Cloud hosting
Migrate, modernise, and optimise infrastructure and business applications using state-of-the-art cloud solutions. Here's a breakdown of what cloud hosting entails:
- Virtualization:
- Resource Management:
- High Availability and Scalability:
- Load Balancing:
- Security:
Features
- Predefined machine types, Custom machine types
- Open Source Increased Productivity
- High throughput at low latency Cluster resizing without downtime
- Zero scheduled downtime online schema changes
- VPC Firewall Rules hierarchical policies Firewall Insights Logging
- Cloud IAM RBAC and service accounts
- HTTP(S) & TCP/SSL load balancing SSL offload
- Real-time log management and analysis
- Fully Managed
- Scaling Prometheus Monitor and improve your application's
Benefits
- Spot machines Confidential computing
- Multi-Cloud Capability Portability & Flexibility
- Flexible, automated replication to optimize any workload
- Strong consistency eliminating manual tasks automatic shading
- Firewall
- Cloud IAP, Organization Policies
- Seamless auto scaling high fidelity health checks
- Built-in metrics observability at scale
- Built-in metrics observability at scale managed service
- Monitor and improve your infrastructure & applications
Pricing
£152.00 to £432.00 a unit a day
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 2 4 4 4 2 5 9 0 1 1 8 6 1 8
Contact
LTIMINDTREE LIMITED
Alastair Norman
Telephone: 07872306860
Email: alastair.norman@ltimindtree.com
Service scope
- Service constraints
- No Constraints
- System requirements
-
- OS, Licensing, Storage, Network, DNS
- OS, Storage, Network IP address for Pods and services, DNS/LBs
- Database version/Location Ports, Protocols User Accounts/Groups/Administrative Accounts
- Protocols, IPS,DNS name, SSL/TLS Metrics/Logs/Alerting
- Metrics/Logs/Alerting
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Depending on the agreed SLAs with the customer
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- For one of the leading Dutch health technology MNCs, we have been involved in the testing of a web chat (Conversational AI) platform. key highlights: 1. Make use of a variety of utterances to ensure coverage of each intent leading to thorough responsiveness 2. Automated testing using page object model approach and automated scripts integrated into Azure pipeline enabling daily execution of bot health checkup scripts 3. Automated email trigger of execution results to the stakeholders, thereby ensuring any failure gets addressed as early as possible 4. Testing is done on different zoom configurations making sure the users with any configuration be able to see the compatible bot irrespective of the platform - desktop browsers, IOS and Android 5. Chatbot content, which is leveraged in the automation suite, is maintained in an excel file so that whenever there is a change in the content, it can be directly amended in the excel sheet 6. Common test steps and methods maintained in a separate file leading to 30-40% reduction in maintenance effort
- Onsite support
- Yes, at extra cost
- Support levels
- We have three different support levels i.e. Gold, Silver and Bronze. Based on customer requirements and mutually agreed, support type will be provided. We provide technical account manager or cloud support engineer as required.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide onsite training, online training, or user documentation.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
- CSV, PDF, API
- End-of-contract process
- 1) Prices are exclusive of taxes and duties such as VAT, GST, Business tax, Sales and use tax, service tax, lease tax, custom duty and all similar taxes and duties. 2) Rates proposed are valid for a period of 12 months from the start of the engagement. End of each anniversary year, with mutual discussion rates are subject to annual increase and are linked to CPI - UK, CPI - India. 3) All Onsite services are rendered from premises owneḍd by customer and customer shall make available, at no charge adequate facilities for LTIMindtree personnel to work Onsite and will ensure that LTIMindtree personnel are assigned appropriate working space, IT equipment, including access to phone/fax./ email/ internet etc. 4) Price do not include cost of any customer specified background screening or checks, these shall be charged extra unless specifically communicated by LTIMindtree.
