CINXE.COM

Managed firewall | Jisc

<!DOCTYPE html> <!--[if lt IE 7]><html class="no-js lt-ie9 lt-ie8 lt-ie7" lang="en-GB"><![endif]--> <!--[if IE 7]><html class="no-js lt-ie9 lt-ie8 ie7" lang="en-GB"><![endif]--> <!--[if IE 8]><html class="no-js lt-ie9 ie8" lang="en-GB"><![endif]--> <!--[if IE 9]><html class="no-js ie9" lang="en-GB"><![endif]--> <!--[if gt IE 8]><!--><html class="no-js" lang="en-GB"><!--<![endif]--> <head><script type="text/javascript" src="https://web-static.archive.org/_static/js/bundle-playback.js?v=7YQSqjSh" charset="utf-8"></script> <script type="text/javascript" src="https://web-static.archive.org/_static/js/wombat.js?v=txqj7nKC" charset="utf-8"></script> <script>window.RufflePlayer=window.RufflePlayer||{};window.RufflePlayer.config={"autoplay":"on","unmuteOverlay":"hidden"};</script> <script type="text/javascript" src="https://web-static.archive.org/_static/js/ruffle/ruffle.js"></script> <script type="text/javascript"> __wm.init("http://web.archive.org/web"); __wm.wombat("https://www.jisc.ac.uk/managed-firewall","20230104163817","http://web.archive.org/","web","https://web-static.archive.org/_static/", "1672850297"); </script> <link rel="stylesheet" type="text/css" href="https://web-static.archive.org/_static/css/banner-styles.css?v=p7PEIJWi" /> <link rel="stylesheet" type="text/css" href="https://web-static.archive.org/_static/css/iconochive.css?v=3PDvdIFv" /> <!-- End Wayback Rewrite JS Include --> <title>Managed firewall | Jisc</title> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"/> <script type="text/javascript">var jiscp = {"joid":-1,"name":"","sector":"","region":""};</script> <link rel="preconnect" href="//web.archive.org/web/20230104163817/https://cdn-eu.dynamicyield.com/"> <link rel="preconnect" href="//web.archive.org/web/20230104163817/https://st-eu.dynamicyield.com/"> <link rel="preconnect" href="//web.archive.org/web/20230104163817/https://rcom-eu.dynamicyield.com/"> <link rel="dns-prefetch" href="//web.archive.org/web/20230104163817/https://cdn-eu.dynamicyield.com/"> <link rel="dns-prefetch" href="//web.archive.org/web/20230104163817/https://st-eu.dynamicyield.com/"> <link rel="dns-prefetch" href="//web.archive.org/web/20230104163817/https://rcom-eu.dynamicyield.com/"> <script> var cookiestring = new RegExp("jisc_eprivacy" + '[^;]+').exec(document.cookie); var value = unescape(!!cookiestring ? cookiestring.toString().replace(/^[^=]+/, '').replace('=', '') : ''); if(value === "active-consent") { var script1 = document.createElement('script'); var script2 = document.createElement('script'); script1.src = "//web.archive.org/web/20230104163817/https://cdn-eu.dynamicyield.com/api/9877327/api_dynamic.js"; script2.src = "//web.archive.org/web/20230104163817/https://cdn-eu.dynamicyield.com/api/9877327/api_static.js"; document.getElementsByTagName('head')[0].appendChild(script1); document.getElementsByTagName('head')[0].appendChild(script2); } </script><script> var cookiestring = new RegExp("jisc_eprivacy" + '[^;]+').exec(document.cookie); var value = unescape(!!cookiestring ? cookiestring.toString().replace(/^[^=]+/, '').replace('=', '') : ''); if(value === "active-consent") { (function(h,o,t,j,a,r){ h.hj=h.hj||function(){(h.hj.q=h.hj.q||[]).push(arguments)}; h._hjSettings={hjid:2326029,hjsv:6}; a=o.getElementsByTagName('head')[0]; r=o.createElement('script');r.async=1; r.src=t+h._hjSettings.hjid+j+h._hjSettings.hjsv; a.appendChild(r); })(window,document,'http://web.archive.org/web/20230104163817/https://static.hotjar.com/c/hotjar-','.js?sv='); } </script> <link rel="shortcut icon" href="http://web.archive.org/web/20230104163817im_/https://www.jisc.ac.uk/sites/all/themes/jisc_clean/favicon.ico"/> <meta name="description" content="A fully managed solution for your firewall's operation that will keep you ahead of the current threat."/> <link rel="canonical" href="http://web.archive.org/web/20230104163817/https://www.jisc.ac.uk/managed-firewall"/> <link rel="shortlink" href="http://web.archive.org/web/20230104163817/https://www.jisc.ac.uk/node/59831"/> <meta property="og:site_name" content="Jisc"/> <meta property="og:type" content="product"/> <meta property="og:url" content="http://web.archive.org/web/20230104163817/https://www.jisc.ac.uk/managed-firewall"/> <meta property="og:title" content="Managed firewall"/> <meta property="og:description" content="A fully managed solution for your firewall's operation that will keep you ahead of the current threat."/> <meta name="twitter:card" content="summary_large_image"/> <meta name="twitter:site" content="@jisc"/> <meta name="twitter:url" content="http://web.archive.org/web/20230104163817im_/https://www.jisc.ac.uk/managed-firewall"/> <meta name="twitter:title" content="Managed firewall"/> <meta name="twitter:description" content="A fully managed solution for your firewall's operation that will keep you ahead of the current threat."/> <link rel="alternate" type="application/rss+xml" title="Jisc blog feed" href="http://web.archive.org/web/20230104163817/https://feeds.feedburner.com/JISCBlog"/> <link rel="alternate" type="application/rss+xml" title="Jisc news feed" href="http://web.archive.org/web/20230104163817/https://feeds2.feedburner.com/ac/uabG"/> <link rel="alternate" type="application/rss+xml" title="Jisc events feed" href="http://web.archive.org/web/20230104163817/https://feeds2.feedburner.com/ac/toXU"/> <link rel="alternate" type="application/rss+xml" title="Jisc jobs feed" href="http://web.archive.org/web/20230104163817/https://feeds.feedburner.com/JiscJobVacanciesWebFeed"/> <link rel="alternate" type="application/rss+xml" title="Jisc podcasts feed" href="http://web.archive.org/web/20230104163817/https://feeds.feedburner.com/JiscPodcast"/> <link rel="apple-touch-icon" sizes="144x144" href="http://web.archive.org/web/20230104163817im_/https://www.jisc.ac.uk/sites/all/themes/jisc_clean/apple-touch-icon-144x144-precomposed.png"> <link rel="apple-touch-icon" sizes="114x114" href="http://web.archive.org/web/20230104163817im_/https://www.jisc.ac.uk/sites/all/themes/jisc_clean/apple-touch-icon-114x114-precomposed.png"> <link rel="apple-touch-icon" sizes="57x57" href="http://web.archive.org/web/20230104163817im_/https://www.jisc.ac.uk/sites/all/themes/jisc_clean/apple-touch-icon-57x57-precomposed.png"> <link rel="apple-touch-icon" sizes="72x72" href="http://web.archive.org/web/20230104163817im_/https://www.jisc.ac.uk/sites/all/themes/jisc_clean/apple-touch-icon-72x72-precomposed.png"> <link rel="apple-touch-icon" href="http://web.archive.org/web/20230104163817im_/https://www.jisc.ac.uk/sites/all/themes/jisc_clean/apple-touch-icon-precomposed.png"> <link rel="apple-touch-icon" href="http://web.archive.org/web/20230104163817im_/https://www.jisc.ac.uk/sites/all/themes/jisc_clean/apple-touch-icon.png"> <!-- The conditional comments above make IE show compatibility mode button, unless you add this meta tag. It forces the latest IE rendering engine (even in intranet) & Chrome Frame. Note: to avoid edge case issues and please the validator you could replace this tag with a line in .htaccess (h5bp.com/b/378) --> <meta property="fb:pages" content="499379160101212"/> <meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"/> <meta content="width=device-width,initial-scale=1.0" name="viewport"/> <meta content="on" http-equiv="cleartype"/> <!