VERSION CONTROL Document Name: SCHEDULE 6 – CYBERSECURITY SERVICES Version: v1.1 Date Issued: 2nd October 2025 Author/Editor: M.Lulham Versioning: https://infopoint.mtechsystems.co.uk/versioning
1.1 Except as defined in this Schedule 6 (Cybersecurity Services), capitalised terms shall have the meanings given to them in the Agreement.
1.2 To the extent applicable to the Cybersecurity Services, in the event of conflict between this Schedule 6 and the Agreement, the provisions of this Schedule 6 shall take precedence, and in the event of conflict with a Service Document, Statement of Work, or Service Order, the provisions of that Service Document shall take precedence.
1.3 For the purposes of this Schedule 6:
2.1 The Cybersecurity Services are designed to reduce the risk of cyber attack and data loss by applying layered controls across endpoints, networks, cloud services and users.
2.2 The Services are delivered through managed tools, monitoring, detection, baseline enforcement, response guidance, and user awareness training. Capabilities may include:
(a) Endpoint and server protection (e.g. EDR/MDR).
(b) Security event collection and analysis, including monitoring and escalation services provided by third-party MDR/SOC vendors (e.g. Huntress, SentinelOne Vigilance) where included in the Service Scope.
(c) Threat containment and isolation (e.g. application allow-listing, zero trust controls).
(d) Secure internet access and cloud edge protection (e.g. SASE, firewalls, secure web gateways).
(e) Email and identity security (e.g. anti-phishing, impersonation defence, URL scanning, attachment sandboxing, policy-based filtering).
(f) Credential and account protection (e.g. password vaulting, MFA enforcement).