Grove Information Systems
MEMCYCO Brand Protection - Proof of Source Authenticity - PoSA
Unique, memorable and agentless Proof of Website Authenticity
Forge-proof and user-friendly seal of genuineness for your websites
Features
- Proactive real-time protection at the point-of-impact
- Real-time Brand impersonation prevention
- AI-powered brand impersonation monitoring, alerting and prevention engine
Benefits
- Reduces business risk and costs
- Real-time alerts on impersonation attacks
- Preempt brandjacking attacks before they are launched
- Access granular customer impact reports
Pricing
£0 to £0 a unit
- Education pricing available
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at pwitheridge@groveis.com.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
9 0 8 9 1 4 4 3 7 4 9 4 6 9 9
Contact
Grove Information Systems
Philip Witheridge
Telephone: +44 207 493 6741
Email: pwitheridge@groveis.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- None
- System requirements
- Cloud based service. No system requirements.
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
-
1 – Critical Error The SAAS Product is down or extremely impaired, production system is seriously impacted. 4 hours (24 x 7) Telephone / Web
2 – Significant Error The software is mostly operational, and production is not seriously impacted. 8 hours (M-F, 8am-8pm EST) Telephone / Web
3 – Minor Error Minor operational issue. 48 hours (M-F, 9am - 6pm EST) Web - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
1 – Critical Error The SAAS Product is down or extremely impaired, production system is seriously impacted. 4 hours (24 x 7) Telephone / Web
2 – Significant Error The software is mostly operational, and production is not seriously impacted. 8 hours (M-F, 8am-8pm EST) Telephone / Web
3 – Minor Error Minor operational issue. 48 hours (M-F, 9am - 6pm EST) Web - Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Upon sign up, Grove requests a Technical Point of Contact list of any authorised personnel who can log, access and change tickets on your organisation's behalf. Those users are then sent credentials, instructions and log in tokens to enable them to utilise our support service
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Data export
- End-of-contract process
-
Service will stop working.
Customer access will cease.
Customer information will be purged from service.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- No differences in features between browser and mobile.
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- All software management is maintained by web interface. Users can be administered and updated from this interface also along with analysis of threat data and threat reports.
- Accessibility standards
- None or don’t know
- Description of accessibility
- User communicates with service using TLS encryption, management is over browser using HTTPs.
- Accessibility testing
- None
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- Can only provide with signed NDA
Analytics
- Service usage metrics
- Yes
- Metrics types
- Attack and/or other pertinent service information (detected, gathered or provided)
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- MEMCYCO
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Certain data points can be exported.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- 99999%
- Approach to resilience
- Data center is AWS - Amazon Cloud Services, using multiple high-availability zones.
- Outage reporting
- Email Alerts, Web Status page
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- RBAC
- Access restriction testing frequency
- Never
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Can only provide with signed NDA
- ISO/IEC 27001 accreditation date
- Can only provide with signed NDA
- What the ISO/IEC 27001 doesn’t cover
- Can only provide with signed NDA
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- ISO 27017
- ISO 27018
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Can only provide with signed NDA
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Configuration Identification, Control, Status accounting, Audit, Change
management, Basline - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Amazon inspector
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Scope definition, Tool selection, Process establishment, Integration with IR
- Incident management type
- Supplier-defined controls
- Incident management approach
- Agile incident management
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
The solutions and services we offer to G Cloud procurement organisations typically require new skill sets for which we provide employment and follow on mentorship training and growth opportunities.
Pricing
- Price
- £0 to £0 a unit
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- 30 Day trial
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at pwitheridge@groveis.com.
Tell them what format you need. It will help if you say what assistive technology you use.