Cloud and SaaS Backup - in partnership with Dell Technologies / Druva
The Dell Apex Backup Service (based on Druva) is an "at-scale" Cloud / SaaS platform that unifies backup and data resiliency. Easily manage all your data resiliency and backup needs across clouds, on-premises workloads, cloud-native and SaaS applications, and critical IT endpoints.
Features
- Azure and AWS workload backups
- Office365, Entra, Google, Salesforce backups
- File, Database and Virtual Machines
- Federated Data Search & System Audit
- Data Loss Prevention
- AD Integration & Single Sign On
- Administrative Dashboard & Reporting
- Multi Region Availability - including the UK
- Ransomware and Cyber protection
- 24x7x365 availability
Benefits
- Compliance to data legislation (PCI-DSS,GDPR,HIPAA,PII)
- Cost effective data protection for all data sources
- Source-side global duplication for more efficient data backup
- Enterprise grade security protects all data in transit
- Self-service user data restore portal
- Immutable Backups
- Protects from Ransomware
- Enables FOI searches
- Provides in cloud backups for Cloud Native Apps
Pricing
£1 a unit a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 1 5 9 7 6 9 6 6 9 6 9 7 6 8
Contact
QNETIX LTD
Qnetix - Your Trusted Technology Solutions Partner
Telephone: +443333355673
Email: gcloud@Qnetix.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- The Service is cloud based and constraints are likely to be end user specific.
- System requirements
-
- Normal levels of access to users data for backup
- Optional local cloud cache
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Business critical offered as standard with priority of response set by customer. Critical having 1 hour initial, high 2 hours, medium 4 hours and low 8 hours.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- NA
- Web chat accessibility testing
- NA
- Onsite support
- Yes, at extra cost
- Support levels
- 24/7 for P1 and P2 incidents. P3 issues are handled during business hours. Additional support services are available.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We pride ourselves on the fact that our services are easy to consume and simple to use. New customers provide a list of authorized contacts and their permission levels. We engage with those contacts, supply documentation, and offer training if needed on contacting support, accessing portals, and using our services. We do not charge for standard onboarding/offboarding. If extra onboarding support like project management or technical design is required, we may charge a pre-agreed rate.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- We will work with you to create a plan for closing your account and provide assistance with exporting and downloading your data. Users can also directly download their data.
- End-of-contract process
- We do not charge for standard off-boarding, allowing organizations to exit our service without penalty. If extensive project management or large-scale support is necessary, We reserve the right to charge the client, contingent on advance agreement before termination.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Other
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- None
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- Full service management is possible via the online web interface.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- None
- API
- Yes
- What users can and can't do using the API
- Please see following link to see documentation outlining the API set available: https://developer.druva.com/reference
- API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Logos and branding/naming can be customised.
Scaling
- Independence of resources
- The service is cloud provisioned and right sized for each individual organisations workload demands. The service is located in AWS.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Service availability, Deduplication rates, Successful backups, Successful restores, Active users, License allocation, Growth rates.
Not limited to the above and many more available. - Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Dell Technologies Apex Backup, Druva
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- We will work with you to create a plan for closing your account and provide assistance with exporting and downloading your data. Users can also directly download their data and applications.
- Data export formats
- Other
- Other data export formats
- Any common data format
- Data import formats
- Other
- Other data import formats
- Any common data format
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- 99.5% uptime and 99.99999% Customer Data Durability
- Approach to resilience
- The cloud instance for the customer is always replicated between 3 physically different data centres as part of the Amazon AWS availability zone feature.
- Outage reporting
- Outages of the system availability or the storage component are communicated to all assigned administrators within a cloud instance via email as well as via the Support Portal. An online dashboard also reports instance of global outages
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Only authorised contacts are granted access rights / access.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- ISAE 3000 Type II / SOC 2
- FIPS 140-2
- AWS - ISO27001
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- Annual SOC 2 Type 2 and HIPAA audit
- Information security policies and processes
-
Vendors has Dedicated Security team that is responsible for security governance. This team includes dedicated personnel that oversee security operations, certifications, and internal audit. The CISO reports to the company CFO.
