Skip to main content

Help us improve the Digital Marketplace - send your feedback

TRUSTED TECHNOLOGY PARTNERSHIP LTD

Virtual Firewall

SonicWall Virtual Firewall, NSv, delivers enterprise class security with streamlined management, complete visibility, flexible deployment, while delivering superior performance for virtual workloads. Support across private and public cloud (AWS, Azure). NSv firewall help security teams reduce security risks and vulnerabilities, which can cause serious disruption to business-critical services and operations.

Features

  • Next-gen firewall with automated real-time breach detection and prevention capabilities
  • Patent-pending Real-Time Deep Memory Inspection (RTDMI) technology
  • Patented Reassembly-Free Deep Packet Inspection (RFDPI) technology
  • Complete end-to-end visibility and streamlined management with Unified Policy
  • Application intelligence and control
  • Support across private cloud platforms: ESXi, Hyper-V,KVM, Nutanix
  • Support public cloud AWS and Azure platforms
  • Prevent threats with visibility into intra-host communication between virtual machines

Benefits

  • Experienced SonicWall certified team
  • Cloud spend control, forecasting and ROI calculation services availabl
  • References and examples of previous projects available on request
  • Presents meaningful visualizations of threat information
  • SD-WAN and TLS 1.3 support
  • Protect corporate resources from attacks at the Internet gateway
  • Ensure compliance with regulatory standards
  • Prevent threats with visibility into intra-host communication between virtual machines

Pricing

£908 a unit a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sales@trusted-technology.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

9 5 6 9 0 9 5 2 6 4 2 9 4 5 5

Contact

TRUSTED TECHNOLOGY PARTNERSHIP LTD Sales Account
Telephone: 01425 470888
Email: sales@trusted-technology.co.uk

Service scope

Service constraints
Public Cloud - Azure, AWS supported

Private Cloud - Hyper-V, VMWare, KVM, Nutanix, supported
System requirements
  • AWS, c5.large c5n.large c5d.large m5.large
  • AWS, m5n.large c5.xlarge c5n.xlarge c5d.xlarge
  • AWS, m5.xlarge m5n.xlarge c5.2xlarge c5n.2xlarge
  • AWS, c5d.2xlarge m5.2xlarge m5n.2xlarge
  • Azure, Standard D2 v2 Standard_B2ms Standard_D2V4 Standard_D2ds_V4
  • Azure, Standard D3 v2 Standard_B4ms Standard_DS3_v2 Standard_D2ds_V4
  • Azure, Standard D4 v2 Standard_A8_v2 Standard_F8 Standard_F8s
  • Azure, Standard_D8_v4 Standard_D8_v3 Standard_D8s_v3
  • Hyper-V, VMWare ESXi, KVM, Nutanix

User support

Email or online ticketing support
Email or online ticketing
Support response times
Acknowledgement is automated and instant. Response times vary depending on the SLA category assigned
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 A
Phone support
Yes
Phone support availability
9 to 5 (UK time), 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
We provide an service / account manager on all G-Cloud engagements with responsibility for ensuring customer objectives are met, and that there are no issues with service delivery and customer satisfaction is maximised. Our service / account managers act as an escalation point, and can be reached via phone or email, to respond to issues beyond the control of the team providing the service. Service / account management is included within our service pricing. Onsite technical support would be charged as per our SFIA rate card.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Partner Support and SonicWall online support. Knowledge base on Sonicwall.com is also available along with technical documentation.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Configuration can be exported. Virtual appliance can be wiped clean if desired.
End-of-contract process
Security services and support functions cease to be updated.

Using the service

Web browser interface
Yes
Using the web interface
Administrators can configure, manage and investigate NSv products via the interface.
Web interface accessibility standard
WCAG 2.1 A
Web interface accessibility testing
None.
API
Yes
What users can and can't do using the API
There is a fully restful API available for the SonicWall NSv. It allows comands to be sent to configure the appliance (all web UI configuration is support in API). The API alos allows for information to be retrieved from the appliance - such as status of a policy, if a rule has been consumed, event details etc.
API automation tools
Other
API documentation
Yes
API documentation formats
HTML
Command line interface
Yes
Command line interface compatibility
  • Linux or Unix
  • Windows
  • MacOS
  • Other
Using the command line interface
All NSv configuration functionality from the UI is replicated in the Cli

Scaling

Scaling available
No
Independence of resources
Specification of underpinning servers, cloud platform and model of NSv virtual machine will affect performance metrics versus user demand.
Usage notifications
No

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
SonicWall

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
Never
Protecting data at rest
Other
Other data at rest protection approach
NSv Stores only Syslog and Netflow/IPFix reporting data. This is protected inhereantly by the hardened Sonic OS platform.
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery
Yes
What’s backed up
Full configuration backups are supported.
Backup controls
Scheduling is available UI/Cli. Cloud backups can be scheduled. Local backups are manual, but can be scripted via Cli or API.
Datacentre setup
  • Multiple datacentres with disaster recovery
  • Multiple datacentres
  • Single datacentre with multiple copies
  • Single datacentre
Scheduling backups
Users schedule backups through a web interface
Backup recovery
Users can recover backups themselves, for example through a web interface

Data-in-transit protection

Data protection between buyer and supplier networks
IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
Impossible to guarantee due to the reliance of the underlying cloud Platform/Server or configured configuration. Users can deploy highly-available architectures using both NSv and the native cloud resilience feature set. NSv supports high-availabilty configurations.
Approach to resilience
A Highly Availability configuration is available and supported. Addtional resilience can be provided by the chosen cloud platform.
Outage reporting
Yes, If you are optionally using Network Security Manager email alerting is provided if the Virtual appliance goes offline. Also your Platform of choice, such as Microsoft Azure, will offer alerting.

