Hosting and Managed Service
PDMS provide a complete and high availability (uptime exceeding 99.9%) end-to-end Hosting and Managed Services provision and have the track record, expertise, infrastructure, systems, accreditations and partnerships to provide the systems we develop on a fully managed-service or software-as-a-service basis. Includes security, business continuity, disaster recovery, backup and patching services.
Features
- Virtualisation providing high levels of resilience
- Certified and accredited secure infrastructure and facilities
- 24/7/365 monitoring
- Geographically separated hosting facilities
- Multiple tiers of security between the application and internet
- Cyber Essentials Certified
Benefits
- High levels of availability
- High levels of security
- Full redundancy in critical systems infrastructure
- Fully managed services
- Rapid deployment
Pricing
£1,000 a unit a month
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 9 1 8 2 0 8 9 7 5 8 8 6 7 1
Contact
PDMS Limited (Professional Data Management Services Limited)
Catriona Watt
Telephone: +44 (0) 1624 664000
Email: saasenquiries@pdms.com
Service scope
- Service constraints
- PDMS provided software
- System requirements
- PDMS Software
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- A response to a support request can typically be expected to be received within four working hours of the support call being raised, however PDMS will work to agree SLAs with the buyer and can provide higher levels of service where required.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- As standard, PDMS provide support 09.00 - 17.00 Monday to Friday excluding UK bank holidays. The support level depends on the type and scope of the solution being supported, and the support hours required. Please see they SFIA rate card for our standard rates. Technical account management/support engineers are available where required.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- See service definition document.
- Service documentation
- No
- End-of-contract data extraction
- See service definition document.
- End-of-contract process
- See service definition document.
Using the service
- Web browser interface
- No
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- No
- Independence of resources
- Client level resource segregation.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Other
- Other data at rest protection approach
-
Secure Tier 3 Data centres
Secure containers, racks or cages
Physical access control
Encryption of Physical media
Safe destruction of physical media - Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Virtual Machines
- Databases
- Files
- Logs
- Customer Specific, requested by agreement
- Backup controls
-
Nightly backups of the data within the Application database will be taken to a local disk on the database server for the purposes of allowing a quick recovery from unexpected issues such as database corruption, or to enable a roll back of recently applied changes or updates etc.
Nightly backups of the data will be taken to a remote disk. This enables quick recovery from database server failure.
Nightly snapshots of the virtual machines will be taken to a remote disk, to enable for quick recovery of the web/application tier if the operating system fails. - Datacentre setup
- Multiple datacentres
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- See Service Definition document.
- Approach to resilience
-
No single points of failure within a datacentre and active active set-up across datacentres.
Further information available on request. - Outage reporting
- Email alerts.
Identity and authentication
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Username or password
- Access restrictions in management interfaces and support channels
- Management interfaces are only allowed to internal staff.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
- Dedicated device on a segregated network (providers own provision)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Lloyd's Register Quality Assurance (LRQA)
- ISO/IEC 27001 accreditation date
- Held since 25/03/2003
- What the ISO/IEC 27001 doesn’t cover
- All areas of the business and our services are in scope
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- Cyber Essentials
- Information security policies and processes
- As part of its ISMS, PDMS have the following policies and processes; Information Security Policy, Secure Development Process, Acceptable Use Policy, Change Control Policy, Data Classification and Handling Policy, Data Protection Policy, Business Continuity Policy and an Incident Management Process, all of which are governed, managed and audited through our ISO certifications. All policies are owned and regularly reviewed by the relevant departmental manager. It is the responsibility of each departmental manager to ensure that all of their staff follow the information security policies and processes, however compliance is audited by the Quality and Standards Manager, with any issues identified reported to the relevant manager, for rectification. Operationally, Information Security is jointly managed by the Chief Operating Officer and the Quality and Standards Manager, both of whom report directly to the Chief Executive Officer, who has overall ownership at Executive Level for Security, allowing issues that require immediate escalation to be reported to the Executive Team. Operational Issues that do not require immediate escalation are discussed at the monthly management meetings, where it is a standing issue. All issues discussed during these meetings that require escalation are reported upwards to the Executive Team for it to be discussed, where appropriate.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
We have change management processes in place for both system and software changes. These processes are part of the lifecycle of each system or service. They involve the use of tools and technical controls, as well as policies and procedures for our engineers to follow.