-- Turn off phone number auto-detection in favour of manual control: http://bit.ly/pHJN6R --> <meta name="format-detection" content="telephone=no"/> <meta name="google-site-verification" content="UNqcoVblscrmuOfPyGUTeRMyNRcroUK_U9ghx-PFl0Q"/> <link href="//web.archive.org/web/20230104163817cs_/https://fonts.googleapis.com/css?family=Roboto:300,300i,400,400i,500,500i" rel="stylesheet"> <link href="http://web.archive.org/web/20230104163817cs_/https://fonts.googleapis.com/css2?family=Roboto+Slab&amp;display=swap" rel="stylesheet"> <link rel="stylesheet" href="http://web.archive.org/web/20230104163817cs_/https://www.jisc.ac.uk/sites/default/files/css/css_rEI_5cK_B9hB4So2yZUtr5weuEV3heuAllCDE6XsIkI.css"/> <link rel="stylesheet" href="http://web.archive.org/web/20230104163817cs_/https://www.jisc.ac.uk/sites/default/files/css/css_oBsiHIoIA5lAPqK9E6jDdaNe3tAN5Nagql7giHq9cno.css"/> <link rel="stylesheet" href="http://web.archive.org/web/20230104163817cs_/https://www.jisc.ac.uk/sites/default/files/css/css_PsIMLeNhMOWYLk90AWTJ5AtR6KQeGbR_YScSoC_7uSM.css" media="print"/> <style type="text/css"> .cookie-bar { color: #fff; background-color: #0d224c;} .cookie-bar__confirm2, .cookie-bar__confirm, .cookie-bar__reject { padding: .9rem 1.8rem; color: #0D224E!important; line-height: 1; text-align: center; text-decoration: none!important; background-color: #fff; margin-left: 25px ; margin-left: 2.5rem ; font-size: 18px ; font-size: 1.8rem ; line-height: 22px ; line-height: 2.2rem ; -webkit-border-radius: 3px; -moz-border-radius: 3px; -ms-border-radius: 3px; -o-border-radius: 3px; border-radius: 3px; } .cookie-bar__confirm2:visited, .cookie-bar__confirm:visited, .cookie-bar__reject:visited { color: #0D224E; } @media print { .cookie-bar__reject:visited { color: #0D224E; } } .cookie-bar__confirm2:focus, .cookie-bar__confirm:focus, .cookie-bar__reject:focus { color: #007aaa; background-color: #d9d9d9; outline: 0.3rem solid #fd6; } .cookie-bar__confirm2:hover, .cookie-bar__confirm:hover, .cookie-bar__reject:hover { box-shadow: 0 0.3rem 1.2rem rgba(0, 0, 0, 0.23), 0 0.3rem 1.2rem rgba(0, 0, 0, 0.16); color: #0D224E; background-color: #d9d9d9; transition: all 0.3s cubic-bezier(0.25, 0.8, 0.25, 1); } .cookie-bar__reject:hover { transition: none; } .cookie-bar__reject:active { box-shadow: none; } .cookie-bar__confirm2:focus:hover, .cookie-bar__confirm:focus:hover, .cookie-bar__reject:focus:hover { color: #0D224E; text-decoration: none; background-color:#d9d9d9; outline: 0.3rem solid #fd6; } .cookie-bar__confirm2:active, .cookie-bar__confirm:active, .cookie-bar__reject:active { color: #0D224E; text-decoration: none; background-color: #d9d9d9; outline: 0.3rem solid #fd6; } </style> <script> dataLayer = []; </script> <script src="/web/20230104163817js_/https://www.jisc.ac.uk/sites/all/themes/jisc_clean/js/vendor/modernizr.js"></script> <script src="/web/20230104163817js_/https://www.jisc.ac.uk/sites/all/themes/jisc_clean/js/vendor/a11y-toggle.min.js"></script> <!-- Google Tag Manager - JS snippet - GTM Jisc theme --> <script>(function(w,d,s,l,i){ var cookiestring = new RegExp("jisc_eprivacy" + '[^;]+').exec(document.cookie); var value = unescape(!!cookiestring ? cookiestring.toString().replace(/^[^=]+/, '').replace('=', '') : ''); if(value === "active-consent") { w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'http://web.archive.org/web/20230104163817/https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); } })(window,document,'script','dataLayer','GTM-PWX6FN');</script> <!-- End Google Tag Manager --> <!--[if lte IE 8]> <script src="/sites/all/themes/jisc_clean/js/vendor/html5shiv.cx.js"></script> <script src="/sites/all/themes/jisc_clean/js/vendor/respond.js"></script> <![endif]--> </head> <body class="jisc not-front no-sidebars node-type-product-service"> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="http://web.archive.org/web/20230104163817if_/https://www.googletagmanager.com/ns.html?id=GTM-PWX6FN" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <div id="cookie-bar-main" class="cookie-bar" style="display: none;"> <div class="inner"> <p class="cookie-bar__notification">We use cookies to give you the best experience and to help improve our website</p> <p> <a class="cookie-bar__link" href="/web/20230104163817/https://www.jisc.ac.uk/website/cookies">Find out more about how we use cookies</a> </p> <p class="cookie-bar__options-title">Choose whether to use cookies:</p> <p class="cookie-bar__options"> <a href="#" class="cookie-bar__reject">No thanks</a> <a href="#" class="cookie-bar__confirm">Yes, I accept</a> </p> </div> </div> <header class="masthead jsSiteMasthead" role="banner" xmlns="http://www.w3.org/1999/html"> <div class="inner"> <a id="skiplinks" class="visuallyhidden focusable in-page" href="#main"> <span>Skip to main content</span> </a> </div> <div class="c-main-site-header jsMainSiteHeader"> <div class="c-main-site-header__primary-signpost c-main-site-header__primary-signpost--has-nav-items "> <div class="c-main-site-header__container"> <div class="c-main-site-header__primary-signpost-inner"> <p class="c-main-site-header__brand"> <a class="c-main-site-header__brand-link" href="/web/20230104163817/https://www.jisc.ac.uk/" title="Go to the Jisc homepage"> <img class="c-main-site-header__brand-img" src="http://web.archive.org/web/20230104163817im_/https://www.jisc.ac.uk/sites/all/themes/jisc_clean/img/jisc-logo.svg" alt="Jisc"/> </a> </p> <nav class="c-main-site-header__you-are-in" aria-label="Breadcrumb"> <p class="c-main-site-header__you-are-in-title">You are in:</p> <ul class="c-main-site-header__you-are-in-list"> <li><a href="/web/20230104163817/https://www.jisc.ac.uk/cyber-security">Cyber security</a></li><li><span>Managed firewall</span></li> </ul> </nav> <div class="c-main-site-header__utilities"> <p class="c-main-site-header__utilities-title">Utilities:</p> <ul class="c-main-site-header__utilities-list c-main-site-header__utilities-list--menu-triggers"> <li class="c-main-site-header__utilities-item"> <button class="c-main-site-header__trigger c-main-site-header__trigger--enabled jsUtilityTrigger" data-a11y-toggle="a11ytoggle-siteSearchTarget" data-trigger-role="search" aria-label="Search this website"> <div class="c-main-site-header__trigger-search-icon jsFnbMenuIconTrigger" data-icon-role="search"> <span class="c-main-site-header__trigger-search-icon-circle"></span> <span class="c-main-site-header__trigger-search-icon-handle"></span> </div> <span class="c-main-site-header__trigger-copy">Search this website</span> </button> </li> <li class="c-main-site-header__utilities-item"> <button class="c-main-site-header__trigger c-main-site-header__trigger--enabled jsUtilityTrigger" data-a11y-toggle="a11ytoggle-siteMenuTarget" data-trigger-role="navigation" aria-label="Site navigation"> <div class="c-main-site-header__trigger-menu-icon jsFnbMenuIconTrigger" data-icon-role="navigation"> <span class="c-main-site-header__trigger-menu-icon-line"></span> <span class="c-main-site-header__trigger-menu-icon-line"></span> <span class="c-main-site-header__trigger-menu-icon-line"></span> </div> <span class="c-main-site-header__trigger-copy">Site navigation</span> </button> </li> </ul> <ul class="c-main-site-header__utilities-list c-main-site-header__utilities-list--nav-and-site-search"> <li class="c-main-site-header__utilities-item"> <div class="search search--not-front" id="search"> <span class="c-main-site-header__site-search-label-copy">Search