Katapult Cloud Virtual Infrastructure
Katapult provides on-demand infrastructure which can scale to suit any requirement or demand, allowing you to launch enterprise production-ready virtual infrastructure in seconds to accommodate the most demanding and complex production workloads at any scale.
Features
- Free transfer IN / 1TB transfer OUT
- Use our OS templates or upload your own ISO
- 2 free snapshots per VM
- Free data on SDN between servers
Benefits
- Launch Virtual Infrastructure in seconds
- Easy to understand billing
Pricing
£0.00 to £0.00 a unit a second
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
2 9 5 1 8 0 3 3 4 3 6 6 8 1 4
Contact
Krystal Hosting Ltd
David Kimberley
Telephone: 020 3886 1396
Email: dave@krystal.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- N/A
- System requirements
- N/A
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within the hour.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- N/A
- Onsite support
- No
- Support levels
- N/A
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Please see the service documentation.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Please see the service documentation.
- End-of-contract process
- Please see the service documentation.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- N/A
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AAA
- Description of service interface
- N/A
- Accessibility standards
- WCAG 2.1 AAA
- Accessibility testing
- N/A
- API
- Yes
- What users can and can't do using the API
- N/A
- API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
- Please see the service documentation.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Please see the service documentation.
- Reporting types
-
- API access
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Please see the service documentation.
- Data export formats
- Other
- Other data export formats
- Please see the service documentation.
- Data import formats
- Other
- Other data import formats
- Please see the service documentation.
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Please see the service documentation. (SLA)
- Approach to resilience
- Please see the service documentation. (SLA)
- Outage reporting
- Please see the service documentation. (SLA)
Identity and authentication
- User authentication needed
- Yes
- User authentication
- 2-factor authentication
- Access restrictions in management interfaces and support channels
- Please see the service documentation.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- Less than 1 month
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- British Assessment Bureau
- ISO/IEC 27001 accreditation date
- 13th May 2020
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Please see the service documentation.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Please see the service documentation.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Please see the service documentation.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Please see the service documentation.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Please see the service documentation.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
Please see the service documentation. - Covid-19 recovery
-
Covid-19 recovery
Please see the service documentation. - Tackling economic inequality
-
Tackling economic inequality
Please see the service documentation. - Equal opportunity
-
Equal opportunity
Please see the service documentation. - Wellbeing
-
Wellbeing
Please see the service documentation.
Pricing
- Price
- £0.00 to £0.00 a unit a second
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Please see the service documentation.