Daisy Asanti Hosting Services
hosting and hybrid cloud services, a seamless integration of hosted infrastructure with the scalability and accessibility of cloud computing. Our hybrid cloud solutions blend the reliability and control of traditional data centres with the agility and efficiency of cloud environments, delivering a versatile platform for modern businesses to thrive.
Features
- UK wide coverage via 6 edge-enabled Data Centres
- Tier 3 Operational level including diverse, dedicated substations
- Certified 100% green, renewable energy
- 24x7x365 staffed facilities with on-site engineering resource
- Hybrid-cloud enabled via on-ramps to public and private cloud
- Fixed price or on-demand power consumption models
- Existing Scottish Public Sector Colocation partner / SWAN connectivity enabled
- ultra-low latency and high-speed connectivity between sites <1m/s
- IaaS and NaaS available nationally
- Network support for Web 3, AI and high-capacity edge technologies
Benefits
- Rack power-density for Hosting up-to 100kW,
- ISO 27001, ISO 9001 accredited provider
- 100% green energy contributes towards carbon reduction plan
- Carrier Neutral for competitive commercial offerings
- Bring your own carrier
- Enables AI and high-density compute
- Colocation ability
Pricing
£2,500 a server
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 6 8 4 5 5 4 4 5 5 5 2 8 9 2
Contact
Wavenet Ltd
Paddy Sheridan-Ruddy
Telephone: 07714737991
Email: publictenders@daisygroup.com
Service scope
- Service constraints
- No constraints specifically however 100% availability for power and connectivity is offered and 99.999% availability elsewhere within the infrastructure. Availability of applications cannot be guaranteed as they are purely hosted within the environment. These remain the responsibility of the client or their third party representitives
- System requirements
- Subject to clients individual requirements
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
SLAType Priority SLADuration Days of Cover Times of Cover Bank Holidays Included
Response P1 1 hour 24 x 7 24 x 7 Yes
Response P2 4 hours 24 x 7 24 x 7 Yes
Response P3 8 hours Monday - Friday 08:00am - 06:00pm No
Response P4 30 hours Monday - Friday 08:00am - 06:00pm No
Resolution P1 4 hours 24 X 7 24 X 7 Yes
Resolution P2 8 hours 24 X 7 24 X 7 Yes
Resolution P3 16 hours Monday - Friday 08:00am - 06:00pm No
Resolution P4 40 hours Monday - Friday 08:00am - 06:00pm No - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
- A variety of support models are available, please see our pricing document for further details
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We take the time to understand your unique business requirements, IT infrastructure, and growth objectives. By gaining insights into your specific needs and challenges, we can tailor our solutions to align perfectly with your goals.
Armed with a deep understanding of your business landscape, our team collaborates with you to design a bespoke hybrid cloud solution that meets your needs. Whether you require colocation services, private cloud infrastructure, or a hybrid environment that seamlessly integrates both, we leverage our expertise to architect a solution that maximises efficiency, scalability, and security.
Once the solution is finalised, our dedicated implementation team takes charge of deploying the infrastructure and configuring the necessary components. We handle all aspects of the onboarding process, from provisioning hardware to setting up connectivity. Our goal is to minimise disruption to your operations and ensure a smooth transition to the new hybrid cloud environment
As you start using our services, we provide comprehensive training and support to your IT teams to familiarise them with the new infrastructure and workflows. From best practices for managing hybrid environments to troubleshooting common issues, our support team is available round-the-clock to address any questions or concerns you may have - Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
-
- Ppt
- XLS
- End-of-contract data extraction
-
We first understand client's data extraction requirements, including the types of data to be extracted, the desired format, and any specific timelines or constraints.
We develop a comprehensive data migration strategy that outlines the steps involved in extracting and transferring the data from our infrastructure to their desired destination including considerations for data security, integrity, and compliance throughout the migration process.
Our experienced technical team executes the data extraction process according to the agreed-upon migration strategy. We employ industry-leading tools and techniques to ensure the efficient and secure transfer of data while minimising downtime and disruption to the client's operations.
Once the data extraction is complete, we conduct thorough verification and validation checks to ensure that all data has been successfully transferred and that it remains intact and accurate. We address any discrepancies or issues that may arise during this process, ensuring the integrity and completeness of the data extraction.
Upon successful completion of the data extraction process, we provide comprehensive documentation detailing the extracted data, including its format, location, and any relevant metadata. We also facilitate a formal handover process, ensuring that the client has full ownership and control of their data as per the terms of the contract. - End-of-contract process
-
As the contract expiration date approaches, our dedicated account management team conducts a thorough review of the contract terms and conditions. We notify the client well in advance, typically several months before the contract end date, to initiate discussions about renewal or termination options.
If the client is interested in renewing the contract, we engage in discussions to negotiate terms and conditions that meet their evolving needs. This may involve adjustments to service levels, pricing, or contract duration based on feedback and changing business requirements.
For clients who choose not to renew the contract or who opt for termination, we initiate transition planning to facilitate a smooth exit from our services. This involves assessing the client's data and infrastructure requirements, outlining the steps involved in the transition process, and establishing timelines and milestones for completion.
