Skip to main content

Help us improve the Digital Marketplace - send your feedback

Exponential-e Ltd

Global Protect Cloud Service

GlobalProtect Network Security extends to your remote networks and mobile users. Offering next-generation security deployment to remote devices by leveraging a cloud-based security infrastructure managed by Palo Alto Networks. GlobalProtect cloud service allows you to create and deploy consistent security policies across your entire organisation.

Features

  • Next generation firewall
  • Intrusion Prevention System (IPS)
  • Anti-Virus
  • Anti-Spyware
  • URL Filtering
  • Application Visibility
  • Bandwidth management
  • Near-Real-time Sandboxing
  • DNS Security
  • User based access control

Benefits

  • Securing remote locations
  • Securing mobile users
  • Reduced attack surface
  • Consistent security policy across entire estate
  • Preventing known and unknown threats
  • Scalable and resilient architecture
  • Data protection
  • Secure inter-branch communications
  • Cloud based architecture with no capital investment required

Pricing

£113,492 an instance a year

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at psbids@exponential-e.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

9 6 9 7 3 8 2 6 8 6 0 2 4 2 0

Contact

Exponential-e Ltd Kay Sugg
Telephone: 02034358835
Email: psbids@exponential-e.com

Service scope

Service constraints
No
System requirements
  • IPSec Enabled device on remote network perimeter
  • Supported endpoint device to install GlobalProtect Client

User support

Email or online ticketing support
Email or online ticketing
Support response times
P1 Target Response Time - 30 mins
P2 Target Response Time - 30 mins
P3 Target Response Time - 1 hour
P4 Target Response Time - 4 hours
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Business Hours (0900-1700), weekdays excluding Bank Holidays. Extended Business Hours (0800 - 1800), weekdays excluding Bank Holidays. 24x7x365, including Bank Holidays.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Onsite training will be provided to the administrators wishing to access the service for configuration, report generation or troubleshooting.

Short end user manual can be provided in the event that end user interaction is required to resolve any issues, e.g. users wish to override the geolocation settings and retain their home country language and settings whilst travelling.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
All customer data that is held on request, would be handed back at the end of the contract in digital format.
End-of-contract process
Organization remote networks and remote users will no more be protected by GlobalProtect Cloud Service at the end of the contract and depeding on the contract obligations, following may or may not be followed to offboard organization from GlobalProtect Cloud Service.

1. The method that was initially used to onboard remote networks into GlobalProtect Cloud Service will be used to offboard remote networks.

2. The packaging tool that was used to deploy GlobalProtect agent application on the end point devices will be used to remove the agent.

Any other contractual obligations will be followed at the end of the contract.

Using the service

Web browser interface
Yes
Using the web interface
Configuration, reporting and logging (providing access has been granted by Exponential-e, on request by the Buyer).
Web interface accessibility standard
None or don’t know
How the web interface is accessible
Web interface is useful for administrators of the service and is accessible by https - a secure channel for access. Administrators can configure the service, generate reports and look at logs for troubleshooting purposes.

Users using the service will have no requirement to access the web interface of the service.
Web interface accessibility testing
None
API
Yes
What users can and can't do using the API
Administrators can configure GlobalProtect Cloud Service using XML API and access pre-defined reports.

Users will have no access to the API.
API automation tools
  • Ansible
  • Other
Other API automation tools
XML API
API documentation
Yes
API documentation formats
  • HTML
  • PDF
Command line interface
Yes
Command line interface compatibility
Other
Using the command line interface
Administrators can manage configurations using CLI interface and check status of the service.

End users are generally not provided access to the CLI interface.

