Direct Award Public Sector Frameworks
Remove the time, resource, cost and risk associated with tender procurement exercises.
Jisc Network Equipment Framework
What is it?
The scope of the agreement covers the supply and support of a broad range of wired and Wi-Fi network equipment including:
- Devices with firewall capabilities
- Low-end customer premises equipment (CPE)
- Mid-range enterprise and high-end, carrier-class type equipment supporting 100 Gigabit Ethernet and above.
It also covers converged network adapters, interface modules, transceivers, access points, voice over internet protocol (VoIP) products and associated ancillary goods and services including software, cabling and installation.
Lots which we are on:
- Lot 7 Palo Alto Networks “Top Ranked Supplier”: Next-Generation Firewalls (hardware, virtual appliances), Cloud Security: Private and Public, Advanced Endpoint Security, and Secure Remote Access.
- Lot 8 Proofpoint: Advanced Email Security – Inbound, Outbound and Cloud
- Lot 8 Alcatel-Lucent: Wired and Wi-Fi Networking
- Lot 8 Infoblox: Next-Generation Security, Reliability and Automation of DNS, DHCP and IPAM (DDI)
- Lot 8: Efficient IP
Who can purchase through this?
It is open to higher education institutions, further education and specialist colleges and research council establishments in the UK. It can also be used by any other organisations connected to the Janet Network, including local authorities, regional broadband consortia, or other bodies whose core purpose is the support or advancement of further or higher education or of research.
Managed & Co-Managed NGFWs from Jisc & KHIPU
A recently enhanced Managed Firewall Service (MFS), designed specifically for UK colleges, universities, research centres and the public sector, delivered by Jisc in collaboration with KHIPU Networks.
As the operator of the Janet Network, Jisc is in a unique position, with oversight of threats from across the education and research sector’s connected community. The enhanced firewall service, combines threat intelligence feeds from all participating members, enabling the rapid detection and proactive mitigation of potentially harmful cyber threats. This constantly developing knowledge-based, combined with the cyber-secutity expertise held by KHIPU, ensure an unprecedented level of network protection for your educational institution.
Jisc Simulated Phishing and Associated Training Framework
What is it?
The service is a cost-effective and flexible solution to highlight the dangers of Phishing attacks. It includes practical simulations, as well as theoretical sessions, with a choice of classroom-based or virtual learning led by experienced cyber security experts.
The simulation service includes:
- Practical phishing simulations – including simulated phishing emails and websites
- A ‘cyber security 101’ training session – including training modules with videos, interactive quizzes and tests
- Branded landing pages for your website to support user awareness
- Detailed reporting showing stats and graphs after each anti-phishing campaign
Who can purchase through this?
It is open to higher education institutions, further education and specialist colleges and research council establishments in the UK. It can also be used by any other organisations connected to the Janet Network, including local authorities, regional broadband consortia, or other bodies whose core purpose is the support or advancement of further or higher education or of research.
Jisc Vulnerability Assessment Service and Tools Supply Framework
What is it?
With a choice of lots and suppliers, the framework allows you to engage a service provider to do the work for you and deliver a report and guidance. Alternatively, you can buy the tooling you need to run your own scans.
This framework is broken down into eight lots to offer the sector full access to the valuable tools and assessment service.
- Lot 1 – Vulnerability assessment service: provides automated, security vulnerability assessments of your IT assets, including reporting and guidance on remediation actions
- Lot 2–8 – Access to market-leading vulnerability assessment tools: Provides an easy path to procure tools for you to conduct your own vulnerability scans
Lots which we are on:
- Lot 1: Vulnerability Assessment Service – A managed service providing the requested vulnerability scan, results and associated report.
- Lot 8: Greenbone – The supply and support of other vulnerability assessment and scanning solutions
Who can purchase through this?
Access to the framework is freely available to members of Jisc and/or those providing or supporting education, research or culture, such as:
- All higher and further education institutions
- All laboratories and other establishments of the Research Councils
- The funding bodies for research, higher and further education across the UK
- Local government authorities that provide broadband ICT services to schools, or commission these services from third parties
- Regional Broadband Consortia (RBCs) and any other vehicles created by local government authorities in England to aggregate the provision of broadband ICT services to schools
- The equivalent bodies in Scotland, Wales and Northern Ireland providing broadband ICT services to schools
- Individual schools, whether under local government control or with other governance
- Individual or groups of libraries or museums, whether under local government control or with other governance
- Other bodies whose core purpose is the support or advancement of education or research
Jisc Web Filtering, Monitoring and Reporting Framework
What is it?
