GCSX Code of Connection Compliance
Security Standards for GCSX Code of Connection Compliance
The Government Connect Secure Extranet (GCSX) is a private, wide-area network designed to allow secure communication between central government and local authorities, including police and health organizations, in England and Wales.
The GCSX enables participants to communicate without using the Internet, but in order to access the private network, local authorities must meet a detailed set of communications and security standards—known as the Code of Connection (CoCo)— which include requirements for endpoint protection and encryption. They must also answer a rigorous questionnaire, much of which is based on the ISO 27001 security standard.
By deploying CREDANT Mobile Guardian, local authorities can meet CoCo requirements for endpoint device protection and encryption. CREDANT Mobile Guardian enables organisations to:
- Encrypt data no matter where it resides, including laptops, desktops, smartphones, USB drives, CD/DVDs or any other endpoint device
- Secure data across multiple platforms from a single console
- Create automatic audit trails
- Provide a transparent end-user interface
CREDANT Solutions Backed by CCTM Certification
With a presence in the United Kingdom, the United States, mainland Europe—and around the world—CREDANT understands the data protection and compliance challenges that organisations in England and Wales are facing. This is why CREDANT Mobile Guardian is also backed by CCTM certification, which helps assure governmental entities about the validity of vendors’ security functionality claims.
CREDANT Mobile Guardian Protects Data Wherever it Resides
CREDANT Mobile Guardian provides centrally managed, highly scalable and architecturally flexible security to manage all data endpoints and:
- Ensure data security without the risk of users placing data in unencrypted areas
- Provide confidentiality, privacy and auditing of data on any endpoint device
- Protect sensitive data from unwarranted access and reduce the risk of internal breaches