Scaling

Scaling available
No
Independence of resources
GlobalProtect Cloud Service has dedicated instances to the organizations consuming the service and hence it cannot be affected by non-organization users.
Usage notifications
No

Analytics

Infrastructure or application metrics
Yes
Metrics types
Other
Other metrics
Service availability information is available at https://status.paloaltonetworks.com/#
Reporting types
Real-time dashboards

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Palo Alto Networks

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
  • Hardware containing data is completely destroyed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • Backup the GlobalProtect Cloud Service configuration
  • Backup the relevant traffic, threat etc. log information
Backup controls
Scheduled configuration backups as per the requirement e.g. weekly, monthly etc. For log backup, this information needs to be transferred into an "on-premise" backup solution.
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
Other
Other protection within supplier network
The data centers used for the Logging Service are secured and protected with state-of-the-art physical and network security, the latter provided by Palo Alto Networks Next-Generation Security Platform. Palo Alto Networks has also achieved SOC 2 certification for its Logging Service to demonstrate its strong security policies and internal controls environment. Furthermore, the service is hosted in SOC 2 Type II certified data centers.

Availability and resilience

Guaranteed availability
The Service Level Objectives are available on this link - https://www.paloaltonetworks.com/resources/datasheets/service-level-objects
Approach to resilience
The GlobalProtect Cloud Service infrastructure is resilient. Detailed information on internal infrastructure resiliency can be made available to customers on request.

Customers can onboard in to this cloud service with in-region and cross-region resiliency.
Outage reporting
At the moment of this writing, outages are available on public dashboard. Further outage notification methods such as email alerts are in planning phase and may be available in future once released as a part of next version.

Identity and authentication

User authentication
Identity federation with existing provider (for example Google apps)
Access restrictions in management interfaces and support channels
Administrators can be assigned different roles using roles based access management and can be restricted to the permissions required for their role.

Authentication to management interface can be managed with two factor authenticatin methods such as OKTA, Duo, RSA etc.
Access restriction testing frequency
At least once a year
Management access authentication
Identity federation with existing provider (for example Google Apps)
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
12/4/2024
What the ISO/IEC 27001 doesn’t cover
Details available on request
ISO 28000:2007 certification
No
CSA STAR certification
Yes
CSA STAR accreditation date
12/4/2021
CSA STAR certification level
Level 3: CSA STAR Certification
What the CSA STAR doesn’t cover
Details available on request
PCI certification
Yes
Who accredited the PCI DSS certification
PCI Self-Assessment
PCI DSS accreditation date
08/11/2023
What the PCI DSS doesn’t cover
Details available on request.
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
  • SOC2 Type 2 Report
  • BS 10012 Personal Information Management
  • HSCN Stage 3 Compliance
  • ISO 9001 - Quality Management
  • ISO 27017 - Private Cloud Security
  • ISO 20000-1 - Service Management
  • BS 10012 - Data Protection (GDPR)
  • ISO 22301 - Business Continuity
  • ISO 50001 - Energy Management
  • ISO 14001 - Environmental Management

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
The security of our Network is fundamental to our business and have implemented a wide range of security measures. Our network has undergone rigorous security assessments - undertaken by BSI - and has achieved ISO 27001 (tested every six months) and PCI-DSS (tested annually) certifications to ensure security standards.
Our network has undergone rigorous security assessments - undertaken by BSI - and has achieved ISO 27001 (tested every six months) and PCI-DSS (tested annually) certifications to ensure security standards. These audits and controls are continuous and executed in-line with the appropriate HMG data security standards.
Exponential-e are currently at HSCN Stage 3 accreditation.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Details available on request.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Details available on request.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Details available on request.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Details available on request.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Third-party
Third-party virtualisation provider
AWS, Google (GCP)
How shared infrastructure is kept separate
GlobalProtect Cloud Service deploys dedicated set of virtual firewall instances for each customer. No firewall instance serves multiple customers. Any data stored on or processed by Palo Alto Networks systems is secured with state-of-the-art technologies, and Palo Alto Networks operate rigorous technical and organizational security controls. Palo Alto Networks has achieved SOC 2 certification for GlobalProtect cloud service to demonstrate its strong security policies and internal controls.

