, files accessed, and event notifications
 Use of administrative/root accounts
 Unauthorized access attempts including failed attempts
 System alerts and failures
Incident management type
Undisclosed
Incident management approach
The Cisco Computer Security Incident Response monitors Intrusion Detection Systems using various Security Information Management Systems.

Cisco uses both network- and host-based IDS.

Cisco has deployed IDS at the perimeter and other internal network choke points to provide alerts for security incidents. CSIRT has full-time, dedicated resources that run daily reports for potentially dangerous activities.

The audit log reviews determine the level of monitoring and controls in place to ensure authorized activity.

The activities are reviewed:
Authorized access information including user ID, files accessed, event notifications
Use of administrative/root accounts
Unauthorized access attempts including failed attempts
System alerts and failures

Secure development

Approach to secure software development best practice
Supplier-defined process

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Supplier
Virtualisation technologies used
Hyper-V
How shared infrastructure is kept separate
On request

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
ISO14001 certified with energy-efficient processes in place such as water, lighting and recycling.

Social Value

Fighting climate change

Fighting climate change

The Supplier has a track record of driving positive change for our people, communities and our planet. For example: Through the Supplier's "Meaningful Connections Plan" and "Blueprint" sustainability strategies, the Supplier sets long-term goals to reduce emissions, protect our natural resources, and create a meaningful impact on society. The Supplier has a made huge progress towards the company's Net Zero ambitions in our own operations and making significant headway in our supply chain. Progress is summarised below; these learnings and best practice can be shared with Buyers when awarded a new contract. Carbon Neutrality Target: net zero operations by 2025. Net zero operations, products and supply chain by 2040. 10 years ahead of the Paris Agreement. Renewables By the end of 2025: • Change masts on landlord sites to renewable energy • 40% of the Suppliers vehicles will be electric By the end of 2030 the Supplier will use 100% green energy. Decarbonisation The Supplier is investing in carbon-removal projects and supporting the decarbonisation of the UK economy by providing the connectivity to underpin a low-carbon digital revolution. Carbon Footprint The Supplier has commissioned consultancy to calculate the company's footprint in line including the standards below: • World Resources Institute/World Business Council for Sustainable Development, 2004 • Greenhouse Gas Protocol: A Corporate Accounting and Reporting Standard, Revised Edition Carbon offsetting The Supplier plans to reduce full value chain emissions by at least 90% by 2040, in line with science-based targets. Some residual carbon emissions are expected that will be difficult to completely eliminate (e.g. flights). When 90% is reached, the plan is to offset the rest, using gold standard offsets (usually investing in nature-based solutions, such as tree planting).
Covid-19 recovery

Covid-19 recovery

The Supplier continues to contribute to economic recovery and ambitions to level up society following Covid-19. Examples include:
In 2020, as part of the Supplier’s COVID-19 response, we co-launched ‘Community Calling’, a phone gifting scheme focusing on deprived areas within the UK, aiming to donate 10,000 smartphones to those who were shielding and needed support. That target has been reached so the project has expanded to more vulnerable people in need across the UK.
The Supplier’s Essential Broadband (EB) tariff was launched in November 2020 for new and existing customers who are in receipt of Universal Credit. The tariff offers 15Mbps for £15 per month, with no prices rises, and no fixed-term contract length. Since its launch, feedback has led to the development of a new and improved customer acquisition journey, now with an automatic live chat feature to simplify the process for eligible customers. Thousands of customers use this and the Supplier is working with government to understand who is eligible so those who need it most know about the offer and how to access it.
Tech-Lending Community Hubs: In January 2022, the Supplier launched a new project that will see grant funding of £400,000 become available to organisations interested in setting up tech lending hubs. This fund will provide one-off grants to organisations who work with temporary accommodation services, that could feasibly set up a lending hub, whereby residents can borrow tablets on a short-term basis. The tablets will be loaded with free data provided by the Supplier through the National Data Bank. Funding has now been awarded to five beneficiaries throughout the UK, which will see pilots operated with all five. Once this process continues to establish, the target is to expand this in collaboration with more customers, as part of the Buyer’s social value partnership.
Tackling economic inequality

