Virtual Firewall
SonicWall Virtual Firewall, NSv, delivers enterprise class security with streamlined management, complete visibility, flexible deployment, while delivering superior performance for virtual workloads. Support across private and public cloud (AWS, Azure). NSv firewall help security teams reduce security risks and vulnerabilities, which can cause serious disruption to business-critical services and operations.
Features
- Next-gen firewall with automated real-time breach detection and prevention capabilities
- Patent-pending Real-Time Deep Memory Inspection (RTDMI) technology
- Patented Reassembly-Free Deep Packet Inspection (RFDPI) technology
- Complete end-to-end visibility and streamlined management with Unified Policy
- Application intelligence and control
- Support across private cloud platforms: ESXi, Hyper-V,KVM, Nutanix
- Support public cloud AWS and Azure platforms
- Prevent threats with visibility into intra-host communication between virtual machines
Benefits
- Experienced SonicWall certified team
- Cloud spend control, forecasting and ROI calculation services availabl
- References and examples of previous projects available on request
- Presents meaningful visualizations of threat information
- SD-WAN and TLS 1.3 support
- Protect corporate resources from attacks at the Internet gateway
- Ensure compliance with regulatory standards
- Prevent threats with visibility into intra-host communication between virtual machines
Pricing
£908 a unit a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 5 6 9 0 9 5 2 6 4 2 9 4 5 5
Contact
TRUSTED TECHNOLOGY PARTNERSHIP LTD
Sales Account
Telephone: 01425 470888
Email: sales@trusted-technology.co.uk
Service scope
- Service constraints
-
Public Cloud - Azure, AWS supported
Private Cloud - Hyper-V, VMWare, KVM, Nutanix, supported - System requirements
-
- AWS, c5.large c5n.large c5d.large m5.large
- AWS, m5n.large c5.xlarge c5n.xlarge c5d.xlarge
- AWS, m5.xlarge m5n.xlarge c5.2xlarge c5n.2xlarge
- AWS, c5d.2xlarge m5.2xlarge m5n.2xlarge
- Azure, Standard D2 v2 Standard_B2ms Standard_D2V4 Standard_D2ds_V4
- Azure, Standard D3 v2 Standard_B4ms Standard_DS3_v2 Standard_D2ds_V4
- Azure, Standard D4 v2 Standard_A8_v2 Standard_F8 Standard_F8s
- Azure, Standard_D8_v4 Standard_D8_v3 Standard_D8s_v3
- Hyper-V, VMWare ESXi, KVM, Nutanix
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Acknowledgement is automated and instant. Response times vary depending on the SLA category assigned
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 A
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- We provide an service / account manager on all G-Cloud engagements with responsibility for ensuring customer objectives are met, and that there are no issues with service delivery and customer satisfaction is maximised. Our service / account managers act as an escalation point, and can be reached via phone or email, to respond to issues beyond the control of the team providing the service. Service / account management is included within our service pricing. Onsite technical support would be charged as per our SFIA rate card.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Partner Support and SonicWall online support. Knowledge base on Sonicwall.com is also available along with technical documentation.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Configuration can be exported. Virtual appliance can be wiped clean if desired.
- End-of-contract process
- Security services and support functions cease to be updated.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Administrators can configure, manage and investigate NSv products via the interface.
- Web interface accessibility standard
- WCAG 2.1 A
- Web interface accessibility testing
- None.
- API
- Yes
- What users can and can't do using the API
- There is a fully restful API available for the SonicWall NSv. It allows comands to be sent to configure the appliance (all web UI configuration is support in API). The API alos allows for information to be retrieved from the appliance - such as status of a policy, if a rule has been consumed, event details etc.
- API automation tools
- Other
- API documentation
- Yes
- API documentation formats
- HTML
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- MacOS
- Other
- Using the command line interface
- All NSv configuration functionality from the UI is replicated in the Cli
Scaling
- Scaling available
- No
- Independence of resources
- Specification of underpinning servers, cloud platform and model of NSv virtual machine will affect performance metrics versus user demand.
- Usage notifications
- No
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- SonicWall
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- Never
- Protecting data at rest
- Other
- Other data at rest protection approach
- NSv Stores only Syslog and Netflow/IPFix reporting data. This is protected inhereantly by the hardened Sonic OS platform.
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
- Full configuration backups are supported.
- Backup controls
- Scheduling is available UI/Cli. Cloud backups can be scheduled. Local backups are manual, but can be scripted via Cli or API.
- Datacentre setup
-
- Multiple datacentres with disaster recovery
- Multiple datacentres
- Single datacentre with multiple copies
- Single datacentre
- Scheduling backups
- Users schedule backups through a web interface
- Backup recovery
- Users can recover backups themselves, for example through a web interface
Data-in-transit protection
- Data protection between buyer and supplier networks
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- Impossible to guarantee due to the reliance of the underlying cloud Platform/Server or configured configuration. Users can deploy highly-available architectures using both NSv and the native cloud resilience feature set. NSv supports high-availabilty configurations.