Using the service
- Web browser interface
- Yes
- Using the web interface
- End Users can View, Update, Create their tickets and Service Requests Chat-Connect Chat/Virtual Agent
- Web interface accessibility standard
- WCAG 2.1 AAA
- Web interface accessibility testing
- LTIMindtree has rich experience of testing using assistive technologies for various customers including: 1.For a Global Cosmetic Company, validated whether individuals with disabilities will be able to use their web app as required by DOT Mandate and norms defined by WCAG 2.0 Level AA/AAA.
- API
- Yes
- What users can and can't do using the API
- APIs are used for integrations and automations
- API automation tools
-
- Ansible
- Chef
- OpenStack
- SaltStack
- Terraform
- Puppet
- API documentation
- Yes
- API documentation formats
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- MacOS
- Using the command line interface
- CLI (Command Line Interface) used to interact with instance operation End users is not required to use command line interface. Support users use command line interface to perform instance operations from your local system
Scaling
- Scaling available
- Yes
- Scaling type
-
- Automatic
- Manual
- Independence of resources
- We do Health check parameters on regular basis and this guarantees that users are not affected by the demand
- Usage notifications
- Yes
- Usage reporting
-
- API
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Other
- Other metrics
-
- Application Error
- Average Response time
- Error Count
- Hit Count
- Success/failure count
- Requests/second
- 90 percentile response time
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Hardware containing data is completely destroyed
- Equipment disposal approach
- In-house destruction process
Backup and recovery
- Backup and recovery
- Yes
- Backup controls
-
• Virtual machines using persistent disk snapshots
• Database backup" - Datacentre setup
-
- Multiple datacentres with disaster recovery
- Multiple datacentres
- Single datacentre with multiple copies
- Single datacentre
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
-
- Users can recover backups themselves, for example through a web interface
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- The SLA's are defined by the cloud providers. You can find the links below to refer the same. https://aws.amazon.com/compute/sla/ https://azure.microsoft.com/en-in/support/legal/sla/summary/ Users are refunded with service credits if we don't meet guaranteed levels of availability
- Approach to resilience
- We can use the standard resilience principles. We design, build and support solutions in Cloud by leveraging resilient cloud infrastructure such as Datacenter, Storage, Network and compute sub systems
- Outage reporting
- We can report outages through: Service Health dashboards An API Email Alerts
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Access restrictions in management interfaces and support channels
- We restrict access using RBAC, SSO
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Bureau Veritas
- ISO/IEC 27001 accreditation date
- 14/02/2024
- What the ISO/IEC 27001 doesn’t cover
- Not applicable
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- ISO/IEC 27001:2013
- ISO27701:2019 Personal Information Management System
- ISO 20000:2011 Compliance for design, transition, delivery and improvement
- ISO 22301:2019 International standard for Business Continuity Management (BCM
- SSAE18 SOC1 and SOC2 Type 2 controls
- PCI DSS v3.2.1 Compliance to Payment Card industry Data Security
- Trusted Information Security Assessment Exchange (TISAX)
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- ISO/IEC 27001
- Other
- Other security governance standards
-
LTIMindtree’s Security Strategy has been designed based on renowned industry approved security frameworks/standards such as
• NIST SP 800-53
• NIST Cybersecurity Framework v1.1
• ISO 27001:2013
• ISO 27002:2013 - Information security policies and processes
-
LTIMindtree across all its Service Delivery Center is ISO 27001:2013 Information Security certified, Attested for SOC 1 Type II and SOC 2 Type II. LTIMindtree follows NIST 800-53 guidelines, ISO 27001 as a benchmark for all its Information Security policies and processes
LTIMindtree's Information Security Program is envisioned as a top down approach where the senior/executive management along with the Chief Information Security Officer (CISO) are key stakeholders in designing the information security strategy/framework and necessary support is provided to LTIMindtree's Corporate Security team to drive the security initiatives and program across the organization. Information security manager to handle and manage IT security incidents and exceptions. Periodic updates on security aspects and incidents are shared with steering committee, senior management and board of directors."
