IOT - Internet of Things Capability
Hitachi serving various industries with high standards of expertise of Cloud engineering, IoT/IIoT/Mixed reality. Hitachi Industry Cloud has three major addressable industries/focus areas: Manufacturing, Energy & Mobility
Features
- Edge computing
- Mixed reality with Digital and Process twin
- Optimization of Resources with Sustainability
- Data analytics
- Cloud Service configuration, dashboards and reports
Benefits
- Descriptive, Perspective and Predictive analytics for maintenance and operational people,
- Manufacturing Insights through Intelligent dashboards and reporting
- Efficient Manufacturing process implementation reducing carbon footprint and energy consumption
- Increasing productivity with analytics
- Enabling Subject matter expert for process optimization
Pricing
£160 to £1,535 a unit a day
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 4 6 9 3 4 1 6 8 5 2 3 7 3 4
Contact
HITACHI DIGITAL SERVICES UK LIMITED
Ian Blond
Telephone: 07707585971
Email: ian.blond@hitachids.com
Service scope
- Service constraints
- The service is limited with SLA offered by Public Cloud service provider and its availability in the region.
- System requirements
-
- Buyers will purchase Cloud service subscription with required accessing rights
- Buyer will pay the captial expense (Upfront Cost )
- And operational cost depending on cloud services usage
- All third party license fees will be paid by Buyer
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Monday to Friday, 9am -5pm UK time
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- N/A
- Onsite support
- Yes, at extra cost
- Support levels
-
The support is with extra cost as per the Client requirements which will be in line with ITIL process. The support is with 5(days) X 8 (Hours), 5X24, 8X24 Hours support. There are three level of support L1, L2, L3 level support with ticketing categories and its priority.
The Cloud engineer or technical manager will be provided as per the agreed support model. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Registering at application and then users can log in after validating their credentials. In some case users will be invited to register as per the business requirements where they will be educated to use the services.
The training is also provided to use the solutions with extra cost.
The training documents are also provided to use the solution and to maintain. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- At end of contract we assist clients for safe data extraction for additional cost.
- End-of-contract process
- Depends on the statement of work we align with the customer at the end of the contract. We provide maintenance and technical support for the live systems at an additional cost.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Yes we provide web interface as per the need of the individual buyer and the cost associated will depend on the requirements. We provide admin-like access to the client's hosted UI or we own that permission depending on the use-case and our discussions.
- Web interface accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web interface accessibility testing
- N/A
- API
- Yes
- What users can and can't do using the API
- Yes with extra cost depending on the buyers needs. Industry standard automation tools works with our service’s API. User specific permissions and restrictions are also enforced as needed. We provide documentation for the same.
- API automation tools
-
- Ansible
- Chef
- OpenStack
- Terraform
- Puppet
- API documentation
- Yes
- API documentation formats
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- MacOS
- Using the command line interface
- Yes with extra cost. We include all the UI user functions in the command line and also programmatic functions to debug any future issues. We provide documentation for accessing and controlling through the CLI.
Scaling
- Scaling available
- Yes
- Scaling type
-
- Automatic
- Manual
- Independence of resources
- The solutions are Multi tenancy and using their own resources. The users services are not affected as used Cloud best practices for isolation of data and services.
- Usage notifications
- Yes
- Usage reporting
-
- API
- SMS
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- Backup controls
- As per Disaster recovery/data retention/back up strategy of the organization
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Users contact the support team to schedule backups
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- The availability depends on Customer requirement. It is aligned with the Cloud service provider SLA and offered methods like Active-Active regions; Active - passive regions.
- Approach to resilience
- The availability is depending on Customer requirement. It is aligned with Cloud service provider SLA and offered methods like Active Active regions; Active - passive regions. We also have load balancing and Business continuity and Disaster policy.
