Network Infrastructure
Network Infrastructure Services for Cloud users. Covering, Network Security, Network Support, Network Architecture, Network Monitoring, Cisco, Juniper, Fortinet, FortiGate, SolarWinds, F5, ASA, Pix, Checkpoint, Palo Alto, Riverbed, BGP/OSPF, LAN, WAN, VLAN
Features
- Networking, switches, firewalls, Juniper, Cisco, LAN, WAN, CCNA
- Certified Information Systems Security Professional (CISSP) testing
- Cisco accredited engineers CCNA, CCDA, CCDP
- Design and integration of network architecture
- Remote monitoring services
- Firewall Installation and Configuration
- Cloud migration (Azure, AWS)
Benefits
- Deliver network performance
- Drive improved employee productivity
- Enable an enterprise mobility strategy and cloud strategy
- Improve end-to-end performance of applications and services
- Qualified and trained professionals
- Specialists in public sector delivery
- SC / DV security cleared professionals
Pricing
£295 to £1,125 a unit a day
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 0 4 0 2 9 4 1 5 3 8 4 0 5 8
Contact
Henderson Scott
David Potter
Telephone: 07540 974 378
Email: PMO@hendersonscott.co.uk
Service scope
- Service constraints
- No service constraints
- System requirements
- No specific system requirements
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Response times are within 3 hours including weekends.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
-
Response to requests within 3 hours, including weekends.
Standard support hours are 8.30am to 6.00pm Monday to Friday (24/7 and extended support also available on request)
We provide a dedicated account manager on all G-Cloud accounts to manage and support the recruitment process. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We provide a User Documentation pack for users of our Services.
All staff performing services have received extensive onsite training. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Users may take advantage of our online data tool or make a request and data will be provided to them.
- End-of-contract process
-
A full off-boarding process is implemented.
All services are included in the price of the contract, there is no additional cost.
Using the service
- Web browser interface
- No
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
-
We have dedicated Account Teams, headed up by Senior Managers to ensure that the volume of requests from users is managed efficiently and the service provided is at the exceptional level that we have become known for in the industry.
The Account Leads have regular contact and communication with both Users and internal managers so demand can be communicated and managed efficiently. - Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Hardware containing data is completely destroyed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Files
- Databases
- Directories
- Backup controls
- Users may make requests regarding backups, which will be reviewed and responded to in line with our usual support response processes.
- Datacentre setup
- Single datacentre with multiple copies
- Scheduling backups
- Users contact the support team to schedule backups
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
We agree to work with any level of SLA that the user may require, and can arrange these on request.
If services are not performed to the satisfaction of the User, a full refund may be agreed on a case by case basis. - Approach to resilience
- Available on request
- Outage reporting
- Email alerts
Identity and authentication
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- IP restrictions, two factor authentication of approved users and protective monitoring/logging. Geofencing.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
- Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- CCIE
- CISSP
- CCNA
- CCNP
- TCPIP
- CCDP
- JNCIA
- JNCIS
- JNCIP
- JNCIE
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Work to GDPR standards, and are in the process of implementing.
- Information security policies and processes
- We work to GDPR levels of security, and all Information Security Policies and Processes are well documented. Authorised users have thorough training on these policies, and we conduct regular security checks to ensure that these are being followed completely
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Work to recognised standards. Details available on request.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Work to recognised standards.
Sensitive information, details available on request. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Work to recognised standards.
Sensitive information, details available on request. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Work to recognised standards.
Sensitive information, details available on request.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- Microsofts Datacenters achieved a carbon neutrality in 2014 and have averaged 1.125 power usage effectiveness (PUE) for any new datacenter—exceeding the industry average by more than 30 percent.
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Wellbeing
Fighting climate change
Sustainability is at the core of everything we do at Henderson Scott. Our actions today shape the world of tomorrow, and we are committed to a journey that balances business success with environmental responsibility and social contribution. Environmental stewardship - We actively manage our environmental impact, focusing on reducing emissions and resource consumption. We have committed to Net Zero by 2050, reducing our carbon footprint by 50% by 2030 and have taken positive climate action by carbon offsetting in 2023 therefore we are now operating as a certified carbon neutral business.Tackling economic inequality
Henderson Scott are committed to tackling economic inequality and our G-Cloud service provision is further enabling us to take positive action. For example, in respect of creating new businesses, new jobs and new skills. Under the Armed Forces Covenant Employer Recognition Scheme we hold a Bronze Award Certificate for our committed to aiding Veterans with the transition into civilian careers and have a particular track record in supporting individuals to transition into project/programme management focused roles within the Security Cleared space, supporting our projects with Central Government and Defence customers. The Henderson Scott team regularly attend schools, colleagues, universities and career fairs promoting roles within the Cloud space and have a particular emphasis on addressing the gender gap in Cloud/IT professionals by hosting events with female leaders such as our Women in Tech Events which we ran in London, Glasgow, Edinburgh and Manchester. We regularly host workshops on Interview Skills to assistant prospective talent to develop the interview skills they need to secure a role in the Cloud/Technology sector.Wellbeing
Henderson Scott places significant focus on supporting the health and wellbeing of our workforce. Our G-Cloud service provision will further support our efforts in this space. We currently provide and would be able to continue to invest in ensuring Mental Health First Aiders are available in all of our physical locations in the UK and that remote staff including those deployed to our Customer sites would have the ability to utilise the services of our Mental Health First Aiders. All staff have access to additional, specialist mental health support via their private medical insurance which is provided for all staff post probation. We also provide and would continue to provide access to private GP services, ensuring our staff can access support when they need it. We have automated alerts prompting staff to consider a day off if they haven't taken annual leave for 60 consecutive days as part of our efforts to protect our workforce from employee burnout. All employees supporting our G-Cloud Service Provision would receive the above alongside additional wellbeing support, full details of which can be provided where additional word count permits.
Pricing
- Price
- £295 to £1,125 a unit a day
- Discount for educational organisations
- Yes
- Free trial available
- No