Skip to main content

Help us improve the Digital Marketplace - send your feedback

Cloud Dolphin - UK Based Backup Solutions

Cloud Backup Solutions

Cloud Dolphin’s Backup as a Service (BaaS) Solution provides a remote backup solution that delivers high level protection for client data and increases control over your data in a Disaster Recovery process.

Features

  • Office 365 Backup
  • Microsoft Hyper-v Backup
  • VMware Environment Backup
  • Granular File and Folder backup
  • Microsoft Exchange Server Backup
  • Microsoft SQL backup
  • Microsoft Server Backup
  • Google Drive Backup
  • Synology Direct Backup
  • QNAP Direct Backup

Benefits

  • 24/7/365 UK Based Support
  • UK Based Data Centres
  • Dedicated Account Manager
  • Remote Backup Software
  • Automated Update Feature
  • Scalable Solution

Pricing

£48 to £80 a terabyte a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at kiran@clouddolphin.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

2 2 6 5 1 9 0 1 4 9 2 9 8 9 2

Contact

Cloud Dolphin - UK Based Backup Solutions Kiran Francis
Telephone: 03332100012
Email: kiran@clouddolphin.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
No
System requirements
  • Windows Operating System Support
  • Mac Operating System Support
  • Linux Operating System Support
  • FreeBSD Operating System Support
  • Solaris Operating System Support
  • Synology Operating System Support
  • QNAP Operating System Support

User support

Email or online ticketing support
Email or online ticketing
Support response times
Same day, immediate.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
No
Support levels
Cloud Dolphin offer 1 support level to all customers at no extra cost.

This is a premium, immediate support plan that is effective 24/7/365 by phone, email, website contact form and aim to resolve all issues within the hour.

All support is handled by our dedicated UK support team.

Any development issues that require further software development are solved on a case by case basis depending on the level of urgency.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Set onboarding period where a dedicated team assist you with your installation, setup and initial monitoring prior to handover to the client (if required).

The level of onboarding support given by Cloud Dolphin is at the customers request and is optional if the customer does not require it they don't have to have it.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
This is done free of charge and clients can do this at their own leisure if required prior to termination date, post contract termination may incur additional costs.
End-of-contract process
The customer has the right to renew or withdraw from our services, this can be done via their account manager.

If the customer decides they wish to leave they can extract data and close down their account or choose a supported service where Cloud Dolphin can be instructed to carry out removal or deletion at the customers request via email.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
Yes
Compatible operating systems
  • Linux or Unix
  • MacOS
  • Windows
  • Other
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
The web browser application works on both ios and android web browsers.

Functionality is identical on mobile devices as the desktop web application.
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
The service interface consists of a web browser application that allows users to manage all of their cloud backup users in one place. You can also download your physical device applications from here and deploy your cloud to cloud backups here for such things as Office 365 backup or Azure cloud to cloud backups.
Accessibility standards
None or don’t know
Description of accessibility
Through a web browser on any device with internet connection.
Accessibility testing
Basic testing.
API
Yes
What users can and can't do using the API
This feature is enable at no extra cost and there are documents to support API functionality and setup if required.

Almost all features are available through the API functionality.
API documentation
Yes
API documentation formats
PDF
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
You can white label this service with any colour scheme and branding you require.

You can add/remove functionality buttons within the software depending on your user level access policy so the end user can only see a read only format if required.

Scaling

Independence of resources
All users are on large bandwidth resource with dedicated resource for larger users.

Analytics

Service usage metrics
Yes
Metrics types
Users can see usage metrics for:

- Total used
- Individual account (multiple devices)
- Individual device (multiple backup sets)
- Individual backup set
- Total devices backed up
- Total backups performed in 24 hours
- Successful backups
- Failed backups
- Missed backups
- Total backup report email
- Real time backups
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Through the desktop agent, simply select the data and select restore to the destination they wish it to be restored to.
Data export formats
Other
Other data export formats
All file formats supported
Data import formats
Other
Other data import formats
All file formats supported

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
Cloud Dolphin will guarantee 99.99% uptime.
Approach to resilience
Cloud Dolphin use virtualised networks with multi-layer, multi-site dedicated resource for servers, storage and networking hardware.

