Element Matrix Services
Matrix Server Hosting - build on Matrix without having to own and manage your Matrix infrastructure. Element Matrix Services (EMS) is a robust and reliable hosting service for fast, secure real time communication.
Features
- Fully managed hosting
- Multi-tenant or dedicated hosting
- Custom domains
- End-to-End Encryption
- Hosted bridging
- Universal chat
- Decentralised
- Run by the experts
Benefits
- Inherent resilience through decentralisation
- Solid foundations, supported by experts
- Fully managed hosting for fast, robust performance
- Speed development by building on top of hosted Matrix infrastructure
- End-to-end encryption for secure chat
- Control of your data, even when it’s hosted by us
- Build and embed your own encrypted chat
- Open network, with bridging to other platforms
- Scalable to support up to millions of users
Pricing
£1.08 a licence
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
2 5 2 0 9 6 4 6 7 9 9 3 4 4 7
Contact
New Vector Ltd
Ron Aherne
Telephone: 07885553945
Email: roba@element.io
Service scope
- Service constraints
- None
- System requirements
-
- None for cloud.
- An environment where the server can run (if on-premise).
- We recommend a Kubernetes container environment (if on-premise)
- But all modern infrastructure is supported (if on-premise).
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 1 business day
- User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- Web chat is provided through the Element app. We have iterated our standard design and 'large text mode' directly with education-based Buyers This process involved user testing and validation. We have also worked extensively with Mozilla’s accessibility team to support screenreaders and achieve AAA WCAG compliance (c.f. https://www.marcozehe.de/how-to-use-element-and-matrix-with-a-screen-reader/)
- Onsite support
- Yes, at extra cost
- Support levels
- Remote support is provided as part of the services between 0900-1800 UK time, which can be delivered at Level 2 and/or Level 3. We can provide technical account managers, who oversee and coordinate the delivery of ongoing support. Associated costs are provided in the pricing matrix.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We currently provide remote or onsite training, which can of course be tailored to the users and controllers. We also have comprehensive user guides and user videos to support setup and familiarisation.
Our Element Enterprise Installer service also makes setting up a Matrix deployment quick, intuitive and secure, leveraging proven cloud-native technologies such as containers and Kubernetes if you wanted to bring your Matrix deployment on-premise. Deployments can be migrated between any Kubernetes-certified environments. Furthermore, our bridging capabilities then allows users and organisations to remain connected to existing services and platforms, to enable a gradual transition to their new cloud service. - Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
- If the customer is self-hosting then they will, by design, own and retain complete control of their data throughout. When the customer is hosted in Element’s cloud (via EMS) and users wanted to extract their data, they can request a database export (PostgresSQL database dump.) This can export the whole database (if the user has the required level of administrative access) or specific extracts (from rooms.) Finally, there is a client-side option that allows end users to export a room’s history, post-decryption. This is useful for archiving content, whereas the DB dump is better suited for migrating whole servers. Self-managed, on premise deployments have the same options.
- End-of-contract process
- If the customer is self-hosting then they will, by design, own and retain complete control of their data throughout. When the customer is hosted in Element’s cloud (via EMS) and users wanted to extract their data, they can request a database export (PostgresSQL database dump.) This can export the whole database (if the user has the required level of administrative access) or specific extracts (from rooms.) Finally, there is a client-side option that allows end users to export a room’s history, post-decryption. This is useful for archiving content, whereas the DB dump is better suited for migrating whole servers. Self-managed, on premise deployments have the same options.
Using the service
- Web browser interface
- Yes
- Using the web interface
-
Users can create an online account to manage their products and services through a web portal interface. Account creation is self-service. The interface provides users with a variety of functions including:
The ability to create and manage Matrix homeserver (and hosted client instances).
Purchasing, hosting and configuration of Matrix related services and integrations - bots, bridges, service extensions.
Managing subscriptions, invoicing, account and payment details. Viewing historic usage and invoices.
Administration tools for a variety of homeserver management functions including creating homeserver users accounts, setting / resetting passwords, broadcasting server messages, viewing and managing homeserver rooms and resource utilisation.
The web interface provides a rich UI for management of user services, including the ability to configure core server configuration, specify user registration and authentication mechanisms, setting branding, etc. Changes made in the UI will be propagated to the running services when saved.
Server and service configuration is currently limited to a single user login associated with the account. Account authentication is achieved through username and password credentials (with optional two factor authentication), or via Single Sign On e.g. Google account authentication. Only successfully authenticated users are able to view or make changes to products and services associated with an account. - Web interface accessibility standard
- WCAG 2.1 AAA
- Web interface accessibility testing
- We have iterated our standard design and 'large text mode' directly with education-based Buyers This process involved user testing and validation. We have also worked extensively with Mozilla’s accessibility team to support screenreaders and achieve AAA WCAG compliance (c.f. https://www.marcozehe.de/how-to-use-element-and-matrix-with-a-screen-reader/)
- API
- Yes
- What users can and can't do using the API
- Element’s offering is based on the Matrix protocol, which is designed as a giant API (https://spec.matrix.org/v1.2/). As such, essentially anything can be done via the API: user management, room management, moderation, etc. In the case of Matrix hosting, the user (i.e. administrator of the service) will probably mostly interact with the Client-Server API (https://spec.matrix.org/v1.2/client-server-api/) as they set up a client to use the resources of the server, but may have to interact with the Application Service API (https://spec.matrix.org/v1.2/application-service-api/), for example if they try to integrate their communication system with a third party via bridging, or the Identity Service API (https://spec.matrix.org/v1.2/identity-service-api/) if they are trying to use existing identifiers with the service.
