O365 Backups
Microsoft provides powerful services within Office 365 – but comprehensive backup of your data is not one of them.
Wanstor’s Backup for M365 eliminates the risk of losing access and control over your O365 data, including Exchange, OneDrive and Teams – so that your data is always protected and accessible.
Features
- Securely backup Office 365
- Protect your Office 365 data from accidental deletion
- Monthly subscription service
- Quickly restore individual Office 365 email, files and sites
- Meet legal and compliance requirements with efficient eDiscovery
- Backups monitored 24/7 by Wanstor service desk
Benefits
- Setup and operational in minutes
- Wanstor's service desk team can recover data or servers 24x7
- Entire restore process is completed by Wanstor on your behalf
- Integrates with Veeam Availability Suite or Backup and Replication
- Data resides in the UK
- Help's ensure compliance with industry regulations
- Help's to preserve an organisations reputation with customers and partners
- Maintain employee productivity and organisational ability to process transactions
Pricing
£0.07 a gigabyte a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 1 3 0 0 7 8 5 9 9 0 8 6 2 4
Contact
Wanstor Ltd
Wanstor
Telephone: 02075927860
Email: sales@wanstor.com
Service scope
- Service constraints
- Support is for the cloud connection service, the client is responsible for their on-premise Veeam backups unless otherwise agreed.
- System requirements
-
- Veeam Availability Suite
- Veeam Backup & Replication
- Veeam Backup Essentials
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Priority 1 - 30 minutes
Priority 2 - 2 hrs
Priority 3 - 4 hrs
Priority 4 - 8 hrs - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
-
Wanstor works with a variety of customers. The testing and web chat services we provide includes:
Adjustable time settings
All functionality is available via keyboard
Users can easily see and hear content, and understand what is in the foreground vs background
Users can pause, stop or hide content manually
Page flashes are less than 3 times per second to prevent seizures
Web and chat pages are easily navigable in a logical and intuitive manner
Headings are easily readable
Input modalities - For different types of users we can provide pointer gestures, label in names, motion actuation and a variety of concurrent input mechanisms
All chat and web pages appear and operate in predictable ways and give clear indication of where information needs to be submitted - Onsite support
- Onsite support
- Support levels
- Customer calls which are raised are usually a priority 3 call relating to operational questions, advice or a change in service. This carries an 8 hour response time and a 85% SLA to resolution within 8 hours. Support is operated by the engineering team, each client has their own account manager. Wanstor do not directly provide support and maintenance of the customers operating systems, applications or onsite backups (unless agreed separately).
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Wanstor provide a fully managed setup and on-boarding process. The solution setup and data migration is completed by Wanstor with the customer updated throughout the project.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
- All data is controlled from the existing Veeam console and can be restored back on premise if required.
- End-of-contract process
- To renew the service no changes will need to be made. To cancel the service, all data will be removed and the repository will be deleted.
Using the service
- Web browser interface
- No
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
-
- Automatic
- Manual
- Independence of resources
- Wanstor monitors 24x7 data storage usage and ensures there is always sufficient storage within our platform. Internet bandwidth is also monitored in real-time to make sure sufficient capacity is available and can be used.
- Usage notifications
- Yes
- Usage reporting
-
- Other
- Other usage reporting
- Reporting analytics through Service Now delivered via Power BI, and reviewed at monthly service reviews
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Veeam
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Full Virtual Machines
- Files
- Databases
- Applications
- Operating Systems (OS)
- Backup controls
- Backups are completely custom made and can be requested on a daily, monthly, quarterly or annual basis with user-definable retention periods. This is all controlled in the same manner local backups would be from the Veeam console.
- Datacentre setup
-
- Multiple datacentres with disaster recovery
- Multiple datacentres
- Single datacentre with multiple copies
- Single datacentre
- Scheduling backups
- Users schedule backups through a web interface
- Backup recovery
- Users can recover backups themselves, for example through a web interface
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- 100% uptime with a 200% service credit for the outage time affected.