the Jisc website</span> <form action="/web/20230104163817/https://www.jisc.ac.uk/search" method="post" id="search-api-page-search-form-search-" accept-charset="UTF-8"> <label class="visuallyhidden" for="search_term"><span class="form-fields__label-text">Search </span></label> <input class="ui-autocomplete-input" placeholder="Search Jisc" id="search_term" autocomplete="off" type="text" name="keys_1" value="" size="30" maxlength="128"/> <input type="hidden" name="id" value="1"/> <a href="#" class="close ico ico-cross">Clear search results</a><input class="ico ico-search-glass" type="submit" id="edit-submit-1" name="op" value="Search"/><input type="hidden" name="form_build_id" value="form-GYU6NW3VS3Wrr3w1urmCqNP7TGxWU86EtNLwUIQ0F-E"/> <input type="hidden" name="form_id" value="search_api_page_search_form_search_"/> </form> <div id="search-results" class="search-results-dropdown"> <p class="search-results__intro"></p> </div> </div> </li> </ul> </div> </div> </div> </div> <div class="c-main-site-header__menu jsMenuTarget" id="a11ytoggle-siteSearchTarget" data-is-small-viewport=""> <div class="c-main-site-header__site-search c-main-site-header__site-search--in-menu" role="search"> <div class="search search--not-front" id="search"> <span class="c-main-site-header__site-search-label-copy">Search the Jisc website</span> <form action="/web/20230104163817/https://www.jisc.ac.uk/search" method="post" id="search-api-page-search-form-search-" accept-charset="UTF-8"> <label class="visuallyhidden" for="search_term"><span class="form-fields__label-text">Search </span></label> <input class="ui-autocomplete-input" placeholder="Search Jisc" id="search_term" autocomplete="off" type="text" name="keys_1" value="" size="30" maxlength="128"/> <input type="hidden" name="id" value="1"/> <a href="#" class="close ico ico-cross">Clear search results</a><input class="ico ico-search-glass" type="submit" id="edit-submit-1" name="op" value="Search"/><input type="hidden" name="form_build_id" value="form-GYU6NW3VS3Wrr3w1urmCqNP7TGxWU86EtNLwUIQ0F-E"/> <input type="hidden" name="form_id" value="search_api_page_search_form_search_"/> </form> <div id="search-results" class="search-results-dropdown"> <p class="search-results__intro"></p> </div> </div> </div> </div> <div class="c-main-site-header__menu jsMenuTarget" id="a11ytoggle-siteMenuTarget" data-is-small-viewport=""> <nav> <div class="c-main-site-header__main-nav jsMainNavHook"> <p class="c-main-site-header__main-nav-title">Navigation:</p> <div class="c-main-site-header__main-nav-secondary jsMainNavSecondaryHook"> <ul class="c-main-site-header__container"><li class="c-main-site-header__main-nav-item"><a href="/web/20230104163817/https://www.jisc.ac.uk/allow-and-deny-lists" class="c-main-site-header__main-nav-link">Allow and deny lists</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20230104163817/https://www.jisc.ac.uk/ddos-mitigation" class="c-main-site-header__main-nav-link">Foundation DDoS mitigation</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20230104163817/https://www.jisc.ac.uk/critical-services-protection" class="c-main-site-header__main-nav-link">Critical services protection</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20230104163817/https://www.jisc.ac.uk/cyber-essentials" class="c-main-site-header__main-nav-link">Cyber Essentials</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20230104163817/https://www.jisc.ac.uk/cyber-security-assessment" class="c-main-site-header__main-nav-link">Cyber security assessment</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20230104163817/https://www.jisc.ac.uk/cyber-security-financial-x-ray" class="c-main-site-header__main-nav-link">Cyber security financial X-ray</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20230104163817/https://www.jisc.ac.uk/csirt" class="c-main-site-header__main-nav-link">CSIRT</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20230104163817/https://www.jisc.ac.uk/cyber-threat-intelligence" class="c-main-site-header__main-nav-link">Cyber threat intelligence</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20230104163817/https://www.jisc.ac.uk/security-operations-centre" class="c-main-site-header__main-nav-link">Security operations centre</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20230104163817/https://www.jisc.ac.uk/email-advice" class="c-main-site-header__main-nav-link">Email advice and testing</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20230104163817/https://www.jisc.ac.uk/janet-network-resolver" class="c-main-site-header__main-nav-link">Janet Network resolver</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20230104163817/https://www.jisc.ac.uk/network-time-service-ntp" class="c-main-site-header__main-nav-link">Network time service (NTP)</a></li> <li class="c-main-site-header__main-nav-item active-trail"><a href="/web/20230104163817/https://www.jisc.ac.uk/managed-firewall" class="c-main-site-header__main-nav-link--current c-main-site-header__main-nav-link active-trail active">Managed firewall</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20230104163817/https://www.jisc.ac.uk/cyber-security-threat-monitoring" class="c-main-site-header__main-nav-link">Cyber security threat monitoring</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20230104163817/https://www.jisc.ac.uk/penetration-testing" class="c-main-site-header__main-nav-link">Penetration testing</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20230104163817/https://www.jisc.ac.uk/primary-nameserver" class="c-main-site-header__main-nav-link">Primary nameserver service</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20230104163817/https://www.jisc.ac.uk/simulated-phishing-and-associated-training" class="c-main-site-header__main-nav-link">Simulated phishing and associated training</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20230104163817/https://www.jisc.ac.uk/web-filtering" class="c-main-site-header__main-nav-link">Web filtering and monitoring framework</a></li> <li class="c-main-site-header__main-nav-item"><a href="/web/20230104163817/https://www.jisc.ac.uk/vulnerability-assessment-service-and-tools-supply-framework" class="c-main-site-header__main-nav-link">Vulnerability assessment service</a></li> </ul> </div> </div> </nav> </div> </div> </header> <main id="main" class="jsMainContent" role="main"> <div class="inner l-pull-left featured top-bar"> <div class="l-centre-offset row"> </div> </div> <section class="t-products-and-services"> <div class="inner"><div id="target-space"></div></div> <!-- node-product-service-full.tpl.php --> <div class="inner l-pull-left featured top-bar"> <div class="c-service-gutter__right"> <div class="l-centre-offset"> <!-- Optional banner image Omit -has-banner class from header and the nested -has-banner element if required --> <header class="service-header" itemscope itemtype="http://schema.org/Organization"> <span class="marker marker--page">Service</span> <h1 class="page-title" itemprop="name"> Managed firewall </h1> <div class="service-logo"> </div> <div class="service-header__banner"> </div> <div class="row"> <div class="col span-6"> <p class="field field-type-text-long service-header__summary l-gutter--right">A fully managed solution for your firewall's operation that will keep you ahead of the current threat.</p> </div> <!