- API automation tools
-
- Ansible
- Terraform
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- MacOS
- Other
- Using the command line interface
-
Configuration via the command line is done using standard tools such as cURL, and as such is compatible with any operating system where cURL runs (ie: Linux, Windows via the WSL, macOS, the BSD family and other variants of UNIX.
The command line interface available for automating EMS is described in https://spec.matrix.org and https://matrix-org.github.io/synapse/latest/usage/administration/admin_api/
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- Our use of Kubernetes environments ensures the logical separation of users and, therefore, mitigates the demand and impact of other users and deployments. Our Element Enterprise Installer service makes setting up a Matrix deployment quick, intuitive and secure, leveraging proven cloud-native technologies such as containers and Kubernetes. Deployments can be migrated between any Kubernetes-certified environments. Furthermore, our bridging capabilities then allows users and organisations to remain connected to existing services and platforms, to enable a gradual transition to their new cloud service.
- Usage notifications
- Yes
- Usage reporting
- Other
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Number of active instances
- Other
- Other metrics
- We can provide Grafana dashboards showing deep server analytics
- Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Conversion data
- Transferred files
- Underlying databases
- Backup controls
- Users may backup their data themselves by exporting it; alternative EMS can provide regular snapshot backups of database and filesystem state in order to avoid data loss. The schedule is currently defined by the EMS administrator for the account rather than by users.
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Users contact the support team to schedule backups
- Backup recovery
- Users can recover backups themselves, for example through a web interface
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- Other
- Other protection between networks
- Data flowing from a customer’s network to our network is protected at all times by TLS 1.3 encryption. A second layer of encryption is enabled at the content layer, in the form of end-to-end encryption (Olm and Megolm, variants of the double-ratchet protocol).
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
-
Each customer service is logically separated using industry best-practices
Furthermore, in Matrix, events in rooms are end-to-end encrypted, meaning as well as being encrypted over the wire (TLS), events (messages) also encrypted at rest on the server. They can only be read by the client (the user device) which has the keys to decrypt the message.
This provides multiple levels of protection: separation between customers, encryption of data in transit, and encryption of data at rest.
Availability and resilience
- Guaranteed availability
-
99.5% availability by default
Credit to the customer’s account. - Approach to resilience
- The service is designed to be decentralised, with multiple servers federating together to create the service. For instance, chat room data doesn’t exist only on a given server but on the servers of all end-users participating in the conversation. Furthermore, server X going down and becoming inaccessible doesn’t affect another server Y’s users’ capacity to use the service. Only users of server X are affected. These properties create a built-in layer of resiliency.
- Outage reporting
- We have support rooms with customers to discuss outages and their resolution. We also would contact by email if necessary, but have never had a customer outage that needed such a step.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Join permissions on rooms. Rooms can be publicly joinable, invite-only, or scoped to the Space (Matrix Room container.) Rooms can also be restricted to a given server. Management interfaces (e.g. EMS) are additionally restricted by role-based access controls.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
-
- Dedicated device on a government network (for example PSN)
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- Used at OFFICIAL SENSITIVE on current UK Gov deployments.
- Successfully evaluated at SECRET in a Test & Dev environment.
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Cyber Essentials Plus
- Information security policies and processes
-
Our approach to information security is based on the principles defined by ISO 27001 as much as possible, in the sense that best practice risk management principles are followed for policy and procedure changes, as well as embedded within day to day information security work.
In terms of specific policies and procedures, we have an IT Information Security Policy in place, which covers both server-side and workstation level security, which is then complemented by other policies and procedures:
- Patching Policy;
- Incident Response Procedure;
- Personal Data Breach Notification Procedure;
- BYOB and Device Security Procedures and Guides;
- Privileged Access Controls and User Entitlement Reviews.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- We use Ansible and Terraform. Since everything is infrastructure-as-code, we enforce code reviews from peers and have CI checking and validating patches.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Initially, vulnerabilities are assigned a ticket in an internal repository. For third-party software, we triage (looking at publicly available solutions), assess exposure and disable/work around the affected functionality until a patched version is available. We monitor security announcements, mailing lists, maintain in-house vulnerability scanning and pentesting.
