Skip to main content

Help us improve the Digital Marketplace - send your feedback

Stream Networks Ltd

Virtual Private Cloud Hosting

Virtual Private Cloud Hosting within ultra secure nuclear proof datacentres. Securely host your business essentials – file storage, content management systems, and unified communications – in our virtual private cloud. Enjoy dedicated resources, network services, and robust backup & recovery for complete control and peace of mind.

Features

  • 100% Uptime Service Level Agreement
  • DDoS protected Internet Transit
  • SSD Storage
  • Remote Back-ups
  • Automated Disaster Recovery
  • Proactive System Monitoring

Benefits

  • Built in High Availability for 100% Uptime
  • Automated Disaster Recovery to Back-up Datacentres
  • Ultra Fast Storage Arrays for data intensive applications and databases
  • 24x7x365 System and Platform Monitoring
  • DDoS protected Internet Transit for security

Pricing

£40 a virtual machine

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at matts@stream-networks.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

1 7 2 2 5 6 4 1 5 9 5 9 1 9 6

Contact

Stream Networks Ltd Matt Shanahan
Telephone: 01635884170
Email: matts@stream-networks.co.uk

Service scope

Service constraints
No Service Constraints listed
System requirements
Windows Operating Systems must be licenced using our MicrosoftSPLA

User support

Email or online ticketing support
Email or online ticketing
Support response times
Ticketing and support is available 24x7x365
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Web chat is available on our website through the TAWK chat bot
Web chat accessibility testing
None
Onsite support
Onsite support
Support levels
Support of the underlying Infrastructure is provided free of charge. Pricing for specific application support it charged at £100.00 per hour or part thereof.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Handover documentation is presented to the user on completion of an order. In addition, remote training is provided within our customer onboarding to provide training on our cloud web interface
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
Virtual Machine files are encrypted and provided to the customer via a secure Internet download or via a USB drive. We also provide written documentation confirming deletion of data from our storage systems.
End-of-contract process
Customers are required to provide 3 months' notice if they do not wish to continue their contract. Engineering charges are applied at £100.00 per hour for any data migration help required.

Using the service

Web browser interface
Yes
Using the web interface
Users can build, modify and delete Virtual Machines within our Virtual Private Cloud web interface.
Web interface accessibility standard
None or don’t know
How the web interface is accessible
Our web interface is available over a normal browsers using the HTTPS protocol.
Web interface accessibility testing
None
API
No
Command line interface
No

Scaling

Scaling available
No
Independence of resources
All Virtual Infrastructure is dedicated to the user, no infrastructure sharing is applied.
Usage notifications
Yes
Usage reporting
Email

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
Reporting types
Real-time dashboards

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
Physical access control, complying with CSA CCM v3.0
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • Entire Virtual Machines
  • SQL Databases
  • Exchange Servers
  • Individual Files
Backup controls
Standard back up is of the customers entire Virtual Machine on a 7 day basis. Additional back-ups can be performed to store data for longer periods.
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Users contact the support team to schedule backups
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
We provide 100% SLA against service outage. Service Credits are applied to the customer bill. A copy of our full SLA is available and provided during the onboarding process.
Approach to resilience
Available upon request
Outage reporting
Our network and customer services are monitored via our network monitoring system with email alerts sent.

Identity and authentication

User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
We restrict access to users by way of username and password and 2 factor authorisations. In addition, roles are created to confirm what access each user has.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password
Devices users manage the service through
  • Dedicated device over multiple services or networks
  • Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
British Assesment
ISO/IEC 27001 accreditation date
06/05/2022
What the ISO/IEC 27001 doesn’t cover
Not applicable.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
It is the policy of Stream Networks Limited to maintain a quality system designed to meet the requirements of ISO9001:2015 & ISO27001:2017 (or any other standard in line with the Annex SL Structure) in pursuit of its primary objectives, the purpose and context of the organisation.

• The company has a designated Senior Management Representative who is responsible for the maintenance and review of the Quality Management Systems
• The ongoing activities of Stream Networks are reviewed regularly and that any required corrective action is adequately implemented and reviewed to establish an effective preventative process
• Measurement of our performance against our declared Quality and Information Security Objectives is undertaken
• Resources needed for the BMS are available and employees have the necessary training, skills and equipment to effectively carry out their work
• Internal audits are conducted regularly to review progress and assist in the improvement of processes and procedures
• Objectives are reviewed and, if necessary amended, at regular Management review meetings and the performance communicated to all staff

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Initial configuration of systems is defined in a Scope of Works. Customer sign off is required on initial configuration completion.

Change requests are handled using our defined change request form.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Our core infrastructure is monitored for security breaches using SKOUT Log Monitoring and SIEM analysis.

All infrastructure is patched monthly or as per the underlying vendors advice.

Potential threat information is provided by our SKOUT platform and our Vendor support
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We identify potential compromises using our SKOUT cyber security platform. Security compromises are sent to the Stream network operations centre and are dealt with on receipt.
Incident management type
Supplier-defined controls
Incident management approach
Every incident is tracked using our network status page available on our website.

Incidents are typically created by a support engineer in response to a network monitoring event. In addition, customers can raise an incident via email or our Cascade customer service portal.

As incidents are progressed updates are provided via our website. On closure of an incident a report is produced providing a summary of the issues, how it was fixed and how we mitigate against the issue repeating.

Secure development

Approach to secure software development best practice
Supplier-defined process

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Supplier
Virtualisation technologies used
VMware
How shared infrastructure is kept separate
All customers are segemented via individual Virtual Firewalls, private VLAN's and encrypted data.

Energy efficiency

Energy-efficient datacentres
No

Social Value

Social Value

Social Value

Equal opportunity

Equal opportunity

Stream Networks is committed to ensuring that existing members of staff and job applicants are treated fairly, in an environment which is free from any form of discrimination with regard to the following protected characteristics as outlined by the Equality Act of 2010:
• Age
• Disability
• Gender reassignment
• Marriage and civil partnership
• Pregnancy and Maternity
• Race (including colour, nationality, and ethnic origins)
• Religion or belief
• Sex
• Sexual orientation

In addition, existing members of staff and job applicants are treated fairly in an environment which is free from any form of discrimination with regard to caring responsibilities, part-time employment, membership or non-membership of a trade union or spent convictions.
• All employment-related policies, practices and procedures are applied impartially
• Equality of opportunity
• That the company works towards achieving a diverse workforce at all levels
• That employees can work in an atmosphere of dignity and respect

The Equality and Diversity Policy provides a clear framework for translating our policy into action. It outlines the responsibilities of the Directors, managers and individuals to comply with the Equality Act of 2010 and to be strongly committed to its full and active implementation.

Stream Networks will not tolerate processes, attitudes and behaviour that amounts to direct discrimination, associative discrimination, discrimination by perception, indirect discrimination including harassment (harassment by a third party), victimisation and bullying through prejudice, ignorance, thoughtlessness, and stereotyping.

Practical support for a diverse workforce
As an employer committed to diversity and equality Stream Networks recognises that its success depends on creating a working environment which supports the diverse make-up of its staff, with supporting policies and procedures to create a framework of assistance.

The company takes account of equality considerations which affect its staff and try to minimise or remove disadvantage.

Pricing

Price
£40 a virtual machine
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
30 Day free trial of Virtual Machine Hosting

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at matts@stream-networks.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.