Google Cloud Platform (GCP) - Big Data
GSL can host your Big Data solutions on Google Cloud Platform, utilizing services like BigQuery for petabyte-scale data warehousing. We streamline data ingestion with Pub/Sub, Cloud Data Fusion, Cloud Composer (Airflow), and Dataproc (Hadoop), ensuring efficient processing and analysis of large datasets, enabling data-driven decision-making.
Features
- Ability to process both structured and unstructured data.
- A fully managed SQL data warehouse capable of handling petabyte-scale
- Managed SQL and highly scalable NoSQL databases.
- Leverage Google's expertise in data processing.
- Capability to process data in batches or streams.
- Fully managed globally scalable SQL database with transactional consistency.
- Fully managed Hadoop and Spark for data processing.
- User-friendly visualization tools for seamless analysis.
- Intuitive report creation tools for easy use.
- A fully managed SQL data warehouse capable of handling petabyte-scale
Benefits
- Processing and analyzing large dataset quickly and efficiently.
- Obtain real time insights for informed decision making.
- Scale resources to accommodate growing data needs.
- Focus on data analysis rather than infrastructure management.
- Easily integrate with various GCP services for comprehensive solutions.
- Utilizing ML models for predictive analytics.
- Ensure data security and compliance with robust security measures.
- Reduce operational cost with pay only for resources use.
- Make informed decisions based on data insights.
- Leverage cutting edge technologies for advance data processing and analysis.
Pricing
£10 a licence a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 0 2 0 1 9 6 1 9 3 9 5 0 5 3
Contact
GET SWARMS LIMITED
Amit Jain
Telephone: 07545641528
Email: amit.jain@getswarms.com
Service scope
- Service constraints
- None - pls speak to GetSwarms team for confirmation at the time of contract.
- System requirements
- None - speak to us to discuss any specifics
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
We provide 24x7 prioritised service for the customer technical support staff. Our response times are as follows:
P1: CRITICAL - 15 mins
P2: URGENT - 1 Hour
P3: IMPORTANT - 3 Hrs
P4: COSMETIC/MINOR - 1 Day - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- Accessibility Testing, Functional Testing, UAT Testing
- Onsite support
- Yes, at extra cost
- Support levels
- We provide a dedicated Technical Accounts manager for the duration of contract who serves as an escalation point for any service-related issues. Additionally, we can offer Level 1, 2 and 3 support depending on the needs of our clients. Cost will vary depending upon the required service levels.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We offer various resources to assist customers in initiating their usage of our services. These encompass extensive documentation available in multiple formats, introductory videos, practical labs, both online and in-person training sessions, access to a vast ecosystem of partners, and support from the public sector account team.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
- As a contract draws to a close, our designated Service Delivery Manager proactively engages with the customer to collaborate on establishing a comprehensive contract exit plan. This plan encompasses various facets, notably the extraction and deletion of data from our infrastructure, ensuring a seamless transition for both parties. Our team works closely with the customer to ascertain specific requirements and preferences regarding data handling, ensuring compliance with relevant regulations and agreements. Additionally, customers retain autonomy over their data throughout the contract lifecycle, with the flexibility to modify, update, or remove their data as needed, with or without direct involvement from GetSwarm. This commitment to transparency and customer-centricity underscores our dedication to fostering trust and accountability throughout the contract lifecycle, safeguarding the integrity and security of our customers' data.
- End-of-contract process
- When a client chooses to end subscription with GetSwarms, we ensure a smooth transition process. We offer assistance with data extraction and migration to facilitate the transition to another service provider or platform, within reasonable bounds. We establish a mutually agreed-upon point for service termination. Once this transition milestone is reached, our dedicated teams cease all service provision, ensuring a clear delineation of responsibilities. Throughout this process, we prioritize transparency and open communication to address any concerns or queries from the client effectively. Our commitment to facilitating a seamless transition underscores our dedication to client satisfaction and reflects our ethos of reliability and professionalism. We remain steadfast in our support of clients even at the conclusion of our business relationship, ensuring their continued success beyond the scope of our services.