--/ .col --> <div class="col span-6"> <div class="contact-panel contact-panel--has-callout-top"> <a class="contact-panel__callout contact-panel__callout--top" href="http://web.archive.org/web/20230104163817/https://www.jisc.ac.uk/contact/your-account-manager"> <em> </em><span itemprop="email">Contact your relationship manager to get started</span> </a> <div class="c-contact-panel__contact-details"> <p class="visuallyhidden">For enquiries contact:</p> <ul> <li class="c-contact-panel__contact-details-item"> <a class="c-contact-panel__contact-details-link" href="tel:03003002212"><i aria-hidden="true" class="fas fa-phone c-contact-panel__contact-details-link-icon"></i> <span class="c-contact-panel__contact-details-link-text">0300 300 2212</span></a> </li> <li class="c-contact-panel__contact-details-item"> <a class="c-contact-panel__contact-details-link" href="http://web.archive.org/web/20230104163817/mailto:help@jisc.ac.uk" itemprop="email"><i aria-hidden="true" class="fas fa-envelope c-contact-panel__contact-details-link-icon"></i> <span class="c-contact-panel__contact-details-link-text">help@jisc.ac.uk</span></a> </li> </ul> </div> </div> <!--/ .contact-panel --> </div> <!--/ .col --> </div> <!--/ .row --> <div class="row break-contact-panel article-full"> <div class="article-full__body"> <div class="product-service-body col span-9"> <div class="field field-type-text-long"> <h2>About</h2><p>Firewalls are fundamental to protecting your network, but keeping ahead of the current threats and abreast of best practice is time consuming. Having your firewall proactively maintained, patched and configured by cyber experts will help strengthen your security posture and keep your organisation safe.</p><p>Furthermore Jisc’s position as the operators of the <a href="http://web.archive.org/web/20230104163817/https://www.jisc.ac.uk/janet">Janet Network</a> affords us the ability to view threats across all our connected community gaining earlier insights to support proactive mitigation.</p><p>In providing this service Jisc has brought together key strengths of two organisations; Jisc’s understanding of the sector as trusted advisors with the experience of a proven managed security service provider (MSSP) with a solid vendor relationship to deliver a quality, tailored and responsive service at scale.</p><h2>Features</h2><p>The solution is based on an on-premises CPE firewall, remotely managed as part of a Janet Network connected community by an operational management system. </p><p>Features include:</p><ul><li>Next generation firewalls that detect and prevent network-based threats</li><li>Firewalls are centrally managed by technical experts</li><li>Maintenance, patching and configuration of firewalls according to best practise</li><li>24/7 proactive mitigation</li><li>Rigorous change control process according to ITIL standards</li><li>Monthly allowance of customer instigated configuration change requests, with changes bought into effect according to an SLA and change control board appropriate to each request</li><li>Reports and dashboards to inform both IT managers and strategic leaders on their security posture</li></ul><h2>Benefits</h2><p>The solution is tailored to the needs of the Janet-connected community; <span class="lexicon-term has-tooltip" title="further education"><abbr title="further education">FE</abbr></span>, <span class="lexicon-term has-tooltip" title="higher education"><abbr title="higher education">HE</abbr></span>, research, sector bodies, public sector and charities.</p><p>Benefits include:</p><ul><li>Removes the need for the local management of firewall by IT staff</li><li>Utilises wide-ranging threat intelligence to protect customers</li><li>Advice on the most cost-effective firewall to fit organisational needs and need to scale</li><li>Reduces the financial and resource overheads for an organisation</li><li>Enhances security and helps to maintain business continuity</li></ul><h2>Core service offering</h2><p>The service offers two firewall solutions with one gold standard configuration. One is sized to meet the capacity and capabilities likely found in smaller organisations with 1 Gbits/s connectivity. The other is likely to match large organisations with 10 Gbits/s connectivity and above. Both options are available as single units or as a high availability pair working in active failover.</p><p>This managed service covers the maintenance of both the firewall hardware, the overall solution, its core configuration and mitigations. The service is built upon a configuration devised from firewall best practice and updated by the service as the threat landscape changes.</p><p>Customers can request service rule and configuration changes to tailor the service to meet their needs. See the section on customer change requests in the service description below</p><div class="signpost--highlight article-full__body" style="border: 2px solid #006938;"><p> <figure class="media media-element media--left file-default"> <div class="media__inner"> <img alt="Crown Commercial Service Supplier logo" style="width: 130px; height: 105px;" data-delta="4" typeof="foaf:Image" src="http://web.archive.org/web/20230104163817im_/https://www.jisc.ac.uk/sites/default/files/crown-commercial-service-logo-150.png" title=""/> </div> </figure> </p><p>Jisc is a supplier on Crown Commercial Service’s G-Cloud framework. <a href="http://web.archive.org/web/20230104163817/https://www.crowncommercial.gov.uk/agreements/RM1557.13">Purchasing services through the framework</a> can offer significant savings.</p></div><h2>Service options</h2><h3>Additional setup options</h3><ul><li>The firewalls are available as single units or as a high availability pair working in active failover and failback. This not only avoids loss of availability due to faults, but also service down time caused by maintenance updates.</li><li>The service uses zero touch provisioning. However if the service onboarding is part of a more complex infrastructure delivery plan you may prefer to make use of an on-site installation option.</li></ul><h3>Additional mitigations packages</h3><p>In addition to the core configuration and its mitigation, some customers may want to take up additional mitigation options. The following options are available. Many rely on the customer’s LAN configuration and the network’s identity strategy being configured to support and make best use of the mitigation offered by each package.</p><p>Additional charges, licences, and professional service charges may be required for each package.</p><ul><li>User visibility &amp; control package</li><li>On demand remote access package</li><li>Always-on remote access package</li><li>Advanced reporting package</li><li>Site-2-site <span class="lexicon-term has-tooltip" title="virtual private network"><abbr title="virtual private network">VPN</abbr></span> package</li><li>Policy control package</li></ul><p>As the service evolves to address the changing threat landscape, additional configuration options may become part of the core configuration and its mitigation. Similarly over time, the additional mitigations packages may well change with new options being offered.</p><h2>Find out more</h2><p>Are you interested in exploring the benefits of managed firewall? Get in touch with your <a href="http://web.archive.org/web/20230104163817/https://www.jisc.ac.uk/contact/your-account-manager">relationship manager</a>.