Cloud Volumes ONTAP (CVO) Azure
NetApp Cloud Volumes ONTAP®, the leading enterprise-grade storage management solution, delivers secure, proven storage management services.
Features
- High Availability - Ensures RPO=0 and RTO<60 secs
- Data Protection - With NetApp Snapshot™ technology
- Storage Efficiencies - Thin provisioning, data compression, and deduplication.
- Data Tiering - Automatically move infrequently-used data to object storage
- Cloning-Create writeable clone volumes instantly and with no capacity penalty
- Cloud Migration - With SnapMirror® replication technology
- Kubernetes Integration - For containerized workloads persistent storage
- BlueXP -UI/APIs for management, supporting hybrid & multi-cloud architectures
Benefits
- Provide High Availability for your cloud applications
- Reduce public cloud storage spend with NetApp CVO for Azure
- Multiple storage consumption models
- ONTAP rapidly and easily provisions and manages cloud storage
Pricing
£0.03 to £0.13 a licence a month
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 4 8 8 4 0 7 5 6 3 1 9 0 6 1
Contact
NETAPP
Chris Roberts
Telephone: 07920284901
Email: chris.roberts@netapp.com
Service scope
- Service constraints
- Cloud Volumes ONTAP limitations can be found here - https://docs.netapp.com/us-en/cloud-volumes-ontap-9101-relnotes/reference-limitations.html#cloud-volumes-ontap-supports-reserved-and-on-demand-vm-instances
- System requirements
-
- Routing, firewall policies must allow HTTP/HTTPS traffic to specific endpoints
- 5 to 6 Private IP addresses
- Use of Security group rules
- Connector https://docs.netapp.com/us-en/bluexp-setup-admin/task-quick-start-connector-azure.html
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- 24x7 access to Cloud Support Engineers via phone, chat, and web. You can have an unlimited number of contacts that can open an unlimited amount of cases. Response times for general guidance is less than 24 hours, system impaired is less than 12 hours, production system impaired is less than 4 hours, production system down is less than an hour, and business critical system down is less than 15 minutes.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Webchat is available via NetApp Helpcentre at https://bluexp.netapp.com/help-center
- Web chat accessibility testing
- Unknown
- Onsite support
- Yes, at extra cost
- Support levels
-
NetApp SupportEdge Services portfolio for cloud:
Support Edge Base for cloud:
Priority 1: 2 hours
•Priority 2: 4 hours
•Priority 3 or 4: Next business day
Support Edge Advisor for Cloud:
•Priority 1: 30 minutes
•Priority 2: 2 hours
•Priority 3 or 4: Next business day
All details can be found here -
https://www.netapp.com/media/78660-DS-4225-NetApp-SupportEdge-Cloud-Portfolio-datasheet.pdf - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Quick start for Cloud Volumes ONTAP in Azure can be found here -
https://docs.netapp.com/us-en/bluexp-cloud-volumes-ontap/task-getting-started-azure.html - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Data can be copied out of the solution at any time via standard file copy means, prior to the expiration of the license. The system warns your 30 days before a license is due to expire.
- End-of-contract process
- Once the license term has expired, the system shuts itself down and ceases to serve data. The data itself is not deleted, so can be recovered by renewing the license, or destroyed by deleting the cloud infrastructure underpinning the virtual storage system.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Full guide how to register, create a case, information to include and how to manage and escalate cases, can be found at https://docs.netapp.com/us-en/bluexp-tiering/task-get-help.html#get-support-for-a-cloud-provider-file-service
- Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- NetApp provides support for BlueXP and its cloud services in a variety of ways. Extensive free self-support options are available 24x7, such as knowledgebase (KB) articles and a community forum. Your support registration includes remote technical support via web ticketing.
- Web interface accessibility testing
-
This Voluntary Product Accessibility Template (VPAT) provides guidance on the accessibility
characteristics of the NetApp ONTAP® Cloud :
Full details can be found here : https://www.netapp.com/us/media/vpat-netapp-ontap-cloud.pdf - API
- Yes
- What users can and can't do using the API
-
The BlueXP REST APIs use mainstream protocols and standards to provide a flexible foundation for deploying and administering your cloud-based and on-premise resources.
