Virtual Private Cloud Hosting
Virtual Private Cloud Hosting within ultra secure nuclear proof datacentres. Securely host your business essentials – file storage, content management systems, and unified communications – in our virtual private cloud. Enjoy dedicated resources, network services, and robust backup & recovery for complete control and peace of mind.
Features
- 100% Uptime Service Level Agreement
- DDoS protected Internet Transit
- SSD Storage
- Remote Back-ups
- Automated Disaster Recovery
- Proactive System Monitoring
Benefits
- Built in High Availability for 100% Uptime
- Automated Disaster Recovery to Back-up Datacentres
- Ultra Fast Storage Arrays for data intensive applications and databases
- 24x7x365 System and Platform Monitoring
- DDoS protected Internet Transit for security
Pricing
£40 a virtual machine
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 7 2 2 5 6 4 1 5 9 5 9 1 9 6
Contact
Stream Networks Ltd
Matt Shanahan
Telephone: 01635884170
Email: matts@stream-networks.co.uk
Service scope
- Service constraints
- No Service Constraints listed
- System requirements
- Windows Operating Systems must be licenced using our MicrosoftSPLA
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Ticketing and support is available 24x7x365
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Web chat is available on our website through the TAWK chat bot
- Web chat accessibility testing
- None
- Onsite support
- Onsite support
- Support levels
- Support of the underlying Infrastructure is provided free of charge. Pricing for specific application support it charged at £100.00 per hour or part thereof.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Handover documentation is presented to the user on completion of an order. In addition, remote training is provided within our customer onboarding to provide training on our cloud web interface
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Virtual Machine files are encrypted and provided to the customer via a secure Internet download or via a USB drive. We also provide written documentation confirming deletion of data from our storage systems.
- End-of-contract process
- Customers are required to provide 3 months' notice if they do not wish to continue their contract. Engineering charges are applied at £100.00 per hour for any data migration help required.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Users can build, modify and delete Virtual Machines within our Virtual Private Cloud web interface.
- Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- Our web interface is available over a normal browsers using the HTTPS protocol.
- Web interface accessibility testing
- None
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- No
- Independence of resources
- All Virtual Infrastructure is dedicated to the user, no infrastructure sharing is applied.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Entire Virtual Machines
- SQL Databases
- Exchange Servers
- Individual Files
- Backup controls
- Standard back up is of the customers entire Virtual Machine on a 7 day basis. Additional back-ups can be performed to store data for longer periods.
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Users contact the support team to schedule backups
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- We provide 100% SLA against service outage. Service Credits are applied to the customer bill. A copy of our full SLA is available and provided during the onboarding process.
- Approach to resilience
- Available upon request
- Outage reporting
- Our network and customer services are monitored via our network monitoring system with email alerts sent.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- We restrict access to users by way of username and password and 2 factor authorisations. In addition, roles are created to confirm what access each user has.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
- Devices users manage the service through
-
- Dedicated device over multiple services or networks
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- British Assesment
- ISO/IEC 27001 accreditation date
- 06/05/2022
- What the ISO/IEC 27001 doesn’t cover
- Not applicable.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
It is the policy of Stream Networks Limited to maintain a quality system designed to meet the requirements of ISO9001:2015 & ISO27001:2017 (or any other standard in line with the Annex SL Structure) in pursuit of its primary objectives, the purpose and context of the organisation.
• The company has a designated Senior Management Representative who is responsible for the maintenance and review of the Quality Management Systems
• The ongoing activities of Stream Networks are reviewed regularly and that any required corrective action is adequately implemented and reviewed to establish an effective preventative process
• Measurement of our performance against our declared Quality and Information Security Objectives is undertaken
• Resources needed for the BMS are available and employees have the necessary training, skills and equipment to effectively carry out their work
• Internal audits are conducted regularly to review progress and assist in the improvement of processes and procedures
• Objectives are reviewed and, if necessary amended, at regular Management review meetings and the performance communicated to all staff
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Initial configuration of systems is defined in a Scope of Works. Customer sign off is required on initial configuration completion.
Change requests are handled using our defined change request form. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Our core infrastructure is monitored for security breaches using SKOUT Log Monitoring and SIEM analysis.
All infrastructure is patched monthly or as per the underlying vendors advice.
Potential threat information is provided by our SKOUT platform and our Vendor support - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We identify potential compromises using our SKOUT cyber security platform. Security compromises are sent to the Stream network operations centre and are dealt with on receipt.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Every incident is tracked using our network status page available on our website.
Incidents are typically created by a support engineer in response to a network monitoring event. In addition, customers can raise an incident via email or our Cascade customer service portal.
As incidents are progressed updates are provided via our website. On closure of an incident a report is produced providing a summary of the issues, how it was fixed and how we mitigate against the issue repeating.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- VMware
- How shared infrastructure is kept separate
- All customers are segemented via individual Virtual Firewalls, private VLAN's and encrypted data.
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
Stream Networks is committed to ensuring that existing members of staff and job applicants are treated fairly, in an environment which is free from any form of discrimination with regard to the following protected characteristics as outlined by the Equality Act of 2010:
• Age
• Disability
• Gender reassignment
• Marriage and civil partnership
• Pregnancy and Maternity
• Race (including colour, nationality, and ethnic origins)
• Religion or belief
• Sex
• Sexual orientation
In addition, existing members of staff and job applicants are treated fairly in an environment which is free from any form of discrimination with regard to caring responsibilities, part-time employment, membership or non-membership of a trade union or spent convictions.
• All employment-related policies, practices and procedures are applied impartially
• Equality of opportunity
• That the company works towards achieving a diverse workforce at all levels
• That employees can work in an atmosphere of dignity and respect
The Equality and Diversity Policy provides a clear framework for translating our policy into action. It outlines the responsibilities of the Directors, managers and individuals to comply with the Equality Act of 2010 and to be strongly committed to its full and active implementation.
Stream Networks will not tolerate processes, attitudes and behaviour that amounts to direct discrimination, associative discrimination, discrimination by perception, indirect discrimination including harassment (harassment by a third party), victimisation and bullying through prejudice, ignorance, thoughtlessness, and stereotyping.
Practical support for a diverse workforce
As an employer committed to diversity and equality Stream Networks recognises that its success depends on creating a working environment which supports the diverse make-up of its staff, with supporting policies and procedures to create a framework of assistance.
The company takes account of equality considerations which affect its staff and try to minimise or remove disadvantage.
Pricing
- Price
- £40 a virtual machine
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- 30 Day free trial of Virtual Machine Hosting