Tackling economic inequality

The Supplier is building an ambitious new strategy that will deliver social, economic and environmental benefits so our people, customers and the communities we serve can continue to have confidence in our values, integrity and mission to create positive change. The Supplier has significant experiencing delivering social impact and social value programmes throughout the UK in collaboration with the public sector. The Supplier has a solid portfolio of social value initiatives, many of which promote an inclusive economy. These include: -Working with organisations such as LMP Education and JobSkilla to help unemployed people back into work -Creation of a National Databank, which aims to end data poverty in communities across the UK. The National Data Bank provides free of charge SIMS for residents experiencing data poverty. -A wealth of expertise in working with small businesses, through Wayra (start-up cohort) and 5G accelerator hubs. Public sector customers also benefit by having access to subject matter experts in this space, as well as partnerships such as the ones with Neighbourly, and Good Things Foundation. In addition, the Supplier has a significant focus on digital skills, being brought to the forefront through the launch of our new sustainability strategy. Volunteering Since February 2022, all of the Supplier's employees have five paid volunteering days per year to support and connect with their local communities, digitally and in person, and support brilliant organisations. The Supplier looks for volunteering opportunities where employees can share expertise with local community organisations and registered charities, focusing on resolving local issues.
Equal opportunity

Equal opportunity

The Supplier is an equal opportunities employer and is certified as Disability Confident Level 1; in the process to become Level 3 with a Guaranteed Interview Scheme, supporting disabled people throughout a recruitment and interview process. As part of the "Belonging Strategy", the Supplier will also ensure home-based working contracts will come into place across the business to offer more opportunities for disabled people, unpaid carers, and part-time workers without inhibiting and restricting career progression. The Supplier has a dedicated team responsible for diversity and inclusion. The Belonging Strategy underpins ambitions to ensure the creation and maintenance of a fair and inclusive workforce. To focus on supporting priority groups furthest from the labour market, the Supplier has created an Inclusive Recruitment Programme; to review all current processes that fall within our end-to-end recruitment journey for both internal and external talent and to ensure they are fully inclusive, equitable and accessible to all. The Supplier has made significant progress, partnering with Microlink, supporting workplace adjustments process; Implementation of Textio that is a platform which enables us to write inclusive and accessible job adverts and recruitment content; Creation of page specifically centred around Belonging and DEI on our external Careers Site. The Supplier has worked in partnership with Scope for the last five years, aligned with our Sustainability Strategy, supporting millions of disabled people into employment. The Supplier also has existing strategic partnerships with The Valuable 500, Business Disability Forum, Purple Space and have signed up to the Work With Me pledge.
Wellbeing

Wellbeing

The Supplier promotes a culture of health, education and wellbeing so that we can support all employees, both personally and professionally. We also want to extend this to our customers and the communities where we operate, supporting the wider ambition of a happier, healthier population. The Supplier is working with ‘Tickets for Good’ on a mission to make events more accessible and inclusive. The vision of the ticket donations service is to help event organisers/venues, sponsors and performers distribute surplus inventory, making sure it’s done in a fair and inclusive way. We have created a custom distribution system for the donation of unsold tickets to live experiences. Health and wellbeing at work The Supplier's "Thrive" programme provides a comprehensive range of advice, tools and policies to support our people and ensure they can be their best at work. As part of Thrive, the Supplier provides free health checks for all employees. The online MyWellbeingCheck© is available for all employees to access at any time. The Supplier also offers the following management development modules as part of learning and development programmes: • Stamp Out Stigma: Managers’ mental health awareness, • Anxiety and Depression: Managers’ toolkit, • Workplace Stress: Managers’ survival kit. From September 2020, employees have access to ‘Unmind’, a mobile app to help manage and track mental wellbeing. The Supplier's Ride-to-Work scheme helps employees enjoy all the benefits of cycling during the daily commute. Everyone can apply for it at any time throughout the year, reducing their carbon footprint, improving fitness and saving money. The Supplier works in collaboration with our Buyers, sharing and promote best practice on wellbeing, in the workplace and local communities.

Pricing

Price
£2.00 a user a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
On request

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at publicprocurement@virginmediao2.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.