Skip to main content

Help us improve the Digital Marketplace - send your feedback

LTIMINDTREE LIMITED

Cloud hosting

Migrate, modernise, and optimise infrastructure and business applications using state-of-the-art cloud solutions. Here's a breakdown of what cloud hosting entails:
- Virtualization:
- Resource Management:
- High Availability and Scalability:
- Load Balancing:
- Security:

Features

  • Predefined machine types, Custom machine types
  • Open Source Increased Productivity
  • High throughput at low latency Cluster resizing without downtime
  • Zero scheduled downtime online schema changes
  • VPC Firewall Rules hierarchical policies Firewall Insights Logging
  • Cloud IAM RBAC and service accounts
  • HTTP(S) & TCP/SSL load balancing SSL offload
  • Real-time log management and analysis
  • Fully Managed
  • Scaling Prometheus Monitor and improve your application's

Benefits

  • Spot machines Confidential computing
  • Multi-Cloud Capability Portability & Flexibility
  • Flexible, automated replication to optimize any workload
  • Strong consistency eliminating manual tasks automatic shading
  • Firewall
  • Cloud IAP, Organization Policies
  • Seamless auto scaling high fidelity health checks
  • Built-in metrics observability at scale
  • Built-in metrics observability at scale managed service
  • Monitor and improve your infrastructure & applications

Pricing

£152.00 to £432.00 a unit a day

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at alastair.norman@ltimindtree.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

1 2 4 4 4 2 5 9 0 1 1 8 6 1 8

Contact

LTIMINDTREE LIMITED Alastair Norman
Telephone: 07872306860
Email: alastair.norman@ltimindtree.com

Service scope

Service constraints
No Constraints
System requirements
  • OS, Licensing, Storage, Network, DNS
  • OS, Storage, Network IP address for Pods and services, DNS/LBs
  • Database version/Location Ports, Protocols User Accounts/Groups/Administrative Accounts
  • Protocols, IPS,DNS name, SSL/TLS Metrics/Logs/Alerting
  • Metrics/Logs/Alerting

User support

Email or online ticketing support
Email or online ticketing
Support response times
Depending on the agreed SLAs with the customer
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AAA
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
For one of the leading Dutch health technology MNCs, we have been involved in the testing of a web chat (Conversational AI) platform. key highlights: 1. Make use of a variety of utterances to ensure coverage of each intent leading to thorough responsiveness 2. Automated testing using page object model approach and automated scripts integrated into Azure pipeline enabling daily execution of bot health checkup scripts 3. Automated email trigger of execution results to the stakeholders, thereby ensuring any failure gets addressed as early as possible 4. Testing is done on different zoom configurations making sure the users with any configuration be able to see the compatible bot irrespective of the platform - desktop browsers, IOS and Android 5. Chatbot content, which is leveraged in the automation suite, is maintained in an excel file so that whenever there is a change in the content, it can be directly amended in the excel sheet 6. Common test steps and methods maintained in a separate file leading to 30-40% reduction in maintenance effort
Onsite support
Yes, at extra cost
Support levels
We have three different support levels i.e. Gold, Silver and Bronze. Based on customer requirements and mutually agreed, support type will be provided. We provide technical account manager or cloud support engineer as required.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide onsite training, online training, or user documentation.
Service documentation
Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction
CSV, PDF, API
End-of-contract process
1) Prices are exclusive of taxes and duties such as VAT, GST, Business tax, Sales and use tax, service tax, lease tax, custom duty and all similar taxes and duties. 2) Rates proposed are valid for a period of 12 months from the start of the engagement. End of each anniversary year, with mutual discussion rates are subject to annual increase and are linked to CPI - UK, CPI - India. 3) All Onsite services are rendered from premises owneḍd by customer and customer shall make available, at no charge adequate facilities for LTIMindtree personnel to work Onsite and will ensure that LTIMindtree personnel are assigned appropriate working space, IT equipment, including access to phone/fax./ email/ internet etc. 4) Price do not include cost of any customer specified background screening or checks, these shall be charged extra unless specifically communicated by LTIMindtree.