Using the service
- Web browser interface
- Yes
- Using the web interface
- If a purchaser chooses self-managed IaaS, they'll have the freedom to set up their environment, enabling them to assign CPU, RAM, and disk space to their virtual servers. They'll also have the ability to create, delete, and reboot servers independently, without needing to reach out to our support team.
- Web interface accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web interface accessibility testing
- Accessibility testing, Manual, Automated, Functional
- API
- Yes
- What users can and can't do using the API
- We provide extensive API endpoints. Contact our support desk for more detail.
- API automation tools
-
- Ansible
- Chef
- OpenStack
- SaltStack
- Terraform
- Puppet
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- ODF
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- MacOS
- Using the command line interface
- We offers excellent command line interface. For more details, contact us more info.
Scaling
- Scaling available
- Yes
- Scaling type
-
- Automatic
- Manual
- Independence of resources
- At Get Swarms, we ensure uninterrupted service for all users by implementing robust measures for data isolation and resource allocation. Through our cloud infrastructure, comprising public, private, community, and hybrid clouds, each user's data and resources are segregated, safeguarding against interference from other users' demands. Our dynamic resource management system optimally distributes resources, dynamically allocating capacity to meet fluctuating demand while maintaining performance and reliability. This approach guarantees that users experience consistent and reliable service, unaffected by the activities of other users, thereby ensuring a seamless and dependable experience across our platform.
- Usage notifications
- Yes
- Usage reporting
-
- API
- SMS
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Hardware containing data is completely destroyed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Files
- Virtual machine
- Service configurations
- Applications
- Any type of data back up can be arranged
- Database configuration
- CMDB data
- Backup controls
- Users have full control over their backup preferences, enabling them to specify what data is backed up and when. Through our platform, users can configure backups for different types of data on customised schedules, tailoring the process to suit their specific needs. We offer services to facilitate the creation of backup strategies and, a range of backup options to accommodate customer requirements.
- Datacentre setup
-
- Multiple datacentres with disaster recovery
- Multiple datacentres
- Single datacentre with multiple copies
- Single datacentre
- Scheduling backups
- Users schedule backups through a web interface
- Backup recovery
-
- Users can recover backups themselves, for example through a web interface
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Bonded fibre optic connections
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- At Get Swarms, our SLAs guarantee a certain level of availability for our services, typically measured in uptime percentage over a defined period, such as a month or a year. In the event that we fail to meet these guaranteed levels of availability, we offer service credits as compensation to affected users.These SLAs outline the specific levels of uptime we commit to maintaining and the corresponding compensation structure if those levels are not met. Service credits are provided to impacted users based on the extent to which our uptime falls short of the guaranteed level, as outlined in the SLA. To ensure transparency and accountability, users have access to an intuitive interface where they can view SLA reports detailing uptime performance and any associated service credits. This interface provides users with visibility into our service performance and the credits they are entitled to in the event of downtime.
- Approach to resilience
- Available on request. Our data center infrastructure is designed with disaster recovery in mind, featuring redundant systems and failover mechanisms to minimize the impact of potential disruptions. Redundant disks and multiple storage options are deployed to safeguard against hardware failures and ensure data integrity and availability. Also, multiple availability zones within each region and, distributed architecture ensure that even in the event of a catastrophic failure at one data center, services can seamlessly failover to alternate locations without impacting users.