</p><section class="is-collapsible is-collapsible--blue user-created "><h3 class="cx_collapsibles__trigger"><a id="service-description" name="service-description"></a>Service level description</h3><div class="cx_collapsibles__target"><h3>Administration of services</h3><p>The service onboarding group administer the procedures for approval and commissioning of this service and are available during the business day on 01235 822308 or by emailing <a href="http://web.archive.org/web/20230104163817/mailto:connect@ja.net">connect@ja.net</a><br/>The team are able to quote, fulfil your order, issue contracts and triggering invoicing.</p><h3>Eligibility and service prerequisites</h3><p>Organisations wishing to use the service must be connected to the Janet Network, typically through a Janet IP connection or a Janet Cloud connection. Eligibility for organisations wishing to connect to the Janet Network is covered in the <a href="http://web.archive.org/web/20230104163817/https://community.jisc.ac.uk/library/janet-policies">Janet Network Connection Policy</a>.</p><h3>Service on-boarding</h3><p>Following an initial discussion and capture of the customer’s requirements, led by your Jisc relationship manager, a quote can be issued and if acceptable to the customer an order placed. Once an order is placed service on-boarding will begin. Service on-boarding covers the agreement of the scope of works for the proposed solution, contracting and order fulfilment. Working with the customer to agree a suitable date the team will deploy the firewall solution to the customer site with the required configuration so that the firewall CPE can be bought under the management of the centralised operational management system.</p><h3>Target availability</h3><p>The target availability for the service is 99.9% (8 hours 45 minutes loss of availability per year).</p><p>This is the availability of the firewall to process and forward traffic such that there is no loss of service to the customer. This measurement would exclude the failure of a high-availability firewall, if the remaining firewall was still providing service. The measurement would also exclude any agreed scheduled upgrades, hardware replacements within SLA, or waiting on an action by the customer.</p><p>This measurement will be made available in the customer’s monthly reports for their service.</p><h3>Service delivery time</h3><p>On receipt of the signed service agreement and any other information that we may reasonably require from you the order will be placed with the operating partner. Installation will be arranged and notified by email once the operating partner has received the equipment subject to availability. The service will not commence until in the opinion of JSL adequate and satisfactory testing has been concluded. When we have received all necessary information from you, we will email you a target date when your service will commence, keeping you informed of any changes to this target date.  Once the service is configured and tested satisfactorily, we will confirm your actual service commencement date by email.</p><p>Cancellation of services will be implemented within 30 business days of our confirming the request unless the cancellation is prevented by reasons beyond our control.</p><h3>Service management</h3><p>Jisc provides support via our experienced service desk which acts as your first point of contact for any service-related issues or queries that you may have. Service desk support is provided between 07:00 and 23:59 Monday to Friday, excluding UK public holidays. </p><p>Outside of these hours call are managed by our operating partner for the service KHIPU who ensure customer incidents are recorded and on-call engineers are available to investigate urgent service effecting issues.</p><p>Jisc is a proven network and service management specialist with extensive experience of service management implementation, network operation, security and continual service improvement. All our operational processes are aligned with ITIL v3 and managed within our ISO 9001 QMS. Information assurance is provided through our ISO 27001 certification. The service is jointly operated by our operating partners KHIPU. KHIPU Networks is a fully certified company to the following quality standards:</p><ul><li>ISO9001 Quality Management</li><li>ISO27001 Security Management</li><li>ISO14001 Environmental Management</li><li>ISO45001 Occupational Health and Safety Standard</li><li>Cyber Essentials</li></ul><h3>Customer change requests</h3><p>The service can action bespoke configurations changes at the request of the customer. Each change will be categorised under the ITIL standard as ‘Normal’, ‘Standard’ or ‘Emergency’.<br/>Each change type has a Change Advisory Board (CAB) and SLA appropriate to the change type.</p><h4>‘Standard’ changes</h4><p>Configuration changes, which are agreed with Jisc in advance and as such are preauthorised, so do not require further CAB approval. They are changes, which are considered to have little to no risk associated and follow a documented process. Standard change requests need to be requested via support so they can be logged and tracked. The service team will only apply changes requested by designated authorised users pre supplied by the customer.</p><p>Request should be made by email.</p><p>Examples include (but not limited to):</p><ul><li>Adding, removing, or changing a new object to the existing policy (address object, user id, group ID, application or service)</li><li>Adding an exception (allow or block) to the URL profile.</li><li>Adding additional IP range for <span class="lexicon-term has-tooltip" title="virtual private network"><abbr title="virtual private network">VPN</abbr></span> users</li><li>Creating and scheduling report</li><li>Changing details of AD / Syslog / email servers</li><li>Add/change the description on the rule</li><li>Disable or deletion of rules not used for over 60 days</li><li>Optimise the existing rule – change it to App-ID rule based on traffic hits</li></ul><p>Requests logged will be responded to within 1 hour. Once details of the required change are confirmed, Standard Changes will be applied within 2 hours.</p><p>Allowance: 15 standard change requests per calendar month with the option of carrying forward up to 15 unused changes giving a theoretical maximum of 30 standard changes in a single month.</p><p>Acknowledgement and response: One hour acknowledgement and two hour response</p><h4>‘Normal’ changes</h4><p>Non-emergency proposed configuration changes, which need to be reviewed by change management so require approval by the CAB. Normal Changes need to be requested via support so they can be logged and tracked and require a change request form to be completed and approved by the customer. The service team will only apply proposed changes requested by designated authorised callers pre supplied by the customer.</p><p>Request should be made by email.</p><p>Examples include (but are not limited to):</p><ul><li>Add new Security Nat rule + necessary objects required</li><li>Add new admin user</li><li>Change authentication source for users/admins</li><li>Add new subnet, firewall interface, zone</li><li>Change network details, network interfaces/routing</li><li>Change management IP address of the firewall</li><li>Delete/disable rules not used for over 30 days</li></ul><p>Logged requests will be responded to within one hour. Normal change requests require customer authorisation. The service team will either help complete or complete the change request form to be submitted for authorisation. Once authorised, the service team will apply the change within two hours.