We use cookies on this site to help provide the best possible online experience. By using this site you agree to our use of cookies.
Click to view our cookie policy and customize your cookie preferences.
A leader in the detection of cyber threats, Gatewatcher has been protecting critical networks of public and private institutions worldwide since 2015. Their Network Detection and Response (NDR) and Cyber Threats Intelligence (CTI) solutions analyse the vulnerabilities and quickly detect and respond to cyber-attacks. Thanks to the convergence of AI and dynamic analysis techniques, Gatewatcher delivers a real-time 360-degree view of threats, covering both cloud and on-premise infrastructures.
Agreement start: 01 November 2024
Agreement end: 30 October 2027
Subsequent invoice date: annually three months in advance of the anniversary of the licence start date.
Three years (thirty-six months) from licence commencement date shown on order form.
Hardware or Virtual
Please contact zack.vanaarde@gatewatcher.com for a discussion around POC for your institution.
Higher and Further Education and Research Councils in the United Kingdom, and to Universities and Colleges of Further Education in Ireland.
Other organisations aligned with Chest's charitable objectives of supporting education, research bodies and the public sector may ask to participate in the Agreement. Chest will liaise with the Supplier about any such requests.
Licensor: Campus Cyber, Tour Eria, 5-7 rue Bellini 92800 La Défense France
Interoperable with your security ecosystem, Gatewatcher's products integrate seamlessly with your institution's IT systems and IT services, and are immediately ready for use. Gatewatcher give you the power to protect your network and the peace of mind you need to focus on your core business.
Network Detection and Response (NDR)
Gatewatcher’s NDR enables you to identify and characterize threats as quickly as possible, so you can take remediation action and minimize disruption to your business from cyberattacks. Illustrated within a unique multiengine detection and response platform, benefit from 360° visibility through immediate mapping of all types of assets and users present on your IT Systems.
Their COCKPIT and REFLEX modules allow you to speed up your SOC analysis, centralize handling of security incidents with full support for multiple business units and flexible role-based access control.
By combining NDR and CTI, adopt a proactive approach to manage your cyber risks, Gatewatcher offer the solution in an airgap environment that doesn’t share any of your data into the cloud, enabling GDPR and Pii compliance.
Cyber Threat Intelligence (CTI)
Gatewatcher’s CTI enables you to immediately improve your detection capabilities in the face of any kind of threats, by providing you with enriched indicators of compromise tailored to your specific context.
Integrated within COCKPIT and REFLEX, cyber intelligence supports your SOC’s analysis and investigations to enrich their detection with a better understanding and knowledge of the threat, and to adapt their response. Your cyber security team can then provide an accelerated operational response focused on your institution.
By combining Gatewatcher's NDR and CTI, strengthen your defence system with comprehensive, early protection against cyberattacks.
Traffic Access Point (TAP)
Gatewatcher offers a complete range of optical and copper TAPs to help you monitor your traffic, whatever your media type or network speed.
Access your network without interrupting connectivity thanks to their passive, unpowered TAPs. Reliably duplicate your traffic for in-depth real-time analysis, without placing any load on your network devices.
Cover all your monitoring and detection needs, while offering you total visibility.
Generative AI Assistant
Generative AI opens a new world for every cybersecurity team. Through the power of generative AI coupled with the value of its detection, Gatewatcher revolutionizes SOC and confirms its place as a leader in cybersecurity.
A thirty-day free trial is available. Please contact zack.vanaarde@gatewatcher.com for POC's.
Technical support provided by Gatewatcher. Please contact zack.vanaarde@gatewatcher.com
Details of system releases and/or new version and/or new supporting documentation will be notified.
Discover Gatewatcher benefits, products and technical details here
Licensor: Campus Cyber, Tour Eria, 5-7 rue Bellini 92800 La Défense France
The Chest Order, together with the Licence Terms and Conditions, and any exceptions listed below, create a legally binding contract between your institution, organisation or company and the Licensor. Therefore please read the terms and conditions carefully and only submit a Chest Order if its terms and conditions are acceptable to your institution, organisation or company and you have the authority to make the financial commitment shown.
This Site licence is subject to the terms and conditions for the Standard Chest Licence for Software (June 2011). There are some specific rules that apply to the use of Software outside the territory of the United Kingdom and the Republic of Ireland which are detailed at the bottom of this page.
Copying of the Software is allowed in accordance with the terms and conditions for the Standard Chest Licence for Software.
Jisc will invoice Licensed Institutions for the initial fee on receipt of a completed order. Sites will then be invoiced annually three months in advance of the anniversary of their licence start date until the end of their chosen Commitment Period.
You are advised that because of the requirement for Jisc to collect monies due before the anniversary date two charges may initially fall into one academic accounting year.
Chest is an Enterprise of Jisc. All Purchase orders must be made out to Jisc Services Ltd, 4 Portwall Lane, Bristol, BS1 6NB to cover all charges plus VAT.
All terms contained in a PO are expressly rejected and do not form part of the Licence or vary the Licence terms in any way.
Payments are due within thirty days of invoice date; recipients of late payments are entitled to interest in accordance with UK statutory provisions.
At the end of the Period of Agreement, if there is no new Agreement between Campus Cyber and Chest or a new Agreement directly between the Licensed Site and Campus Cyber, then Licensed Sites are required to remove all copies of Campus Cyber Products from their systems - including personal machines which have been loaded with a copy of the software - at the expiry of their Licence (Commitment) Period.
The product(s) may be used by any Authorised User of the Licensee for Educational Purposes which includes the administration and management of the licensee’s educational and research operations. These permissions are described in the terms and conditions for the Standard Chest Licence for Software.
Students | Yes |
Academic Staff | Yes |
Non-Academic Staff | Yes |
Administration and management | Yes |
Staff home use rights | Yes |
Student home use rights | Yes |
Installation on Hosted Server | Yes |
Only site licences are available under this agreement.
The use of Software outside the territory of the United Kingdom and the Republic of Ireland (the Territory) by your Authorised Users temporarily working outside the Territory is allowed provided the Software is only installed on the Authorised Users’ personally-owned computers or on computers provided to them by you. Your Authorised Users are responsible for preventing third-party use whilst they are outside the Territory and for ensuring that Software is not loaded onto any other machine whilst they are outside the Territory. They must also still conform to the terms, conditions and restrictions on use stipulated in this Licence Agreement.
Staff and students at legal entities that are 100% owned by you, including overseas locations (that is, outside the Territory), must be included in the total of your staff and student FTE count when determining your charge band (see the first table displayed at 5 above). Where a legal entity that is 100% owned by you, and is included in the total of your staff and student FTE count when determining your charge band, and is outside the Territory (that is, outside the UK and the Republic of Ireland), then the nation state where that legal entity is located shall be included in the definition of “the Territory”.
The Licensor and you both acknowledge that Authorised Users making use of Software outside the Territory may do so for a period of up to three months. Use of Software outside the Territory for any longer period is not allowed, save but by specific written authorisation from the Supplier*. Such authorisation may be by letter, fax, email or similar method of electronic communication and shall be communicated to an applicant Authorised User by the Licensor direct. Jisc shall be sent a copy of the relevant authorising communication by the Licensor.
*This applies to Authorised Users travelling overseas for periods of longer than three months. Where the user is permanently based overseas and not part of any of the above categories, they will require a separate licence. Contact help@chest.ac.uk for further information or clarification.
Join our mailing list for the latest news, event information and resources