- Outage reporting
- We offer Public Dashboard, API, email alerts, SMS to report any outage
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- At Get Swarms, we enforce strict access controls across management interfaces and support channels. Role-Based Access Control (RBAC), Authentication is reinforced with usernames, passwords, and multifactor authentication. Firewalling and IP restrictions limit access to authorized networks. Bastion hosts provide a secure gateway for accessing sensitive systems. Regular audits are conducted to monitor access patterns and detect anomalies. Admin accounts are isolated, and privileged access is strictly managed, mitigating the risk of unauthorized access and enhancing the security of our systems and support channels.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Dedicated device on a government network (for example PSN)
- Dedicated device over multiple services or networks
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- IAF
- ISO/IEC 27001 accreditation date
- 20/09/2023
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- ISO/IEC 27001
- Information security policies and processes
- At Get Swarms, we prioritize information security through comprehensive policies and processes. Our Information Security Management System (ISMS) is guided by industry best practices and frameworks such as ISO/IEC 27001 and NIST Cybersecurity Framework. Our Chief Information Security Officer (CISO) oversees the development, implementation, and enforcement of security policies. They lead a team of Security Managers and Security Analysts who are responsible for monitoring and assessing security risks, incident response, and compliance. To ensure policies are followed, we employ a combination of technical controls and human oversight. We utilize Security Information and Event Management (SIEM) systems to continuously monitor network activity for suspicious behavior and potential threats. Regular audits and assessments are conducted to verify compliance with security policies and industry standards. Additionally, we provide ongoing training and awareness programs to educate employees about security best practices and their responsibilities. Reporting structures are established to enable employees to report security incidents or concerns promptly.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- At Get Swarms, we employ a robust configuration and change management process. Our Configuration Management Database (CMDB) tracks the components of our services throughout their lifecycle. Changes undergo assessment by our Change Advisory Board (CAB) and Steering Board, where potential security impacts are evaluated. We utilize Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), and Interactive Application Security Testing (IAST) practices to ensure changes meet security standards. All changes are documented in source control, with a comprehensive history maintained, enabling us to manage tech debt effectively.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- At Get Swarms, we maintain a proactive vulnerability management process. We assess potential threats to our services through regular penetration testing, Nessus scanning, and continuous monitoring. Critical security patches are deployed swiftly using zero downtime deployments. We rely on various sources for threat intelligence, including industry alerts, CVE ratings, and internal risk assessments. Our risk assessment methodology ensures prioritization of vulnerabilities based on severity and impact, enabling us to effectively mitigate risks and enhance the security posture of our services.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
We deploys (pan-environmental) monitoring devices to collect information on unauthorized intrusion attempts, usage abuse, and network/application bandwidth usage. Devices monitor:
• Port scanning attacks
• Usage (CPU, processes, disk utilization, swap rates, software-error generated losses)
• Application metrics
• Unauthorized connection attempts
Near real-time alerts flag incidents, based on our Service/Security Team- set thresholds. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
We adopt a three-phased approach to manage incidents:
1. Activation and Notification Phase
2. Recovery Phase
3. Reconstitution Phase
Incident management aims to manage the lifecycle of all incidents. Users can report incidents through dedicated portal, email or Phone. Our primary objective is to return the IT service to users as quickly as possible. The incident management sub-processes and objectives are aligned to ITIL and ISO 27001:2013 standard. Incident management support, incident logging and categorisation, incident resolution, incident monitoring and escalation, incident closure and evaluation, pro-active user information and incident management reporting.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Third-party
- Third-party virtualisation provider
- AWS
- How shared infrastructure is kept separate
- We use AWS infrastructure. Amazon Web Services (AWS) primarily utilizes the Xen hypervisor for virtualization across its Elastic Compute Cloud (EC2) instances. Xen is an open-source virtualization platform that provides efficient and secure virtualization capabilities, allowing multiple virtual machines (VMs) to run on a single physical server.This includes using virtualization techniques to create separate virtual environments, implementing robust access controls and permissions, and employing network segmentation to ensure that each organization's data and resources remain isolated and secure.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- We rely on 3rd party data centers provided by AWS, Azure and GCP. The cloud provider is committed to sustainability and energy efficiency in its data centers, aligning with the EU Code of Conduct for Energy Efficient Data Centres. They design their data centers with energy efficiency in mind, utilizing innovative cooling and power management technologies to minimize energy consumption. They also employ advanced monitoring and optimization tools to continuously improve the efficiency of infrastructure.
