Cisco Security from Virgin Media O2 Business
Why Cisco Security? As the largest enterprise cybersecurity company in the world, Cisco lead the way with solutions that are driving the industry in SASE, XDR, and zero trust. Integrating it all is Cisco SecureX, Cisco security platform that provides simplicity, visibility and efficiency across your security infrastructure.
Features
- Cisco Secure Access by Duo
- Cisco Secure Email
- Kenna Security
- Cisco Secure Endpoint
- Next-Generation Firewalls (Firepower)
- Cisco Identity Service Engine (ISE)
- Cisco Umbrella
- Cisco Cloudlock
- Cisco AnyConnect
- Cisco Secure Workload
Benefits
- Improved Security Posture
- Reduced System Complexity
- Improved, Simplified Security Management
- Automated alerts and monitoring
- Consolidate platforms and reduce security spend
- Improved threat visibility and control
- Significantly reduce time to detect breaches
- Reduce time to respond
Pricing
£2.00 a user a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
8 8 7 5 5 1 0 5 7 1 6 6 7 0 6
Contact
Telefonica UK Limited
Steve Smith
Telephone: 07834 571216
Email: publicprocurement@virginmediao2.co.uk
Service scope
- Service constraints
- Service constraints listed per Cisco products
- System requirements
-
- Administrators of the service interact via web brower only
- An industry standard web browser that support TLS 1.0+
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Yes, email support is provided for Cisco Security product suites. http://www.cisco.com/c/dam/en_us/about/doing_business/legal/docs/omnibus-cloud-security.pdf
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Details on Cisco Technical Support Offerings can be found here: http://www.cisco.com/c/dam/en_us/about/doing_business/legal/docs/omnibus-cloud-security.pdf
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Cisco Security Cloud Solutions are sold as standalone resell only. PS and installation services are available at additional costs
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Cisco does not store any customer information except metadata. All audit logs, incidents, activities can be exported at anytime to a CSV file and/or PDF when the contract ends at which time Cisco's Dev Ops team will delete customer audit data from its databases.
- End-of-contract process
- Standard T&C's require that data is deleted upon contract termination
Using the service
- Web browser interface
- Yes
- Using the web interface
- Administrators of the service interact with the customer dashboard via web brower only, no client side software required. An industry standard web browser that support TLS 1.0, 1.1, or 1.2 is sufficient. We support the last major version and 1 previous major version of the big 3: IE, Chrome, Firefox.
- Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- N/a
- Web interface accessibility testing
- N/a
- API
- Yes
- What users can and can't do using the API
- See setup for more details
- API automation tools
- Other
- Other API automation tools
- Postman
- API documentation
- Yes
- API documentation formats
-
- HTML
- Other
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- With no hardware to deploy, the company can configure new offices, remote branches and stores quickly. Cisco does not require the need to backhaul traffic to your headquarters location or major data centers. Connections to our Cisco cloud can go straight out to the internet. As the company shifts to a decentralized model, this will be a crucial value add.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- No
Resellers
- Supplier type
- Reseller (no extras)
- Organisation whose services are being resold
- Cisco Security
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Other
- Other data at rest protection approach
- When leveraging the virtual appliance or roaming client, all data is encrypted from the UK Government to Cisco datacenters. No data is stored locally at the UK Government, Data in the backend database is not encrypted. A customer's dashboard password is BCrypt hashed prior to storage in the database.
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- In-house destruction process
Backup and recovery
- Backup and recovery
- No
Data-in-transit protection
- Data protection between buyer and supplier networks
- Other
- Other protection between networks
- Where possible, best of breed encryption is used to protect customer queries in transit.
- Data protection within supplier network
- Other
- Other protection within supplier network
- Where possible, best of breed encryption is used to protect customer queries in transit.