- Approach to resilience
- A Highly Availability configuration is available and supported. Addtional resilience can be provided by the chosen cloud platform.
- Outage reporting
- Yes, If you are optionally using Network Security Manager email alerting is provided if the Virtual appliance goes offline. Also your Platform of choice, such as Microsoft Azure, will offer alerting.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- The management inferface can be restricted by only giving access to specified acccounts of your choosing. Further more access can be limited by public IP to your chosen source address. For access to support channels this would be acheieved via mysonicwall.com. An account is needed in order to register the device. Mysonicwall.com requires a username and password as well as optional MFA.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Dedicated device on a government network (for example PSN)
- Dedicated device over multiple services or networks
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- Less than 1 month
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- Less than 1 month
- How long system logs are stored for
- Less than 1 month
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- None
- Information security policies and processes
- Not known
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- NSv development follows an internally developed metholodogy and processes for robust release management and change control.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Discovered vulnerabilities are publicaly available from SonicWall website.
Patches are made available for supported customers to download and apply. Patches for fundamental vulnerabilities are made available for all customers.
Potential threats are identified both internally, by third parties, and security researchers. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Identification of potential compromise or vulnerability can come from multiple sources accross SonicWall's entire global network.
Once identified a potential compromise will be evaluated. Once confirmed a mitigation will be published. NSv signature updates are routinely released every hour. - Incident management type
- Supplier-defined controls
- Incident management approach
- An ITIL based incident management process applies.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
At TT we are committed to tackling the challenges of sustainable development and we operate as a responsible corporate business. We implement practices that promote economic security, social and environmental responsibility and we continuously seek to improve performance in these areas. We are committed to working with our suppliers and customers to improve sustainability performance throughout all our activities. We recycle printer toners, IT waste and cardboard through our partner Restore and the Council Recycling Scheme. Respecting the environment, TT is focused on reducing the environmental footprint of our customers by innovating highly efficient, integrated appliances and cloud-based security solutions at TT, we understand the unprecedented challenge that our customers face in continually improving their sustainability. We utilise innovation to drive environmental responsibility at the core of our strategy. We strive to minimize our environmental impact throughout our value chain, to ensure we are driving the best possible outcomes for sustainability goals and for the planet. We try to demonstrate this commitment in everything we do, by reducing the footprint of our partners products, ensuring they lead the way with energy efficiency, and adhere to compliance and regulations worldwide, and adopting responsible approaches across our daily business operations. We are also currently working on an independently validated and publicly available Carbon Reduction Plan, due to be completed and published mid-2024.Tackling economic inequality
In addressing economic inequality, we must begin by fostering equal opportunities for all, starting from the grassroots level. One effective approach we undertake is to introduce mock interviews for school children, providing them with essential skills and confidence needed to navigate the professional world regardless of their background. Additionally, we offer work experience opportunities and apprenticeships to bridge the gap between education and employment, empowering individuals from diverse socio-economic backgrounds to access valuable hands-on training and networking opportunities.Equal opportunity
Trusted Technology is an equal opportunity employer and is fully committed to a policy of treating all its employees and job applicants equally.
TT will take all reasonable steps to employ, train and promote employees on the basis of their experience, abilities and qualifications without regard to race, colour, ethnic origin, nationality, national origin, religion or belief, sex, sexual orientation, marital status, age or disability. TT will also take all reasonable steps to provide a work environment in which all employees are treated with respect and dignity and that is free of harassment based upon an employee’s race, colour, ethnic origin, nationality, national origin, religion or belief, sex, sexual orientation, marital status, age or disability. TT will not condone any form of harassment, whether engaged in by employees or by outside third parties who do business with TT.
We regularly carry out diversity surveys to ensure we are an ethical and diverse employer, these survey results are publicly available.Wellbeing
A recent development is our premises move; we have recently moved building to a brand-new, open office space in an environmentally friendly building. Our new building has an open office space for socialising with lots of natural light and quiet meeting rooms to work in, we even have a pool table for leisure! We provide our colleagues with a weekly delivery of “wonky fruit”, offering a healthy snack option for colleagues and utilising fruit which supermarkets reject. Furthermore, Trusted Technology operates a hybrid working environment, with two days a week in the office. This allows individuals to spend less time commuting but also offers a healthy balance of remote and office working. We offer tangible rewards to colleagues to incentivise responsible, hardworking behaviour. Some examples of this are an equally divided profits share, extra days of annual leave if certain criteria are met and a one off £500 Cost of Living payment. Furthermore, Trusted Technology has certified mental and physical health first aiders and we also release a monthly newsletter with features on mental and physical health.
Pricing
- Price
- £908 a unit a year
- Discount for educational organisations
- No
- Free trial available
- No