Using the service
- Web browser interface
- No
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- No
- Independence of resources
- Customers are provided with their own infrastructure and uncontended bandwidth and power so should be unaffected by other users
- Usage notifications
- Yes
- Usage reporting
-
- SMS
- Other
- Other usage reporting
- To be determined by the customer
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Asanti
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Files
- Virtual Machines
- Databases
- Image files
- Any other data as requested by the client
- Backup controls
- Subject to the software and service level agreements that are in place
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Users contact the support team to schedule backups
- Backup recovery
-
- Users can recover backups themselves, for example through a web interface
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- IPsec or TLS VPN gateway
- Bonded fibre optic connections
- Data protection within supplier network
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- We guarantee a minimum of 99.999% uptime for our data centre colocation and hybrid cloud services. This means that our infrastructure is designed and maintained to ensure that our clients' applications and data are accessible and operational for at least 99.999% of the time over any given contractual period.
- Approach to resilience
-
Our data centres are equipped with redundant power, cooling, and networking infrastructure to minimise the risk of downtime due to hardware failures or maintenance activities. Redundancy at every level of the infrastructure ensures that there are no single points of failure that could disrupt service availability. We operate an N+1 approach across all facilities.
We employ a high availability architecture that includes load balancing, failover mechanisms, and automatic failover clustering to ensure continuous availability of services. In the event of hardware or software failures, traffic is seamlessly rerouted to redundant systems to prevent service disruption.
Our team of skilled technicians monitors our infrastructure 24/7/365, using advanced monitoring tools and proactive maintenance procedures to identify and address potential issues before they escalate into service-affecting incidents. Regular maintenance activities are scheduled during off-peak hours to minimise impact on service availability.
We have robust disaster recovery and business continuity plans in place to mitigate the impact of unforeseen events such as natural disasters, cyber-attacks, or infrastructure failures. Our geographically diverse data centre locations and data replication strategies ensure that clients' data remains accessible even in the face of catastrophic events. - Outage reporting
- Outages are reported via a public dashboard with email alerts sent out to nominated customer contacts as agreed as part of the contract.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Access is limited on a role based model as defined in the customer requirements
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Dedicated device over multiple services or networks
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 13/09/2013 original certification
- What the ISO/IEC 27001 doesn’t cover
-
Scope is all Daisy sites and services requiring security
Additionally Asanti hold their own accreditation - ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
- ISO 9001
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Both Daisy and our partners operate comprehensive Information Security Policies in line with ISO27001
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Our ITIL v3 aligned service management tool meets ISO 27001 guidelines, governing core ITIL processes including, but not limited to, incident, problem, change, release, configuration, service level management and service catalogue functions
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Vulnerability scanning is included in the Daisy security framework, to help monitor the effectiveness of existing security controls and identify any weaknesses. The IT security Manager in consultation with Head of Compliance shall coordinate vulnerability scanning activities including: • identifying the scope of testing • monitor manufacturer and vendor sites for information updates regarding vulnerabilities Should the vulnerabilities be assessed as not posing an immediate threat to operations, security patches or code fixes shall be subject
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
We utilise industry standard solutions to proactively monitor their key data centre infrastructure. M&E assets, physical security and environmental controls are monitored continuously. This integrated platform allows 24/7/365 monitoring of our data centre assets ensuring physical security and that actual or predictive hardware failures are highlighted to the 24/7/365 manned in-house operations bridge to action appropriately, thus mitigating the risk to customer services and data hosted within our data centres.
We employ advanced monitoring tools and technologies to continuously monitor our infrastructure, network traffic, and systems for signs of suspicious activity or security breaches.
Further information available upon request - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- We utilise Halo ITSM to ensure ITIL compliant incident management processes are followed. Customers contact the 24/7/365 operations bridge to record an incident. This incident is then tracked via the ITIL complaint ITSM solution ensuring that incidents are assigned to the appropriate resources (internal and external), actions are recorded, escalations taken appropriately, and any underlying risk or problem managed via the associated ISO process. Customer SLAs are clearly defined, and all incident responses are measured against these
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- Other
- Other virtualisation technology used
-
As a vendor agnostic provider we are able to utilise virtualisation technologies from multiple sources including:
Vmware
Hyper-V
Red Hat Virtualisation - How shared infrastructure is kept separate
- Physical and virtual separation alongside dedicated infrastructure
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
-
We employ advanced energy monitoring and management systems to track and analyse energy consumption across our data centre facilities. This includes real-time monitoring of power usage effectiveness (PUE), which measures the efficiency of our data centre infrastructure in delivering computing services relative to energy consumption. Our data centres are equipped with state-of-the-art cooling systems that are designed for maximum efficiency and minimal energy consumption. We use technologies such as free cooling, economisers, and variable-speed fans to optimize cooling efficiency while minimising energy usage and environmental impact. We work closely with our clients to ensure that their server and IT equipment are optimised for energy efficiency. This may involve virtualisation, consolidation, and server optimisation techniques to reduce energy consumption while maximising performance and resource utilisation. Where feasible, we prioritise the use of renewable energy sources to power our data centres. This may include sourcing electricity from renewable energy providers, installing onsite solar panels or wind turbines, or purchasing renewable energy certificates to offset our carbon footprint.