</p><p>Allowance: 15 normal change requests per calendar month with the option of carrying forward up to 15 unused changes giving a theoretical maximum of 30 normal changes in a single month.</p><p>Acknowledgement and response: One hour acknowledgement and two hour response</p><h4>Short notice user requests to the IT manager</h4><p>It is likely that IT managers will on occasion receive short notice requests to block or allow specific URLs.  Such as an education resource that a tutor needs to give a class of students access to for use later that day or the next day (business days only).</p><p>The service team would review the change request to ensure it can be applied safely. If during the evaluation of a temporary change a potential issue is identified, such as concern about permitting access to a high-risk URL, then this will be raised with the IT manager. Provided there are no concerns, the change will be applied as a standard change and the customer updated.</p><p>Temporary changes will be treated as standard changes as they are authorised by the IT manager and do not require additional CAB approval. Once authorised by the IT manager the change will be applied within two hours.</p><p>Temporary changes will be reverted after two days, and the original request submitted as a normal change request for review by CAB. </p><h4>‘Emergency change’</h4><p>An urgent change that may present high risk if not addressed promptly, such as a security incident or is required to resolve a P1 type incident such as ‘network down’.</p><p>For emergency changes, it may be appropriate for the customer to give verbal approval to apply the change rather than wait for written approval, but this must be followed up with a retrospective written change control form via support.</p><p>The service team will only apply changes requested by designated authorised callers pre supplied by the customer.</p><p>Request can be made by telephone or else email, with retrospective confirmed via email.</p><p>Examples include:</p><ul><li>Stopping an active security incident</li><li>Something not working and multiple users affected, a change is required to fix the issue</li><li>Applying emergency patches to prevent imminent threat</li></ul><p>The service will not limit the number of emergency change requests if responding to active security incidents.</p><p>For other emergency change requests, an average of one emergency change request per month (i.e. 12 per annum). For example, to restore service where changes have been made elsewhere on the network resulting in a P1 type incident such as ‘network down’.</p><p>Emergency change requests which are required as a direct result of unscheduled changes elsewhere on the network, poor planning, or failure to act on recommendations may be chargeable.</p><p>Change requests can be placed by the customers but can also be advised and proposed by Jisc.</p><p>Service requests are managed 24x7x365.</p><p>If the change allowances are insufficient, the customer can pay to either increase their monthly limit or buy a block of additional changes, which are separate to the monthly allowance but will expire at the end of the contract. This flexible approach accommodates customers with a higher volume of project work or during busy periods when more changes are required.</p><h3>Fault management and escalation</h3><p>The Jisc managed firewall service will follow ITIL incident management process guidelines to log, assign and diagnose incidents and to restore service operation as quickly as possible with the minimum disruption, in line with the agreed hours of service.</p><p>Our support design can diagnose and resolve connectivity, routing and firewall issues for your organisation.</p><p>Our volume of incidents is not sufficiently large to warrant distinct priority levels. The timings below indicate the target time to respond to an incident.</p><h4>Service incident response targets</h4><p>Our response target is the same for all service incidents.<br/><br/>For urgent incidents: incidents involving service component failing or severely impaired, resulting in serious business-wide impact or multiple users/services impacted.</p><h4>Business hours</h4><p>JSD Help Desk<br/>0300 300 2212<br/><a href="http://web.archive.org/web/20230104163817/mailto:operations@ja.net">operations@ja.net</a> <br/><br/>Monday-Friday:<br/>07:00-23:59<br/>Weekends:  09:00-19:00</p><p>Phone calls: answered in six rings<br/>Email/ticket requests: response within one hour</p><h4>Non-business hours</h4><p>Incident Management by KHIPU<br/>0345 272 0910<br/><br/>All incident outside of JSD hours<br/>Phone calls: answered by staff from our operating partner KHIPU<br/><br/>For urgent incidents:<br/>Issues must be reported by phone.<br/>Engineers will raise a ticket and begin investigations aiming to respond within one hour of the call.</p><p>Incidents are managed 24 x365.</p><p>Note: Incident resolution targets do not apply in cases where the incident is outside of Jisc’s control, e.g. local connectivity problems within a customer data centre, or where the customer is not on-site to affect incident resolution.</p><p>If you are experiencing an issue with the service and wish to escalate the issue, please contact us via the service desk details above.</p><h3>Firewall ownership</h3><p>The firewall, customer premises equipment (CPE) used to deliver this service, and the licenses used will remain the property of Jisc Services Limited.</p><h3>Customer responsibilities</h3><p>Organisations have the following responsibilities in relation to the service:</p><ul><li>They must provide accurate contact and payment details on managed firewall service registration.</li><li>They must follow designated procedures for logging incidents and change requests</li><li>They must provide all relevant site information as requested</li><li>They must provision and maintain their own internal network and facilities in order to utilise the service</li><li>They must provide suitable contact details of a representative from within their organisation</li><li>They must adhere to <a href="http://web.archive.org/web/20230104163817/https://community.jisc.ac.uk/library/janet-services-documentation/ownership-and-maintenance-routers">our ‘reasonable care’ requirement for customer premises equipment (CPE) owned by Jisc</a></li><li>They must ensure that the Janet Network is used according to the <a href="http://web.archive.org/web/20230104163817/https://community.jisc.ac.uk/library/janet-policies">Acceptable Use Policy</a></li><li>They must ensure they understand and adhere to the <a href="http://web.archive.org/web/20230104163817/https://community.jisc.ac.uk/library/janet-policies">Janet security policy</a></li><li>They must adhere to the <a href="http://web.archive.org/web/20230104163817/https://community.jisc.ac.uk/library/janet-policies">Janet Network connection policy</a></li></ul><h3>Processing locations</h3><p>The managed firewall service is only available to UK customers who are connected to the Janet Network. All network and security operation functions and external connection locations are based in the UK.