COMPUTERKO LIMITED

Kleip's Managed Enterprise Website and Email Hosting

This service is used by individuals and businesses of any size to host websites of any size, custom unlimited professional emails and other web applications as the customer requires.

Features

  • WordPress, Linux and Windows Web Hosting
  • Timeline Backup
  • Domain Registration
  • UK-London Based Datacentre
  • Autoscaling Platform and Load Balancers
  • FTP and SFTP
  • Global CDN
  • 24/7 network security
  • Migrate In and Out With One Click
  • Full control panel and WebMail

Benefits

  • Host Unlimited Website with Unlimited Website Files
  • Free Unlimited Custom Email Accounts 10Gb per Mailbox
  • Unlimited Bandwidth
  • Access Email From Anywhere with WebMail
  • Access To Kleip's Optimised Wordpress CMS Hosting
  • Host Shared, VPS or in our Dedicated Server in Oneclick
  • Option To Choose Windows, Linux Web Hosting
  • Agile Security With 24/7 Web Service Monitoring
  • UK Data Jurisdiction
  • Domain Privacy and Redaction

Pricing

£250 an instance a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at support@kleip.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

3 1 6 0 9 9 1 2 4 9 3 9 3 9 9

Contact

COMPUTERKO LIMITED Ian Mugray
Telephone: 07311100978
Email: support@kleip.co.uk

Service scope

Service constraints
None
System requirements
  • Personal Computer or Workstation
  • An Up To Date Web Browser
  • Domain Name Registration or Transfer or DNS Server

User support

Email or online ticketing support
Email or online ticketing
Support response times
WeekDay:
Acknowledgement time 10 Minutes
Response time 10 Minutes to a Hours

Weekend:
Acknowledgement time an hour
Response time 30 Minutes to 4 Hours
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Users Can;
Enquire About the Service
Request A Callback
Open A Support Request
Start A Complaint

Users Cannot;
Cannot Order A Service
Cannot Get Up Date Information Regarding a Ticket
Web chat accessibility testing
N/A
Onsite support
Onsite support
Support levels
Help Desk Support;
This is provided free of charge to all customers and users of our web portals.

DevOps Support;
This is provided free of charge to all customers

Account Manager;
This is provided for free to customers for account management related inquiries.

Onsite Support
This is provided at a cost with a daily rate card of 350 GBP ex VAT.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Customers will have access to numerous resources to assist with their day to day use of the service.

These are some of the resources you'd have access to;

1. Online documentation
2. Online explainer video introduction
3. Proposal of onsite training to suit customer wants
4. An Account Manager and Product Manager
5. etc
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
Users of our portal will have access to the following tools to assist them to perform an end of contract data extraction using these two methods;

1. Using the Portal Migrate away tools that allow them to transfer their data to another provider.

2. Users can use the web portal file manager to manually perform a simple download of web data.

3. Users can also use the SFTP or FTP function to download files.

4. We can also use our deep access capability to extract data for our Customers after the contract is finished

5. Users can also have an access license for a period of 6 months to allow them transfer their data away
End-of-contract process
1. Domain registration or subscription if any comes to an end and must be transferred away.

2. Web Hosting packages will automatically be disabled after the contract is finished with an exception of a license to access the services only to extract data.

3. Our Support team will be on hands to assist with data transfer

There is no cost of the above unless the customer requires us to perform a service that is not specified in our contract.

Using the service

Web browser interface
Yes
Using the web interface
Provision or decommission of Web Hosting Services
Order Domain Names
Add or Remove Emails
Control Panel Access with web hosting features
Web interface accessibility standard
None or don’t know
How the web interface is accessible
None
Web interface accessibility testing
None
API
Yes
What users can and can't do using the API
Register Domains
Domain Search
Domain Verification
Manage Hosting
Manage MSSDL Databases
Manage Packages
Timeline Backups
Provision VPS
API automation tools
OpenStack
API documentation
Yes
API documentation formats
HTML
Command line interface
Yes
Command line interface compatibility
  • Linux or Unix
  • Other
Using the command line interface
SSH Access;

Manage Hosting
Manage MSSDL Databases
Manage Packages

Scaling

Scaling available
Yes
Scaling type
  • Automatic
  • Manual
Independence of resources
We can guarantee Users cannot be affected because the service leverages these two technologies;

1. Autoscale
2. Loadbalancing

It uses these two technologies to scale and balance out the load across multiple servers to ensure the integrity of the service is not compromised.