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
• All our Data Centres are ISO14001 accredited organisations with robust environmental management systems
• Procuring consumed energy from sustainable energy sources wherever possible
• Ensuring the use of hot/cold aisle cooling design in our Data Centres, which reduces energy consumption as the cooling is more efficient and helps our customers to reduce their carbon footprint

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

MAC 4.1: Delivering environmental benefits Exponential-e is committed to continually improving environmental performance and monitoring environmental effects from our activities to identify potential areas for improvement. We are accredited and operate within internationally recognised management standards (9 ISO’s) of which two are focused on Environment Management (ISO 14001:2015) and Energy Efficiency (ISO 50001:2015). This standard specifies the requirements for establishing, implementing, maintaining and improving an energy management system with a systematic approach in achieving continual improvement of energy performance, including energy efficiency, energy security, energy use and consumption. Critical to our core operation is our national network infrastructure, and cloud infrastructure. Thanks to unique cooling technology, our Data Centres are the most environmentally efficient in the UK. They save customers on average around £1.1 million per megawatt and 6,000 tonnes of taxable carbon annually compared with an average Data Centre facility. Some of the practices deployed to achieve carbon footprint include: • All our Data Centres are ISO 14001 accredited with robust environmental management systems • Procuring consumed energy from sustainable energy sources wherever possible • Ensuring the use of hot/cold aisle cooling design in our Data Centres, which reduces energy consumption as the cooling is more efficient and helps our customers to reduce their carbon footprint • Using the latest virtualisation (VDC) technologies to ensure the most efficient utilisation of hardware resulting in the overall optimisation of our client’s infrastructure. Our VDC delivers dedicated processing instead of having multiple, underutilised physical servers, which helps minimise our environmental impact • The business considers the environmental impact of goods and services within procurement processes. Working with suppliers, contractors and indeed clients to lessen the environmental impact of their operations. • Homeworking practices have been developed to allow homeworking whilst preserving security of company data and access to IT systems.

Covid-19 recovery

MAC 1.5: Improvements to workplace conditions Exponential-e operates to ISO22301 – Business Continuity Management System (BCMS) standard. This means our critical business functions have existing and proven business continuity plans which are reviewed, exercised and/or tested regularly. In line with this standard, we have taken the following steps: • Implemented flexible working arrangements for any high-risk employees, or employees who are unable to travel due to other reasons relating to the coronavirus (Covid-19) • Conducted a full Business Impact Analysis (BIA), considering shift patterns, physical segregation and cover arrangements across all of our core 24*7 service operations to maintain the appropriate resource levels • Implemented ongoing monitoring of our workforce and skills capability to ensure all our personnel are multi-skilled and have monitoring in place to address any weakness or gaps • Completed capacity planning and forecasting of the current and future levels of resource utilisation, taking into consideration the enactment of multiple Business Continuity scenarios • Introduced enhanced presence of our on-site cleaning personnel throughout the day and evening to ensure the cleanliness of our facilities is maintained • Initiated a change freeze across our core platforms to allow our key resources to focus on service availability and reacting to changes our customers may require • Limited any non-essential travel to customer or vendor sites, making the best use of remote technology to ensure we maintain our quality of service and open engagement throughout this period of uncertainty. Exponential-e has since initiated remote working at a larger scale in a controlled manner. Our Head Office has implemented a Hybrid working model for all staff who are able to work remotely for two days a week and in the office for maximum of three days a week. This also reduces our carbon emissions through travelling and heating/lighting of office premises.

Tackling economic inequality

MAC 3.1: Diverse supply chain Exponential-e maintains a policy of working with diverse partners and SME organisations where there is a defined benefit to our customers, and where the limitations of the contract or security requirements are not at risk in any way, which must be our overriding consideration. We reach out to our wider supply chain partners should any subcontracting opportunities arise during the contract duration. If any strategic supplier fails to deliver and thus breaches the terms of their contract, we will invoke the use of alternative and pre-qualified suppliers. We plan for these contingencies and maintain a supply chain that does not rely on any single source of fulfilment. MAC 3.2: Supporting innovation & disruptive technologies We will hold regular engagements, in which we will review, present, and collaborate on new technology and commercial initiatives throughout the life of the contract, and (when applicable), driving equality throughout our supply chain. MAC 3.3: Scalable & future-proofed methods to modernise delivery/increase productivity We work with innovative and agile supplier organisations who bring innovative technology solutions to market, by providing a framework to enable the deployment of their services within our stable and risk-controlled corporate environment. MAC 3.5: Manage cyber security risks Exponential-e maintains Cyber Essentials Plus and ISO 27001 accreditations. Additionally, Exponential-e operates a 24 x 7 x 365 CSOC desk to alert for any cyber security issues and potential risks. Our CSOC is built using trusted Unified Security Management (USM) technology, which unlike other SIEM software, combines powerful SIEM and log management capabilities with other essential security tools such as asset discovery, vulnerability assessment, intrusion detection (NIDS and HIDS) to provide a centralised security monitoring of networks and endpoints, all through a single pane of glass.