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
We help implement effective stewardship of environment by supporting following activities:
• Deliver additional environmental benefits in the performance of the contract including working towards net zero greenhouse gas emissions.
• influence staff, suppliers, customers and communities through the delivery of the contract to support environmental protection and improvement.
• We adapt to our clients’ priorities and change our working approach to our client’s needs, such as working on-site, working remotely, or at an offsite short-term rental office if needed. We don't have plans to invest in long-term office premises that could potentially be underutilised. This gives us the flexibility to rent office space close to our clients.Covid-19 recovery
We support following activities to help local communities recover from the impact of Covid-19:
• We have paid particular attention to the mental well-being of our remote teams and made changes as needed to ensure everyone has the best working pattern and environment to continue to be part of the team, feel productive and deliver successfully.
• Create employment, re-training, and other return to work opportunities for those left unemployed by COVID-19, particularly new opportunities in high growth sectors.
• Support people and communities to manage and recover from the impacts of COVID-19, including those worst affected or who are shielding.
• Support organisations and businesses to manage and recover from the impacts of COVID-19, including where new ways of working are needed to deliver services.
• Support the physical and mental health of people affected by COVID-19, including reducing the demand on health and care services.
• Improve workplace conditions that support the COVID-19 recovery effort including effective social distancing, remote working, and sustainable travel solutions.Tackling economic inequality
We support following activities:
• Create opportunities for entrepreneurship and help new, small
organisations to grow, supporting economic growth and business creation.
• Create employment opportunities particularly for those who face barriers to employment and/or who are located in deprived areas.
• Create employment and training opportunities, particularly for people in industries with known skills shortages or in high growth sectors.
• Support educational attainment relevant to the contract, including training schemes that address skills gaps and result in recognised qualifications.
• Influence staff, suppliers, customers and communities through the delivery of the contract to support employment and skills opportunities in high growth sectors.
• Create a diverse supply chain to deliver the contract including new businesses and entrepreneurs, start-ups, SMEs, VCSEs and mutuals.
• Support innovation and disruptive technologies throughout the supply chain to deliver lower cost and/or higher quality goods and services.
• Support the development of scalable and future-proofed new methods to modernise delivery and increase productivity.
• provide collaboration throughout the supply chain, and a fair and responsible approach to working with supply chain partners in delivery of the contract.
• identify and manage cyber security risks in the
delivery of the contract including in the supply chain.
• Influence staff, suppliers, customers and communities through the delivery of the contract to support resilience and capacity in the supply chain.Equal opportunity
As a diverse group of people, we value culture differences and approaches in the workplace and recruit people into our network in an inclusive way.We actively promote inclusion in our resources including the following considerations:
• Women in It
• Minority representation
• Disadvantaged backgrounds
• Returning to work
• Local economy
We help tackle workplace inequality by supporting following activities:
• identify and tackle inequality in employment, skills
and pay in the contract workforce.
• Support in-work progression to help people, including those from disadvantaged or minority groups, to move into higher paid work by developing new skills relevant to the contract.
• identify and manage the risks of modern slavery in
the delivery of the contract, including in the supply chain.Wellbeing
We work with our clients and consultants to encourage a flexible working environment which allows everyone to attain a good work-life balance. We’ve paid particular attention to the mental well-being of our remote teams and made changes as needed to ensure each individual has the best working pattern and environment to continue to be part of the team, feel productive and deliver successfully.
We always work with individuals to understand and appreciate any personal challenges they may have, both hidden and visible, and agree how we can cater for specific needs, without prejudice or detriment to any individual or to the work we deliver.
We ensure we share and agree best practices and we encourage debate, intellectual curiosity and building of trust both with internal and external team members. Online collaboration, blog articles and community wiki pages are key to our well-being of staff members.
Pricing
- Price
- £10 a licence a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- All Features included in trial period. Trial periods range from 7 days to 30 days depending on service.