Availability and resilience
- Guaranteed availability
- For Service Availability Commitments, please see the following: http://www.cisco.com/c/dam/en_us/about/doing_business/legal/docs/omnibus-cloud-security.pdf
- Approach to resilience
- For Service Availability Commitments, please see the following: http://www.cisco.com/c/dam/en_us/about/doing_business/legal/docs/omnibus-cloud-security.pdf
- Outage reporting
- Email Alerts
Identity and authentication
- User authentication
- 2-factor authentication
- Access restrictions in management interfaces and support channels
- On request
- Access restriction testing frequency
- Less than once a year
- Management access authentication
- 2-factor authentication
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Dedicated device on a government network (for example PSN)
- Dedicated device over multiple services or networks
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 23/01/2022
- What the ISO/IEC 27001 doesn’t cover
- Certification covers the protection of all Buyer and employee information that is managed by the Supplier.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Cisco’s information security policies are designed to meet the ISO/IEC 27001 Information Security Management Systems (ISMS) requirements and are available on the Cisco intranet to all employees, contractors, consultants, temporary and other workers at Cisco. In certain cases, Cisco has implemented more stringent internal controls to comply with legal, regulatory or customer security requirements. Information Security policies and supporting standards are reviewed and approved by cross-functional groups including IT, Legal, Information Security, and HR. Policies are reviewed biennially and standards are reviewed annually.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Cisco uses a formal change management system that documents, maintains, and archives changes made to the IT infrastructure. All the Changes go through Risk and Business Impact assessment via the Change Management process and CAB . Each change request is assigned risk/impact score (high, medium, low or very low) based on the answers to the risk assessment questions, the number of resources included as affected resources, and the priority of the listed resources.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- The Corporate Information Security team performs periodic vulnerability analysis, penetration testing, and risk assessments to determine areas of vulnerability and to initiate appropriate remediation. Policies, standards, and guidelines are classified Cisco Confidential and cannot be redistributed. The Security Alert tiger team evaluates vulnerabilities which are identified through various organizations, categorizes them as applicable to Cisco's environment and rates them using the CVSS scale. These ratings are reviewed with the appropriate support teams who analyze business impact and collectively determine implementation timeframes (i.e. in next patch cycle or immediate fix required).
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
-
The Cisco Computer Security Incident Response (CSIRT) monitors Intrusion Detection Systems (IDS) using various Security Information Management Systems (SIMS). Cisco uses both network- and host-based IDS. Cisco has deployed IDS at the perimeter and other internal network choke points to provide alerts for security incidents.
The audit log reviews determine the level of monitoring and controls in place to ensure authorized activity. The following activities are reviewed:
Authorized access information including user ID, files accessed, and event notifications
Use of administrative/root accounts
Unauthorized access attempts including failed attempts
System alerts and failures - Incident management type
- Undisclosed
- Incident management approach
-
The Cisco Computer Security Incident Response monitors Intrusion Detection Systems using various Security Information Management Systems.
Cisco uses both network- and host-based IDS.
Cisco has deployed IDS at the perimeter and other internal network choke points to provide alerts for security incidents. CSIRT has full-time, dedicated resources that run daily reports for potentially dangerous activities.
The audit log reviews determine the level of monitoring and controls in place to ensure authorized activity.
The activities are reviewed:
Authorized access information including user ID, files accessed, event notifications
Use of administrative/root accounts
Unauthorized access attempts including failed attempts
System alerts and failures
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- Hyper-V
- How shared infrastructure is kept separate
- On request
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- ISO14001 certified with energy-efficient processes in place such as water, lighting and recycling.
Social Value
- Fighting climate change
-
Fighting climate change
The Supplier has a track record of driving positive change for our people, communities and our planet. For example: Through the Supplier's "Meaningful Connections Plan" and "Blueprint" sustainability strategies, the Supplier sets long-term goals to reduce emissions, protect our natural resources, and create a meaningful impact on society. The Supplier has a made huge progress towards the company's Net Zero ambitions in our own operations and making significant headway in our supply chain. Progress is summarised below; these learnings and best practice can be shared with Buyers when awarded a new contract. Carbon Neutrality Target: net zero operations by 2025. Net zero operations, products and supply chain by 2040. 10 years ahead of the Paris Agreement. Renewables By the end of 2025: • Change masts on landlord sites to renewable energy • 40% of the Suppliers vehicles will be electric By the end of 2030 the Supplier will use 100% green energy. Decarbonisation The Supplier is investing in carbon-removal projects and supporting the decarbonisation of the UK economy by providing the connectivity to underpin a low-carbon digital revolution. Carbon Footprint The Supplier has commissioned consultancy to calculate the company's footprint in line including the standards below: • World Resources Institute/World Business Council for Sustainable Development, 2004 • Greenhouse Gas Protocol: A Corporate Accounting and Reporting Standard, Revised Edition Carbon offsetting The Supplier plans to reduce full value chain emissions by at least 90% by 2040, in line with science-based targets. Some residual carbon emissions are expected that will be difficult to completely eliminate (e.g. flights). When 90% is reached, the plan is to offset the rest, using gold standard offsets (usually investing in nature-based solutions, such as tree planting). - Covid-19 recovery
-
Covid-19 recovery
The Supplier continues to contribute to economic recovery and ambitions to level up society following Covid-19. Examples include:
In 2020, as part of the Supplier’s COVID-19 response, we co-launched ‘Community Calling’, a phone gifting scheme focusing on deprived areas within the UK, aiming to donate 10,000 smartphones to those who were shielding and needed support. That target has been reached so the project has expanded to more vulnerable people in need across the UK.
The Supplier’s Essential Broadband (EB) tariff was launched in November 2020 for new and existing customers who are in receipt of Universal Credit. The tariff offers 15Mbps for £15 per month, with no prices rises, and no fixed-term contract length. Since its launch, feedback has led to the development of a new and improved customer acquisition journey, now with an automatic live chat feature to simplify the process for eligible customers. Thousands of customers use this and the Supplier is working with government to understand who is eligible so those who need it most know about the offer and how to access it.