Equal opportunity

MAC 5.1 Provision of inclusive working environment As a commitment to reducing the disability employment gap Exponential-e has adopted a hybrid working model that allows flexibility. Hybrid working, sometimes referred to as "blended working", is a form of flexible working that allows employees to split their time between attending the workplace and working remotely (typically from home). MAC 6.1: Tackling inequality in the contract workforce We are committed to equal pay for the contract workforce. To address our gender pay gap, we have a number of initiatives in place, to not only attract more female talent, but to encourage a more balanced, and rewarding workplace: • Working with educational institutions to help attract more women into STEM focused roles • The data shows that the disparity in the bonuses paid is due to the fact there a very few women in senior sales positions. We have a junior sales mentoring programme for both men and women, equally, to encourage progression into senior sales roles, especially for women • Training is available to cover areas like Equality & Diversity, Unconscious Bias • We have established a Women’s Working Group who will assist in supporting the attraction, retention and promotion of our female talent across the business • Flexible working arrangements for all staff to encourage work life balance. Placement Programme & Apprenticeships Every year Exponential-e offers placements and apprenticeships to students whose degrees would benefit from working in an operational technical environment. The students are paid, which allows them to practice the theory learnt in the classroom in a real world environment; while also supporting themselves financially. As part of our commitment to the Government’s Apprenticeships Levy Programme we actively work with registered apprenticeship companies to provide upskilling opportunities to employees across a range of subjects.

Wellbeing

MAC 7.1: Support health and wellbeing in the workforce All staff are eligible to join our Private Health scheme (on completion of probationary period) run by Vitality which actively encourages physical and mental wellbeing through a broad variety of programmes design to promote and incentivise wellbeing. Exponential-e has also implemented the six standards in the Mental Health at Work commitment and where possible follows the mental health enhanced standards in Thriving at Work, as follows: 1. Prioritise Health Wellbeing Through Systematic Programme of Activities Exponential-e partnered with Care first as an Employee Assistance Programme (EAP) to provide online and counselling services to all our employees. 2. Work Design & Culture Drives Mental Health Outcomes Exponential-e offers the following benefits package for all eligible employees - Life Assurance, Private Medical Scheme, Employee Assistance Programme, Ride to Work Scheme, Season Ticket Loan, Employee Referral Scheme and Purchase of Holiday Scheme. 3. Promote Open Culture Around Mental Health Exponential-e has seen a huge shift in attitudes to mental health and we promote and support employees to think and talk about their mental health which subsequently helps the organisation to thrive. 4. Increase Organisational Confidence & Capability Exponential-e recognises the importance of leadership and management development and provides programmes designed to upskill our managers and strengthen our leadership capabilities. 5. Provide Mental Health Tools & Support Exponential-e partners with Care first as an Employee Assistance Programme (EAP) to provide online and counselling services to all our employees, including a series of webinars including stress awareness, social anxiety, long Covid, how weather can affect mood and behaviour, financial wellbeing, and breaking bad habits. 6. Increase Transparency/Accountability Through Reporting Annual Employee Opinion Surveys are used to drive improvements. A monthly Employee Engagement Pulse Survey helps to keep our finger on the pulse of the organisation.

Pricing

Price
£113,492 an instance a year
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
The service will be provided in a free trial for a period of 60 calendar days.
Link to free trial
Trial license provided on request.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at psbids@exponential-e.com. Tell them what format you need. It will help if you say what assistive technology you use.