For our own software, our engineering team works on a fix. Depending on severity, we either remediate the issue immediately or wait for a patched release. Finally, we verify that the issue no longer affects us. Vulnerabilities are reported by external researchers via security@matrix.org or security@element.io, or discovered in-house. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
We monitor alerts for important events, such as sign-ins to important accounts. We perform weekly in-house port and vulnerability/CVE scans to monitor changes in our external surface.
If a potential compromise is detected, a ticket is filed internally, detailing known information. The incident is then also raised in an internal security room and given top priority.
The Ops and Security teams cooperatively assess and investigate the incident to determine what, if anything, needs to be done to sanitise (rebuilding hosts, rotating secrets, etc). In the event of a data breach, the internal Data Breach Response and Notification Procedure is followed. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Incidents are either reported to us by external researchers via security@matrix.org or security@element.io, or discovered in-house. If a potential compromise is detected, a ticket is filed internally, detailing known information. The incident is then also raised in an internal security room and given top priority.
The Ops and Security teams cooperatively assess and investigate the incident to determine what, if anything, needs to be done to sanitise (rebuilding hosts, rotating secrets, etc). In the event of a data breach, the internal Data Breach Response and Notification Procedure is followed.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- Other
- Other virtualisation technology used
- We use Kubernetes containers to isolate separate applications from each other, and to separate different user instances from each other.
- How shared infrastructure is kept separate
- We use Kubernetes containers to isolate separate applications from each other, and to separate different user instances from each other.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- We use AWS as our datacentres, who adhere to the EU code of conduct for energy-efficient datacentres. For more information please visit https://aws.amazon.com/about-aws/sustainability/
Social Value
- Fighting climate change
-
Fighting climate change
We have invested heavily in designing Matrix to provide robust decentralised access control and permissions without wasting any electricity: Matrix uses a minimal energy footprint and is designed specifically for low-latency decentralised communication rather than using blockchains of any kind. We also have a Carbon Reduction Plan, which is available on request (as submitted in Lot 4). - Tackling economic inequality
-
Tackling economic inequality
To provide training opportunities for underrepresented groups, Element is sponsoring interns through the Outreachy organisation. Outreachy provides internships to people subject to systemic bias and impacted by underrepresentation in the technical industry where they are living. - Equal opportunity
-
Equal opportunity
Operating in a technical industry means diversity is a huge focus of ours. We believe that having a diverse team brings fresh ideas and approaches, making us more creative and effective in our work. We reflect this commitment throughout the business but mostly in our hiring practises. Some things we have done recently include: We are providing unconscious bias training to all of our team that are part of the interview process; We review our job descriptions against the industry standard, to ensure we are using inclusive language; We have extended our candidate sourcing to include agencies and job boards with a focus on diversity hiring; We work with organisations providing internships to diverse candidates to ensure we are providing equal opportunities where we can. Being a global team also means our focus needs to be on making the wider team feel that Element is an inclusive, accepting and safe place to work. Some things we have done recently to promote inclusion include: We run our company meeting in three different time zones to make sure everyone in the team has time with the founders and doesn’t miss important announcements; We’ve rolled out a company events calendar including local celebrations specific to each country; We’ve rolled out a new holiday policy which recognises the local bank holidays for each region and have promoted them company wide for transparency; We celebrate our differences by incentivising the creation of employee led groups, like the Queer Group; Inclusion is not only activities we promote, but also in our day to day behaviours. Here are some examples we try to live by: We respect each others time zones, making sure we work asynchronously when needed; We translate things where we can, whether this be official documents or in a chat room. - Wellbeing
-
Wellbeing
Our main goal for wellbeing at Element is to make sure our team feels safe, productive and happy at work. Transparency - We are committed to being a transparent organisation so we can build trust with our team. Only when trust is present, do people feel they can be open and honest about their wellbeing needs. Senior Leadership - Our senior leaders are our biggest wellbeing advocates. Having them onboard and communicating about the importance of wellbeing regularly, means our team can feel safe to manage their wellbeing in their own way. Flexibility - We know everybody's needs around mental health are different. We are committed to giving the team the time and space they need to manage their own wellbeing and giving managers the discretion to offer flexibility when it is needed. Open Communication - We regularly check in with our team through various surveys, feedback forms and 121 chats to make sure our wellbeing offering is still fit for purpose. We also provide wellbeing check in sessions and open lines of communication, where people can come and talk openly ad hoc and in a safe environment Benefits Offering - Having a consistent feedback loop on wellbeing means we are consistently reviewing our wellbeing offering to make sure we are providing our team with the right tools. That currently consists of lots of annual leave to take time to de-stress, private medical insurance support including access to mental health services as well as flexible hours to avoid burnout. Manager Resources - We also provide tools for managers to help them support their teams wellbeing such as wellbeing guides and mental health support guides for managers Events- We make sure to recognise things like Mental Health Awareness Week and Wellbeing at Work Week, organising events and talks to promote wellbeing.
Pricing
- Price
- £1.08 a licence
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Trial Enterprise licences for up to 600 users for 1 month, including our Enterprise Installer tool to set up your own deployment. Bridges (from our existing library) on a case-by-case basis.