Documented policies include:
Access Control Policy
Audit and Accountability Policy
Awareness Training Policy
Clear Desk Policy
Configuration Management Policy
Contingency Planning Policy
Identification and Authentication Policy
Information Security Policy
Information Technology Policy
Media Protection Policy
Personnel Security Policy
Physical & Environmental Security Policy
Position Designation Policy
Risk Assessment Policy
Secure Development (SDLC) Policy
Security Planning Policy
Server Security Policy
System Acquisition Policy
System & Information Integrity Policy
System Maintenance Policy
Vendor Management Policy
Wireless Communication Policy
Business Continuity Plan
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Dell/Druva uses industry tools from third parties to help manage and deploy our own change management policies. Any changes are controlled under project management and done with validated testing to ensure changes are stable
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Dell/Druva defines its own policies and maintains a high level awareness of industry approaches and fixes to defined issues and ensures adoption of these fixes as soon as is possible.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Dell/Druva's Cloud Operations team monitors the services on a 24x7x365 basis. Systems are monitored with host based intrusion detection and AWS activity logging that is centralized in Druva's logging infrastructure.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Documented Incident Response Plan that includes steps to respond to security incidents including identification, investigation, response, mitigation, customer notification, and root cause analysis.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
While Qnetix is not a manufacturer of hardware or software, we are committed to minimizing any activities that could harm the environment. To achieve this goal, we will: /1/ Assess and seek to reduce the environmental impact of our current and future operations. /2/ Continuously improve our environmental performance and reduce waste by promoting recycling and reuse. /3 / Purchase environmentally responsible goods and services whenever possible. /4/ Train employees on environmental matters and make information available as needed. /5/ Expect similar environmental standards from our suppliers and contractors. /6 / Assist customers in using our products and services in environmentally sensitive ways. /7/ Participate in discussions about environmental issues as necessary. /8/ Comply with all legal and regulatory environmental requirements. /9/ Review this policy annually and update as needed. We share the industry's concern about the environmental impact of obsolete IT equipment that is not recycled. We believe no computer should go to waste. We work with suppliers to enable materials to be reused or recycled, helping conserve natural resources. We have a strong commitment to keeping environmentally sensitive IT materials out of landfills.Covid-19 recovery
Qnetix remain committed to supporting our teams and community in the recovery of the affects of Covid 19. To achieve this goal, we will: /1/ Continue to offer training and education support for those left unemployed by COVID-19. /2 / Support people and communities to manage and recover from the impacts of COVID-19. /3/ Support organisations and businesses to manage and recover from the impacts of COVID-19. /4/ Support the physical and mental health of people affected by COVID-19. /5/ Improve workplace conditions that support the COVID-19 recovery effort including effective social distancing, remote working, and sustainable travel solutions.Tackling economic inequality
Qnetix is committed to addressing economic inequality at its core by creating new businesses and employment opportunities, as well as improving education and training. Our overriding vision is to help reduce the unequal distribution of income and opportunity between different groups in society.Equal opportunity
Qnetix aims to promote equal opportunities and fair management practices beyond legal requirements. Qnetix provides a work environment free from unlawful discrimination, harassment, bullying, or victimization based on sex, marital status, sexuality, disability, age, race, color, ethnicity, nationality, religion, or political beliefs. This principle applies equally to recruitment, training, promotion, dismissal, transfer, benefits, and all terms and conditions of employment. Qnetix does not tolerate breaches of this policy. All such instances will be thoroughly investigated and proven cases subject to disciplinary procedures. Policies for recruitment, selection, training, development, and promotion ensure individuals are treated solely based on relevant aptitudes, skills, and abilities.Wellbeing
At Qnetix, we understand that nurturing employee well-being is critical to developing workplace resilience. We focus on the following key areas: /1/ Physical - We ensure employees have routine in their roles, enough time for exercise, sleep, work-life balance, and nutrition. /2/ Career - We provide learning and development programs for employee growth. /3/ Financial - We offer fair compensation and aim to alleviate financial stress, which has been more prominent during the pandemic. /4/ Social - We host social events, especially now as people emerge from isolation, to build community. /5/ Community - We engage with local schools, colleges, and apprenticeship programs when possible. /6/ Emotional - We support employees through one-on-one meetings and external assistance to aid their mental health. /7/ Purpose - Our regular team meetings set work goals and align individual roles with the company's overall mission.
Pricing
- Price
- £1 a unit a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Free trials are available. Resource limits and timeframe are agreed on a case basis.