Identity and authentication

User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
The management inferface can be restricted by only giving access to specified acccounts of your choosing. Further more access can be limited by public IP to your chosen source address. For access to support channels this would be acheieved via mysonicwall.com. An account is needed in order to register the device. Mysonicwall.com requires a username and password as well as optional MFA.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device on a government network (for example PSN)
  • Dedicated device over multiple services or networks
  • Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Less than 1 month
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
Less than 1 month
How long system logs are stored for
Less than 1 month

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
None
Information security policies and processes
Not known

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
NSv development follows an internally developed metholodogy and processes for robust release management and change control.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Discovered vulnerabilities are publicaly available from SonicWall website.

Patches are made available for supported customers to download and apply. Patches for fundamental vulnerabilities are made available for all customers.

Potential threats are identified both internally, by third parties, and security researchers.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Identification of potential compromise or vulnerability can come from multiple sources accross SonicWall's entire global network.

Once identified a potential compromise will be evaluated. Once confirmed a mitigation will be published. NSv signature updates are routinely released every hour.
Incident management type
Supplier-defined controls
Incident management approach
An ITIL based incident management process applies.

Secure development

Approach to secure software development best practice
Supplier-defined process

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
No

Energy efficiency

Energy-efficient datacentres
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

At TT we are committed to tackling the challenges of sustainable development and we operate as a responsible corporate business. We implement practices that promote economic security, social and environmental responsibility and we continuously seek to improve performance in these areas. We are committed to working with our suppliers and customers to improve sustainability performance throughout all our activities. We recycle printer toners, IT waste and cardboard through our partner Restore and the Council Recycling Scheme. Respecting the environment, TT is focused on reducing the environmental footprint of our customers by innovating highly efficient, integrated appliances and cloud-based security solutions at TT, we understand the unprecedented challenge that our customers face in continually improving their sustainability. We utilise innovation to drive environmental responsibility at the core of our strategy. We strive to minimize our environmental impact throughout our value chain, to ensure we are driving the best possible outcomes for sustainability goals and for the planet. We try to demonstrate this commitment in everything we do, by reducing the footprint of our partners products, ensuring they lead the way with energy efficiency, and adhere to compliance and regulations worldwide, and adopting responsible approaches across our daily business operations. We are also currently working on an independently validated and publicly available Carbon Reduction Plan, due to be completed and published mid-2024.

Tackling economic inequality

In addressing economic inequality, we must begin by fostering equal opportunities for all, starting from the grassroots level. One effective approach we undertake is to introduce mock interviews for school children, providing them with essential skills and confidence needed to navigate the professional world regardless of their background. Additionally, we offer work experience opportunities and apprenticeships to bridge the gap between education and employment, empowering individuals from diverse socio-economic backgrounds to access valuable hands-on training and networking opportunities.

Equal opportunity

Trusted Technology is an equal opportunity employer and is fully committed to a policy of treating all its employees and job applicants equally.
TT will take all reasonable steps to employ, train and promote employees on the basis of their experience, abilities and qualifications without regard to race, colour, ethnic origin, nationality, national origin, religion or belief, sex, sexual orientation, marital status, age or disability. TT will also take all reasonable steps to provide a work environment in which all employees are treated with respect and dignity and that is free of harassment based upon an employee’s race, colour, ethnic origin, nationality, national origin, religion or belief, sex, sexual orientation, marital status, age or disability. TT will not condone any form of harassment, whether engaged in by employees or by outside third parties who do business with TT.
We regularly carry out diversity surveys to ensure we are an ethical and diverse employer, these survey results are publicly available.

Wellbeing

A recent development is our premises move; we have recently moved building to a brand-new, open office space in an environmentally friendly building. Our new building has an open office space for socialising with lots of natural light and quiet meeting rooms to work in, we even have a pool table for leisure! We provide our colleagues with a weekly delivery of “wonky fruit”, offering a healthy snack option for colleagues and utilising fruit which supermarkets reject. Furthermore, Trusted Technology operates a hybrid working environment, with two days a week in the office. This allows individuals to spend less time commuting but also offers a healthy balance of remote and office working. We offer tangible rewards to colleagues to incentivise responsible, hardworking behaviour. Some examples of this are an equally divided profits share, extra days of annual leave if certain criteria are met and a one off £500 Cost of Living payment. Furthermore, Trusted Technology has certified mental and physical health first aiders and we also release a monthly newsletter with features on mental and physical health.

Pricing

Price
£908 a unit a year
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sales@trusted-technology.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.