Skip to main content

Help us improve the Digital Marketplace - send your feedback

Bytes Software Services

Druva Data Resiliency Cloud

Backup, archival, and compliance for Endpoint devices and cloud workloads. Simplify data protection, ensure regulatory compliance, eDiscovery and improve data visibility for your critical online data. bssgc

Features

  • Cloud-to-cloud backup and recovery.
  • Legal hold, eDiscovery, and forensics investigations.
  • Granular and role-based access control.
  • Unlimited data retention and restore.
  • Multi-geo support with AWS storage regions.
  • Air-gap your environment from threats with immutable backups
  • Eliminate hardware, infrastructure, and storage

Benefits

  • Zero-trust security architecture
  • Immutable, air-gapped backups
  • Global source-side, inline deduplication
  • Incremental forever backup model
  • Unlimited restores (no cloud egress charges)
  • Cloud-based centralized management
  • Role based access control (RBAC)
  • Multi-Factor authentication (MFA)
  • Unusual data activity and user access insights
  • Federated Search across all users and all devices

Pricing

£3.40 a user a month

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@bytes.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

2 1 0 9 5 5 2 6 2 6 5 6 1 7 3

Contact

Bytes Software Services Chris Swani
Telephone: +44 (0) 7951 326815
Email: tenders@bytes.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
The Service is cloud based and constraints are likely to be end user specific. The only key restraint is this service only holds backup data in AWS clouds
System requirements
  • AWS
  • This service just requires normal levels of access

User support

Email or online ticketing support
Email or online ticketing
Support response times
Business critical offered as standard with priority of response set by customer. Critical having 1 hour initial, high 2 hours, medium 4 hours and low 8 hours. We offer premium support (at a cost) with critical being 30 mins, high 1 hour, medium 2 hours, and low 4 hours
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
Unknown
Onsite support
No
Support levels
Business critical offered as standard with priority of response set by customer. Critical having 1 hour initial, high 2 hours, medium 4 hours and low 8 hours. We offer premium support (at a cost) with critical being 30 mins, high 1 hour, medium 2 hours, and low 4 hours
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Druva operates a knowledge base portal for help and configuration documentation as well as free online learning videos to assist with service training
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
Users can extract data manually from within the system at any time. An bulk export service is available at an additonal cost. Upon termination of the contract, data is transferred back to the client over a secure channel (TLS 1.2) or other storage medium of their choice.
End-of-contract process
Customer will have 30 days to retrieve their data after termination of services. If you wish to retrieve data more than 30 days after termination, customer will be charged the current price for every additional storage day. Data will be returned either via direct transfer, where we will export Customer Data into Customer’s AWS account under the selected S3 bucket; or a portable physical media provided by Customer (i.e. SATA, USB connected media or AWS Snowball).

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
N/a
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
There is a GUI Portal that allows users to access all aspects of the backup service
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
Unknown
API
Yes
What users can and can't do using the API
We have both Events and Actionalble APIs

Please see following link to see documentation outlining all requirements:
https://developer.druva.com/reference
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
No
Customisation available
No

Scaling

Independence of resources
The service is cloud provisioned and right sized for each individual organisations workload demands. The right sizing of the cloud environment ensure performance demands are comfortably meet. The service is scalable using Amazon AWS Compute and Storage for all Servers, allowing it to use further resources as and when necessary. No further customer investment in additional technologies is necessary to ensure scalability of the service- this is included in the service per user cost

Analytics

Service usage metrics
Yes
Metrics types
Service availability,
deduplication rates,
successful backups,
successful restores,
Active users,
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Druva Data Resiliency Cloud

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users can extract data manually from within the system at any time. An bulk export service is available at an additonal cost
Data export formats
Other
Other data export formats
Exported back in the original format
Data import formats
Other
Other data import formats
N/A

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
We provide an SLA of 99.5% uptime and 99.99999% Customer Data durability
Approach to resilience
AWS Multi-way redundancy: The cloud instance for the customer is alwalys replicated between 3 physically different data centres as part of the Amazon AWS availability zone feature. In the case of access being not availabile from 1 datacentre, the customers instance will be instantly available from 1 of the 2 further datacentres.
Outage reporting
Outages of the system availability or the storage component are communicated to all assigned administrators within a cloud instance via email as well as via the Support Portal. An online dashboard also reports instance of global outages

