Forge Cloud Resiliency
Forge’s managed service solutions, built on Rubrik’s Security Cloud, enable organisations to control their entire backup environment ensuring resiliency against data loss, natural disasters and cyber attacks
Features
- Schedule backups that meet your requirements using Rubrik SLA domains
- Granular recovery of objects across subscriptions
- Store your backup data in our default location or Azure
- Perform restoration of data with full fidelity and user mapping
- Quickly locate records you need to restore through keyword search
- Review backup and restore details via the Rubrik Security Cloud
- Assign roles for administrative specific responsibilities on backup recoveries
- Gain full visibility of backup and restore service is used
Benefits
- Protects against data loss, natural disasters, cyber attacks
Pricing
£1.70 to £10.00 a user a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 7 2 8 2 8 7 2 1 3 5 5 2 0 3
Contact
FORGE TECHNOLOGIES LTD
Jason Osmond
Telephone: 07931391290
Email: jason.osmond@forge-technologies.com
Service scope
- Service constraints
- English Language Support Desk
- System requirements
-
- Internet Connection
- Rack Units expected standard 19” width rack with standard depth
- IP Addresses on customer’s internal network are required for devices
- Assigned VLANs for Management Network Data Protection Networ
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Within 4 hours during business hours (Mon - Fri / 8am - 6pm)
Weekends and out of hours is available upon request - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
-
Fully managed solution - Forge take care of every aspect of the organisations backup and recovery processes, from backup support to carrying out restores.
- 3rd Line Support - Forge will provide 3rd line support for software and hardware issues, as well as training for the end user to carry out 1st and 2nd line tasks - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
During the service design phase, a transition manager will be assigned, and you will have the opportunity to meet with them prior to the delivery phase commencing. The assigned transition will work hand in hand with the delivery members to ensure structured communications, performance and reporting
In addition to the service delivery manager, Forge consultants from the scoping phase will either transition into delivery roles, or participate in ongoing service reviews. This approach helps ensure continuity of knowledge and that swift adjustments are made during the engagement to achieve the original outcomes.
Forge will work to mobilise all service team members as efficiently as possible for each customer engagement. The specific team members will be identified and allocated early in the scoping phase. Any incremental client specific clearances, security briefings, site inductions or training will be completed as early as possible, to ensure that they can ‘hit the ground running’ and deliver value from day-1 of the engagement. Forge will coordinate all mobilisation and on/off-boarding activity to minimise any additional overhead to customer stakeholders. - Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
-
At the conclusion of a Cloud Resiliency engagement, we will conduct thorough transition and handover activities to your in-house team. This typically includes
• Knowledge transfer sessions
• Lessons learned workshop with key stakeholders
• Handover of shared document libraries, including the necessary tools, data/reporting outputs, processes, and training documentation
• End-of-contract review and sign-off against the agreed Scope of Works - End-of-contract process
-
• Knowledge transfer sessions
• Lessons learned workshop with key stakeholders
• Handover of shared document libraries, including the necessary tools, data/reporting outputs, processes, and training documentation
• End-of-contract review and sign-off against the agreed Scope of Works
Using the service
- Web browser interface
- Yes
- Using the web interface
- When onboarded Users will be given access to a Web Interface allowing creation and scheduling of jobs and ad-hoc execution of jobs as well as reporting
- Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- Web Interface support standard browser accessibility features and has been tested with MS Edge, Google Chrome and Safari
- Web interface accessibility testing
- Tested with MS Edge, Google Chrome and Safari
- API
- Yes
- What users can and can't do using the API
- Rubrik is an API 1st technology, with all features and functionalities accessed in this manner.
