Skip to main content

Help us improve the Digital Marketplace - send your feedback

virtualDCS Ltd

Veeam software as a service

Veeam software is no longer available for purchase on a perpetual socket basis. Veeam software as a service, from virtualDCS, gives you the opportunity to build a cost effective back-up service using our competitively priced Veeam workload based licences, and/or off-site backup and replication failover services.

Features

  • First class support from our team
  • Complete solution for all your backup and disaster recovery requirements
  • All Veeam editions available (Standard, Enterprise & Enterprise Plus)
  • Veeam Availability Suite
  • Veeam Backup and Replication
  • Veeam Backup Agents
  • Kasten
  • Veeam for Microsoft 365
  • Self-service portals

Benefits

  • Competitive prices - up to 50% cheaper than VUL licences
  • Pay for what you need, not for pack sizes
  • Pay monthly as a service
  • Special prices for local Government, charity and education

Pricing

£5.00 an instance

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sales@virtualdcs.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

1 0 4 8 5 6 6 6 2 3 3 3 9 7 7

Contact

virtualDCS Ltd Kerri Milburn
Telephone: 03453 888327
Email: sales@virtualdcs.co.uk

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Backup as a service, Off-site backup as a service, disaster recovery as a service, Veeam Cloud Connect, Veeam for Microsoft 365, immutable object storage.
Cloud deployment model
  • Private cloud
  • Hybrid cloud
Service constraints
None
System requirements
  • Protecting VMware and Hyper-V virtual machines
  • Protecting Windows, Linux and MAC workloads
  • Protecting network attached storage
  • Protecting Microsoft 365 and SalesForce
  • Protecting Azure and AWS workloads
  • Protecting Kubernetes
  • Protecting Oracle and SAP

User support

Email or online ticketing support
Email or online ticketing
Support response times
Level 1 - Critical—(Severe Business Disruption) Business unit is unable to operate; critical system component failed or severely impaired (Response Immediate)

Level 2 - High—(Major Business Disruption) Critical user or user group unable to operate, or the business unit is experiencing a significant reduction in system performance (Response 2 Hours)

Level 3 - Medium—(Minor Business Disruption) A single user is unable to operate with no available work around (Response 8 Hours)

Level 4 - Low—(Minor Disruption) A single user or user group is experiencing incidents, but work around is available. (Response 24 hours)

Level 5 - Planning (Response 48 Hours)
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 A
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
None
Onsite support
Yes, at extra cost
Support levels
Support is included with the service. If you have bespoke support requirements, we can accommodate dedicated agents, technical account management, and 24x7 phone support at additional cost.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Customers can subscribe to licences and will be given access to software, support, licence keys, and installation services.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
No data is held as part of this service
End-of-contract process
The contract includes the use of Veeam software.
Access to virtualDCS support team.
Installation service at additional cost.
Monitoring service at an additional cost if required.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Yes
Compatible operating systems
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices
No
Service interface
No
User support accessibility
WCAG 2.1 AA or EN 301 549
API
No
Customisation available
No

Scaling

Independence of resources
Software provided through this service is run on-premise and used exclusively by the end user.

Analytics

Service usage metrics
Yes
Metrics types
Licencing and ticket information is available through a portal

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Veeam

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
Never
Protecting data at rest
Other
Other data at rest protection approach
Not applicable data is held on buyers site, following their own encryption standards
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
No data is held
Data export formats
Other
Other data export formats
No data is held
Data import formats
Other
Other data import formats
Not applicable

Data-in-transit protection

Data protection between buyer and supplier networks
Other
Other protection between networks
For this service all data will reside on the buyers network
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Support for your software will be available under the following SLAs

Level 1 - Critical—(Severe Business Disruption) Business unit is unable to operate; critical system component failed or severely impaired (Response Immediate) Level 2 - High—(Major Business Disruption) Critical user or user group unable to operate, or the business unit is experiencing a significant reduction in system performance (Response 2 Hours) Level 3 - Medium—(Minor Business Disruption) A single user is unable to operate with no available work around (Response 8 Hours) Level 4 - Low—(Minor Disruption) A single user or user group is experiencing incidents, but work around is available. (Response 24 hours) Level 5 - Planning (Response 48 Hours)
Approach to resilience
We have multiple support agents
Outage reporting
Software service resides on the customer site, if additional monitoring is paid for email notifications will be sent

Identity and authentication

User authentication needed
Yes
User authentication
2-factor authentication
Access restrictions in management interfaces and support channels
Not applicable
Access restriction testing frequency
At least every 6 months
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
13/07/2024
What the ISO/IEC 27001 doesn’t cover
The ISO 27001 certification covers our whole service.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
All our staff follow strict ISO 27001 audited ISMS procedures. We have our own accredited ISO auditor, and are independently assessed by BSI on a regular basis.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We operate a change management process in accordance with our ISO 27001 certification. As part of this process, assessments are made of the risk and impact associated with any change, along with conditions required to mitigate the risks of any approved changes. Full details of our change management process are available on request.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
VirtualDCS uses a specialist vulnerability monitoring service which continuously monitors our services for vulnerabilities. We aim to deploy patches to security related vulnerabilities within one day of the vulnerability being discovered.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
VirtualDCS uses an automated audit and alerting solution continuously monitors our services for irregular activity. We invoke our standard response process in the event of a suspected compromise; the response time target for such an incident is 1 hour.
Incident management type
Supplier-defined controls
Incident management approach
Our incident management process is administered through the service desk as a 'ticket'. This allows customers to log incidents (with an associated priority according to severity) with our specialists. Customers are kept updated through the service desk on the incident and are advised when progress is updated or when it is resolved. The 'ticket' is recorded and archived in the service desk and this 'ticket' forms the incident report. For severe incidents (Priority 1) a separate incident report is published and delivered to the customer on request.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

virtualDCS CloudCover services combat climate change by consolidating servers and reducing energy usage. They also reduce the demand for physical hardware, leading to decreased energy consumption and lower carbon emissions associated with manufacturing, operating, and disposing of such equipment. Supporting remote working initiatives through highly available data helps to reduce commuting and further lowers carbon emissions.

Pricing

Price
£5.00 an instance
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
30 days unlimited access

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sales@virtualdcs.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.