Compute and Application Hosting ( IaaS )
The Park Place Technologies Compute and Application Hosting ( Iaas ) Service provides a resilient, secure, scalable and fully redundant environment for physical and virtual based workloads. Your fully managed infrastructure is supported 24x7 with options of a single UK-based location or multiple to provide additional redundancy.
Features
- On Demand VMs and storage
- Dedicated or multi-tenanted environments
- High availability
- Guaranteed Service Level Agreement
- ITIL based service delivery management
- 24x7x365 service, support and monitoring
- Delivered from UK Data Centres
- Platform architected from industry leading hardware and software components
- Persistent storage
- Simple, flexible billing model
Benefits
- Scalable as required
- Reduce local infrastructure requirements
- Easy to control costs with a predictable cost model
- Eliminate administrative overheads
- No single point of failure
- Cloud platform architecture delivers greater resiliency
- Flexibility to create private or hybrid cloud configurations
- Automatic failover protection to another hardware node
Pricing
£92 a virtual machine a month
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
2 3 8 0 3 4 3 0 7 3 8 1 5 1 2
Contact
Park Place Technologies
Simon Bitton
Telephone: 0208 885 9656
Email: sbitton@parkplacetech.com
Service scope
- Service constraints
- Planned maintenance with a minimum of 1 weeks notice may be required
- System requirements
- Requires secure connectivity
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- N/A
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Park Place Technical support is available 24x7x365 via our global service desk. All support is delivered by UK based engineers, who monitor the service availability and provide proactive support via email or phone.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Park Place will provide customers with full on-boarding documentation as part of take on process. New customers are asked to provide us with a list of authorised contacts and their associated permission levels that may make requests for service invocation or service change. Park Place don't charge customers for on-boarding however, should a customer require additional or tailored support outside of the standard process, such as project management, technical design, etc, then Park Place may charge for this based on a detailed SOW.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Park Place Technologies will provide the customer with the latest server images in an industry standard format. Any data on dedicated physical servers will be provided in a agreed format. Requests for data extraction are submitted and managed via the service desk.
- End-of-contract process
- Park Place Technologies do not charge customers as standard for off-boarding a client. We will provide reasonable support to the customer as part of the off-boarding process however, should additional assistance or project management be required, Park Place reserves the right to charge the customer. Charges will be calculated and agreed in advance.
Using the service
- Web browser interface
- No
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
-
- Automatic
- Manual
- Independence of resources
- Park Place adopt two approaches to mitigate these risks. The first is that we can provide a dedicated infrastructure to ensure absolute isolation from all other workloads. The second approach involved the deployment of resource reservation technologies to protect and isolate workloads from each other when they are deployed on a shared infrastructure.
- Usage notifications
- Yes
- Usage reporting
-
- Other
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- Memory
- Network
- Other
- Other metrics
-
- Incident history
- Quarterly service review
- Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Hardware containing data is completely destroyed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Files
- Virtual Machines
- Application data
- Databases
- Any other data set
- Backup controls
- Backups are configured to each customers unique requirement.
- Datacentre setup
-
- Multiple datacentres with disaster recovery
- Multiple datacentres
- Single datacentre with multiple copies
- Single datacentre
- Scheduling backups
- Users contact the support team to schedule backups
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- IPsec or TLS VPN gateway
- Data protection within supplier network
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- The Park Place SLA offers 99.99% availability up to the operating system. Scheduled maintenance windows will be agreed with the customer as necessary.
- Approach to resilience
- All deployed infrastructure is designed with no single point of failure and our significant experience as a managed service provider ensures the appropriate management of this infrastructure is optimized to achieved maximum availability.
- Outage reporting
-
Park Place have co-developed a proactive monitoring platform, ParkView. This platform monitors the entire technology stack and uses artificial intelligence technologies to take a proactive approach to fault detection and alerting.
The Managed Service team will alert the customer of any outages according to the agreed communication policy.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- As part of the on-boarding process, we will request a list of authorised users with roles and permissions. The service desk and Managed Service team will only accept requests from authorised contacts. any changes to the authorised user list will be subject to the agreed change control mechanism.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Devices users manage the service through
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- QCSI Ltd, accredited by ASCB(E) ltd
- ISO/IEC 27001 accreditation date
- 28/04/17
- What the ISO/IEC 27001 doesn’t cover
- Outsourced Development is excluded from the Statement of Applicability
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- Cyber Essentials
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
PPT operate an Information Security Management System (ISMS) that is certified to ISO27001:2013. This includes:
• An Information Security Policy
• A Statement of Applicability
• A Data Destruction policy
• An Acceptable Use of Assets Policy
• A Use of Cryptographic controls policy
• An Information Exchange Policy
• A Policy for handling Classified Information
• An Access Control Policy
• A Destruction and Disposal Policy
An Information security risk assessment has been completed which is reviewed annually, whenever there is a major change that could impact information security or following a major security incident.
Each employee is responsible for reporting any system weakness, information security incident, or event that could lead to an incident. These are to be reported to the IT systems engineer as soon as possible by phone, email or in person in accordance with Incident Management & Reporting procedures.
Employees are given an overview of the ISMS during induction, including data protection and cyber security training. All system documents are readily available via the company SharePoint.