Using the service

Web browser interface
Yes
Using the web interface
End Users can View, Update, Create their tickets and Service Requests Chat-Connect Chat/Virtual Agent
Web interface accessibility standard
WCAG 2.1 AAA
Web interface accessibility testing
LTIMindtree has rich experience of testing using assistive technologies for various customers including: 1.For a Global Cosmetic Company, validated whether individuals with disabilities will be able to use their web app as required by DOT Mandate and norms defined by WCAG 2.0 Level AA/AAA.
API
Yes
What users can and can't do using the API
APIs are used for integrations and automations
API automation tools
  • Ansible
  • Chef
  • OpenStack
  • SaltStack
  • Terraform
  • Puppet
API documentation
Yes
API documentation formats
PDF
Command line interface
Yes
Command line interface compatibility
  • Linux or Unix
  • Windows
  • MacOS
Using the command line interface
CLI (Command Line Interface) used to interact with instance operation End users is not required to use command line interface. Support users use command line interface to perform instance operations from your local system

Scaling

Scaling available
Yes
Scaling type
  • Automatic
  • Manual
Independence of resources
We do Health check parameters on regular basis and this guarantees that users are not affected by the demand
Usage notifications
Yes
Usage reporting
  • API
  • Email

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
  • Other
Other metrics
  • Application Error
  • Average Response time
  • Error Count
  • Hit Count
  • Success/failure count
  • Requests/second
  • 90 percentile response time
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
  • Hardware containing data is completely destroyed
Equipment disposal approach
In-house destruction process

Backup and recovery

Backup and recovery
Yes
Backup controls
• Virtual machines using persistent disk snapshots
• Database backup"
Datacentre setup
  • Multiple datacentres with disaster recovery
  • Multiple datacentres
  • Single datacentre with multiple copies
  • Single datacentre
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
  • Users can recover backups themselves, for example through a web interface
  • Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
The SLA's are defined by the cloud providers. You can find the links below to refer the same. https://aws.amazon.com/compute/sla/ https://azure.microsoft.com/en-in/support/legal/sla/summary/ Users are refunded with service credits if we don't meet guaranteed levels of availability
Approach to resilience
We can use the standard resilience principles. We design, build and support solutions in Cloud by leveraging resilient cloud infrastructure such as Datacenter, Storage, Network and compute sub systems
Outage reporting
We can report outages through: Service Health dashboards An API Email Alerts

Identity and authentication

User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
Access restrictions in management interfaces and support channels
We restrict access using RBAC, SSO
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Bureau Veritas
ISO/IEC 27001 accreditation date
14/02/2024
What the ISO/IEC 27001 doesn’t cover
Not applicable
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
  • ISO/IEC 27001:2013
  • ISO27701:2019 Personal Information Management System
  • ISO 20000:2011 Compliance for design, transition, delivery and improvement
  • ISO 22301:2019 International standard for Business Continuity Management (BCM
  • SSAE18 SOC1 and SOC2 Type 2 controls
  • PCI DSS v3.2.1 Compliance to Payment Card industry Data Security
  • Trusted Information Security Assessment Exchange (TISAX)

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • CSA CCM version 3.0
  • ISO/IEC 27001
  • Other
Other security governance standards
LTIMindtree’s Security Strategy has been designed based on renowned industry approved security frameworks/standards such as
• NIST SP 800-53
• NIST Cybersecurity Framework v1.1
• ISO 27001:2013
• ISO 27002:2013
Information security policies and processes
LTIMindtree across all its Service Delivery Center is ISO 27001:2013 Information Security certified, Attested for SOC 1 Type II and SOC 2 Type II. LTIMindtree follows NIST 800-53 guidelines, ISO 27001 as a benchmark for all its Information Security policies and processes

LTIMindtree's Information Security Program is envisioned as a top down approach where the senior/executive management along with the Chief Information Security Officer (CISO) are key stakeholders in designing the information security strategy/framework and necessary support is provided to LTIMindtree's Corporate Security team to drive the security initiatives and program across the organization. Information security manager to handle and manage IT security incidents and exceptions. Periodic updates on security aspects and incidents are shared with steering committee, senior management and board of directors."