Additional information is available upon request
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Wellbeing
Fighting climate change
DCS is signed up to UN Compact and have planned our strategy to address a number of the Sustainability Goals. We plan to submit SBTi targets within the next financial year and Nature Positive Pledge.
Our primary focus is the reduction of our carbon footprint alongside our customers as we have identified this as the most pressing need in the IT industry today.
We have an ESG lead and ESG Governance Manager co-ordinating effort from across the business and industry prominent Statutory Board representation as well as Chairman who champions many of our environmental initiatives. We have three bi-monthly groups representing every business area and a Green Team spearheading our local and site based strategy.
We should reach Net Zero Scopes 1&2 within the next two years and throughout our supply chain by 2039.
We already consume only REGO backed renewable energy, our first renewable contract being put in place in 2017 and installation of solar panels on our owned buildings as well as EV schemes and gas replacement pilots. Our overall energy consumption has reduced by 7.5% in the first six months of 2023.
DCS is certified to ISO14001 (Environmental Management) and ISO50001 (Energy Management).
DCS sponsor the Girlguiding Rainbow Recycling badge encouraging green thinking within the 4-7 age group resulting in 10,594 badges being earned across the UK.
We have a strong relationship with a forward thinking ITAD partner and have introduced Environmental KPIs associated with equipment circularity into the Environment Policy.
We have a new Kelp Farm on the Isle of Mull which seeks to demonstrate the environmental, carbon sequestering, deacidifying and social benefits of the Sugar Kelp we grow on decommissioned salmon farms.
Alongside our carbon reduction plans we are reviewing our other impacts such as waste stream, water usage and single use plastics.Tackling economic inequality
Our Learning platform Daisy Grow supports people to further their careers, change direction and realise their ambitions.
It’s also the conduit for training our staff ensuring our management maintains awareness of inequality, modern slavery and wellbeing amongst many other courses.
DCS has also developed a Social Value Training programme to deliver courses to our staff, supplier employees, customer’s employees, and citizens to support the Social Value Model Themes. This programme is made available to Buyers through the GCloud Call Off contract.
It’s known as the Daisy Community Learning Portal and there are 150+ courses available to support the development of employment and life skills.
These skills not only provide greater employment opportunities for their recipients; are less location dependant, and are more likely be required in jobs that have flexible working hours and role types.
Courses are organised into three general categories of:
• Career Development
• Health & Wellbeing
• Leadership & Management
This training programme is provided to customers and citizens as part of Social Value directly under G-Cloud Service Provision.
Daisy provide 10 x 30-day licences for the training programme for every £10,000 of contract value, The full range of courses will be available for citizens in need and can be accessed via any browser including smart phones, tablets, library and school computers.
We estimate that 50-100 hours of learning is achievable within the 30-day window.
Each user has a Learning Dashboard tracking their progress and certificates awarded for completion can be used in job seeking and career progression.
A dedicated Community Learning Portal SV (CLPSV) Licence Co-ordinator works within the Daisy Frameworks Team and will liaise with the Buyer to arrange access.
Daisy will report on the take up and usage and this will be reported back to the Buyer via the DCS Social Commitments ReportWellbeing
Daisy from the very top down, is active in the promotion of health and wellbeing in the colleague environment.
We promote a healthy and happy working environment for staff and to identify, prevent and alleviate work-related stress as far as possible. In each physical location we have Health and Wellbeing champions as local points of contact for health/wellbeing issues.
They:-
Promote health/wellbeing within DCS
Assist in health and wellbeing activities that are companywide.
Coordinate local health and wellbeing activities such as running clubs, lunchtime classes etc.
Communicate regular feedback to the Health and Wellbeing team to allow internal communication of local/national events.
Maintain health and safety company policy and legislation
DCS communicates its messages in different formats, directly through the Champions, from senior management through videos and live presentations, through the intranet and the Daisy Grow Learning Platform.
Our Health and Wellbeing Manager provides useful tips and initiatives to help maintain mental health in our stressful lives.
We have a business-wide team of 30 Mental Health first aiders. DCS employees have a number of schemes promoting health and wellbeing, there is in place an Employee Assistance Programme offering help to employees and their families when required.
Daisy celebrates both International Women’s and Men’s days with a programme of inspiring events and talks including Suicide Awareness, Wellness, Careers and STEM partnerships.
Daisy have also developed a comprehensive Social Value Training programme to deliver courses to our staff, supplier employees, customer’s employees, and citizens to support the Social Value Model Themes. There are 500+ courses available including a wide range of courses to support Wellbeing. This training programme is used internally within Daisy, with our suppliers, and can also be provided to customers and citizens as part of Social Value directly delivered under G Cloud Service Provision.
Pricing
- Price
- £2,500 a server
- Discount for educational organisations
- No
- Free trial available
- No