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- In configuration management, the focus is on the effective and efficient provision of IT services. The scope of service assets involves such things as IT services and related items. Configurations include individual and group combinations of historical, current, and future proposed or planned versions of hardware, software, locations, people, documentation, enterprise-wide activities, and supporting information. The change management process ensures that standardized methods and procedures are used for efficient and prompt handling of all changes and minimizes the impact of change-related Incidents upon service quality. This improves the day-to-day operations of the organization by allowing implementation of authorized changes.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Security vulnerabilities is a process that needs to be performed continuously in order to keep up with new systems being added to networks, changes that are made to systems, and the discovery of new vulnerabilities over time. The approach consists of 4 stages: 1. Discover: organizing all the company assets and uncovering any forgotten devices. 2. Prioritize : Is used to rate the severity of CVEs 3. Assess: Gaining timely, efficient access to the information 4. Report: Variety of customizable reports and dashboards. 5. Remediate: The goal is to monitor vulnerabilities, assign tickets, and manage exceptions.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Protective Monitoring Process: 1. Real-time log management and analysis 2. Built-in metrics observability at scale 3. Managed service for running and scaling Prometheus 4. Monitor and improve the application's performance
- Incident management type
- Supplier-defined controls
- Incident management approach
- Incident Management Approach: • All incidents are logged, classified, and assigned as per defined guidelines. • KEDB is used to match the known errors during incident resolution. • Generate problem record for critical and high priority incidents. • Improve the quality of log notes, resolution codes, closure codes etc. • Based on pre-defined guidelines, take collective decisions to upgrade the priority of an incident or to change an incident to a Major Incident • Actively drive the RCA activities and Major Incident report generation pertaining to Major Incidents • Identify pitfalls in process, operations and automation and drive service Improvements
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- VMware
- How shared infrastructure is kept separate
- Though Multi tenancy approach
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- For Datacenters security is supreme and so is minimizing the exposure of sensitive data. We will adhere We will adhere to the EU Code of Conduct for Energy Efficient using Data Center Equipment: 1. Consolidate Lightly-utilized Servers. 2. Implement Efficient Data Storage Measures. 3. Utilize Built-in Server Power Management Features. 4. Reduce Energy Losses from Power Distribution Units (PDUs) 5. Reduce Energy Losses from Uninterruptable Power Supply (UPS) Systems. 6. Manage Airflow for Cooling Efficiency.
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
As a de-carbonization initiative, our facilities and business operations, we have challenged ourselves to find new ways to reduce our carbon footprint and invest in the low-carbon infrastructure and renewable and clean energy. We are working to attract partners to support on wheeling of solar power, hydro, usage of lithium batteries in future, solar charging infrastructure and other advanced technologies.
Deploying energy management platform and controls to provide energy bill reductions, energy operations transformation initiatives, Replacement of Ozone depleting substance with eco-friendly refrigerants, Replacement of existing UPS model with energy efficient models, Replacement of CFL lights with LED lights with smart sensors, Implementation of battery monitoring system, Installation of catalytic convertors to reduce emissions from DG, chiller descaling, automation of all AHU units, Influencing builders to opt for renewable resources to meet the energy requirement, retrofits, replacement of inefficient equipment etc are taken up . Also, the learnings from these activities resulted in efficient design of the building architecture that helped us maintaining lowest energy intensity. We have invested in Clean Energy with a dedicated budget to move towards green power.