These services will enable you to safeguard potentially vulnerable learners from inappropriate or illegal content on the web and also help you to comply with your duty under the Prevent agenda.
Web filtering includes lists from the Internet Watch Foundation (IWF) – illegal sexual content – and the Counter Terrorism Internet Referral Unit (CTIRU) – illegal extremist content, Prevent. There are flexible choices and you choose from pre-built and/or custom categories.
Monitoring covers allowed and disallowed pages. It also comes with the ability to send alerts when conditions are met.
Reporting is available for both general or individual behaviours. You can also use this to distinguish between onsite and offsite activities. Exportable formats are available.
Lots which we are on:
- Lot 2 – Palo Alto Networks – Predominantly Local Appliance Based
Who can purchase through this?
Access to the framework is freely available to Jisc member institutions and anyone in education (including schools, sixth form colleges, libraries and museums and more).
The agreement will continue irrespective of the ongoing negotiations and outcome of the UK’s decision to leave the European Union. The Public Contracts Regulations 2015 continue to apply to this procurement process.
NHS SBS Digital Workplace Solutions Framework
What is it?
This framework enables public sector organisations* to purchase market leading solutions and services without the need for a procurement exercise (i.e. tender, mini-competition etc). The framework body undertook a formal tender process for each of the available technology and service categories so that only reputable suppliers and manufacturers can be used on these frameworks.
KHIPU are on the following technology and service categories:
- Palo Alto Networks – Cyber security solutions to secure the network, endpoint and cloud
- HPE Aruba Networks – Network, Wi-Fi, RADIUS, NAC and Cloud Management (ESP)
- HPE Hybrid IT – Cloud computing, storage and virtual environments: Servers, storage and laptops
- Infoblox – Resilient, central and secure DNS, DHCP and IPAM (DDI)
- Fortinet FortiNAC – Network visibility and access control, cyber security solutions
- Greenbone – Vulnerability information assessment and management
- Ordr – Manage network connected systems
- Proofpoint – inbound/outbound email security, outbound data loss prevention, cloud security
- Alcatel-Lucent – Solutions to deliver mission critical clinical applications on any device securely
- Exabeam – Next generation Security Information and Event Management (SIE
- Rubrik – Cloud Data Management and Enterprise Backup Software
- Simulated phishing and cyber security awareness training – reduce the risk of being breached by a phishing attack
- KARMA™ – 24x7x365 proactive monitoring and alerting of networks and systems
- Konnect™ – Managed RADIUS services for Wi-Fi uptime and authentication
- DeDrone – Drone Detection and alerting solution
- Picus – Next-Generation Penetration “Security Control Validation” Solutions and Services
- Netscout Systems (UK) Limited – DDOS Cyber Security Solutions and Services
Who can purchase through this?
Any of the following Approved Organisations, and any of their successors can buy directly from KHIPU without a tender or procurement process.
- NHS bodies;
- Ambulance services;
- Councils, including county councils, district councils, county borough councils, community councils, London borough councils, unitary councils, metropolitan councils, parish councils;
- Educational bodies or establishments including state schools (nursery schools, primary schools, middle or high schools, secondary schools, special schools), academies, colleges, Pupil Referral Unit (PRU), further education colleges and universities;
- Police forces;
- Fire and rescue services;
- Ministerial government departments;
- Non ministerial government departments;
- Executive agencies of government;
- Non-Departmental Public Bodies (NDPBs), including advisory NDPBs, executive NDPBs, and tribunal NDPBs;
- Assembly Sponsored Public Bodies (ASPBs);
- Maritime and coastguard agency services;
- Hospices;
- National Parks;
- Housing associations, including registered social landlords;
- Third sector and charities;
- Citizens advice bodies;
- Public corporations;
- Public financial bodies or institutions;
- Public pension funds;
- Central banks; and
- Civil service bodies, including public sector buying organisations
- Channel Islands Public Sector bodies
- Isle of Man Government Health and Public Services
Crown Commercial Services (G-Cloud 12)
What is it?
