Veeam software as a service
Veeam software is no longer available for purchase on a perpetual socket basis. Veeam software as a service, from virtualDCS, gives you the opportunity to build a cost effective back-up service using our competitively priced Veeam workload based licences, and/or off-site backup and replication failover services.
Features
- First class support from our team
- Complete solution for all your backup and disaster recovery requirements
- All Veeam editions available (Standard, Enterprise & Enterprise Plus)
- Veeam Availability Suite
- Veeam Backup and Replication
- Veeam Backup Agents
- Kasten
- Veeam for Microsoft 365
- Self-service portals
Benefits
- Competitive prices - up to 50% cheaper than VUL licences
- Pay for what you need, not for pack sizes
- Pay monthly as a service
- Special prices for local Government, charity and education
Pricing
£5.00 an instance
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 0 4 8 5 6 6 6 2 3 3 3 9 7 7
Contact
virtualDCS Ltd
Kerri Milburn
Telephone: 03453 888327
Email: sales@virtualdcs.co.uk
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Backup as a service, Off-site backup as a service, disaster recovery as a service, Veeam Cloud Connect, Veeam for Microsoft 365, immutable object storage.
- Cloud deployment model
-
- Private cloud
- Hybrid cloud
- Service constraints
- None
- System requirements
-
- Protecting VMware and Hyper-V virtual machines
- Protecting Windows, Linux and MAC workloads
- Protecting network attached storage
- Protecting Microsoft 365 and SalesForce
- Protecting Azure and AWS workloads
- Protecting Kubernetes
- Protecting Oracle and SAP
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Level 1 - Critical—(Severe Business Disruption) Business unit is unable to operate; critical system component failed or severely impaired (Response Immediate)
Level 2 - High—(Major Business Disruption) Critical user or user group unable to operate, or the business unit is experiencing a significant reduction in system performance (Response 2 Hours)
Level 3 - Medium—(Minor Business Disruption) A single user is unable to operate with no available work around (Response 8 Hours)
Level 4 - Low—(Minor Disruption) A single user or user group is experiencing incidents, but work around is available. (Response 24 hours)
Level 5 - Planning (Response 48 Hours) - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 A
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- None
- Onsite support
- Yes, at extra cost
- Support levels
- Support is included with the service. If you have bespoke support requirements, we can accommodate dedicated agents, technical account management, and 24x7 phone support at additional cost.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Customers can subscribe to licences and will be given access to software, support, licence keys, and installation services.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- No data is held as part of this service
- End-of-contract process
-
The contract includes the use of Veeam software.
Access to virtualDCS support team.
Installation service at additional cost.
Monitoring service at an additional cost if required.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Linux or Unix
- MacOS
- Windows
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- Software provided through this service is run on-premise and used exclusively by the end user.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Licencing and ticket information is available through a portal
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Veeam
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- Never
- Protecting data at rest
- Other
- Other data at rest protection approach
- Not applicable data is held on buyers site, following their own encryption standards
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- No data is held
- Data export formats
- Other
- Other data export formats
- No data is held
- Data import formats
- Other
- Other data import formats
- Not applicable
Data-in-transit protection
- Data protection between buyer and supplier networks
- Other
- Other protection between networks
- For this service all data will reside on the buyers network
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Support for your software will be available under the following SLAs
Level 1 - Critical—(Severe Business Disruption) Business unit is unable to operate; critical system component failed or severely impaired (Response Immediate) Level 2 - High—(Major Business Disruption) Critical user or user group unable to operate, or the business unit is experiencing a significant reduction in system performance (Response 2 Hours) Level 3 - Medium—(Minor Business Disruption) A single user is unable to operate with no available work around (Response 8 Hours) Level 4 - Low—(Minor Disruption) A single user or user group is experiencing incidents, but work around is available. (Response 24 hours) Level 5 - Planning (Response 48 Hours) - Approach to resilience
- We have multiple support agents
- Outage reporting
- Software service resides on the customer site, if additional monitoring is paid for email notifications will be sent
Identity and authentication
- User authentication needed
- Yes
- User authentication
- 2-factor authentication
- Access restrictions in management interfaces and support channels
- Not applicable
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 13/07/2024
- What the ISO/IEC 27001 doesn’t cover
- The ISO 27001 certification covers our whole service.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- All our staff follow strict ISO 27001 audited ISMS procedures. We have our own accredited ISO auditor, and are independently assessed by BSI on a regular basis.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- We operate a change management process in accordance with our ISO 27001 certification. As part of this process, assessments are made of the risk and impact associated with any change, along with conditions required to mitigate the risks of any approved changes. Full details of our change management process are available on request.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- VirtualDCS uses a specialist vulnerability monitoring service which continuously monitors our services for vulnerabilities. We aim to deploy patches to security related vulnerabilities within one day of the vulnerability being discovered.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- VirtualDCS uses an automated audit and alerting solution continuously monitors our services for irregular activity. We invoke our standard response process in the event of a suspected compromise; the response time target for such an incident is 1 hour.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Our incident management process is administered through the service desk as a 'ticket'. This allows customers to log incidents (with an associated priority according to severity) with our specialists. Customers are kept updated through the service desk on the incident and are advised when progress is updated or when it is resolved. The 'ticket' is recorded and archived in the service desk and this 'ticket' forms the incident report. For severe incidents (Priority 1) a separate incident report is published and delivered to the customer on request.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
virtualDCS CloudCover services combat climate change by consolidating servers and reducing energy usage. They also reduce the demand for physical hardware, leading to decreased energy consumption and lower carbon emissions associated with manufacturing, operating, and disposing of such equipment. Supporting remote working initiatives through highly available data helps to reduce commuting and further lowers carbon emissions.
Pricing
- Price
- £5.00 an instance
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- 30 days unlimited access