Skip to main content

Help us improve the Digital Marketplace - send your feedback

HITACHI DIGITAL SERVICES UK LIMITED

IOT - Internet of Things Capability

Hitachi serving various industries with high standards of expertise of Cloud engineering, IoT/IIoT/Mixed reality. Hitachi Industry Cloud has three major addressable industries/focus areas: Manufacturing, Energy & Mobility

Features

  • Edge computing
  • Mixed reality with Digital and Process twin
  • Optimization of Resources with Sustainability
  • Data analytics
  • Cloud Service configuration, dashboards and reports

Benefits

  • Descriptive, Perspective and Predictive analytics for maintenance and operational people,
  • Manufacturing Insights through Intelligent dashboards and reporting
  • Efficient Manufacturing process implementation reducing carbon footprint and energy consumption
  • Increasing productivity with analytics
  • Enabling Subject matter expert for process optimization

Pricing

£160 to £1,535 a unit a day

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ian.blond@hitachids.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

2 4 6 9 3 4 1 6 8 5 2 3 7 3 4

Contact

HITACHI DIGITAL SERVICES UK LIMITED Ian Blond
Telephone: 07707585971
Email: ian.blond@hitachids.com

Service scope

Service constraints
The service is limited with SLA offered by Public Cloud service provider and its availability in the region.
System requirements
  • Buyers will purchase Cloud service subscription with required accessing rights
  • Buyer will pay the captial expense (Upfront Cost )
  • And operational cost depending on cloud services usage
  • All third party license fees will be paid by Buyer

User support

Email or online ticketing support
Email or online ticketing
Support response times
Monday to Friday, 9am -5pm UK time
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Yes, at an extra cost
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
N/A
Onsite support
Yes, at extra cost
Support levels
The support is with extra cost as per the Client requirements which will be in line with ITIL process. The support is with 5(days) X 8 (Hours), 5X24, 8X24 Hours support. There are three level of support L1, L2, L3 level support with ticketing categories and its priority.
The Cloud engineer or technical manager will be provided as per the agreed support model.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Registering at application and then users can log in after validating their credentials. In some case users will be invited to register as per the business requirements where they will be educated to use the services.
The training is also provided to use the solutions with extra cost.
The training documents are also provided to use the solution and to maintain.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
At end of contract we assist clients for safe data extraction for additional cost.
End-of-contract process
Depends on the statement of work we align with the customer at the end of the contract. We provide maintenance and technical support for the live systems at an additional cost.

Using the service

Web browser interface
Yes
Using the web interface
Yes we provide web interface as per the need of the individual buyer and the cost associated will depend on the requirements. We provide admin-like access to the client's hosted UI or we own that permission depending on the use-case and our discussions.
Web interface accessibility standard
WCAG 2.1 AA or EN 301 549
Web interface accessibility testing
N/A
API
Yes
What users can and can't do using the API
Yes with extra cost depending on the buyers needs. Industry standard automation tools works with our service’s API. User specific permissions and restrictions are also enforced as needed. We provide documentation for the same.
API automation tools
  • Ansible
  • Chef
  • OpenStack
  • Terraform
  • Puppet
API documentation
Yes
API documentation formats
PDF
Command line interface
Yes
Command line interface compatibility
  • Linux or Unix
  • Windows
  • MacOS
Using the command line interface
Yes with extra cost. We include all the UI user functions in the command line and also programmatic functions to debug any future issues. We provide documentation for accessing and controlling through the CLI.

Scaling

Scaling available
Yes
Scaling type
  • Automatic
  • Manual
Independence of resources
The solutions are Multi tenancy and using their own resources. The users services are not affected as used Cloud best practices for isolation of data and services.
Usage notifications
Yes
Usage reporting
  • API
  • Email
  • SMS

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
Reporting types
Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Yes
Backup controls
As per Disaster recovery/data retention/back up strategy of the organization
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Users contact the support team to schedule backups
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
The availability depends on Customer requirement. It is aligned with the Cloud service provider SLA and offered methods like Active-Active regions; Active - passive regions.
Approach to resilience
The availability is depending on Customer requirement. It is aligned with Cloud service provider SLA and offered methods like Active Active regions; Active - passive regions. We also have load balancing and Business continuity and Disaster policy.
Outage reporting
Email / text notification to users. Dashboard display is also available as per users requirements.

