UST CloudDesk
UST CloudDesk is a secure and end-to-end managed Virtual desktop that can be hosted in both public (Azure and AWS) and private cloud.
Features
- Single plane to access Virtual Desktop
- Built-in Zero trust-based access
- Built-in Multi-factor Authentication
- Device Entry Control features restrict users to specific devices
- Block users to do Data copy Printing screen Screen recording
- Block users Share their PC over desktop sharing tools
- Block or control Internet while working on VDI
- Access to physical PCs
- Session Recording
Benefits
- Access available to Virtual apps and Desktops as a service
- Single Client to access both cloudDesk & remote access
- Access office PC securely using the same client
- Allow client-server and web app access
- Built in Multi-factor authentication
- Built in Device ID control
- Zero Trust Security - IP Camouflaging & Network Blinding
- Device control plane allows Endpoint control
- Contextual security engine
- Enable user control Data Copy Restrictions on Endpoints
Pricing
£28.00 a user
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at ukpublicsectorsales@ust.com.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 13
Service ID
1 9 1 2 2 0 5 3 6 7 5 6 2 2 3
Contact
UST Global Pvt Ltd
Patrick Marren
Telephone: 07544102103
Email: ukpublicsectorsales@ust.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- N/A
- System requirements
-
- CloudDesk licences are included based on the feature set selected
- All application software licensing to be included by the customer
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Customers are able to raise requests to service through email, phone or a web portal 24x7x365 days a year with defined service SLAs to respond to those requests based on incident/issue severity.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Webchat accesible via standard webbrower
- Web chat accessibility testing
- N/A
- Onsite support
- Yes, at extra cost
- Support levels
- We have L1, L2 and L3 support levels and are finalized per the client requirements. Cost and resources are subject to discussions and are determined as per the client needs.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- The UST CloudDesk service includes a comprehensive on-boarding phase to setup and customise the platform to the specific requirements of each individual customer's requirements which includes virtual instructor-led training provided prior to go-live with ongoing access to documentation for help and FAQs. On site training can be arranged depending on the type of engagement.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- UST will export any customer specific data in an agreed format
- End-of-contract process
- We will assist with export of data as required at end of the contract.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- There is no difference in functionality, usability experience will be influenced by the size of the screen of the mobile device.
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- Service will be deployed in the customer's tenant
Analytics
- Service usage metrics
- Yes
- Metrics types
- Cpu, disk, memory, network, number of active instances
- Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Accops
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- We will assist with export of data as required at end of the contract.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- The level of availability depends on the availability mechanisms chosen by the customer for the infrastructure services (public and private)
- Approach to resilience
- Resiliency is achieved by using default public cloud availability options. In case of private cloud the data centre setup is based on the customer environment.
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
- Access restrictions in management interfaces and support channels
- We grant user access to the the platform using fine-grained permissions built on role-based access controls (RBAC). Customers can create multiple roles and assign roles to users based on their responsibilities. RBAC lets you control the way your users access, view and manage data.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Information can be provided upon request
- ISO/IEC 27001 accreditation date
- Information can be provided upon request
- What the ISO/IEC 27001 doesn’t cover
- Information can be provided upon request
- ISO 28000:2007 certification
- Yes
- Who accredited the ISO 28000:2007
- Information can be provided upon request
- ISO 28000:2007 accreditation date
- Information can be provided upon request
- What the ISO 28000:2007 doesn’t cover
- Information can be provided upon request
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- UST follow a defined escalation and reporting approach. Full details can be supplied upon request.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Undisclosed. Information can be provided to individual customers under an NDA.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Undisclosed. Information can be provided to individual customers under an NDA.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Undisclosed. Information can be provided to individual customers under an NDA.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Our incident management approach is based on the ITIL v3/v4 framework.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Tackling economic inequality
-
Tackling economic inequality
UST typically aim to fill at least 10-15% of roles with people from a disadvantaged background, providing employment and training opportunities to disadvantaged people from economically underprivileged areas who may face barriers to digital jobs, such as not having a university degree. UST work with partners who provide employment opportunities, along with training, and personal development for their staff. We will hire disadvantaged staff who would typically be unable to find opportunities in the technology industry, provide them with all necessary training and experience, and then bring them onto projects where they will bring value and success both to the project and their own careers. Where possible, UST will hire from areas that have over 20% of the community on out-of-work benefits. Our head of Social Value will assist in assessing suitable areas and provide feedback to recruitment teams. UST will be visible in these deprived areas through local community workshops and advertise the roles to these communities. Additionally, UST will work with Job Centre Plus to help find suitable candidates who would benefit from training and work opportunities. - Equal opportunity
-
Equal opportunity
UST implement processes to eliminate bias in our hiring and promotion practices, working to support people who fall under the nine ‘protected characteristics’ detailed in the Equality Act 2010. Our recruitment process is designed to eliminate bias. We use software that removes all personally identifying information from CVs, such as gender, race, and age, before they are reviewed to ensure these characteristics don’t factor into hiring. We have a multi-phase interview process, with a team of five people selected randomly for each interview to provide a wide range of perspectives on each candidate. Salaries adhere to a defined pay structure and are based entirely on role and skills. Our recruitment team is trained in strategies to ensure the recruitment process does not demotivate or bias against any group. This includes the Unconscious Bias course provided by LinkedIn, which details the impact of bias, how it arises, and how to combat it. We provide training to staff at all levels, and renew this training on an ongoing basis, to create an inclusive environment where staff are empowered to identify and tackle bias.
Pricing
- Price
- £28.00 a user
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Please contact UST to discuss the size and scoping of a free trial
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at ukpublicsectorsales@ust.com.
Tell them what format you need. It will help if you say what assistive technology you use.