The REST style of application development begins by identifying a set of server-based resources. The resources defined with the BlueXP REST APIs can be broadly categorized as follows:
Storage resources
Used to manage and administer cloud storage resources (for example, Cloud Volumes ONTAP, Azure NetApp Files) as well as on-premises and edge storage resources
Platform resources
Used to manage users, workspaces, accounts, Connectors, credentials in BlueXP control plane
Data resources
Used to protect and create backup of your cloud and on-premises data, manage your licenses and subscriptions to BlueXP - API automation tools
-
- Ansible
- Chef
- OpenStack
- Terraform
- Puppet
- Other
- Other API automation tools
- WorkFlow automation (WFA)
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- Command line interface
- Yes
- Command line interface compatibility
- Other
- Using the command line interface
- The ONTAP command-line interface (CLI) provides a command-based view of the management interface. You enter commands at the storage system prompt, and command results are displayed in text.
Scaling
- Scaling available
- Yes
- Scaling type
-
- Automatic
- Manual
- Independence of resources
- You can use storage quality of service (QoS) to guarantee that performance of critical workloads is not degraded by competing workloads.
- Usage notifications
- Yes
- Usage reporting
-
- API
- SMS
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- Memory
- Network
- Number of active instances
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
- All / Any Data can be backed up.
- Backup controls
- Backups can be done via both manual and automated standard NetApp Back and recovery services.
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Users schedule backups through a web interface
- Backup recovery
-
- Users can recover backups themselves, for example through a web interface
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Other
- Other protection within supplier network
- ACL Based Network Security Groups are also used. See https://azure.microsoft.com/en-us/blog/network-security-groups/
Availability and resilience
- Guaranteed availability
-
Guaranteed availability of 99.99%
If Microsoft do not achieve and maintain the Service Levels for each Service as described in the SLA, then a customer may be eligible for a credit towards a portion of their monthly service fees.
Terms including How to Claim can be found on the latest published SLA agreement below:
https://azure.microsoft.com/en-us/support/legal/sla/netapp/v1_1/ - Approach to resilience
-
Whether it’s a single hardware node failure, a rack level failure, a datacenter outage, or a large-scale regional outage, Azure provides solutions that improve reliability with built in services.
Availability sets ensure that the virtual machines deployed on Azure are distributed across multiple isolated hardware nodes in a cluster. Availability zones protect customers’ applications and data from datacenter failures across multiple physical locations within a region.
Availability zones, which are separated groups of datacenters within a region. Availability zones are close enough to have low-latency connections to other availability zones. They're connected by a high-performance network with a round-trip latency of less than 2ms. However, availability zones are far enough apart to reduce the likelihood that more than one will be affected by local outages or weather and have independent power, cooling, and networking infrastructure. They're designed so that if one zone experiences an outage, then regional services, capacity, and high availability are supported by the remaining zones. They help your data stay synchronized and accessible when things go wrong.
Datacenter locations are selected by using rigorous vulnerability risk assessment criteria. This process identifies all significant datacenter-specific risks and considers shared risks between availability zones. - Outage reporting
-
Public dashboard; personalised dashboard with API and events - see https://azure.microsoft.com/en-us/status/ and https://portal.azure.com/#blade/HubsExtension/ServicesHealthBlade
Configurable alerting (email / SMS / messaging)
Identity and authentication
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google apps)
- Username or password
- Other
- Other user authentication
-
Azure Active Directory is Microsoft’s multi-tenant cloud based directory and identity management service. Azure-AD provides an affordable, easy to use solution to give employees and business partners single sign-on (SSO) access to thousands of cloud SaaS Applications like Office365, Salesforce.com, DropBox, and Concur. For application developers, Azure-AD lets you focus on building your application by making it fast and simple to integrate with a world class identity management solution used by millions of organizations. Azure-AD also includes a full suite of identity management capabilities including multi-factor authentication, device registration, self-service password management, self-service group management, privileged account management.