Identity and authentication

User authentication needed
Yes
User authentication
Other
Other user authentication
Druva supports the use of cloud-based SSO solutions such as Okta, Ping Identity, and Microsoft ADFS for both administrators and end users. Organizations can also leverage more traditional directory service implementations, such as Microsoft Active Directory or LDAP, for user authentication.
Access restrictions in management interfaces and support channels
Users and management are seperated and controlled with separate authentication portals. RBAC is also used to determine a users level of system access
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password
  • Other
Description of management access authentication
Via SSO and MFA

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Schellman LLP
ISO/IEC 27001 accreditation date
28/09/2023
What the ISO/IEC 27001 doesn’t cover
N/a
ISO 28000:2007 certification
No
CSA STAR certification
Yes
CSA STAR accreditation date
17/02/2023
CSA STAR certification level
Level 1: CSA STAR Self-Assessment
What the CSA STAR doesn’t cover
N/a
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
ISAE 3000 Type II audit performed yearly by KPMG

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Druva's security program is based on NIST 800-53, documented policies can be found at security.druva.com

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Druva has documented policies and procedures regarding change management, patch management, and deployment of changes in the Configuration Management Policy. Both change and patch management follow the same process. The procedures regarding patch management exist to verify that relevant, up-to-date patches and security updates are installed. Changes to the application and database are requested using a Change Request (CR) in a ticketing system. Changes are approved as per the authorization matrix defined in Cloud Operations Guide. The change implementer is granted access to the production server for deploying the changes based on approval from the Cloud Operations Head.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Vulnerability Management for the Druva Cloud Service is done as follows: Critical Vulnerabilities are patched in 14 days or less. High Vulnerabilities are patched in 30 days or less. Medium Vulnerabilities are patched in 90 days or less. Low Vulnerabilities are patched in 180 days or less.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Druva has logging systems and log reviews to detect security issues such as loss, misuse, or unauthorized access to Customer Data. This includes developing a baseline of expected activity within the Cloud Services; logging to detect activity exceeding baseline thresholds. Logs shall be regularly reviewed by Druva, either manually or using log parsing tools. Logs will be retained for a minimum of six months and protected from unauthorized access, modification, and accidental or deliberate destruction. Customers that wish to retain audit trails beyond this period can do through our events API and ingest the logs into their own SIEM system.
Incident management type
Supplier-defined controls
Incident management approach
Druva has a documented Incident Response Plan that includes steps to respond to security incidents including identification, investigation, response, mitigation, customer notification, and root cause analysis.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

We take our environmental management and the impact we have on the environment very seriously. We have environmental policies in place and hold the ISO14001 accreditation. Our environmental assessments are conducted annually by an external Lead ESOS Assessor; they are signed-off by the board and compliance reported to the regulator (the Environment Agency). Our environmental policy is published on our website at https://www.bytes.co.uk/company/sustainability/environmental.
Bytes achieved carbon net zero in March 2022 through approved carbon offsetting schemes. We are always seeking to reduce our impact on the environment. We aim to minimise waste, reduce pollutants and use renewable materials. Our offices have recycling facilities for cans, plastic and paper. We aim to reduce our office printing to zero within the next few years.
An Environmental Steering Committee has been established to coordinate environmental activities and drive change.
To drastically reduce our emissions, we have switched to renewable energy. Our Head Office has reached our first milestone of using a specialist 100% renewable electricity provider. We are also exploring options to install solar panels on our Headquarters building.
Other environmental initiatives include installing electric vehicle charging points and encouraging staff to commute to work without the car (setting up a car share network and installing secure cycle parking).
We produce a SECR (Streamlined Energy and Carbon Reporting) report that details the companies energy consumption and carbon emissions. This report is produced annually by an independent assessor.
This report provides details of our emissions in Scope 1, 2 and 3 categories. It details the activities previously taken to reduce emissions and also recommendations for further improvements.
For scope 1,2 and 3 emissions we aim to reduce these by 50% by 2025-2026 from our 2021 baseline.
We aim to be Net Zero by 2040, covering our own operational emissions.

Pricing

Price
£3.40 a user a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
30 Day free Trial - Fully functioning

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@bytes.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.