Kleip's Managed Enterprise Website and Email Hosting
This service is used by individuals and businesses of any size to host websites of any size, custom unlimited professional emails and other web applications as the customer requires.
Features
- WordPress, Linux and Windows Web Hosting
- Timeline Backup
- Domain Registration
- UK-London Based Datacentre
- Autoscaling Platform and Load Balancers
- FTP and SFTP
- Global CDN
- 24/7 network security
- Migrate In and Out With One Click
- Full control panel and WebMail
Benefits
- Host Unlimited Website with Unlimited Website Files
- Free Unlimited Custom Email Accounts 10Gb per Mailbox
- Unlimited Bandwidth
- Access Email From Anywhere with WebMail
- Access To Kleip's Optimised Wordpress CMS Hosting
- Host Shared, VPS or in our Dedicated Server in Oneclick
- Option To Choose Windows, Linux Web Hosting
- Agile Security With 24/7 Web Service Monitoring
- UK Data Jurisdiction
- Domain Privacy and Redaction
Pricing
£250 an instance a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at support@kleip.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 13
Service ID
3 1 6 0 9 9 1 2 4 9 3 9 3 9 9
Contact
COMPUTERKO LIMITED
Ian Mugray
Telephone: 07311100978
Email: support@kleip.co.uk
Service scope
- Service constraints
- None
- System requirements
-
- Personal Computer or Workstation
- An Up To Date Web Browser
- Domain Name Registration or Transfer or DNS Server
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
WeekDay:
Acknowledgement time 10 Minutes
Response time 10 Minutes to a Hours
Weekend:
Acknowledgement time an hour
Response time 30 Minutes to 4 Hours - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
-
Users Can;
Enquire About the Service
Request A Callback
Open A Support Request
Start A Complaint
Users Cannot;
Cannot Order A Service
Cannot Get Up Date Information Regarding a Ticket - Web chat accessibility testing
- N/A
- Onsite support
- Onsite support
- Support levels
-
Help Desk Support;
This is provided free of charge to all customers and users of our web portals.
DevOps Support;
This is provided free of charge to all customers
Account Manager;
This is provided for free to customers for account management related inquiries.
Onsite Support
This is provided at a cost with a daily rate card of 350 GBP ex VAT. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Customers will have access to numerous resources to assist with their day to day use of the service.
These are some of the resources you'd have access to;
1. Online documentation
2. Online explainer video introduction
3. Proposal of onsite training to suit customer wants
4. An Account Manager and Product Manager
5. etc - Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
-
Users of our portal will have access to the following tools to assist them to perform an end of contract data extraction using these two methods;
1. Using the Portal Migrate away tools that allow them to transfer their data to another provider.
2. Users can use the web portal file manager to manually perform a simple download of web data.
3. Users can also use the SFTP or FTP function to download files.
4. We can also use our deep access capability to extract data for our Customers after the contract is finished
5. Users can also have an access license for a period of 6 months to allow them transfer their data away - End-of-contract process
-
1. Domain registration or subscription if any comes to an end and must be transferred away.
2. Web Hosting packages will automatically be disabled after the contract is finished with an exception of a license to access the services only to extract data.
3. Our Support team will be on hands to assist with data transfer
There is no cost of the above unless the customer requires us to perform a service that is not specified in our contract.
Using the service
- Web browser interface
- Yes
- Using the web interface
-
Provision or decommission of Web Hosting Services
Order Domain Names
Add or Remove Emails
Control Panel Access with web hosting features - Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- None
- Web interface accessibility testing
- None
- API
- Yes
- What users can and can't do using the API
-
Register Domains
Domain Search
Domain Verification
Manage Hosting
Manage MSSDL Databases
Manage Packages
Timeline Backups
Provision VPS - API automation tools
- OpenStack
- API documentation
- Yes
- API documentation formats
- HTML
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Other
- Using the command line interface
-
SSH Access;
Manage Hosting
Manage MSSDL Databases
Manage Packages
Scaling
- Scaling available
- Yes
- Scaling type
-
- Automatic
- Manual
- Independence of resources
-
We can guarantee Users cannot be affected because the service leverages these two technologies;
1. Autoscale
2. Loadbalancing
It uses these two technologies to scale and balance out the load across multiple servers to ensure the integrity of the service is not compromised.