- API automation tools
-
- Ansible
- Chef
- OpenStack
- SaltStack
- Terraform
- Puppet
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- MacOS
- Other
- Using the command line interface
- All APIs available on Rubrik systems are also available as command lines in rbkcli, which you can install to run commands against your CDM remotely. rbkcli also extends Rubrik’s API functionality by allowing for customized scripts
Scaling
- Scaling available
- Yes
- Scaling type
-
- Automatic
- Manual
- Independence of resources
- As part of the Service definition we identify the local peak load required and provide with in the service localized private resources to mangle that load
- Usage notifications
- Yes
- Usage reporting
-
- Other
- Other usage reporting
- Daily usage reports are includes in service
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- Disk
- Network
- Number of active instances
- Other
- Other metrics
- Retention Points
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Assured Data Protection
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Encryption of all physical media
- Other
- Other data at rest protection approach
- Private resources delivered into customers private data centre are subject to the customers DC protection process alongside Data at rest encryption
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Private Data Center Servers Physical and Virtual
- Public Cloud IaaS
- Microsoft 365 Services Share point Online Teams, Ondrive and Exchange
- Platform ass a Service SQL No_SQL
- Backup controls
- Users have full control over Job definition and schedule as well as data retention
- Datacentre setup
-
- Multiple datacentres with disaster recovery
- Multiple datacentres
- Single datacentre with multiple copies
- Single datacentre
- Scheduling backups
- Users schedule backups through a web interface
- Backup recovery
-
- Users can recover backups themselves, for example through a web interface
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- Contract Dependent Forge Cloud Resiliency engagements can be structured to provide a fixed set of outcomes, to provide an agreed set of services, or on a time and materials basis. We are open to innovative commercial models, including payments based upon milestones/outcomes, gain-share/pain-share mechanisms, SLAs and service credits.
- Approach to resilience
-
Masterless technology
Redundant-everything - Outage reporting
-
Account Managers
Online Portal
Email
Identity and authentication
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- The access to the interface is restricted by the customers.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Forge maintain an Information Management System designed to meet the requirements of ISO 27001:2017 in pursuit of its primary objectives
The policy of Forge to:
Make the details of our policy known to all other interested parties including external and determine the need for communication and by what methods relevant to the business management system.
Comply with all legal requirements, codes of practice and all other requirements applicable to our activities; we are committed to satisfy applicable requirements related to information security and the continual improvement of the ISMS.
Provide all the resources of equipment, trained and competent staff and any other requirements to enable these objectives to be met;
Ensure that all employees are made aware of their individual obligations in respect of this information security policy;
Maintain a management system that will achieve these objectives and seek continual improvement in the effectiveness and performance of our management system based on “risk”.
This information security policy provides a framework for setting, monitoring, reviewing and achieving our objectives, programmes and targets. The business management system is regularly reviewed by “Senior Leadership Team” to ensure it remains appropriate and suitable to our business and is subject to internal/external annual audits.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All controlled elements of the service are managed through our own internal processes overseen by the Technical Operations Director The Forge Change Management process is based on the ITIL framework and is integrated into our ITSM platform.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Vulnerability management is dealt with on a case by case basis and fixes and patches are implemented inline their severity.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Using provided monitoring and reporting portal their proactive account managers inform customers of issues as the happen
- Incident management type
- Supplier-defined controls
- Incident management approach
- Incident management is dealt with by the Technical Operations Director and any other relevant members of staff
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- Other
- Other virtualisation technology used
- Rubrik Multi-tenancy is at the object level. You can think of a Rubrik Cluster as a collection of objects: sources from where data is getting backed up, targets where backups are stored, and security principals (users and service accounts) that glue those relationships. As a managed service provider, you can host a Rubrik Cluster that grows linearly with your backup business. With Rubrik CDM’s object-level multi-tenancy, you can create virtual instances of Rubrik Cluster for each of your tenants.
- How shared infrastructure is kept separate
- With Rubrik CDM’s object-level multi-tenancy, we create virtual instances of Rubrik Cluster for each of your tenants
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Equal opportunity
- Wellbeing
Fighting climate change
As a digital transformation partner, Forge Technologies prioritizes environmental sustainability in every aspect of our operations. With technology embedded in our name, we recognise the significant role environmentalism plays in our work. Our policy revolves around conducting operations with environmental sensitivity to minimise any adverse impacts.