Tech-Lending Community Hubs: In January 2022, the Supplier launched a new project that will see grant funding of £400,000 become available to organisations interested in setting up tech lending hubs. This fund will provide one-off grants to organisations who work with temporary accommodation services, that could feasibly set up a lending hub, whereby residents can borrow tablets on a short-term basis. The tablets will be loaded with free data provided by the Supplier through the National Data Bank. Funding has now been awarded to five beneficiaries throughout the UK, which will see pilots operated with all five. Once this process continues to establish, the target is to expand this in collaboration with more customers, as part of the Buyer’s social value partnership. - Tackling economic inequality
-
Tackling economic inequality
The Supplier is building an ambitious new strategy that will deliver social, economic and environmental benefits so our people, customers and the communities we serve can continue to have confidence in our values, integrity and mission to create positive change. The Supplier has significant experiencing delivering social impact and social value programmes throughout the UK in collaboration with the public sector. The Supplier has a solid portfolio of social value initiatives, many of which promote an inclusive economy. These include: -Working with organisations such as LMP Education and JobSkilla to help unemployed people back into work -Creation of a National Databank, which aims to end data poverty in communities across the UK. The National Data Bank provides free of charge SIMS for residents experiencing data poverty. -A wealth of expertise in working with small businesses, through Wayra (start-up cohort) and 5G accelerator hubs. Public sector customers also benefit by having access to subject matter experts in this space, as well as partnerships such as the ones with Neighbourly, and Good Things Foundation. In addition, the Supplier has a significant focus on digital skills, being brought to the forefront through the launch of our new sustainability strategy. Volunteering Since February 2022, all of the Supplier's employees have five paid volunteering days per year to support and connect with their local communities, digitally and in person, and support brilliant organisations. The Supplier looks for volunteering opportunities where employees can share expertise with local community organisations and registered charities, focusing on resolving local issues. - Equal opportunity
-
Equal opportunity
The Supplier is an equal opportunities employer and is certified as Disability Confident Level 1; in the process to become Level 3 with a Guaranteed Interview Scheme, supporting disabled people throughout a recruitment and interview process. As part of the "Belonging Strategy", the Supplier will also ensure home-based working contracts will come into place across the business to offer more opportunities for disabled people, unpaid carers, and part-time workers without inhibiting and restricting career progression. The Supplier has a dedicated team responsible for diversity and inclusion. The Belonging Strategy underpins ambitions to ensure the creation and maintenance of a fair and inclusive workforce. To focus on supporting priority groups furthest from the labour market, the Supplier has created an Inclusive Recruitment Programme; to review all current processes that fall within our end-to-end recruitment journey for both internal and external talent and to ensure they are fully inclusive, equitable and accessible to all. The Supplier has made significant progress, partnering with Microlink, supporting workplace adjustments process; Implementation of Textio that is a platform which enables us to write inclusive and accessible job adverts and recruitment content; Creation of page specifically centred around Belonging and DEI on our external Careers Site. The Supplier has worked in partnership with Scope for the last five years, aligned with our Sustainability Strategy, supporting millions of disabled people into employment. The Supplier also has existing strategic partnerships with The Valuable 500, Business Disability Forum, Purple Space and have signed up to the Work With Me pledge. - Wellbeing
-
Wellbeing
The Supplier promotes a culture of health, education and wellbeing so that we can support all employees, both personally and professionally. We also want to extend this to our customers and the communities where we operate, supporting the wider ambition of a happier, healthier population. The Supplier is working with ‘Tickets for Good’ on a mission to make events more accessible and inclusive. The vision of the ticket donations service is to help event organisers/venues, sponsors and performers distribute surplus inventory, making sure it’s done in a fair and inclusive way. We have created a custom distribution system for the donation of unsold tickets to live experiences. Health and wellbeing at work The Supplier's "Thrive" programme provides a comprehensive range of advice, tools and policies to support our people and ensure they can be their best at work. As part of Thrive, the Supplier provides free health checks for all employees. The online MyWellbeingCheck© is available for all employees to access at any time. The Supplier also offers the following management development modules as part of learning and development programmes: • Stamp Out Stigma: Managers’ mental health awareness, • Anxiety and Depression: Managers’ toolkit, • Workplace Stress: Managers’ survival kit. From September 2020, employees have access to ‘Unmind’, a mobile app to help manage and track mental wellbeing. The Supplier's Ride-to-Work scheme helps employees enjoy all the benefits of cycling during the daily commute. Everyone can apply for it at any time throughout the year, reducing their carbon footprint, improving fitness and saving money. The Supplier works in collaboration with our Buyers, sharing and promote best practice on wellbeing, in the workplace and local communities.
Pricing
- Price
- £2.00 a user a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- On request