All changes are documented and tracked. This includes peer review and approvals before any changes are implemented in our environments.
We control changes and releases through automated pipelines. This provides repeatable, audited, and secure methods for introduction of environment changes.
Notifications from the change management process ensures that relevant stakeholders are aware of the changes. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Firstly, we promptly apply updates from the providers/manufacturers of devices and operating software that constitute our hosting platform. Updates are typically applied within a 14-days of release, barring any exceptional circumstances hindering successful deployment.
Secondly, we employ vulnerability management tools to scrutinise the installed software/configuration within our environments. The data generated is aggregated and examined by our engineers. If modifications are deemed necessary, they are managed through change management processes.
Lastly, through our software development lifecycle, we use code analysis and vulnerability scanners to detect known vulnerabilities within our developed software. This proactive approach addresses potential issues before impacting systems/services. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
We operate systems that gather/process telemetry from a range of aspects related to our hosting/service offerings, extending the scope of vulnerability management system monitoring.
Telemetry provides valuable insight to our operations teams, who maintain security/stability of hosted systems. Identified issues/operational enhancements are prioritised/delegated/resolved appropriately.
Security findings are overseen by qualified engineers, allowing for a customised response/remediation process.
Where telemetry indicates potential compromise, it’s escalated through incident management procedures.
The tools/methods we use continually evolves. As new insights/remediations are discovered, they contribute to ongoing improvement of operational procedures and overall environment. This iterative process ensures systems remain secure, efficient and up-to-date. - Incident management type
- Supplier-defined controls
- Incident management approach
-
PDMS allow all staff the ability to report security incidents through a number of methods, including email, telephone, and system based forms. Ultimately all reported incidents are managed by the Chief Operating Officer, who follows the Incident Management Process, which identifies how the incident should be managed, including when to provide updates to any customers that may be affected. Customer Incident Reports are normally provided in a written document.
All incidents are reviewed following their satisfactory conclusion, to determine what lessons can be learned, and to improve the process or prevent future occurrences.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- VMware
- How shared infrastructure is kept separate
- Different virtual machines and virtual networks per client.
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
PDMS is committed to reducing our impact on the environment and has held the ISO I4001 environmental certification for over 10 years. PDMS holds the Bronze Level Social Value Quality Mark accreditation which recognises distinction in values-led business that benefits customers, communities, and the planet. It is one of the most rigorously tested standards of its kind in the UK. As part of our certification, we have pledged to develop a comprehensive roadmap to achieve Net Zero by 2023 and offset our carbon emissions. We have a fully documented Carbon Reduction Plan which is published on our website.
PDMS uses an online portal to report and calculate our carbon footprint, which is then forwarded to an external provider for offsetting through carbon credits. In addition, we have recently helped to fund a local carbon credit project by purchasing land that will support a tree-planting initiative with the dual purpose of carbon sequestration and biodiversity enhancement.
We installed solar panels at our Global House head office which now produce 50-60% of our annual energy consumption based on a daytime energy consumption.
Our employees have embraced Treekly, a platform that plants trees for every day they achieve over 5,000 steps, effectively "turning footsteps into forests." This initiative not only promotes reforestation but also enhances both mental and physical wellbeing among our staff.
Chris Gledhill, our founder, is the sector lead for the local Chamber of Commerce Climate Change Programme which enables us to share best practice across the business community. We cover environmental issues as part of our Lunch Time Learning sessions empowering our team to make environmentally conscious decisions both at work and at home.
We also ensure that environmental protection and improvement is a key consideration of any partners or suppliers we work with.Covid-19 recovery
COVID-19 took a toll on the physical and mental health of many people and within our organisation, we have expanded our comprehensive support programme for our staff and their family wellbeing, helping to reduce the burden on local healthcare services. This includes providing paid time off to attend any health-related appointments, access to bereavement support and counselling, externally trained mental health first aiders and private health care. In addition, we have provided all our staff with access to the HeadSpace meditation app to help support mental health app.
We have improved workplace conditions that support the COVID-19 recovery effort by introducing a flexible policy allowing employees to decide whether they want to work from home or in our offices.
We work with our local authority clients who have our employment and skills portal, SignedUp Skills, supporting their work to create employment, re-training and other return to work opportunities for those left unemployed by COVID-19, and new opportunities in their chosen high growth sectors.