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
In configuration management, the focus is on the effective and efficient provision of IT services. The scope of service assets involves such things as IT services and related items. Configurations include individual and group combinations of historical, current, and future proposed or planned versions of hardware, software, locations, people, documentation, enterprise-wide activities, and supporting information. The change management process ensures that standardized methods and procedures are used for efficient and prompt handling of all changes and minimizes the impact of change-related Incidents upon service quality. This improves the day-to-day operations of the organization by allowing implementation of authorized changes.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Security vulnerabilities is a process that needs to be performed continuously in order to keep up with new systems being added to networks, changes that are made to systems, and the discovery of new vulnerabilities over time. The approach consists of 4 stages: 1. Discover: organizing all the company assets and uncovering any forgotten devices. 2. Prioritize : Is used to rate the severity of CVEs 3. Assess: Gaining timely, efficient access to the information 4. Report: Variety of customizable reports and dashboards. 5. Remediate: The goal is to monitor vulnerabilities, assign tickets, and manage exceptions.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Protective Monitoring Process: 1. Real-time log management and analysis 2. Built-in metrics observability at scale 3. Managed service for running and scaling Prometheus 4. Monitor and improve the application's performance
Incident management type
Supplier-defined controls
Incident management approach
Incident Management Approach: • All incidents are logged, classified, and assigned as per defined guidelines. • KEDB is used to match the known errors during incident resolution. • Generate problem record for critical and high priority incidents. • Improve the quality of log notes, resolution codes, closure codes etc. • Based on pre-defined guidelines, take collective decisions to upgrade the priority of an incident or to change an incident to a Major Incident • Actively drive the RCA activities and Major Incident report generation pertaining to Major Incidents • Identify pitfalls in process, operations and automation and drive service Improvements

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Supplier
Virtualisation technologies used
VMware
How shared infrastructure is kept separate
Though Multi tenancy approach

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
For Datacenters security is supreme and so is minimizing the exposure of sensitive data. We will adhere We will adhere to the EU Code of Conduct for Energy Efficient using Data Center Equipment: 1. Consolidate Lightly-utilized Servers. 2. Implement Efficient Data Storage Measures. 3. Utilize Built-in Server Power Management Features. 4. Reduce Energy Losses from Power Distribution Units (PDUs) 5. Reduce Energy Losses from Uninterruptable Power Supply (UPS) Systems. 6. Manage Airflow for Cooling Efficiency.

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

As a de-carbonization initiative, our facilities and business operations, we have challenged ourselves to find new ways to reduce our carbon footprint and invest in the low-carbon infrastructure and renewable and clean energy. We are working to attract partners to support on wheeling of solar power, hydro, usage of lithium batteries in future, solar charging infrastructure and other advanced technologies.

Deploying energy management platform and controls to provide energy bill reductions, energy operations transformation initiatives, Replacement of Ozone depleting substance with eco-friendly refrigerants, Replacement of existing UPS model with energy efficient models, Replacement of CFL lights with LED lights with smart sensors, Implementation of battery monitoring system, Installation of catalytic convertors to reduce emissions from DG, chiller descaling, automation of all AHU units, Influencing builders to opt for renewable resources to meet the energy requirement, retrofits, replacement of inefficient equipment etc are taken up . Also, the learnings from these activities resulted in efficient design of the building architecture that helped us maintaining lowest energy intensity. We have invested in Clean Energy with a dedicated budget to move towards green power.

We have been working on Waste Management strongly advocating waste reduction, building awareness campaigns around the imperative. As a result, we have seen our overall per capita waste generation trends dip, and recycling discipline improve which led to reducing the burden on the city landfills. Our waste recycling has improved in the last few years and saw progress in reducing incineration. All the waste generated within our office premises get disposed by authorized recyclers as per the legislations.