</p><h3>Information assurance</h3><p>Jisc is an ISO27001 certified organisation and will utilise, as required, appropriately certified management infrastructure, network connectivity, staff security clearance and processes to deliver the service.</p><h3>Price changes</h3><p>We have a standardised timeline for the rollout of pricing changes on existing live services. To our very best endeavours, we will issue price change notifications in January. Ahead of their application in the August invoicing of that same year. We understand that this better aligns with HE and FE budget setting cycles and gives a notification period which is more helpful to members. This will also exceed the three months’ notice stipulated in our terms.</p><p>Typically, service price change notifications will be issued via email to the relevant organisational contacts. We will not email you if are not affected by a price change; for example if the change does not apply to your service or sector.</p><h3>End of contract</h3><p>Customers will be notified as they approach the end of the initial term contract period to allow time to re-procure. The customer may cease use of the service at any time. There is a fixed fee, per service instance, for supported off-boarding from the service. </p><h3>Service off-boarding</h3><p>Service termination is defined as end of contract, without transfer of services to a new provider or customer function. In this case, on service termination Jisc will remove the firewall solution from the customer site.</p><p>Cancellation of services will be implemented within 30 business days of written notice, and confirmation of the request, unless the cancellation is prevented by reasons beyond our control.</p><p>The customer may cease use of the service at any time. There is a fixed fee, per service instance, for supported off-boarding from the service.  Supported off-boarding offers that the customer’s firewall configuration, held by the service, be made available to customer.</p></div></section> </div> </div> </div> </div> </header> <!--/ .service-header --> </div> <!--/ .l-centre-offset --> </div> <!--/ .inner.l-pull-left.featured.top-bar --> </div> <!--/ .inner.l-pull-left.featured --> <div class="inner l-pull-left"> <div class="l-centre-offset"> <aside class="article-full__related l-gutter--top"> </aside> </div> </div> <!--/ .t-products-and-services --> </section> </main><!--/page--> <footer role="contentinfo"> <div class="inner l-pull-left light l-gutter--top"> <div class="l-centre-offset row"> </div> <!--/ /-centre-offset.row --> <div class="l-centre-offset row"> </div> <!--/ /-centre-offset.row --> </div> <div class="inner l-pull-left medium"> <div class="l-centre-offset"> <div class="region region--4-up"> </div> </div> <!--/ .l-centre-offset.region --> </div> <!-- main site footer --> <div class="c-main-site-footer"> <!--Adding the breadcrumb Footer --> <div class="c-main-site-footer__breadcrumb"> <div class="inner inner--main-site-footer"> <div class="c-main-site-footer-grid"> <div class="c-main-site-footer-grid__item u-6/12@medium u-9/12@large"> <nav class="c-main-site-footer__you-are-here" aria-label="Breadcrumb"> <p class="c-main-site-footer__you-are-here-title">You are in:</p> <div class="c-main-site-footer__you-are-here-item-home"> <a class="c-main-site-footer__you-are-here-link" href="/web/20230104163817/https://www.jisc.ac.uk/" aria-label="Jisc homepage"><i class="fas fa-home" aria-hidden="true"></i></a> </div> <ul> <li><a href="/web/20230104163817/https://www.jisc.ac.uk/cyber-security">Cyber security</a></li><li><span>Managed firewall</span></li> </ul> </nav> </div> <div class="c-main-site-footer-grid__item u-6/12@medium u-3/12@large"> <!--Printing the feedback html that has been set up in the block content.--> <!-- <div class="c-main-site-footer__feedback"><p class="c-main-site-footer__feedback-copy"><a class="c-main-site-footer__feedback-link" href="https://jisc.researchfeedback.net/wh/s.asp?k=150461655147&amp;s=https://www.jisc.ac.uk/managed-firewall"><span class="c-main-site-footer__feedback-link-icons"> <i aria-hidden="true" class="far fa-frown"></i> <i aria-hidden="true" class="far fa-meh"></i> <i aria-hidden="true" class="far fa-smile"></i> </span> <span class="c-main-site-footer__feedback-link-copy">Give feedback</span> </a></p></div> --> </div> </div> </div> </div> <!--Adding the linklist Footer --> <div class="c-main-site-footer__linklist"> <div class="inner inner--main-site-footer"> <div class="c-main-site-footer-grid"> <div class="c-main-site-footer-grid__item u-6/12@medium u-3/12@large"> <h2 class="c-main-site-footer__linklist-title">Areas</h2> <ul class="c-main-site-footer__linklist-group"><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="/web/20230104163817/https://www.jisc.ac.uk/connectivity">Connectivity</a></li><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="/web/20230104163817/https://www.jisc.ac.uk/cyber-security">Cyber security</a></li><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="/web/20230104163817/https://www.jisc.ac.uk/cloud">Cloud</a></li><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="/web/20230104163817/https://www.jisc.ac.uk/data-and-analytics">Data analytics</a></li></ul><ul><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="/web/20230104163817/https://www.jisc.ac.uk/libraries-and-research">Libraries, learning resources and research</a></li><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="/web/20230104163817/https://www.jisc.ac.uk/student-experience">Student experience</a></li><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="/web/20230104163817/https://www.jisc.ac.uk/trust-and-identity">Trust and identity</a></li><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="/web/20230104163817/https://www.jisc.ac.uk/advice">Advice and guidance</a></li></ul> </div> <div class="c-main-site-footer-grid__item u-6/12@medium u-3/12@large"> <h2 class="c-main-site-footer__linklist-title">Explore</h2> <ul class="c-main-site-footer__linklist-group"><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="/web/20230104163817/https://www.jisc.ac.uk/guides">Guides</a></li><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="http://web.archive.org/web/20230104163817/https://beta.jisc.ac.uk/training">Training</a></li><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="/web/20230104163817/https://www.jisc.ac.uk/consultancy">Consultancy</a></li><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="http://web.archive.org/web/20230104163817/https://beta.jisc.ac.uk/events">Events</a></li><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="/web/20230104163817/https://www.jisc.ac.uk/rd">Innovation</a></li></ul> </div> <div class="c-main-site-footer-grid__item u-6/12@medium u-3/12@large"> <h2 class="c-main-site-footer__linklist-title">Useful</h2> <ul class="c-main-site-footer__linklist-group"><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="/web/20230104163817/https://www.jisc.ac.uk/about">About</a></li><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="/web/20230104163817/https://www.jisc.ac.uk/membership">Membership</a></li><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="/web/20230104163817/https://www.jisc.ac.uk/get-involved">Get involved</a></li><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="/web/20230104163817/https://www.jisc.ac.uk/news">News</a></li><li