The Digital Marketplace is an online service for public sector organisations to find people and technology for digital projects.
Suppliers must apply to sell services. Any public sector organisation, including agencies and arm’s length bodies, can buy using the Digital Marketplace.
What is Available Through This?
- Cyber Security Risk Assessments
- Professional, Support and Managed Services for:
- Infoblox’ portfolio
- HPE Aruba solutions
- Alcatel-Lucent Enterprise portfolio
- Palo Alto Networks solutions
- Exabeam SIEM Platforms
- FortiNet FortiNAC
- Cyber Essentials Certification and Best Practice Cyber Security Recommendations
- HPE Aruba ClearPass Policy Manager Solution and Cloud Service
- Simulated Phishing, Cyber Security User Awareness Training and Phishing Vulnerability Assessments
- CriticalArc SafeZone and HPE Aruba Meridian Location Tracking and Wayfinding
- KHIPU Konnect™ RADIUS solution: eduroam, Govroam, GovWiFi, any WiFi
- Palo Alto Networks Cortex XDR / Data Lake
- Palo Alto Networks Next-Generation Firewall (Strata), Security Subscriptions and Panorama
- Palo Alto Networks Prisma Cloud
- Palo Alto Networks Prisma Access (SASE)
- Alsid for Active Directory Security
- Blackberry (Cylance) Protect
- Exabeam Next-Generation Security Management Platform (Next Gen SIEM)
- Palo Alto Networks Prisma SaaS
- DeDrone: Drone Detection and Prevention Security – Detect, Track and Identify Drones
- OKTA Cloud Access Management and Multi-Factor Authentication
- Greenbone VAS – Network Vulnerability Assessment Scanning and Management
- Ordr IoT device inventory, classification, profiling and security
- HPE Aruba – Hybrid IT
- Palo Alto Networks Cortex XSOAR
- Proofpoint Email Security – Essentials and Enterprise
- Rubrik Cloud Data Management, Backup and Recovery
- HPE Aruba Cloud Managed WiFi, Networking and ClearPass Services (ESP)
- Fortinet FortiNAC Zero-Trust Network Access Control and IoT Security
- Infoblox DDI
- Managed Services and Network Monitoring, Alerting and Support: WiFi, LAN and Cyber Security
- Alcatel-lucent Enterprise Networking (Wired and Wireless)
- Proofpoint Security Awareness Training
Who can purchase through this?
Any public sector organisation, including agencies and arm’s length bodies, can buy using the Digital Marketplace.
You can create an account and buy at any time.
The buying process is different depending on what services you’re buying.
HEAnet Simulated Phishing
What is it?
The framework is with KHIPU for simulated phishing and associated awareness training framework is a key service that addresses the first and last layer of defense in any organisation – the users.
What is Available Through This?
The framework includes the following services:
- Simulated Phishing Services: Customer-tailored phishing scenarios to identify the ‘risk factor’ and how vulnerable the organisation is to phishing attacks.
- Infrastructure: Are email accounts and systems, as well as the perimeter security (e.g. spam and web filtering, firewalls etc) configured correctly or capable of protecting against a phishing attack?
- Users: How many open phishing emails, click on URL links and share information via phishing websites? How many download attachments from unknown senders?
- Processes: How do users / IT helpdesk departments etc react to phishing emails?
- Devices: What operating systems, web browsers and plug-ins are being used – are they authorised or vulnerable?
Associated User Awareness and Training Services to raise awareness of cyber-attacks delivered via phishing emails, spam, social engineering attempts etc, to help prevent both the individual and organisation from being successfully attacked.
- Awareness training customer portals: What is phishing, facts, statistics, how to identify, what to do, quizzes, training videos and interactive material
Classroom training – Cyber security awareness: That covers all key areas on cyber security and phishing including - Cybersecurity 101, phishing: what is it, the facts and threats to your personal and work life, detection and avoidance, supported by cybersecurity awareness quizzes. The agenda has been designed for staff, both with and without extensive knowledge of IT.
Risk Assessment and Phishing Prevention Report created after each activity, highlighting the risk, all findings including comparisons from previous simulated phishing and training exercises (to measure the success), with recommendations for training, infrastructure configurations and solutions for on-going protection and prevention.
Who can purchase through this?
This is a single supplier Jisc framework available to HEAnet, its member institutions and consumers of its services.