https://docs.microsoft.com/en-us/azure/active-directory/active-directory-whatis - Access restrictions in management interfaces and support channels
-
Azure-AD can designate separate administrators to serve different functions. These administrators will have access to features in the Azure portal and, depending on their role, will be able to create or edit users, assign administrative roles to others, reset user passwords, manage user-licenses, and manage domains, among other things. A user who is assigned an admin role will have the same permissions across all of the cloud services that your organization has subscribed to, regardless of whether you assign the role in the Office365 portal, or in the Azure classic-portal, or by using the Azure-AD module for Windows PowerShell.
https://docs.microsoft.com/en-us/azure/active-directory/active-directory-assign-admin-roles - Access restriction testing frequency
- Less than once a year
- Management access authentication
- Other
- Description of management access authentication
-
2-factor authentication
Identity federation with existing provider (for example Google Apps)
Username or password - Devices users manage the service through
- Dedicated device on a segregated network (providers own provision)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- Users receive audit information on a regular basis
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- FIPS-140-2, Common Criteria and DoDIN APL.
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
-
"ISO/IEC 27001 and ISO/IEC 15408
For further information check the below links:
https://security.netapp.com/certs/
https://library-clnt.dmz.netapp.com/info/web/ECMP1138936.html?&access=a
FIPS-140-2, Common Criteria and DoDIN APL.
https://security.netapp.com/certs/ - Information security policies and processes
-
NetApp is committed to providing its customers with quality products that provide the security posture they require. In pursuit of a continued and supportive relationship, NetApp recognizes that the changing security and threat landscape requires PwC to seek information about NetApp’s Secure Development LifeCycle practices.
NetApp has a comprehensive secure development lifecycle program based on industry best practices which includes, security training, static analysis security testing (SAST), dynamic analysis security testing (DAST), vulnerability scanning, third-party penetration testing and other security practices. NetApp further incorporates certain security features such as encrypted data-at-rest and data-in-motion depending on the system. NetApp’s secure development lifecycle is a journey and continues to be rolled out to achieve maturity.
As part of the development, ONTAP executes various secure development lifecycle practices and determines corrective actions. SAST, DAST, Fuzzing and vulnerability scanning are performed with each release. Pentration testing is performed at least annually.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Azure has developed formal standard operating procedures (SOPs) governing the change management process. These SOPs cover both software development and hardware change and release management, and are consistent with established regulatory guidelines including ISO 27001, SOC 1 / SOC 2, NIST 800-53, and others.
Microsoft also uses Operational Security Assurance (OSA), a framework that incorporates the knowledge gained through a variety of capabilities that are unique to Microsoft including the Microsoft Security Development Lifecycle (SDL), the Microsoft Security Response Center program, and deep awareness of the cybersecurity threat landscape.
Please see https://www.microsoft.com/en-us/SDL/OperationalSecurityAssurance and https://www.microsoft.com/en-us/sdl - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
When providing the Antimalware solution for Virtual Machines, Azure is responsible for ensuring the service is highly available, definitions are updated regularly, that configuration through the Azure Management Portal is effective and that the software detects and protects against known types of malicious software. MCIO-managed hosts in the scope boundary are scanned to validate anti-virus clients are installed and current signature-definition files exist.
Vulnerability scans are performed on a quarterly basis at a minimum. Microsoft Azure contracts with independent assessors to perform penetration testing of the Microsoft Azure boundary. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Microsoft Azure employs sophisticated software-defined service instrumentation and monitoring that integrates at the component or server level, the datacenter edge, our network backbone, Internet exchange sites, and at the real or simulated user level, providing visibility when a service disruption is occurring and pinpointing its cause.
Proactive monitoring continuously measures the performance of key subsystems of the Microsoft Azure services platform against the established boundaries for acceptable service performance and availability. When a threshold is reached or an irregular event occurs, the monitoring system generates warnings so that operations staff can address the threshold or event. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Microsoft has developed robust processes to facilitate a coordinated response to incidents.
• Identification – System and security alerts may be harvested, correlated, and analyzed.
• Containment – The escalation team evaluates the scope and impact of an incident.
• Eradication – The escalation team eradicates any damage caused by the security breach, identifies root cause for why the security issue occurred.