For example, if you have a surge in Users, the system will automatically notice this and deploy more servers to cater for your users and renders to the Users the service without any compromise as long as required.
Usage notifications
Yes
Usage reporting
Other

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
Reporting types
Real-time dashboards

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
20i.com, Linode and AWS

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
  • Hardware containing data is completely destroyed
Equipment disposal approach
In-house destruction process

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • Web Files
  • Emails
  • Databases
Backup controls
1. The Systems automatically backup once a week by default

2. There are timeline backup tool that allows users to perform daily backup once a day

3. There are recovery tools within the timeline backup feature that allows users to perform a restore.

4. There is the Cron or schedule feature that allows users to back up files (Emails, Web Files or Database) automatically in a schedule they may prefer

5. Etc
Datacentre setup
  • Multiple datacentres with disaster recovery
  • Multiple datacentres
  • Single datacentre with multiple copies
Scheduling backups
Users schedule backups through a web interface
Backup recovery
  • Users can recover backups themselves, for example through a web interface
  • Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Our Standard SLA is 99.99% outside our planned maintenance.

Service credits are offered where it is claimed by the Customer and is approved on a pro-rata service loss basis.

For example, if you paid 10 GBP for 10 days worth of hosting and the service was partially or wholly unavailable for two days and we told you before we need a day to perform maintenance and the service worked for two 8 days. We will only refund 1 GBP for the loss. However, this must be documented by our customer and applied for within three months of the failure.
Approach to resilience
This is available upon request.
Outage reporting
We have a service status page that gives users real-time information on the service availability, and service updates of the numerous services or features of our service.

It also gives users prior information on system upgrades and maintenance.

Identity and authentication

User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels
We give access to Users on a need basis as well as in a granular manner. This way only users with certain access rights can access management interfaces as well as support channels.

However, access restriction is a feature on single-tenant customers or contracts.
Access restriction testing frequency
Less than once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
  • Other
Description of management access authentication
SSO using the following techniques;

LDAP
SAML
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device on a government network (for example PSN)
  • Dedicated device over multiple services or networks
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
  • Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Available on request.
Information security policies and processes
We have implemented industry-proven policies and practices that allow us to securely deliver this service to you.

Reporting;

We have incident reporting and incident reporting tools that allow us to report outages, security breaches etc to the affected customers or stakeholders.

Our SA, Security Assurance procedures allow for periodic and real-time monitoring of our security and quality processes to ensure we are always compliant.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Our Changement continuously track the following components;

New Service Features
Service Features Iterations
Implemented Legislative Changes
Etc

For Performance, Security Vulnerability and cultural impact.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Threats are assessed via

Scheduled penetration testing
Breach report
On Spot checks
Security checks on iteration
Customer or Stakeholder Feedback

Once a vulnerability is identified, we use our resources to patch or upgrade the system depending on the severity of the security vulnerability.

We have a monitoring system that monitors the following;

Our Software stacks
Public resources
Online communities
Technology changes
etc

This way we become agile in fixing security issues as they arise.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We have a system in place that continuously monitor our systems and how it is used in real-time.

We have workflows set up to ensure that once an issue reaches a limit or a trough, it triggers an alert or automatically secures our system from a breach or further breaches.

Our incident management policies allow us to fix issues as they occur to mitigate the impact on our service integrity. These policies allow for reactive, active and protective fixes to our systems.
Incident management type
Supplier-defined controls
Incident management approach
We have the following processes that manage our incident management;

1. 'User Control' features to report incidents
2. Customer Support Ticket Systems
3. Preset workflows to listen to system abusers, security issues etc

Users can report issues by using the following;

1. User Control Features
2. Customer Chat, Support Ticket system etc

Incident reports are provided to the product manager which may be available for audit by stakeholders.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Supplier
Virtualisation technologies used
KVM hypervisor
How shared infrastructure is kept separate
Different organisation data are logically or physically kept apart by the system's architectural design and the type of service to the organisation to the customer is subscribed.

Logical means we have for example used a database, or a multi-tenant architecture to separate Users or organisational data.

Physical means only one user or organisational data can be a tenant on a web hosting solution.

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
Available Upon request

Social Value

Fighting climate change

Fighting climate change

As an organisation we respond to climate change with the following;

We have a division within our company that reconditions PCs and other electronics for reuse in our local community. It is sustainable as we have managed to make this division profitable.

Also, we have set purchasing principles in purchasing products processed with green renewable energy in order to support our carbon neutral principles.

Pricing

Price
£250 an instance a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Free Web Hosting for A Month For G Cloud 13 Customers.

All service features are included except for domain registration.
Link to free trial
https://app.kleip.co.uk/login/demo

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at support@kleip.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.