Skip to main content

Help us improve the Digital Marketplace - send your feedback

QNETIX LTD

Cloud and SaaS Backup - in partnership with Dell Technologies / Druva

The Dell Apex Backup Service (based on Druva) is an "at-scale" Cloud / SaaS platform that unifies backup and data resiliency. Easily manage all your data resiliency and backup needs across clouds, on-premises workloads, cloud-native and SaaS applications, and critical IT endpoints.

Features

  • Azure and AWS workload backups
  • Office365, Entra, Google, Salesforce backups
  • File, Database and Virtual Machines
  • Federated Data Search & System Audit
  • Data Loss Prevention
  • AD Integration & Single Sign On
  • Administrative Dashboard & Reporting
  • Multi Region Availability - including the UK
  • Ransomware and Cyber protection
  • 24x7x365 availability

Benefits

  • Compliance to data legislation (PCI-DSS,GDPR,HIPAA,PII)
  • Cost effective data protection for all data sources
  • Source-side global duplication for more efficient data backup
  • Enterprise grade security protects all data in transit
  • Self-service user data restore portal
  • Immutable Backups
  • Protects from Ransomware
  • Enables FOI searches
  • Provides in cloud backups for Cloud Native Apps

Pricing

£1 a unit a month

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at gcloud@Qnetix.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

2 1 5 9 7 6 9 6 6 9 6 9 7 6 8

Contact

QNETIX LTD Qnetix - Your Trusted Technology Solutions Partner
Telephone: +443333355673
Email: gcloud@Qnetix.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
The Service is cloud based and constraints are likely to be end user specific.
System requirements
  • Normal levels of access to users data for backup
  • Optional local cloud cache

User support

Email or online ticketing support
Email or online ticketing
Support response times
Business critical offered as standard with priority of response set by customer. Critical having 1 hour initial, high 2 hours, medium 4 hours and low 8 hours.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
NA
Web chat accessibility testing
NA
Onsite support
Yes, at extra cost
Support levels
24/7 for P1 and P2 incidents. P3 issues are handled during business hours. Additional support services are available.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We pride ourselves on the fact that our services are easy to consume and simple to use. New customers provide a list of authorized contacts and their permission levels. We engage with those contacts, supply documentation, and offer training if needed on contacting support, accessing portals, and using our services. We do not charge for standard onboarding/offboarding. If extra onboarding support like project management or technical design is required, we may charge a pre-agreed rate.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
We will work with you to create a plan for closing your account and provide assistance with exporting and downloading your data. Users can also directly download their data.
End-of-contract process
We do not charge for standard off-boarding, allowing organizations to exit our service without penalty. If extensive project management or large-scale support is necessary, We reserve the right to charge the client, contingent on advance agreement before termination.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Other
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
None
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
Full service management is possible via the online web interface.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
None
API
Yes
What users can and can't do using the API
Please see following link to see documentation outlining the API set available: https://developer.druva.com/reference
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Logos and branding/naming can be customised.

Scaling

Independence of resources
The service is cloud provisioned and right sized for each individual organisations workload demands. The service is located in AWS.

Analytics

Service usage metrics
Yes
Metrics types
Service availability, Deduplication rates, Successful backups, Successful restores, Active users, License allocation, Growth rates.
Not limited to the above and many more available.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Dell Technologies Apex Backup, Druva

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
We will work with you to create a plan for closing your account and provide assistance with exporting and downloading your data. Users can also directly download their data and applications.
Data export formats
Other
Other data export formats
Any common data format
Data import formats
Other
Other data import formats
Any common data format

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
99.5% uptime and 99.99999% Customer Data Durability
Approach to resilience
The cloud instance for the customer is always replicated between 3 physically different data centres as part of the Amazon AWS availability zone feature.
Outage reporting
Outages of the system availability or the storage component are communicated to all assigned administrators within a cloud instance via email as well as via the Support Portal. An online dashboard also reports instance of global outages

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Only authorised contacts are granted access rights / access.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
  • ISAE 3000 Type II / SOC 2
  • FIPS 140-2
  • AWS - ISO27001

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
Annual SOC 2 Type 2 and HIPAA audit
Information security policies and processes
Vendors has Dedicated Security team that is responsible for security governance. This team includes dedicated personnel that oversee security operations, certifications, and internal audit. The CISO reports to the company CFO.