• Recovery – During recovery, software or configuration updates are applied to the system and services are returned to a full working capacity.
• Lessons Learned – Each security incident is analyzed to protect against future reoccurrence.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- Microsoft has operated carbon neutral since 2012. By 2030, Microsoft will be carbon negative and by 2050, Microsoft will have removed from the environment all the carbon the company has emitted either directly or by electrical consumption since it was founded in 1975. By 2025, Microsoft datacenters will be supplied by 100 percent renewable energy. To accomplish this goal, Microsoft has implemented contracting tools such as proxy generation power purchase agreements for green energy to supply 100 percent of the carbon-emitting electricity consumed by all datacenter
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
NetApp's hardware and software solutions are designed to help customers achieve their sustainability goals, including reducing their carbon footprint and optimising data management to conserve energy and resources. To support the complete product lifecycle management, NetApp focuses on energy-efficient technologies such as deduplication, compression, and compaction that dramatically reduce product footprint, lowering overall energy costs. Similarly, using larger capacity media also reduces customers’ footprint and can significantly impact the energy required to run their data centre(s).
Our packaging is made from 98% recycled/renewable materials and we use 80 Plus titanium power supplies for our hardware. Our e-waste and product take-back (free for all customers) programs (https://www.netapp.com/company/environmental-certifications/e-waste-management), adherence to environmental directives (https://www.netapp.com/company/environmental-certifications/), and the provision of sustainability tools like the NetApp Sustainability Dashboard (https://docs.netapp.com/us-en/active-iq/BlueXP_sustainability_dashboard_overview.html) and the Product Attribute to Impact Algorithm (PAIA) methodology to calculate product carbon footprint, all demonstrate our commitment to protecting our environment and fighting climate change.
For more information about NetApp’s environmental, social, and governance (ESG) initiatives, refer to the following URL https://www.netapp.com/esg. Our 2023 ESG report can be downloaded at https://www.netapp.com/pdf.html?item=/media/79434-NetApp-esg-report.pdf. Our Social Impact efforts include offering employees up to five days paid time off each year to volunteer at approved non-profit organizations from a global database, many of which benefit the environment. Specifically in the UK this year, a team volunteered at a nature reserve to remove an invasive species and sow wildflowers.
To summarize, our solutions adhere to circular economy principles that emphasize product durability, end-of-life management, recyclability, and environmental responsibility. For additional information on NetApp’s sustainability efforts, refer to the following URLs https://www.netapp.com/esg/sustainability/ and https://www.netapp.com/esg/sustainable-technology/.Covid-19 recovery
2021 ESG NetApp’s response to the global pandemic began in January 2020, months before major steps were taken in much of the world launching Thrive Belonging. From matching COVID-related charitable donations to shifting rapidly to remote work, NetApp has taken a mix of steps to keep our teams and communities safe while also delivering products and services uninterrupted.
At the outset, we assembled a company-wide crisis management team to execute our Business Continuity Plan and prepare to mitigate the impact of COVID-19. We put in place measures requiring most of our global workforce to work from home.
Our leadership monitored and managed the situation to mitigate impact to sales, global supply chains, and support and services.
As pandemic risks recede, we’re shifting to a hybrid workplace, a mix of remote and onsite work that promises to deliver a productive balance of engagement and tailored flexibility for employees.
2024 in a COVID-19 recovery world NetApp WX introduced Thrive Together, taking steps such as consultancy with an external organisation to take feedback on how we run an approach to being more present in the office by adjusting the office to meet a post COVID-19 world and taking feedback from internal stakeholders including employees and Employee Business Resource Groups.
While retaining hybrid working, all offices are suitable for social distancing and flexibility is available for those wishing to socially distance such as attending during off-peak times or attending meeting remotely.
In the UK a renovation has taken place to adapt our office to a post Covid-19 based of feedback after a return to the office. NetApp offices have washing and hygiene facilities suitable for all members of staff.
