Cloud Backup Solutions
Cloud Dolphin’s Backup as a Service (BaaS) Solution provides a remote backup solution that delivers high level protection for client data and increases control over your data in a Disaster Recovery process.
Features
- Office 365 Backup
- Microsoft Hyper-v Backup
- VMware Environment Backup
- Granular File and Folder backup
- Microsoft Exchange Server Backup
- Microsoft SQL backup
- Microsoft Server Backup
- Google Drive Backup
- Synology Direct Backup
- QNAP Direct Backup
Benefits
- 24/7/365 UK Based Support
- UK Based Data Centres
- Dedicated Account Manager
- Remote Backup Software
- Automated Update Feature
- Scalable Solution
Pricing
£48 to £80 a terabyte a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 2 6 5 1 9 0 1 4 9 2 9 8 9 2
Contact
Cloud Dolphin - UK Based Backup Solutions
Kiran Francis
Telephone: 03332100012
Email: kiran@clouddolphin.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- No
- System requirements
-
- Windows Operating System Support
- Mac Operating System Support
- Linux Operating System Support
- FreeBSD Operating System Support
- Solaris Operating System Support
- Synology Operating System Support
- QNAP Operating System Support
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Same day, immediate.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- No
- Support levels
-
Cloud Dolphin offer 1 support level to all customers at no extra cost.
This is a premium, immediate support plan that is effective 24/7/365 by phone, email, website contact form and aim to resolve all issues within the hour.
All support is handled by our dedicated UK support team.
Any development issues that require further software development are solved on a case by case basis depending on the level of urgency. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Set onboarding period where a dedicated team assist you with your installation, setup and initial monitoring prior to handover to the client (if required).
The level of onboarding support given by Cloud Dolphin is at the customers request and is optional if the customer does not require it they don't have to have it. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- This is done free of charge and clients can do this at their own leisure if required prior to termination date, post contract termination may incur additional costs.
- End-of-contract process
-
The customer has the right to renew or withdraw from our services, this can be done via their account manager.
If the customer decides they wish to leave they can extract data and close down their account or choose a supported service where Cloud Dolphin can be instructed to carry out removal or deletion at the customers request via email.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- Linux or Unix
- MacOS
- Windows
- Other
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
The web browser application works on both ios and android web browsers.
Functionality is identical on mobile devices as the desktop web application. - Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- The service interface consists of a web browser application that allows users to manage all of their cloud backup users in one place. You can also download your physical device applications from here and deploy your cloud to cloud backups here for such things as Office 365 backup or Azure cloud to cloud backups.
- Accessibility standards
- None or don’t know
- Description of accessibility
- Through a web browser on any device with internet connection.
- Accessibility testing
- Basic testing.
- API
- Yes
- What users can and can't do using the API
-
This feature is enable at no extra cost and there are documents to support API functionality and setup if required.
Almost all features are available through the API functionality. - API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
-
You can white label this service with any colour scheme and branding you require.
You can add/remove functionality buttons within the software depending on your user level access policy so the end user can only see a read only format if required.
Scaling
- Independence of resources
- All users are on large bandwidth resource with dedicated resource for larger users.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Users can see usage metrics for:
- Total used
- Individual account (multiple devices)
- Individual device (multiple backup sets)
- Individual backup set
- Total devices backed up
- Total backups performed in 24 hours
- Successful backups
- Failed backups
- Missed backups
- Total backup report email
- Real time backups - Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Through the desktop agent, simply select the data and select restore to the destination they wish it to be restored to.
- Data export formats
- Other
- Other data export formats
- All file formats supported
- Data import formats
- Other
- Other data import formats
- All file formats supported
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- Cloud Dolphin will guarantee 99.99% uptime.
- Approach to resilience
-
Cloud Dolphin use virtualised networks with multi-layer, multi-site dedicated resource for servers, storage and networking hardware.
