CSC DIGITAL BRAND SERVICES (UK) LIMITED
Domain Management and Registration Services
Corporate domain name management and advanced DNS services.
Features
- Enterprise class (Tier 4) data center
- Continuous vulnerability assessments and penetration testing
- 24x7x365 SOC monitoring & response
- Security first, phishing awareness, and social engineering training
- Mandatory Two Factor Authentication for internal and external users
- Single Sign On & IP Whitelisting
- API
- Data and GDPR compliant (e.g. WHOIS practices)
- Built-in DNS DDoS protection and DNSSEC
Benefits
- ICANN-accredited registrar for over 20 years
- Registry – Registrar transfer - lock policy
- Real-time asset monitoring and management
- Dedicated Strategic Account Manager and support team
- Global dedicated & 24/7/365 support
- Expert Brand Advisory team
- World leader of brand protection services
- The world’s largest filer of UDRPs
- Support 26 different languages across 50 locations globally
- Local Presence and Privacy Protection services
Pricing
£30 to £200 a unit
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at eric.loke@cscglobal.com.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
9 0 4 6 8 4 8 6 3 9 0 3 2 3 5
Contact
CSC DIGITAL BRAND SERVICES (UK) LIMITED
Eric Loke
Telephone: +34622450248
Email: eric.loke@cscglobal.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- No
- System requirements
- Access to a modern internet browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Same business day. 24x7 Global Support available on weekends for Technical Support
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- None. Using a vendor
- Onsite support
- Onsite support
- Support levels
- CSC provides each client with a dedicated Client Service Partner (CSP) and Strategic Account Manager (SAM). In addition to that, CSC offers a 24x7 emergency on-call service to clients, supported by our follow the sun model.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Online training and user documentation provided
- Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
- Video
- End-of-contract data extraction
- CSC can assist with extracting data upon contract termination.
- End-of-contract process
- CSC will support in the transition of all services to a new provider. Catch up renewal fees may apply.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The web portal user interface responsively adjusts when being used on a mobile device.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 A
- Description of service interface
- CSCDomainManager® offers users the possibility of managing their domain, digital certificate and DNS portfolio using a Rulesbase, customizable platform, with detailed reporting and granular user management
- Accessibility standards
- None or don’t know
- Description of accessibility
- Users can manage their domain, DNS and digital certificate portfolio. They can order new services, and access webchat support. Users can also access detailed and customizable reporting across all asset types. The domain management service interface is currently being upgraded to meet WCAG2.1A. Our complementary DomainSecSM platform already meets WCAG2.1AA.
- Accessibility testing
- None
- API
- Yes
- What users can and can't do using the API
-
API endpoints are available to perform the following functions:
• Get domain portfolio & configuration data
• Get domain availability
• Register a domain
• Change Name Servers associated with a domain
• Change Whois Contact information associated with domain
• Zone management (view, edit, delete)
• Get security events
• Get order status
• Domain TLS (Certificate) management (view, register, renew, reissue, revoke, add CNAMEs)
• View account administration information
• Manage domain delegation signer records (view, add, delete)
• Manage domain URLF records (view, add, activate, delete)
• Refresh expired API tokens - API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Users can customize reporting, add user defined fields, and through the dedicated support team they can also customize invoicing configurations and user access rights
Scaling
- Independence of resources
- As a multi-tenant SaaS provider supporting 90% of the Fortune 500, CSC offers highly scalable and performant solutions. CSC has robust capacity management and planning capabilities and redundancy in place.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
• Total managed domains
• Domains approaching expiration date
• Total managed digital certificates
• Digital Certificates approaching expiration date
• Total managed trademark clearing house registrations
• Open orders
• Top extensions across portfolio
• Detailed DNS traffic reporting for hosted domains
• Live vs Not live domains
• Detailed resolution status
• Sub-domain reporting (additional fee involved)
• Number of DNS and Digital Certificate providers used across domain portfolio
• Identification of vital domains
• Assessment of email security features across domain portfolio
• Reporting on users with elevated permissions - Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Vercara
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- Other locations
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Other
- Other data at rest protection approach
- Data is encrypted at rest via AES256
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- CSC will support with the provision of all necessary data
- Data export formats
-
- CSV
- Other
- Other data export formats
- Excel
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Other
- Other protection between networks
- CSC implements necessary and relevant controls in order to protect data in transit including appropriate encryption protocols
- Data protection within supplier network
- Other
- Other protection within supplier network
- CSC ensures the privacy and security of customer data through logical separation via unique ORG ID, role and permission-based access either through SSO or username/password with MFA, encryption in transit and at rest, and defense in depth including web-application firewall, among other controls.