- Approach to resilience
- Operating within Tier 3, data centres with multiple power supplies, generators and cooling units for resilience. Our Veeam configuration is maintained under strict change control and protected by internal processes and procedures. Our network connectivity is provided separately from two Points of Presence in two diverse Tier3 data centres, away from the server environment, where our core internet routers reside, these connect us to our four main internet providers in a BGP configuration. Networking connectivity is one of the most common causes of data centre outages and we have the ability to survive multiple failure scenarios in our design.
- Outage reporting
- In the event of an outage, email and text alerts are sent to keep you informed of the progress in resolving any issues.
Identity and authentication
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Username or password
- Other
- Other user authentication
- Cloud connect is accessed directly from the on-premise Veeam console, any authentication on-premise need to be entered to access the cloud repository. In addition to this, the connection to the repository requires a username/password and 2 factor RSA.
- Access restrictions in management interfaces and support channels
- In line with ISO2700 Information Security accreditation, user accounts are set up with specific access using a role-based access system that ensures granularity of the available services within the environment.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Dedicated device over multiple services or networks
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 31/01/2016
- What the ISO/IEC 27001 doesn’t cover
- We cover everything under this qualification.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
- IASME governance
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- In line with 27001 Information Security requirements.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- A change control process in-line with our ISO27001 procedures.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
The Wanstor Security Steering Group uphold the Risk Management Policy which is aligned to ISO27001 data risk management best practices.
We assess threats to services on a real time basis by using a range of network and security monitoring tools from vendors such as Trend Micro and PRTG. We work with ManageEngine and use their desktop central product. This automatically deploys patches across all major operating systems as soon as they are released. We gather information about threats from a variety of sources including vendors e.g. Symantec, Checkpoint, Cisco, Microsoft etc, and the centre for internet security. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- In line with our Audit and Monitoring Policies - The Wanstor Security Manager must be informed immediately of any unusual traffic flows or network device activity that arises from regular network monitoring or alerts. Quantitative or qualitative information on network activity may indicate either device failure or network attacks. The Security Manager needs to be made aware of this activity to investigate the possibility of a network attack that requires remedial action or escalation.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Wanstor follows an ITIL based approach to incident management. We have a range of pre-defined processes and escalation paths depending on the nature of the incident being reported by the user. Users can report IT incidents through Phone, Email, Chat and via a Website.
We can provide incident reports to users in the form of an email which details their IT incident, action taken to resolve and how long the end outcome will be. Additionally IT teams can access a variety of incident reports showing, volume, type, timings, actions taken and resolution rates in line with agreed SLA's.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- VMware
- How shared infrastructure is kept separate
- In line with ISO2700 Information Security, accreditation, user accounts are set up with specific access using a role-based access system that ensures granularity of the available services within the environment. This means only registered and approved users can access their own data at any one time. We also use VMWare and VLAN's to completely segregate customers networks.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
-
Group Involvement - We have established an approval board containing
representatives from all disciplines across the business.
Consider the environmental impact of installed devices - We carry out audits of existing equipment to maximise any unused existing capability by ensuring that all areas of optimisation, consolidation and aggregation are identified prior to new material investment.
Environmental Management - We have introduced a plan for Environmental Management based on the policies outlined in ISO 14001.
Energy Management - We have introduced a set of guidelines and processes for managing energy in the data centre based on ISO 50001.
Asset Management - We have adopted many of guidelines in ISO 55000. We have full knowledge of the numbers, types and purposes of the assets deployed in our data centre and how they impact energy management.
Sustainable energy - We record and reporting on the proportion
of sustainable / renewable energy used against the overall energy consumption. The metric we use in the "Renewable Energy Factor”
(in kWh) compared to overall consumption (in kWh).
Monitor and manage air quality - We ensure air quality is monitored and managed. We base filter choices on the guidance set out in ISO 16890-1.
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
Fighting climate change
Improve workplace conditions that support remote working, and sustainable travel solutionsCovid-19 recovery
Improve workplace conditions that support remote working, and sustainable travel solutions
Pricing
- Price
- £0.07 a gigabyte a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- A 30 day, free trial for Veeam with 200GB available storage on request.