- Outage reporting
- Email / text notification to users. Dashboard display is also available as per users requirements.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Expose management interfaces only to dedicated management networks . We limit authorised inbound IP addresses to those used by dedicated management devices. Deploy jump servers where you need to expose management interfaces to less trusted networks.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
- Dedicated device on a segregated network (providers own provision)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 14/04/2021
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- The data is protected with appropriate encryption and SSL/ TLS (1.2) certifications the network are protected through Vnet and VPN cloud Patterns. The traffic has layer 4 and layer 7 security. The end points are protected and URL is with https security. Infra and Application at every release and for every production environment is confirmed with DevSecOps standards.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
We follow the industry standards to manage any changes to our process/system. It includes, but not limited to:
1. Creating a request for change
2. Reviewing and assessing a request for change
3. Planning the change
4. Testing/assess the change
5. Creating a change proposal
6. Implementing changes
7. Reviewing change performance
8.Closing the process - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
We follow the industry standards for vulnerability management of our process/system. It includes, but not limited to:
1. Assess
2. Prioritize
3. Act
4. Reassess
5. Improve
Security analysts narrow down and define the assets to be assessed for vulnerabilities using network-based solution or using an installed sensor, or “agent,” on each asset. If any threat is found, we prioritize it based on an assigned value and add the threat context to the report. "PSIRT" (Product Security Incident Response Team) is effective in ensuring product security. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- ""PSIRT"" (Product Security Incident Response Team) is effective in ensuring product security. We provide an IT platform equipped with the necessary functionalities for PSIRT operations, such as centralized management of vulnerability and threat information and configuration data, leveraging Hitachi's operational expertise. By combining Hitachi's proprietary vulnerability matching infrastructure with a cloud-based management platform that streamlines vulnerability management and incident response workflows, we enable accurate and rapid security operations.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- ""PSIRT"" (Product Security Incident Response Team) is effective in ensuring product security.We provide an IT platform equipped with the necessary functionalities for PSIRT operations, such as centralized management of vulnerability and threat information and configuration data, leveraging Hitachi's operational expertise. By combining Hitachi's proprietary vulnerability matching infrastructure with a cloud-based management platform that streamlines vulnerability management and incident response workflows, we enable accurate and rapid security operations.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- Other
- Other virtualisation technology used
- This will depend on buyer input.
- How shared infrastructure is kept separate
- We use Cloud shared service (Shared infrastructure) correlating with a buyers organisation roles and responsibilities and with their access right with isolation of data from each other.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- We are BREEAM Certified.
Social Value
- Social Value
-
Social Value
Tackling economic inequalityTackling economic inequality
Hitachi has actively addressed workforce inequality, appointing Lorena Dellagiovanna as our first Chief Diversity Officer and board member in April 2021, alongside Claire Thomas as CDIO. Resulting Success: 1. Inclusive Recruitment and further Development Practices: We prioritise fair treatment and equal opportunities for contract workers, incorporating CV blind interviewing. Our self-directed DEI training platform including subjects of inclusive leadership, creating an inclusive culture, how to overcome bias and many other topics has boosted female and non-Japanese executives at Hitachi by 10%. Now Focusing on emerging talent, we sponsor the 'Festival of the Girl' in London. 2. Investment in Physical and Mental Health: We offer Financial Advice, Career Advice, and anonymous mental health support both internally, through our Mental Health First Aiders, and externally via Optum/MyHeathWebb. We have an Employee Assistance program that ensures employees, and their dependents have access to professional counselling should they require it. More widely, we implemented the Mental Health at Work commitment standards, tailored to the Hitachi workforce. We also have 4 dedicated sessions led by the Equality Institute on how to talk about gender identity, being an ally, using LGBTQ+ identity as a superpower and transgender 101. 3. Environmental Innovator: Hitachi aims to be an innovator, reducing carbon for governments, cities, and customers. The Environmental Vision emphasizes solving environmental issues for a higher quality of life and a sustainable society. Partnering with Rainforest Connection, Hitachi develops data-driven solutions to protect rainforests, combat illegal logging, and preserve biodiversity. As a Principal Partner of COP26, Hitachi contributed to decarbonization and climate action. Committed to a Net Zero society, Hitachi strengthens climate targets across the entire value chain by 2050. We were also key contributors at COP28. In conclusion, By implementing improvements and actively addressing inequality, Hitachi aims to create an inclusive and supportive work environment.
Pricing
- Price
- £160 to £1,535 a unit a day
- Discount for educational organisations
- No
- Free trial available
- No