Detailed network maps available upon request.
Outage reporting
Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
As a cloud backup company in the UK, restricting access to management interfaces and support channels is crucial for ensuring the security and integrity of our services. Here's how we approach this:

1. Role-Based Access Control

2. Multi-Factor Authentication (MFA)

3. Access Logging and Monitoring

4. Incident Response Plan

5. Regular Audits and Reviews

6. Continuous Improvement

By following these practices, we can ensure that only authorised personnel have access to our management interfaces and support channels, reducing the risk of unauthorised access and maintaining the security and integrity of our services.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Cloud Dolphin approach security governance with the below in place:

1. Risk Assessment and Management
2. Security Policies and Procedures
3. Access Control
4. Data Encryption
5. Incident Response and Disaster Recovery
6. Continuous Monitoring and Improvement
7. Employee Training and Awareness
8. Vendor Management
9. Documentation and Reporting
10. GDPR Compliance
Information security policies and processes
Security and Policy processes in place are:

1. Access Control Policy
2. Data Encryption Policy
3. Backup and Recovery Policy
4. Incident Response Policy
5. Data Classification and Handling Policy
6. User Acceptance and Training Policy
7. Vendor Management Policy
8. Physical Security Policy
9. Network Security Policy
10. Asset Management Policy
11. Compliance and Audit Policy
12. Business Continuity and Disaster Recovery Policy

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
As a cloud backup company in the UK, our configuration and change management processes are:

1. Configuration Management:
Asset Inventory
Baseline Configuration
Change Control Board (CCB)
Version Control

2. Change Management:
Change Requests
Change Assessment and Approval
Testing and Validation
Documentation and Communication

3. Automated Deployment and Monitoring

4. Review and Continuous Improvement

5. Compliance and Auditing
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
1. Assessing Potential Threats: We employ various techniques to assess potential threats to our services, including:

- Regular vulnerability scanning

- Risk assessment

- Threat intelligence: We monitor various sources of threat intelligence.

2. Deploying Patches: Our approach to patch management includes:

- Patch management policies: We have established policies and procedures for deploying patches.

- Automated patch deployment: We use automated patch deployment tools to ensure that patches are deployed quickly.

3. Sources of Information: We get our information about potential threats from various sources, including:

- Security vendors

- Industry groups
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
1. Identifying Potential Compromises: To identify potential compromises, we employ the following measures:

- Real-time monitoring

- Security event logging

- Anomaly detection

- Intrusion detection and prevention

2. Responding to Potential Compromises is managed as per below:

- Incident triage

- Incident response team deployed

- Escalation and communication

- Incident investigation

3. Response Time: Our goal is to respond to incidents as quickly as possible to minimise the impact on our services and customers. Our response time depends on the severity of the incident and the resources available. However, we strive to respond to incidents immediately.
Incident management type
Supplier-defined controls
Incident management approach
1. Pre-defined Processes for Common Events: We have pre-defined incident management processes for common events. These processes include the following steps:

- Incident detection and classification

- Incident triage and prioritisation

- Incident response and resolution

- Incident documentation and reporting

2. Reporting Incidents: Users can report incidents using various channels, including:

- Email

- Phone

- Online form

3. Providing Incident Reports: We provide incident reports to relevant stakeholders, including customers and regulatory authorities. These reports include the following information:

- Incident summary

- Incident timeline

- Incident analysis

- Incident response

- Incident impact

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
Yes
Connected networks
  • Public Services Network (PSN)
  • Police National Network (PNN)
  • NHS Network (N3)
  • Joint Academic Network (JANET)
  • Scottish Wide Area Network (SWAN)
  • Health and Social Care Network (HSCN)

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Our cloud backup services help organisations reduce their carbon footprint by eliminating the need for on-premises data storage, which requires energy-intensive servers and cooling systems.

We use energy-efficient data centers and implement green IT practices to minimise energy consumption.

Covid-19 recovery

Our cloud backup services enable organisations to maintain business continuity during the pandemic by securely storing and restoring critical data, even in remote work environments.

We offer cost-effective and scalable solutions that help organisations manage their IT budgets during economic uncertainty.

Tackling economic inequality

Our cloud backup services level the playing field for small and medium-sized organisations by providing access to enterprise-level data protection and disaster recovery solutions at affordable prices.

We offer flexible pricing models and discounts for public sector organisations, helping them to maximise their IT budgets.

Equal opportunity

Our cloud backup services are accessible to all organisations, regardless of size or location. We provide comprehensive support and training to ensure that users can effectively utilise our services.

We prioritise accessibility and inclusivity in our product design and development.

Wellbeing

Our cloud backup services help organisations protect sensitive data, reducing the risk of data breaches that could harm individuals' privacy and wellbeing.

We offer secure data storage and encryption to protect personal and sensitive information.

Pricing

Price
£48 to £80 a terabyte a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Cloud Dolphin offers a free 28 day trial, this consists of an unlimited backup trial to test the functionality of the software within your environment.
Link to free trial
https://clouddolphin.co.uk/cloud-backup-free/

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at kiran@clouddolphin.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.