Office workspaces that individuals or groups can also work from flexible across the world booked via a service, including a weekly office day in London.Tackling economic inequality
We believe that community engagement has the power to bring positive, measurable change to our communities. Through our social impact programs, NetApp empowers our people to care for our communities and harness the power of data/AI for good—investing in programs and partnerships that support economic equality and community vitality in the communities where we live and work around the world.
Our social impact initiatives fall into three categories: data/AI literacy, equity, and sustainability. While the demand for data/AI skills will only increase in the years ahead, students experience significant racial gaps when it comes to data literacy. Through our Data Explorers program, we help bridge those inequities and prepare students for the jobs of the future.
Our equity programs focus on expanding access to data/AI skills and careers for underrepresented groups, closing the racial and gender gaps in the data science field and creating career paths. Finally, we work to accelerate data/AI solutions to support environmental sustainability, recognizing the urgent need to address environmental risks—and the employment opportunities that will accompany these new solutions. In addition to these NetApp investments, we also support employee community engagement programs that empower employees to support the causes they are most passionate about—including organizations that tackle inequality and create career and economic opportunities for others. NetApp supports those efforts through paid volunteer time off, matching donations, grants tied to employee volunteering, and more.Equal opportunity
NetApp’s work environment is based upon respect for the individual and their particular talents and qualities. We strive to recognize and optimize each employee’s unique differences and individual contributions to foster an environment where everyone has access to equal opportunity and can thrive in their role here at NetApp. NetApp is an equal opportunity employer and makes employment decisions on the basis of merit. We want to have the best available persons in every job. Our policy prohibits unlawful discrimination based on race, color, creed, sex, gender/transgender status, gender identity, gender expression, religion, marital status, age, citizenship status, national origin or ancestry, physical, physiological and mental health condition, medical condition including but not limited to AIDS/HIV, genetic characteristics, pregnancy, sexual orientation, veteran status, or any other consideration made unlawful by federal, state, or local laws.
This policy includes the prohibition against discrimination against any individual who is perceived to have any of the protected characteristics or is associated with a person who has or is perceived as having any of those characteristics. All such discrimination is unlawful. NetApp adheres to legal requirements by offering reasonable adjustments for individuals with disabilities, enabling them to fulfil their job responsibilities, provided there is no undue hardship. An interactive effort is made to discover and mitigate obstacles, ensuring workplace success. Possible adjustments are identified in collaboration with the person to mitigate any limitations. When an accommodation is feasible and does not cause undue hardship, NetApp will implement it to support an accessible work environment. NetApp is committed to compliance with all applicable laws providing equal employment opportunities. This commitment applies to all persons involved in Company operations and prohibits unlawful discrimination by any NetApp employee.Wellbeing
NetApp are committed to helping employees manage their health and wellbeing. One way we do this is by taking intentional breaks as a company to ensure we come back refreshed and healthy. We have a global Company shutdown at year end (between Christmas & New Year) and three global wellness days during the year to give employees space and time to focus on wellbeing. In addition to this we have a ‘No Meeting Friday’ once per month to allow for uninterrupted focused, productivity time to get work done or to take advantage of the many opportunities NetApp offers for continued career development and growth. We encourage employees not to hold internal meetings (Zoom/Teams, in-person or otherwise) on these days if possible and to use their best judgement for external-facing meetings on these days. NetApp also offers a variety of financial benefits to support financial wellbeing. Employees are eligible for income protection, life assurance and a contributory pension plan.
In the UK, employees have the opportunity to avail of Eyecare tests, dental insurance, private medical insurance and a monthly contribution towards gym membership. Employees also have access to our Employee Assistance Program which supports all aspects of life – physical, financial, emotional and social – through our partnership with Workplace Options, employees can access a variety of resources and confidential support. A Health, Wellbeing & Community Impact team has been set up to creating a supportive environment where we come together to promote physical and mental wellness, foster connections and forge a sense of UK team spirit by connecting employees through health and wellbeing activities and certified ‘mental health first aid’ training.
Pricing
- Price
- £0.03 to £0.13 a licence a month
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- A 30 day Free trial is available of the CVO product for up to 500GB
- Link to free trial
- https://www.netapp.com/cloud-services/cloud-volumes-ontap/free-trial/