Skip to main content

Help us improve the Digital Marketplace - send your feedback

OCF LIMITED

OCF - WEKA Platform

WEKA is the provider of the WEKA Data Platform a high-performance, software defined, parallel file system. WEKA provides the highest performance density, scalability and simplicity of any high performance storage.

Features

  • Multiprotocol access via POSIX, SMB, NFS & S3
  • Single namespace expansion to 14 exabytes
  • Online upgrades and expansions
  • No single point of failure
  • Snapshots including clones, writable clones and recovery
  • Support for NVIDIA GPUDirect Storage & Kubernetes CSI Plug-In
  • Virtual file system, organisation and directory level quotas
  • Non-disruptively hardware lifecycle management
  • Ability to add/remove/shrink/grow volumes on the fly
  • Encryption-at-rest and in-fight

Benefits

  • Highest performance per TB
  • Highest single client performance
  • Keeps accelerated compute (HPC & AI) busier with data
  • Reduce data movement, data copies and infrastructure requirements
  • Ensure resiliency, data protection & security
  • Simple management and monitoring
  • Leading uptime with non-disruptive upgrades & expansions
  • Enhanced security with encryption, multi-tenancy
  • Leading data integrity

Pricing

£142 a terabyte a year

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tenders@ocf.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

1 7 5 8 0 8 8 7 8 5 3 3 4 0 5

Contact

OCF LIMITED Megan Stroud
Telephone: 0114 257 2200
Email: Tenders@ocf.co.uk

Service scope

Software add-on or extension
Yes
What software services is the service an extension to
The WEKA Data Platform can be deployed on-prem, hybrid or in AWS, Azure, GCP and Oracle Cloud. WEKA enables full cloud deployments or to leverage the cloud for back-up, disaster recovery and bursting.
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
No constraints
System requirements
  • 2013 Intel® Core™ processor family and later
  • Sufficient memory to support the WEKA system

User support

Email or online ticketing support
Email or online ticketing
Support response times
Critical tickets are responded to within 1 hour.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
WEKA provides Slack channels to all of its customers that is used for chat with our engineers. You can find details on Slack's assisted technology features here: https://slack.com/intl/en-gb/blog/news/slack-updates-accessible-equitable
Web chat accessibility testing
WEKA provides Slack channels to all of its customers that is used for chat with our engineers. You can find details on Slack's assisted technology features here: https://slack.com/intl/en-gb/blog/news/slack-updates-accessible-equitable
Onsite support
Onsite support
Support levels
The WEKA Data platform license includes 24x7 remote support in English with critical ticket response within 1 hour. It is included within the license fee. There are no different support levels. WEKA provide a technical account manager or cloud support engineer.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Online training, user documentation and videos. WEKA web chat, support portal and online Learning Centre to introduce users to WEKA platform and help with continued use.
Service documentation
Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction
Data extraction will be discussed with the customer at the end of the contract and an implementation plan to extract any data from the WEKA platform will be performed if required
End-of-contract process
Prior to the end of the contractual date, a license renewal notice will be provided to the customer which will give them the option to renew this service under a new contract. Pricing for this will be discussed with the customer at the end of the contract.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
Yes
Compatible operating systems
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
WEKA provides three quick and easy ways to manage the WEKA file system, either through a Graphical User Interface (GUI), or a Command Line Interface (CLI), or REpresentational State Transfer API (REST). Reporting, visualization, and overall system management functions are accessible using the REST API, CLI or the intuitive GUI-driven management console.
Accessibility standards
None or don’t know
Description of accessibility
The service interface has not been specifically designed/certified against WCAG standards, however has been designed and implemented with user accessibility requirements in mind.
Accessibility testing
While no active testing has been performed, it's expected that users of assistive technology can interact with the Weka command line and WEKA GUI, provided their technology is capable of interacting with Linux command-line utilities of web pages via a browser.
API
Yes
What users can and can't do using the API
Reporting, visualization, and overall system management functions are accessible using the REpresentational State Transfer API (REST). All WEKA system functions and services can be executed via a web service API, which adheres to the RESTful API architecture. Most WEKA API commands are system-wide and deliver the same results on all cluster nodes. Some commands are executed on specific nodes. The API is presented via a Swagger interface for ease of
use and examples of API code in multiple programming languages. You can find a example of the Swagger interface at https://api.docs.weka.io
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • PDF
API sandbox or test environment
Yes
Customisation available
No

Scaling

Independence of resources
Whether your storage infrastructure uses scale-up or scale-out solutions, you probably want to leverage the best approach to power AI applications and heavy workloads. WEKA has the best ways to accommodate rapid scalability. We’ve implemented new dimensions of scalability that incorporate scale-out and scale-up to cloud systems for high-performance computing storage, ensuring users are not affected by other users' demand.

Analytics

Service usage metrics
Yes
Metrics types
Reporting, visualization, and overall system management functions are accessible using the REpresentational State Transfer API, Command Line Interface (CLI) or the intuitive Graphical User Interface -driven management console.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
WEKA

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users can export data as a csv file from the WEKA Data platform.
Data export formats
  • CSV
  • ODF
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Availability is 24 hours a day, 7 days a week
Approach to resilience
WEKA addresses common IT storage problems by providing a fast, efficient, and resilient distributed parallel file system that is cloud- native and delivers the performance of All-Flash Arrays, the simplicity of file storage, and the scalability of the cloud. Part of WEKA’s ease of use and cloud-like experience includes rapid provisioning to reduce time to get new workloads deployed, along with elasticity scaling, resiliency, performance, and cost-effectiveness.
Outage reporting
WEKA system alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels
Authentication is defined on the Organisational level and is encrypted by an encryption key. Only clients with the proper key are able to access authenticated points. This methodology increases security by drastically limiting access to certain subsets of an organization and limiting access to clients with the proper encryption key.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Standards Institution of Israel
ISO/IEC 27001 accreditation date
10/12/2023
What the ISO/IEC 27001 doesn’t cover
WEKA's Information Security Management System is Applicable For The Following scope of: IT Operations Department Related to
Development, sales, and support of storage software.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
WEKA follows ISO 27001 and has committed itself to certain IT security practices to meet the standards of many of our enterprise customers. WEKA are audited at 6 and 12 month periods to maintain ISO accreditation.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
WEKA configuration and change management conforms to ISO27001
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
WEKA conforms to ISO27001 vulnerability management approach. Strong security features including encryption (at-rest and in-flight), authentication, key management, LDAP
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
WEKA provides a comprehensive set of tools for managing data systems, including monitoring, troubleshooting, and optimisation. The WEKA license includes 24x7 remote support and monitoring. When a failure occurs, regardless of how large the failure domain is defined, the system considers it a single failure. WEKA also utilizes a highly randomized data placement for improved performance and resiliency. Critical incidents are responded to within 1 hour.
Incident management type
Supplier-defined controls
Incident management approach
WEKA implements continuous monitoring of incident management across the business with regular reviews. WEKA follows ISO 27001 best practices and governance for Incident Management processes and response.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

WEKA partnered with ECG Capital Group and established that moving to the WEKA Data Platform from a traditional data storage solution can save up to 260 tonnes of Co2e per PB of storage.

Pricing

Price
£142 a terabyte a year
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tenders@ocf.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.