For example, if you have a surge in Users, the system will automatically notice this and deploy more servers to cater for your users and renders to the Users the service without any compromise as long as required. - Usage notifications
- Yes
- Usage reporting
- Other
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- 20i.com, Linode and AWS
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Hardware containing data is completely destroyed
- Equipment disposal approach
- In-house destruction process
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Web Files
- Emails
- Databases
- Backup controls
-
1. The Systems automatically backup once a week by default
2. There are timeline backup tool that allows users to perform daily backup once a day
3. There are recovery tools within the timeline backup feature that allows users to perform a restore.
4. There is the Cron or schedule feature that allows users to back up files (Emails, Web Files or Database) automatically in a schedule they may prefer
5. Etc - Datacentre setup
-
- Multiple datacentres with disaster recovery
- Multiple datacentres
- Single datacentre with multiple copies
- Scheduling backups
- Users schedule backups through a web interface
- Backup recovery
-
- Users can recover backups themselves, for example through a web interface
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
Our Standard SLA is 99.99% outside our planned maintenance.
Service credits are offered where it is claimed by the Customer and is approved on a pro-rata service loss basis.
For example, if you paid 10 GBP for 10 days worth of hosting and the service was partially or wholly unavailable for two days and we told you before we need a day to perform maintenance and the service worked for two 8 days. We will only refund 1 GBP for the loss. However, this must be documented by our customer and applied for within three months of the failure. - Approach to resilience
- This is available upon request.
- Outage reporting
-
We have a service status page that gives users real-time information on the service availability, and service updates of the numerous services or features of our service.
It also gives users prior information on system upgrades and maintenance.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
- Access restrictions in management interfaces and support channels
-
We give access to Users on a need basis as well as in a granular manner. This way only users with certain access rights can access management interfaces as well as support channels.
However, access restriction is a feature on single-tenant customers or contracts. - Access restriction testing frequency
- Less than once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Other
- Description of management access authentication
-
SSO using the following techniques;
LDAP
SAML - Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Dedicated device on a government network (for example PSN)
- Dedicated device over multiple services or networks
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Available on request.
- Information security policies and processes
-
We have implemented industry-proven policies and practices that allow us to securely deliver this service to you.
Reporting;
We have incident reporting and incident reporting tools that allow us to report outages, security breaches etc to the affected customers or stakeholders.
Our SA, Security Assurance procedures allow for periodic and real-time monitoring of our security and quality processes to ensure we are always compliant.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Our Changement continuously track the following components;
New Service Features
Service Features Iterations
Implemented Legislative Changes
Etc
For Performance, Security Vulnerability and cultural impact. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Threats are assessed via
Scheduled penetration testing
Breach report
On Spot checks
Security checks on iteration
Customer or Stakeholder Feedback
Once a vulnerability is identified, we use our resources to patch or upgrade the system depending on the severity of the security vulnerability.
We have a monitoring system that monitors the following;
Our Software stacks
Public resources
Online communities
Technology changes
etc
This way we become agile in fixing security issues as they arise. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
We have a system in place that continuously monitor our systems and how it is used in real-time.
We have workflows set up to ensure that once an issue reaches a limit or a trough, it triggers an alert or automatically secures our system from a breach or further breaches.
Our incident management policies allow us to fix issues as they occur to mitigate the impact on our service integrity. These policies allow for reactive, active and protective fixes to our systems. - Incident management type
- Supplier-defined controls
- Incident management approach
-
We have the following processes that manage our incident management;
1. 'User Control' features to report incidents
2. Customer Support Ticket Systems
3. Preset workflows to listen to system abusers, security issues etc
Users can report issues by using the following;
1. User Control Features
2. Customer Chat, Support Ticket system etc
Incident reports are provided to the product manager which may be available for audit by stakeholders.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- KVM hypervisor
- How shared infrastructure is kept separate
-
Different organisation data are logically or physically kept apart by the system's architectural design and the type of service to the organisation to the customer is subscribed.
Logical means we have for example used a database, or a multi-tenant architecture to separate Users or organisational data.
Physical means only one user or organisational data can be a tenant on a web hosting solution.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- Available Upon request
Social Value
- Fighting climate change
-
Fighting climate change
As an organisation we respond to climate change with the following;
We have a division within our company that reconditions PCs and other electronics for reuse in our local community. It is sustainable as we have managed to make this division profitable.
Also, we have set purchasing principles in purchasing products processed with green renewable energy in order to support our carbon neutral principles.
Pricing
- Price
- £250 an instance a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
-
Free Web Hosting for A Month For G Cloud 13 Customers.
All service features are included except for domain registration. - Link to free trial
- https://app.kleip.co.uk/login/demo
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at support@kleip.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.