Availability and resilience
- Guaranteed availability
- Availability is 99.5% or greater. CSC will adhere to the terms in the agreement with clients.
- Approach to resilience
- CSC has a full Business Continuity and Disaster Recovery Plan. This plan leverages multiple availability regions and is practiced at least yearly. RPT/RPO is 24 hours and has been tested successfully.
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- SSO via SAML is supported. If using native userID/password, 2-factor authentication is required.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- SOC2
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- SOC 2 Type 2 audited annually. Pursuing ISO-27001 certification which is targeted for end of 2025.
- Information security policies and processes
- A dedicated information security department is in place and is overseen by the CISO. Within the information security department there are the following teams: - Security operations - Risk and compliance - Architecture - Application security - Identity and Access Management - Privacy. Policies include access control, backup, logging, secure network, secure application, training, mobile device, among others.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- A Change Management policy and procedure are in place. The policy/procedure covers defined roles and responsibilities, requirements for formal documentation, requirements for segregation of duties, requirements for testing prior to change, requirements to ensure business and customers are notified/trained prior to change, and requirements to ensure that security functions and controls are tested for both a positive and negative result. All changes are logged in a standardized method and the approval of all change requests are documented. There are also specific procedures to ensure the proper control, authorization, and documentation of emergency changes. All changes are managed within ServiceNow.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
A vulnerability management program is in place and vulnerabilities are tracked and reported through to remediation/mitigation. Internal and external network vulnerability scans are performed at least monthly. CSC operates under a monthly patch cycle for Windows, and quarterly for Linux. CSC uses commercially reasonable efforts to remediate vulnerabilities:
- critical/high - 30 days
- medium - 180 days
- Low - best efforts
Vulnerability details are obtained from threat intelligence feeds, and commercial grade vulnerability scanner. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Security event logs are maintained and monitored by security operations team and MSSP. CSC notifies clients of a breach through relevant communication channels within 48 hours.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Our Incident Management process is documented and includes preparation, identification, analysis, containment, eradication, restoration, and follow up. We monitor for all types of incidents, including those related to technology, business operations, and privacy. We also have an incident response process that includes guidelines on when and how to notify a customer.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Please see CSC's public sustainability charter located at: https://www.cscglobal.com/service/about/sustainability/. This public document contains information on CSC's sustainability efforts.Covid-19 recovery
CSC maintains a Pandemic Workforce and Communicable Disease Policy. This Policy covers all Employees. This Policy covers communicable illnesses, diseases and medical conditions (collectively referred to as “Communicable Illnesses”) such as active Tuberculosis, Corona Virus, Severe Acute Respiratory Syndrome (SARS) and Avian Influenza (Bird Flu), or any similar communicable illness that poses a credible threat of transmission in our work place.Tackling economic inequality
The company aims to provide compensation levels that are competitive with the employment market and rewards
individuals for their contributions to the success of the company, their relative level of responsibility, and their consistent
and sustained performance. The company has processes in place in support of periodic review of performance and salary
levelsEqual opportunity
CSC is an equal opportunity employer. We recruit, hire, educate, pay, provide benefits, promote, and discharge people in all
job categories on the basis of merit only, without regard to race, color, religion, sex, gender identity and expression, national
origin, age, genetic information, marital status, physical or mental disability, citizenship, veteran status, sexual orientation,
pregnancy, and any other protected characteristic.Wellbeing
CSC aims to safeguard the health, safety, and welfare of its colleagues. We realize that we have a duty of care to
look after the mental health and well-being of our colleagues while they are at work and ensure, as far as is
reasonably practicable, that workplaces and working environments are safe and healthy.
Pricing
- Price
- £30 to £200 a unit
- Discount for educational organisations
- No
- Free trial available
- No
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at eric.loke@cscglobal.com.
Tell them what format you need. It will help if you say what assistive technology you use.