Identity and authentication

User authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Expose management interfaces only to dedicated management networks . We limit authorised inbound IP addresses to those used by dedicated management devices. Deploy jump servers where you need to expose management interfaces to less trusted networks.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
Dedicated device on a segregated network (providers own provision)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
14/04/2021
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
The data is protected with appropriate encryption and SSL/ TLS (1.2) certifications the network are protected through Vnet and VPN cloud Patterns. The traffic has layer 4 and layer 7 security. The end points are protected and URL is with https security. Infra and Application at every release and for every production environment is confirmed with DevSecOps standards.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
We follow the industry standards to manage any changes to our process/system. It includes, but not limited to:
1. Creating a request for change
2. Reviewing and assessing a request for change
3. Planning the change
4. Testing/assess the change
5. Creating a change proposal
6. Implementing changes
7. Reviewing change performance
8.Closing the process
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
We follow the industry standards for vulnerability management of our process/system. It includes, but not limited to:
1. Assess
2. Prioritize
3. Act
4. Reassess
5. Improve
Security analysts narrow down and define the assets to be assessed for vulnerabilities using network-based solution or using an installed sensor, or “agent,” on each asset. If any threat is found, we prioritize it based on an assigned value and add the threat context to the report. "PSIRT" (Product Security Incident Response Team) is effective in ensuring product security.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
""PSIRT"" (Product Security Incident Response Team) is effective in ensuring product security. We provide an IT platform equipped with the necessary functionalities for PSIRT operations, such as centralized management of vulnerability and threat information and configuration data, leveraging Hitachi's operational expertise. By combining Hitachi's proprietary vulnerability matching infrastructure with a cloud-based management platform that streamlines vulnerability management and incident response workflows, we enable accurate and rapid security operations.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
""PSIRT"" (Product Security Incident Response Team) is effective in ensuring product security.We provide an IT platform equipped with the necessary functionalities for PSIRT operations, such as centralized management of vulnerability and threat information and configuration data, leveraging Hitachi's operational expertise. By combining Hitachi's proprietary vulnerability matching infrastructure with a cloud-based management platform that streamlines vulnerability management and incident response workflows, we enable accurate and rapid security operations.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Supplier
Virtualisation technologies used
Other
Other virtualisation technology used
This will depend on buyer input.
How shared infrastructure is kept separate
We use Cloud shared service (Shared infrastructure) correlating with a buyers organisation roles and responsibilities and with their access right with isolation of data from each other.

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
We are BREEAM Certified.

Social Value

Social Value

Social Value

Tackling economic inequality

Tackling economic inequality

Hitachi has actively addressed workforce inequality, appointing Lorena Dellagiovanna as our first Chief Diversity Officer and board member in April 2021, alongside Claire Thomas as CDIO. Resulting Success: 1. Inclusive Recruitment and further Development Practices: We prioritise fair treatment and equal opportunities for contract workers, incorporating CV blind interviewing. Our self-directed DEI training platform including subjects of inclusive leadership, creating an inclusive culture, how to overcome bias and many other topics has boosted female and non-Japanese executives at Hitachi by 10%. Now Focusing on emerging talent, we sponsor the 'Festival of the Girl' in London. 2. Investment in Physical and Mental Health: We offer Financial Advice, Career Advice, and anonymous mental health support both internally, through our Mental Health First Aiders, and externally via Optum/MyHeathWebb. We have an Employee Assistance program that ensures employees, and their dependents have access to professional counselling should they require it. More widely, we implemented the Mental Health at Work commitment standards, tailored to the Hitachi workforce. We also have 4 dedicated sessions led by the Equality Institute on how to talk about gender identity, being an ally, using LGBTQ+ identity as a superpower and transgender 101. 3. Environmental Innovator: Hitachi aims to be an innovator, reducing carbon for governments, cities, and customers. The Environmental Vision emphasizes solving environmental issues for a higher quality of life and a sustainable society. Partnering with Rainforest Connection, Hitachi develops data-driven solutions to protect rainforests, combat illegal logging, and preserve biodiversity. As a Principal Partner of COP26, Hitachi contributed to decarbonization and climate action. Committed to a Net Zero society, Hitachi strengthens climate targets across the entire value chain by 2050. We were also key contributors at COP28. In conclusion, By implementing improvements and actively addressing inequality, Hitachi aims to create an inclusive and supportive work environment.

Pricing

Price
£160 to £1,535 a unit a day
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ian.blond@hitachids.com. Tell them what format you need. It will help if you say what assistive technology you use.