All elements of the ISMS are included in the Internal Audit Plan and the system is subject to annual 3rd party audit.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- The Park Place internal change control processes are strictly ITIL aligned. Where customers are involved in the submission or approval of change requests, these processes are defined during the contract take on period and can be aligned with the customers existing change control processes.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- The Park Place vulnerability management approach is based on ensuring all platforms are patched and maintained according to vendor best practice. All configuration changes are subject to strict change control and are reviewed, logged and audited on a regular basis.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- All logs are centralised and are reviewed on a regular basis. Any detected high risk activity is given a severity 1 prioritisation for response by operations and security teams.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Park Place operate an ITIL aligned incident management process. Call logging guides and escalation procedures are issued as part of the customer on-boarding process and are reviewed as part of regular service review meetings.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- VMware
- How shared infrastructure is kept separate
- The Park Place infrastructure offers customers access to either a multi-tenant or a dedicated infrastructure. For multi-tenant environments, logical partitioning starts at the edge of the network through dedicated VPNs and internal networks through to a storage level by using dedicated datastores.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
-
The datacentres used adhere to best practices with regards to the EU Code of Conduct. They are also linked with Green Grid and have ISO14001 accreditations across all sites. Each site has Energy Efficiency certificates.
The datacentres are also attached to both the CRC and for DC’s CCA program, meaning they are governed on goals set for efficiencies. They also obtain all power via renewable resources.
Social Value
- Tackling economic inequality
-
Tackling economic inequality
Diversity & Inclusion Philosophy
Dimensions, the Park Place Diversity, Equity and Inclusion program, ensures our culture respects all visible and invisible differences to create an equitable, healthy, and high-performing organization in which all individuals feel valued and their contributions are appreciated. Ongoing training, mentoring and recruitment are all addressed by the Dimensions programs.
STEM Programming
As leaders in the technology industry, Park Place Technologies has an obligation to promote STEM to young women and girls who make up the potential next generation of leaders in the field. It’s time for our ideals and recruitment policies to diversify and evolve. It’s our responsibility to ensure continued action invigorates changing perception which, consequently, will work towards correcting the diversity imbalance.
iWish
A Volunteer led community committed to showcasing the power of Science, Technology, Engineering and Math to female secondary school students. Park Place collaborates with IWISH on an intern initiative in Ireland aimed at female college students studying STEM-related subjects, who want to gain experience in these industries.
Breakthrough Schools
Breakthrough Schools is a local charter school in the United States. Our donations to these schools goes towards classroom development and scholarships. We also have opportunities to volunteer at the local Breakthrough Schools by mentoring students.
CoderDojo
CoderDojo is a global movement of free, volunteer-led, community-based computer programming clubs for young people. Park Place provides laptops, volunteers and programming resources. - Equal opportunity
-
Equal opportunity
Diversity & Inclusion Philosophy
Dimensions, the Park Place Diversity, Equity and Inclusion program, ensures our culture respects all visible and invisible differences to create an equitable, healthy, and high-performing organization in which all individuals feel valued and their contributions are appreciated. Ongoing training, mentoring and recruitment are all addressed by the Dimensions programs.
STEM Programming
As leaders in the technology industry, Park Place Technologies has an obligation to promote STEM to young women and girls who make up the potential next generation of leaders in the field. It’s time for our ideals and recruitment policies to diversify and evolve. It’s our responsibility to ensure continued action invigorates changing perception which, consequently, will work towards correcting the diversity imbalance.
iWish
A Volunteer led community committed to showcasing the power of Science, Technology, Engineering and Math to female secondary school students. Park Place collaborates with IWISH on an intern initiative in Ireland aimed at female college students studying STEM-related subjects, who want to gain experience in these industries.
Breakthrough Schools
Breakthrough Schools is a local charter school in the United States. Our donations to these schools goes towards classroom development and scholarships. We also have opportunities to volunteer at the local Breakthrough Schools by mentoring students.
CoderDojo
CoderDojo is a global movement of free, volunteer-led, community-based computer programming clubs for young people. Park Place provides laptops, volunteers and programming resources. - Wellbeing
-
Wellbeing
Diversity & Inclusion Philosophy
Dimensions, the Park Place Diversity, Equity and Inclusion program, ensures our culture respects all visible and invisible differences to create an equitable, healthy, and high-performing organization in which all individuals feel valued and their contributions are appreciated. Ongoing training, mentoring and recruitment are all addressed by the Dimensions programs.
STEM Programming
As leaders in the technology industry, Park Place Technologies has an obligation to promote STEM to young women and girls who make up the potential next generation of leaders in the field. It’s time for our ideals and recruitment policies to diversify and evolve. It’s our responsibility to ensure continued action invigorates changing perception which, consequently, will work towards correcting the diversity imbalance.
iWish
A Volunteer led community committed to showcasing the power of Science, Technology, Engineering and Math to female secondary school students. Park Place collaborates with IWISH on an intern initiative in Ireland aimed at female college students studying STEM-related subjects, who want to gain experience in these industries.
Breakthrough Schools
Breakthrough Schools is a local charter school in the United States. Our donations to these schools goes towards classroom development and scholarships. We also have opportunities to volunteer at the local Breakthrough Schools by mentoring students.
CoderDojo
CoderDojo is a global movement of free, volunteer-led, community-based computer programming clubs for young people. Park Place provides laptops, volunteers and programming resources.
Pricing
- Price
- £92 a virtual machine a month
- Discount for educational organisations
- Yes
- Free trial available
- No