Each member of the Forge Technologies team is dedicated to upholding our legal obligations and adhering to subscribed requirements. We aim to conserve natural resources, prevent pollution, and eliminate environmental hazards associated with our activities.
Operating as a fully remote team, Forge Technologies benefits from a virtual workspace. This approach not only offers flexibility and efficiency but also contributes positively to the environment. Without a central office, we avoid the energy consumption and carbon emissions associated with powering and heating traditional office spaces, as well as the acquisition of physical equipment and furniture.
Furthermore, our remote setup fosters a paperless, digital-first environment. Documents are stored and shared electronically, reducing the need for printing and minimising paper waste. This commitment to sustainability aligns with our broader mission of leveraging technology to drive positive change while minimizing our ecological footprintEqual opportunity
Forge Technologies is dedicated to fostering an inclusive and diverse work environment, guided by our Equal Opportunities Policy. This policy is underpinned by several key principles:
Firstly, we uphold a steadfast Commitment to Equality, ensuring that all individuals, regardless of age, gender, race, religion, belief, or ability, have equitable opportunities within our organisation and its partnerships.
Secondly, we prioritise creating a Positive Work Environment, where every member of our team feels valued, respected, and supported. We are committed to fostering a climate free from intimidation and harassment, allowing everyone to thrive and achieve their full potential.
Thirdly, we advocate for Inclusive Rights, recognising that every individual should have equal access to the benefits and services offered by Forge Technologies. We are dedicated to breaking down barriers and ensuring that no one is excluded based on any characteristic.
Moreover, we emphasise Respect for Differences, understanding that diversity enriches our organization. While we strive to treat everyone equally, we also acknowledge and respect the diverse life experiences, perspectives, and backgrounds that each individual brings to the table.
Finally, we actively promote Positive Attitudes and Relationships within our workplace. Our policies, procedures, and activities are intentionally designed to foster a culture of inclusivity, mutual respect, and collaboration. We believe that by embracing diversity and promoting positive interactions, we can cultivate a sense of cohesion, belonging, and shared purpose among all members of our team.Wellbeing
Forge Technologies prioritizes the well-being of its employees through comprehensive policies and initiatives aimed at promoting physical, mental, and emotional health. Our well-being framework encompasses the following key areas:
Work-Life Balance:
We recognise the importance of maintaining a healthy equilibrium between work responsibilities and personal life. Through flexible scheduling options and supportive management practices, we empower our employees to prioritise their well-being outside of work commitments.
Mental Health Support:
Mental health is a crucial aspect of overall well-being. Forge Technologies provides extensive resources and support for mental health, including access to counseling services, mindfulness programs, and educational workshops. We strive to foster a culture where mental health concerns are destigmatised and individuals feel comfortable seeking assistance when needed.
Physical Health Initiatives:
Physical health is essential for overall wellness. We proactively promote physical well-being through initiatives such as subsidised gym memberships, wellness challenges, on-site fitness classes, and regular health screenings. These programs aim to encourage healthy habits and prevent illness, contributing to the long-term health of our employees.
Flexible Working Arrangements:
Recognising that every employee has unique needs and commitments outside of work, we offer flexible working arrangements, including remote work options and flexible hours. This flexibility enables our team members to better manage their personal and professional responsibilities, ultimately enhancing their overall well-being and job satisfaction.
Employee Assistance Programs (EAP):
We understand that personal challenges can impact an individual's ability to perform effectively at work. To support our employees during difficult times, we provide access to confidential Employee Assistance Programs. These services offer professional assistance and guidance to help employees navigate personal problems, mental health concerns, financial challenges, and other issues that may affect their well-being and performance.
Pricing
- Price
- £1.70 to £10.00 a user a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
-
Free POC's of service can be arranged with scope and time of POC agreed on a case by case basis
POC's do not include data extraction at end of trial