HADEAN SUPERCOMPUTING LTD

Hadean Platform

The Hadean Platform brings massive computing power to developers. Providing the foundation of web3 applications, metaverse, enterprise organisations and the defence sector.

A distributed processing model enables developers to write once, scale across cloud, public, private and on-premises resources.

Dynamic scaling optimises resources and eliminates the DevOps of Kubernetes solutions.

Features

  • Distributed, spatial and scalable infrastructure.
  • Use any cloud, anywhere. Public, private and on-prem deployment.
  • Use More Available Computing Power.
  • Extensible API.
  • Managing cloud compute resources to use only what is needed.
  • Real-time monitoring and metrics.
  • Event based API for integration with your BI tools.
  • Language agnostic.
  • Dynamic scale at run-time.
  • Write applications once and deploy anywhere.

Benefits

  • High-performance compute with real-time guarantees.
  • Rapid dynamic scale-up and scale-down.
  • Remove the operational complexity of distributed development.
  • Dynamic provisioning optimises cost.
  • Remove infrastructure limitations to deliver performance at scale.
  • Lower costs and shorter delivery time.
  • Parallel simulations and rapid analysis provide precise decision support.
  • Parallel simulations and rapid analysis provide precise decision support.
  • Multi-domain operations can be viewed at every level.
  • No vendor lock-in.

Pricing

£100,000 a licence

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@hadean.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

2 3 5 5 0 8 8 6 9 0 9 5 9 4 2

Contact

HADEAN SUPERCOMPUTING LTD Shany Elkarat
Telephone: 02035141170
Email: tenders@hadean.com

Service scope

Service constraints
We would agree Service Level Agreements with customers in contractual discussions, however we do not have an pre-defined restrictions
System requirements
No specific requirements

User support

Email or online ticketing support
Email or online ticketing
Support response times
SLAs are aligned to industry standards and to be agreed upon with individual customers.
User can manage status and priority of support tickets
No
Phone support
No
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Hadean would have Service Level Agreements (SLAs) constructed to meet the individual needs of customers. At the lowest level, the SLA would consist of email support to support engineers. At the highest level, the SLA would consist of on-site support, training, consultancy and mentoring of customer staff. Technical account managers are available.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Tailored to the client, and can include: initial consultation, onsite or offsite training. Extensive documentation is available with the service. "Hello World" examples are provided. Kickoff meeting with Hadean engineers scheduled to support the project start.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Users have complete control over their data throughout the entire length of the contract and can export and import data at any point during that time.
End-of-contract process
At the end of the contract, Hadean would no longer provide a license to its technology, or services, and subject to any contractual obligations would transfer any data to the client. Offboarding services would be made available as per standard rates.

Using the service

Web browser interface
Yes
Using the web interface
Account creation
Cluster creation and management
Deploy user applications to the platform
Web interface accessibility standard
WCAG 2.1 AA or EN 301 549
Web interface accessibility testing
None
API
Yes
What users can and can't do using the API
Spawn and manage processes
Handle inter-process messaging
Configure provision and deprovision resources
Deploy applications
Manage deployed applications
Stream metrics
Access platform and applications logs
API automation tools
  • Ansible
  • Terraform
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
Command line interface
Yes
Command line interface compatibility
  • Linux or Unix
  • Windows
Using the command line interface
Configure provision and deprovision resources
Deploy applications
Manage deployed applications
Stream metrics
Access platform and applications logs

Scaling

Scaling available
Yes
Scaling type
Automatic
Independence of resources
The users application runs on their own infrastructure, whether in the cloud or on premise, meaning resources are manged by the users
Usage notifications
Yes
Usage reporting
API

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
Reporting types
API access

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • The user decides which services are backed up
  • User controls how that backup process is performed
  • Frequency user controlled
Backup controls
The user is able to decide which services are backed up and retain control for how that backup process is performed along with the frequency.
Datacentre setup
  • Multiple datacentres
  • Single datacentre with multiple copies
  • Single datacentre
Scheduling backups
Users schedule backups through a web interface
Backup recovery
Users can recover backups themselves, for example through a web interface

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
SLA will be agreed with customer dependent on their needs.
Approach to resilience
AVailable upon request.
Outage reporting
Email alerts.

Identity and authentication

User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Access to service functionality is restricted at a role level (RBACS). Roles can be configured by the user to give a fine-grained level of control
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device on a government network (for example PSN)
  • Dedicated device over multiple services or networks
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
  • Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
NQA
ISO/IEC 27001 accreditation date
15/05/2023
What the ISO/IEC 27001 doesn’t cover
N/A.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
We follow the information security policies and processes compliant to ISO27001. For more specific informacion we can provide them upon request.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Supplier defined controls.
Vulnerability management type
Undisclosed
Vulnerability management approach
For end-user devices: we have an enterprise grade antivirus in our local workstations that reports to a centralized management portal. In the management portal we can configure AV databases, scheduled scans, vulnerabilities and threats reports, and alerts.

For servers and services (releases): we run an antivirus scan when generating our packages as part of our automation, whenever vulnerabilities are found we stop the process immediately. The action to generate a security patch or hotfix depends on these findings. We are able to generate a hotfix or a critical security patch in about 5 hours.
Protective monitoring type
Undisclosed
Protective monitoring approach
How do we identify potential compromises:
Regular security training.
Regular nightly scans of our generated releases and can know when there's a threat

How we respond:
Report it to our MSP which will file an information security incident (ISI)
Report it to our MSP which will file an ISI. Triage will be conducted. May result in a hotfix or a critical patch.

How quickly we respond:
MSP has an SLA of 4 hours to respond to high priority incidents
In addition of the SLA of the MSP we can generate a release in 5 hours if required
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
It starts with the identification and reporting of the incident, then initial investigation, then immediate actions, then root cause analysis, then upper management reporting and recommendations, then continual improvement (corrective actions)

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
No

Energy efficiency

Energy-efficient datacentres
No

Social Value

Equal opportunity

Equal opportunity

Hadean is committed to ensuring that all employees will be given equal opportunities, irrespective of their age, disability, gender reassignment, marriage and civil partnership, pregnancy and maternity, race, religion or belief, sex, sexual orientation or trade union membership. This commitment is more than a legal, moral or ethical necessity. It is good employment practice.
The implementation of an Equal Opportunities Statement stimulates a healthy and more productive atmosphere and creates better quality of life. Furthermore, fair representation at all levels of job responsibility and realising the potential of every individual makes sound business sense.
Hadean is committed to eradicating discrimination and seeks to find a means of dealing with it should it occur. This statement applies to all employees and all applicants for employment.

Pricing

Price
£100,000 a licence
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@hadean.com. Tell them what format you need. It will help if you say what assistive technology you use.