Documented policies include:
Access Control Policy
Audit and Accountability Policy
Awareness Training Policy
Clear Desk Policy
Configuration Management Policy
Contingency Planning Policy
Identification and Authentication Policy
Information Security Policy
Information Technology Policy
Media Protection Policy
Personnel Security Policy
Physical & Environmental Security Policy
Position Designation Policy
Risk Assessment Policy
Secure Development (SDLC) Policy
Security Planning Policy
Server Security Policy
System Acquisition Policy
System & Information Integrity Policy
System Maintenance Policy
Vendor Management Policy
Wireless Communication Policy
Business Continuity Plan

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Dell/Druva uses industry tools from third parties to help manage and deploy our own change management policies. Any changes are controlled under project management and done with validated testing to ensure changes are stable
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Dell/Druva defines its own policies and maintains a high level awareness of industry approaches and fixes to defined issues and ensures adoption of these fixes as soon as is possible.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Dell/Druva's Cloud Operations team monitors the services on a 24x7x365 basis. Systems are monitored with host based intrusion detection and AWS activity logging that is centralized in Druva's logging infrastructure.
Incident management type
Supplier-defined controls
Incident management approach
Documented Incident Response Plan that includes steps to respond to security incidents including identification, investigation, response, mitigation, customer notification, and root cause analysis.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

While Qnetix is not a manufacturer of hardware or software, we are committed to minimizing any activities that could harm the environment. To achieve this goal, we will: /1/ Assess and seek to reduce the environmental impact of our current and future operations. /2/ Continuously improve our environmental performance and reduce waste by promoting recycling and reuse. /3 / Purchase environmentally responsible goods and services whenever possible. /4/ Train employees on environmental matters and make information available as needed. /5/ Expect similar environmental standards from our suppliers and contractors. /6 / Assist customers in using our products and services in environmentally sensitive ways. /7/ Participate in discussions about environmental issues as necessary. /8/ Comply with all legal and regulatory environmental requirements. /9/ Review this policy annually and update as needed. We share the industry's concern about the environmental impact of obsolete IT equipment that is not recycled. We believe no computer should go to waste. We work with suppliers to enable materials to be reused or recycled, helping conserve natural resources. We have a strong commitment to keeping environmentally sensitive IT materials out of landfills.

Covid-19 recovery

Qnetix remain committed to supporting our teams and community in the recovery of the affects of Covid 19. To achieve this goal, we will: /1/ Continue to offer training and education support for those left unemployed by COVID-19. /2 / Support people and communities to manage and recover from the impacts of COVID-19. /3/ Support organisations and businesses to manage and recover from the impacts of COVID-19. /4/ Support the physical and mental health of people affected by COVID-19. /5/ Improve workplace conditions that support the COVID-19 recovery effort including effective social distancing, remote working, and sustainable travel solutions.

Tackling economic inequality

Qnetix is committed to addressing economic inequality at its core by creating new businesses and employment opportunities, as well as improving education and training. Our overriding vision is to help reduce the unequal distribution of income and opportunity between different groups in society.

Equal opportunity

Qnetix aims to promote equal opportunities and fair management practices beyond legal requirements. Qnetix provides a work environment free from unlawful discrimination, harassment, bullying, or victimization based on sex, marital status, sexuality, disability, age, race, color, ethnicity, nationality, religion, or political beliefs. This principle applies equally to recruitment, training, promotion, dismissal, transfer, benefits, and all terms and conditions of employment. Qnetix does not tolerate breaches of this policy. All such instances will be thoroughly investigated and proven cases subject to disciplinary procedures. Policies for recruitment, selection, training, development, and promotion ensure individuals are treated solely based on relevant aptitudes, skills, and abilities.

Wellbeing

At Qnetix, we understand that nurturing employee well-being is critical to developing workplace resilience. We focus on the following key areas: /1/ Physical - We ensure employees have routine in their roles, enough time for exercise, sleep, work-life balance, and nutrition. /2/ Career - We provide learning and development programs for employee growth. /3/ Financial - We offer fair compensation and aim to alleviate financial stress, which has been more prominent during the pandemic. /4/ Social - We host social events, especially now as people emerge from isolation, to build community. /5/ Community - We engage with local schools, colleges, and apprenticeship programs when possible. /6/ Emotional - We support employees through one-on-one meetings and external assistance to aid their mental health. /7/ Purpose - Our regular team meetings set work goals and align individual roles with the company's overall mission.

Pricing

Price
£1 a unit a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Free trials are available. Resource limits and timeframe are agreed on a case basis.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at gcloud@Qnetix.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.