During Covid we supported recovery by supporting our clients with various initiatives including rapidly developing a Covid-19 website for the Isle of Man Government.Tackling economic inequality
When working with our clients in central and local government we assess where we can add social and economic value to the local communities both in where our clients work and where we work. We will collaborate with you to ensure that our social value commitments agreed as part of a contract are well aligned with your organisation’s specific social value priorities.
PDMS holds the Bronze Level Social Value Quality Mark accreditation. The Social Value Quality Mark recognises distinction in values-led business that benefits customers, communities and the planet. It is one of the most rigorously tested standards of its kind in the UK. We have pledged to:
Provide opportunities for young people to gain valuable work experience which supports their future employment and to create sustainable employment opportunities in PDMS.
Actively support skills development and knowledge sharing and to promote awareness and understanding of career opportunities in the technology sector to help address the digital skills gap.
Be a force for good in our local communities by investing our time, expertise and money to positively impact people and our environment.
Some of the varied activities we undertake that contribute to our pledges above, in relation to economic inequality, include donating our time to digital sector career talks, career mentoring, mock interview sessions and work buddies. We regularly host work experience students in different parts of our business from development and UX through to infrastructure and marketing. We have a structured apprenticeship programme and one in six of our technical staff originally started with use as an apprenticeship.
Our team are allocated time for mentoring young people schemes including MCR Pathways and the Digital Critical Friends Programme. PDMS is also a key supporter of Junior Achievement; a global organisation that helps provide financial literacy, employability and entrepreneurship education to students.Equal opportunity
We passionately believe in fostering inclusive environments that champion equal opportunity for all, regardless of gender, ethnicity, or background. Our commitment extends across the company ensuring that we have robust hiring practices that emphasis fairness and impartiality. We ensure that all candidates are evaluated solely on their qualifications and also merit based. Our promotion policies are transparent and merit-based too. We actively support career progression for all employees, regardless of their background or working pattern.
Given the gender gap in the technology sector we are involved in initiatives to help address this. We are proud that 34% of our tech roles are performed by females which is above the national average of 26% and we strive for greater representation. Our generous Maternity Pay is 12 weeks full pay and 12 weeks half pay.
We operate a fully hybrid working model, where our staff chose whether to work from home or come into the office and flexible working patterns to suit individual needs.
PDMS has supported the Empowering Women programme through sponsorship and participation. This is a cross-industry initiative, backed by industry and government partners. The programme is unique as it is directed at women who work in digital transformation roles with the aim of building a collaborative and powerful community of emerging women leaders in digital transformation across all industry sectors.
We also support charities that help women and young girls to progress a career in technology such as LoveTech and have STEM ambassadors in our team and focus on promoting awareness of accessibility and diversity in digital design – speaking at third party events and hosting our own webinars to highlight the importance of ensuring that all digital services cater to diverse user needs.
We celebrate diversity, empower women, and work tirelessly to create an environment where everyone thrives.Wellbeing
At PDMS, we promote an open culture around wellbeing and mental health. We conduct regular anonymous staff surveys every six weeks to monitor how staff feel in relation to workload, stress, health and mental health issues. This regular feedback helps form the support we provide to our team. Our Health & Wellbeing score is 8.6 which puts us in the top 25% of technology companies.
We measure our performance, and our results are also benchmarked against other companies in our sector.
We operate inclusive and accessible recruitment practices and have a flexible work policy where our employees decide whether they want to work from home or the office.
We have an internal Wellbeing Team and a dedicated Wellbeing Channel within our corporate intranet along with the following in support of the wellbeing of our staff:
• Externally trained mental health first aiders
• Access to bereavement support and counselling
• Access to private health care including online tools to help support mental health and access to specialist one-to-one counselling covering a range of issues from money worries to a relationship breakdown
• A regular series of talks from external experts on mental and physical health covering topics including nutrition, dealing with stress & anxiety, mindfulness, addiction and posture
• Time off to attend any medical, dentist, opticians, or health related appointments
• Subsidised gym membership to encourage physical activity
• Every member of staff has a minimum of 2 days allocated to undertaking work to support a local charity or not for profit
• Free access for our staff and their family to the HeadSpace app
We also put emphasis on training and continuing professional development supporting paid support for professional qualifications and study leave. We also support a range of different charities that focus on mental health.
Pricing
- Price
- £1,000 a unit a month
- Discount for educational organisations
- Yes
- Free trial available
- No