Detailed network maps available upon request. - Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
-
As a cloud backup company in the UK, restricting access to management interfaces and support channels is crucial for ensuring the security and integrity of our services. Here's how we approach this:
1. Role-Based Access Control
2. Multi-Factor Authentication (MFA)
3. Access Logging and Monitoring
4. Incident Response Plan
5. Regular Audits and Reviews
6. Continuous Improvement
By following these practices, we can ensure that only authorised personnel have access to our management interfaces and support channels, reducing the risk of unauthorised access and maintaining the security and integrity of our services. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
Cloud Dolphin approach security governance with the below in place:
1. Risk Assessment and Management
2. Security Policies and Procedures
3. Access Control
4. Data Encryption
5. Incident Response and Disaster Recovery
6. Continuous Monitoring and Improvement
7. Employee Training and Awareness
8. Vendor Management
9. Documentation and Reporting
10. GDPR Compliance - Information security policies and processes
-
Security and Policy processes in place are:
1. Access Control Policy
2. Data Encryption Policy
3. Backup and Recovery Policy
4. Incident Response Policy
5. Data Classification and Handling Policy
6. User Acceptance and Training Policy
7. Vendor Management Policy
8. Physical Security Policy
9. Network Security Policy
10. Asset Management Policy
11. Compliance and Audit Policy
12. Business Continuity and Disaster Recovery Policy
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
As a cloud backup company in the UK, our configuration and change management processes are:
1. Configuration Management:
Asset Inventory
Baseline Configuration
Change Control Board (CCB)
Version Control
2. Change Management:
Change Requests
Change Assessment and Approval
Testing and Validation
Documentation and Communication
3. Automated Deployment and Monitoring
4. Review and Continuous Improvement
5. Compliance and Auditing - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
1. Assessing Potential Threats: We employ various techniques to assess potential threats to our services, including:
- Regular vulnerability scanning
- Risk assessment
- Threat intelligence: We monitor various sources of threat intelligence.
2. Deploying Patches: Our approach to patch management includes:
- Patch management policies: We have established policies and procedures for deploying patches.
- Automated patch deployment: We use automated patch deployment tools to ensure that patches are deployed quickly.
3. Sources of Information: We get our information about potential threats from various sources, including:
- Security vendors
- Industry groups - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
1. Identifying Potential Compromises: To identify potential compromises, we employ the following measures:
- Real-time monitoring
- Security event logging
- Anomaly detection
- Intrusion detection and prevention
2. Responding to Potential Compromises is managed as per below:
- Incident triage
- Incident response team deployed
- Escalation and communication
- Incident investigation
3. Response Time: Our goal is to respond to incidents as quickly as possible to minimise the impact on our services and customers. Our response time depends on the severity of the incident and the resources available. However, we strive to respond to incidents immediately. - Incident management type
- Supplier-defined controls
- Incident management approach
-
1. Pre-defined Processes for Common Events: We have pre-defined incident management processes for common events. These processes include the following steps:
- Incident detection and classification
- Incident triage and prioritisation
- Incident response and resolution
- Incident documentation and reporting
2. Reporting Incidents: Users can report incidents using various channels, including:
- Email
- Phone
- Online form
3. Providing Incident Reports: We provide incident reports to relevant stakeholders, including customers and regulatory authorities. These reports include the following information:
- Incident summary
- Incident timeline
- Incident analysis
- Incident response
- Incident impact
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- Public Services Network (PSN)
- Police National Network (PNN)
- NHS Network (N3)
- Joint Academic Network (JANET)
- Scottish Wide Area Network (SWAN)
- Health and Social Care Network (HSCN)
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Our cloud backup services help organisations reduce their carbon footprint by eliminating the need for on-premises data storage, which requires energy-intensive servers and cooling systems.
We use energy-efficient data centers and implement green IT practices to minimise energy consumption.Covid-19 recovery
Our cloud backup services enable organisations to maintain business continuity during the pandemic by securely storing and restoring critical data, even in remote work environments.
We offer cost-effective and scalable solutions that help organisations manage their IT budgets during economic uncertainty.Tackling economic inequality
Our cloud backup services level the playing field for small and medium-sized organisations by providing access to enterprise-level data protection and disaster recovery solutions at affordable prices.
We offer flexible pricing models and discounts for public sector organisations, helping them to maximise their IT budgets.Equal opportunity
Our cloud backup services are accessible to all organisations, regardless of size or location. We provide comprehensive support and training to ensure that users can effectively utilise our services.
We prioritise accessibility and inclusivity in our product design and development.Wellbeing
Our cloud backup services help organisations protect sensitive data, reducing the risk of data breaches that could harm individuals' privacy and wellbeing.
We offer secure data storage and encryption to protect personal and sensitive information.
Pricing
- Price
- £48 to £80 a terabyte a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Cloud Dolphin offers a free 28 day trial, this consists of an unlimited backup trial to test the functionality of the software within your environment.
- Link to free trial
- https://clouddolphin.co.uk/cloud-backup-free/