class="c-main-site-footer__linklist-item"><a class="c-main-site-footer__linklist-item-link" href="/web/20230104163817/https://www.jisc.ac.uk/jobs">Jobs</a></li></ul> </div> <div class="c-main-site-footer-grid__item u-6/12@medium u-3/12@large"> <h2 class="c-main-site-footer__linklist-title">Get in touch</h2> <ul class="c-main-site-footer__linklist-group"> <li class="c-main-site-footer__linklist-item"> <a class="c-main-site-footer__linklist-item-link" href="/web/20230104163817/https://www.jisc.ac.uk/contact"> Contact us </a> </li> <li class="c-main-site-footer__linklist-item"> <a class="c-main-site-footer__linklist-item-link" href="/web/20230104163817/https://www.jisc.ac.uk/headlines"> Sign up to our newsletter </a> </li> <li class="c-main-site-footer__linklist-item"> <a class="c-main-site-footer__linklist-item-link-social" href="http://web.archive.org/web/20230104163817/https://twitter.com/jisc"> <i class="fab fa-twitter" aria-hidden="true"></i> <span class="c-main-site-footer__linklist-item-link-social-copy">Twitter</span> </a> </li> <li class="c-main-site-footer__linklist-item"> <a class="c-main-site-footer__linklist-item-link-social" href="http://web.archive.org/web/20230104163817/https://www.facebook.com/jiscsocial"> <i class="fab fa-facebook" aria-hidden="true"></i> <span class="c-main-site-footer__linklist-item-link-social-copy">Facebook</span> </a> </li> <li class="c-main-site-footer__linklist-item"> <a class="c-main-site-footer__linklist-item-link-social" href="http://web.archive.org/web/20230104163817/https://www.linkedin.com/company/jisc"> <i class="fab fa-linkedin" aria-hidden="true"></i> <span class="c-main-site-footer__linklist-item-link-social-copy">LinkedIn</span> </a> </li> <li class="c-main-site-footer__linklist-item"> <a class="c-main-site-footer__linklist-item-link-social" href="http://web.archive.org/web/20230104163817/http://www.youtube.com/user/JISCmedia"> <i class="fab fa-youtube" aria-hidden="true"></i> <span class="c-main-site-footer__linklist-item-link-social-copy">YouTube</span> </a> </li> </ul></div> </div> </div> </div> <!--Adding the Utilities and Additional Footer --> <div class="c-main-site-footer__utilities"> <div class="inner inner--main-site-footer"> <div class="c-main-site-footer-grid"> <div class="c-main-site-footer-grid__item u-6/12@medium u-9/12@large"> <ul class="c-main-site-footer__utilities-list"><li class="c-main-site-footer__utilities-list-item"><a class="c-main-site-footer_utilities-list-item-link" href="/web/20230104163817/https://www.jisc.ac.uk/website/cookies">Cookies</a></li> <li class="c-main-site-footer__utilities-list-item"><a class="c-main-site-footer_utilities-list-item-link" href="/web/20230104163817/https://www.jisc.ac.uk/website/privacy-notice">Privacy</a></li> <li class="c-main-site-footer__utilities-list-item"><a class="c-main-site-footer_utilities-list-item-link" href="/web/20230104163817/https://www.jisc.ac.uk/about/corporate/slavery-and-human-trafficking-statement">Modern slavery</a></li> <li class="c-main-site-footer__utilities-list-item"><a class="c-main-site-footer__utilities-additional-link" href="/web/20230104163817/https://www.jisc.ac.uk/about/corporate/carbon-reduction-plan">Carbon reduction plan</a></li> <li class="c-main-site-footer__utilities-list-item"><a class="c-main-site-footer__utilities-additional-link" href="/web/20230104163817/https://www.jisc.ac.uk/website/accessibility-statement">Accessibility</a></li></ul> </div> <div class="c-main-site-footer-grid__item u-6/12@medium u-3/12@large">   </div> </div> </div> </div> </div> <script src="//web.archive.org/web/20230104163817js_/https://ajax.googleapis.com/ajax/libs/jquery/1.8.3/jquery.min.js"></script> <script>window.jQuery || document.write("<script src='/sites/all/modules/contrib/jquery_update/replace/jquery/1.8/jquery.min.js'>\x3C/script>")</script> <script src="http://web.archive.org/web/20230104163817js_/https://www.jisc.ac.uk/sites/default/files/js/js_38VWQ3jjQx0wRFj7gkntZr077GgJoGn5nv3v05IeLLo.js"></script> <script src="//web.archive.org/web/20230104163817js_/https://ajax.googleapis.com/ajax/libs/jqueryui/1.10.2/jquery-ui.min.js"></script> <script>window.jQuery.ui || document.write("<script src='/sites/all/modules/contrib/jquery_update/replace/ui/ui/minified/jquery-ui.min.js'>\x3C/script>")</script> <script src="http://web.archive.org/web/20230104163817js_/https://www.jisc.ac.uk/sites/default/files/js/js_yxpcsmG10aGVUSD90BA4qltlgKI1rbhnUmWB7jdXazY.js"></script> <script src="http://web.archive.org/web/20230104163817js_/https://www.jisc.ac.uk/sites/default/files/js/js_ln3elyxIXiDHhui9wGpVhQknbd0x6dFFLEcw-d2kY7c.js"></script> <script src="http://web.archive.org/web/20230104163817js_/https://www.google.com/recaptcha/api.js"></script> <script src="http://web.archive.org/web/20230104163817js_/https://www.jisc.ac.uk/sites/default/files/js/js_MRJGmiHDN-YmxpVwJXrmhddeFsDyTTAop4jAFfeWcSc.js"></script> <script src="http://web.archive.org/web/20230104163817js_/https://www.jisc.ac.uk/sites/default/files/js/js_gGSozz5nhS9RR6GeFycLd0mjTBR0-860cSp4ccsVjF8.js"></script> <script>jQuery.extend(Drupal.settings, {"basePath":"\/","pathPrefix":"","ajaxPageState":{"theme":"jisc_clean","theme_token":"u-wi_Q5V_AK-9w68y1DwYkNF7xzlrwiG0vIle16gyOI","js":{"\/\/web.archive.org\/web\/20230104163817\/https:\/\/ajax.googleapis.com\/ajax\/libs\/jquery\/1.8.3\/jquery.min.js":1,"0":1,"misc\/jquery-extend-3.4.0.js":1,"misc\/jquery-html-prefilter-3.5.0-backport.js":1,"misc\/jquery.once.js":1,"misc\/drupal.js":1,"\/\/web.archive.org\/web\/20230104163817\/https:\/\/ajax.googleapis.com\/ajax\/libs\/jqueryui\/1.10.2\/jquery-ui.min.js":1,"1":1,"sites\/all\/modules\/custom\/jisc_search_section\/js\/jiscSectionSearch.js":1,"sites\/all\/modules\/custom\/jisc_ia_nav\/js\/JiscIaNav.js":1,"http:\/\/web.archive.org\/web\/20230104163817\/https:\/\/www.google.com\/recaptcha\/api.js":1,"sites\/all\/themes\/mothership\/mothership\/js\/contextual.js":1,"sites\/all\/themes\/jisc_clean\/js\/jisc-lib.min.js":1,"sites\/all\/themes\/jisc_clean\/js\/extras.js":1,"sites\/all\/themes\/jisc_clean\/js\/integration\/timeline.js":1,"sites\/all\/themes\/jisc_clean\/js\/jisc-p13n.js":1},"css":{"modules\/system\/system.base.css":1,"modules\/system\/system.messages.css":1,"sites\/all\/themes\/jisc_clean\/css\/content.css":1,"sites\/all\/themes\/jisc_clean\/css\/print.css":1}},"jiscFlashPath":"\/sites\/all\/themes\/jisc_clean\/flash\/","searchAutocompletePath":"\/server\/search-results","facetapi":{"view_args":{"rss_snippets:block_1":["59831"]},"exposed_input":{"rss_snippets:block_1":[]},"view_path":{"rss_snippets:block_1":null},"view_dom_id":{"rss_snippets:block_1":"7dc63b8cf611a52ed4e990f4c1484d6d"}},"urlIsAjaxTrusted":{"\/search":true}});</script> </body> </html> <!-- FILE ARCHIVED ON 16:38:17 Jan 04, 2023 AND RETRIEVED FROM THE INTERNET ARCHIVE ON 02:28:05 Mar 04, 2025. JAVASCRIPT APPENDED BY WAYBACK MACHINE, COPYRIGHT INTERNET ARCHIVE. ALL OTHER CONTENT MAY ALSO BE PROTECTED BY COPYRIGHT (17 U.S.C. SECTION 108(a)(3)). --> <!-- playback timings (ms): captures_list: 0.873 exclusion.robots: 0.041 exclusion.robots.policy: 0.025 esindex: 0.012 cdx.remote: 16.126 LoadShardBlock: 1323.001 (3) PetaboxLoader3.resolve: 895.121 (3) PetaboxLoader3.datanode: 1063.181 (5) load_resource: 680.719 loaddict: 56.538 -->

Pages: 1 2 3 4 5 6 7 8 9 10