Hadean Platform
The Hadean Platform brings massive computing power to developers. Providing the foundation of web3 applications, metaverse, enterprise organisations and the defence sector.
A distributed processing model enables developers to write once, scale across cloud, public, private and on-premises resources.
Dynamic scaling optimises resources and eliminates the DevOps of Kubernetes solutions.
Features
- Distributed, spatial and scalable infrastructure.
- Use any cloud, anywhere. Public, private and on-prem deployment.
- Use More Available Computing Power.
- Extensible API.
- Managing cloud compute resources to use only what is needed.
- Real-time monitoring and metrics.
- Event based API for integration with your BI tools.
- Language agnostic.
- Dynamic scale at run-time.
- Write applications once and deploy anywhere.
Benefits
- High-performance compute with real-time guarantees.
- Rapid dynamic scale-up and scale-down.
- Remove the operational complexity of distributed development.
- Dynamic provisioning optimises cost.
- Remove infrastructure limitations to deliver performance at scale.
- Lower costs and shorter delivery time.
- Parallel simulations and rapid analysis provide precise decision support.
- Parallel simulations and rapid analysis provide precise decision support.
- Multi-domain operations can be viewed at every level.
- No vendor lock-in.
Pricing
£100,000 a licence
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
2 3 5 5 0 8 8 6 9 0 9 5 9 4 2
Contact
HADEAN SUPERCOMPUTING LTD
Shany Elkarat
Telephone: 02035141170
Email: tenders@hadean.com
Service scope
- Service constraints
- We would agree Service Level Agreements with customers in contractual discussions, however we do not have an pre-defined restrictions
- System requirements
- No specific requirements
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- SLAs are aligned to industry standards and to be agreed upon with individual customers.
- User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Hadean would have Service Level Agreements (SLAs) constructed to meet the individual needs of customers. At the lowest level, the SLA would consist of email support to support engineers. At the highest level, the SLA would consist of on-site support, training, consultancy and mentoring of customer staff. Technical account managers are available.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Tailored to the client, and can include: initial consultation, onsite or offsite training. Extensive documentation is available with the service. "Hello World" examples are provided. Kickoff meeting with Hadean engineers scheduled to support the project start.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Users have complete control over their data throughout the entire length of the contract and can export and import data at any point during that time.
- End-of-contract process
- At the end of the contract, Hadean would no longer provide a license to its technology, or services, and subject to any contractual obligations would transfer any data to the client. Offboarding services would be made available as per standard rates.
Using the service
- Web browser interface
- Yes
- Using the web interface
-
Account creation
Cluster creation and management
Deploy user applications to the platform - Web interface accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web interface accessibility testing
- None
- API
- Yes
- What users can and can't do using the API
-
Spawn and manage processes
Handle inter-process messaging
Configure provision and deprovision resources
Deploy applications
Manage deployed applications
Stream metrics
Access platform and applications logs - API automation tools
-
- Ansible
- Terraform
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- Using the command line interface
-
Configure provision and deprovision resources
Deploy applications
Manage deployed applications
Stream metrics
Access platform and applications logs
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- The users application runs on their own infrastructure, whether in the cloud or on premise, meaning resources are manged by the users
- Usage notifications
- Yes
- Usage reporting
- API
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
- API access
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- The user decides which services are backed up
- User controls how that backup process is performed
- Frequency user controlled
- Backup controls
- The user is able to decide which services are backed up and retain control for how that backup process is performed along with the frequency.
- Datacentre setup
-
- Multiple datacentres
- Single datacentre with multiple copies
- Single datacentre
- Scheduling backups
- Users schedule backups through a web interface
- Backup recovery
- Users can recover backups themselves, for example through a web interface
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- SLA will be agreed with customer dependent on their needs.
- Approach to resilience
- AVailable upon request.
- Outage reporting
- Email alerts.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Access to service functionality is restricted at a role level (RBACS). Roles can be configured by the user to give a fine-grained level of control
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Dedicated device on a government network (for example PSN)
- Dedicated device over multiple services or networks
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- NQA
- ISO/IEC 27001 accreditation date
- 15/05/2023
- What the ISO/IEC 27001 doesn’t cover
- N/A.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- We follow the information security policies and processes compliant to ISO27001. For more specific informacion we can provide them upon request.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Supplier defined controls.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
-
For end-user devices: we have an enterprise grade antivirus in our local workstations that reports to a centralized management portal. In the management portal we can configure AV databases, scheduled scans, vulnerabilities and threats reports, and alerts.
For servers and services (releases): we run an antivirus scan when generating our packages as part of our automation, whenever vulnerabilities are found we stop the process immediately. The action to generate a security patch or hotfix depends on these findings. We are able to generate a hotfix or a critical security patch in about 5 hours. - Protective monitoring type
- Undisclosed
- Protective monitoring approach
-
How do we identify potential compromises:
Regular security training.
Regular nightly scans of our generated releases and can know when there's a threat
How we respond:
Report it to our MSP which will file an information security incident (ISI)
Report it to our MSP which will file an ISI. Triage will be conducted. May result in a hotfix or a critical patch.
How quickly we respond:
MSP has an SLA of 4 hours to respond to high priority incidents
In addition of the SLA of the MSP we can generate a release in 5 hours if required - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- It starts with the identification and reporting of the incident, then initial investigation, then immediate actions, then root cause analysis, then upper management reporting and recommendations, then continual improvement (corrective actions)
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Equal opportunity
-
Equal opportunity
Hadean is committed to ensuring that all employees will be given equal opportunities, irrespective of their age, disability, gender reassignment, marriage and civil partnership, pregnancy and maternity, race, religion or belief, sex, sexual orientation or trade union membership. This commitment is more than a legal, moral or ethical necessity. It is good employment practice.
The implementation of an Equal Opportunities Statement stimulates a healthy and more productive atmosphere and creates better quality of life. Furthermore, fair representation at all levels of job responsibility and realising the potential of every individual makes sound business sense.
Hadean is committed to eradicating discrimination and seeks to find a means of dealing with it should it occur. This statement applies to all employees and all applicants for employment.
Pricing
- Price
- £100,000 a licence
- Discount for educational organisations
- No
- Free trial available
- No