Covid-19 recovery

The COVID-19 pandemic has had an unprecedented impact on societies and economies worldwide. LTIMindtree faces impact from this event at different levels. Risks include health and safety risks for our employees, impact on our customers, which may lead to reduction in customer discretionary IT spends, risk of delivery disruptions as well as increase in financial, compliance and operational risks. In addition, the pandemic impact may result in an increase in political and macro-economic risks. Some key indicators of our successful response include:
• Enablement of 99.5% of employee to work remotely
• Increase in Project Feedback Survey scores from customers for Q4
• Multiple customer appreciations have been received for the smooth and seamless support provided by LTIMindtree.

Tackling economic inequality

As a socially conscious global enterprise, we realize that the future needs to be benchmarked not just by the financial resources we invest in, but also measured by the care, compassion and time that we willingly give. To us, CSR presents a whole new space of opportunities for ideas, technology, innovation and human energies to intersect and Together shape a transformational landscape. Strengthening our belief that yes, Together we can reach a Future that is really better, Faster.

Our CSR Strategy
Conversation, collaboration and commitment is the way forward for us, as we seek to nurture and grow pockets of thriving local communities that are making a tangible difference.
Through consistent engagements with credible NGOs, we have a handle on the ground realities in the social vectors we choose to impact. We monitor activities, respond to feedback and ensure a result-oriented framework is in place to expedite change. Our own volunteers are an important component of this endeavor too.

Our collaborations with every accredited body, individual and the beneficiary is built on a synergy of ideas, vision and realistic long-term goals. As the harbinger of positive change, we intend to convert every interaction into a constructive transformation. Most importantly we remain patiently and steadfastly committed to the causes we have taken up and ensure that each activity is taken to a logical and successful conclusion.

Our CSR Domains & Impacts:
As we keep evolving, being accountable to the communities around us is what defines us at LTIMindtree.
Our proactive approach drives us to focus our CSR efforts on the 4 vital pillars that we believe are the fundamental catalysts for social progress – Education, Empowerment, Environment, Health & Wellness. These pillars form the bedrock of our staunch commitment to creating meaningful change and fostering a brighter future for all.

Equal opportunity

Diversity, Equity and Inclusion (DEI) is an integral part of life at LTIMindtree. We promote a performance-driven and customer-centric work culture to help clients achieve their business goals. We have Diversity data by Gender (Male, Female, Others), grades, location etc. We track this at an organization level, for eg- % of women in senior management, % of people with disabilities etc

As part of Voluntary DEI self-identification in India and US geos we also request information on
1. Ethnicity (US)
2. LGBTQ+
3. Disability and
4. Veteran status
As part of our HR processes, we track attrition, promotion, and gender pay-parity for gender as well.

We use DEI data to gather valuable information to guide long-term decisions -
1. Identify trends - The data is used in four key areas; retention, promotion, pay, and organizational representation. Eg, to identify if underrepresented groups have disproportionate levels of attrition, or if there is a gender pay gap.
2. Monitor equal opportunities – we use the data to understand if there’s a balanced spread of opportunities across all diversity groups. Identify if there are low levels of representation in decision-making positions or within leadership teams. This will help us understand where the most underrepresented individuals are positioned within the organization.
3. Employee Engagement – DEI Data gives us a better understanding of the people who make up our workforce. Identifying and addressing biases or other issues will validate our commitment to improving the overall employee experience

Wellbeing

LTIMindtree has a comprehensive health and safety policy in place and in addition has partnered with best-in-class service providers for the below

• Employee assistance program (EAP)
• Competent Source of Advice basis ‘The Management of Health and Safety at Work Regulations’
• Comprehensive private medical insurance
• Competitive life insurance coverage

Other measures include -
• UK based employees receive laptops and benefit from flexi and hybrid working arrangements.
• Employees are encouraged to cycle to work via the cycle to work scheme as per the policy in effect.
• Close monitoring of medical/sickness related absenteeism patterns basis which support is provided on a case-to-case basis
• Providing positive strokes for a job well done via a comprehensive rewards and recognition program
• Ensuring adequate staffing levels thereby ensuring work life balance.
• Fully paid sick/medical leave days as per policy in effect

Pricing

Price
£152.00 to £432.00 a unit a day
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at alastair.norman@ltimindtree.com. Tell them what format you need. It will help if you say what assistive technology you use.