We have been working on Waste Management strongly advocating waste reduction, building awareness campaigns around the imperative. As a result, we have seen our overall per capita waste generation trends dip, and recycling discipline improve which led to reducing the burden on the city landfills. Our waste recycling has improved in the last few years and saw progress in reducing incineration. All the waste generated within our office premises get disposed by authorized recyclers as per the legislations.Covid-19 recovery
The COVID-19 pandemic has had an unprecedented impact on societies and economies worldwide. LTIMindtree faces impact from this event at different levels. Risks include health and safety risks for our employees, impact on our customers, which may lead to reduction in customer discretionary IT spends, risk of delivery disruptions as well as increase in financial, compliance and operational risks. In addition, the pandemic impact may result in an increase in political and macro-economic risks. Some key indicators of our successful response include:
• Enablement of 99.5% of employee to work remotely
• Increase in Project Feedback Survey scores from customers for Q4
• Multiple customer appreciations have been received for the smooth and seamless support provided by LTIMindtree.Tackling economic inequality
As a socially conscious global enterprise, we realize that the future needs to be benchmarked not just by the financial resources we invest in, but also measured by the care, compassion and time that we willingly give. To us, CSR presents a whole new space of opportunities for ideas, technology, innovation and human energies to intersect and Together shape a transformational landscape. Strengthening our belief that yes, Together we can reach a Future that is really better, Faster.
Our CSR Strategy
Conversation, collaboration and commitment is the way forward for us, as we seek to nurture and grow pockets of thriving local communities that are making a tangible difference.
Through consistent engagements with credible NGOs, we have a handle on the ground realities in the social vectors we choose to impact. We monitor activities, respond to feedback and ensure a result-oriented framework is in place to expedite change. Our own volunteers are an important component of this endeavor too.
Our collaborations with every accredited body, individual and the beneficiary is built on a synergy of ideas, vision and realistic long-term goals. As the harbinger of positive change, we intend to convert every interaction into a constructive transformation. Most importantly we remain patiently and steadfastly committed to the causes we have taken up and ensure that each activity is taken to a logical and successful conclusion.
Our CSR Domains & Impacts:
As we keep evolving, being accountable to the communities around us is what defines us at LTIMindtree.
Our proactive approach drives us to focus our CSR efforts on the 4 vital pillars that we believe are the fundamental catalysts for social progress – Education, Empowerment, Environment, Health & Wellness. These pillars form the bedrock of our staunch commitment to creating meaningful change and fostering a brighter future for all.Equal opportunity
Diversity, Equity and Inclusion (DEI) is an integral part of life at LTIMindtree. We promote a performance-driven and customer-centric work culture to help clients achieve their business goals. We have Diversity data by Gender (Male, Female, Others), grades, location etc. We track this at an organization level, for eg- % of women in senior management, % of people with disabilities etc
As part of Voluntary DEI self-identification in India and US geos we also request information on
1. Ethnicity (US)
2. LGBTQ+
3. Disability and
4. Veteran status
As part of our HR processes, we track attrition, promotion, and gender pay-parity for gender as well.
We use DEI data to gather valuable information to guide long-term decisions -
1. Identify trends - The data is used in four key areas; retention, promotion, pay, and organizational representation. Eg, to identify if underrepresented groups have disproportionate levels of attrition, or if there is a gender pay gap.
2. Monitor equal opportunities – we use the data to understand if there’s a balanced spread of opportunities across all diversity groups. Identify if there are low levels of representation in decision-making positions or within leadership teams. This will help us understand where the most underrepresented individuals are positioned within the organization.
3. Employee Engagement – DEI Data gives us a better understanding of the people who make up our workforce. Identifying and addressing biases or other issues will validate our commitment to improving the overall employee experienceWellbeing
LTIMindtree has a comprehensive health and safety policy in place and in addition has partnered with best-in-class service providers for the below
• Employee assistance program (EAP)
• Competent Source of Advice basis ‘The Management of Health and Safety at Work Regulations’
• Comprehensive private medical insurance
• Competitive life insurance coverage
Other measures include -
• UK based employees receive laptops and benefit from flexi and hybrid working arrangements.
• Employees are encouraged to cycle to work via the cycle to work scheme as per the policy in effect.
• Close monitoring of medical/sickness related absenteeism patterns basis which support is provided on a case-to-case basis
• Providing positive strokes for a job well done via a comprehensive rewards and recognition program
• Ensuring adequate staffing levels thereby ensuring work life balance.
• Fully paid sick/medical leave days as per policy in effect
Pricing
- Price
- £152.00 to £432.00 a unit a day
- Discount for educational organisations
- No
- Free trial available
- No