Skip to main content

Help us improve the Digital Marketplace - send your feedback

Baseel Limited

Cloud hosting/migration/optimisation/ management services

Baseel Limited can offer cloud hosting services with key cloud services such as Azure, AWS and Google Cloud. We can help companies to migrate their on-premises environment to the selected cloud environment. We also provide cloud optimisation and management services including migration from one provider to the other.

Features

  • Partnering with the leading cloud brands Azure, AWS, Google Cloud
  • Architecting the solution through assessment of the business needs
  • End to end cloud migration services
  • Full spectrum of managed services, operational and security management
  • Optimising the existing cloud environment to make it cost effective
  • Sizing the cloud environment and designing optimised cloud environment
  • Improved business orientation through process re-engineering

Benefits

  • Clear visibility on the cloud migration costing and benefits
  • Compliance with industry standards with optimum cost and efforts
  • Our approach ensures repeatability and consistency
  • Can offer a complete hands off approach for the clients
  • Continuous cloud optimisation model
  • Better management reporting
  • Secured environment

Pricing

£50 to £1,000 a server a month

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at paresh@baseel.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

3 1 6 6 8 7 6 1 0 7 7 0 0 7 3

Contact

Baseel Limited Paresh Deshmukh
Telephone: 07825362359
Email: paresh@baseel.co.uk

Service scope

Service constraints
None
System requirements
None - we are flexible to accomodate client needs

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Depending on the client needs our SLAs and Costing Vary
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Yes, at an extra cost
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
We are flexible as per the client needs
Web chat accessibility testing
We have used industry standard chat solutions such as Microsoft Teams
Onsite support
Yes, at extra cost
Support levels
We are flexible - depending on the client needs we can design the support levels
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Understanding the business, explaining onboarding process, training , focused handholding sessions
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
Word
End-of-contract data extraction
It depends on how the client wants to extract their data. we are flexible on the data extraction services.
End-of-contract process
We are extremely flexible on the services and can address client needs in the contract

Using the service

Web browser interface
Yes
Using the web interface
We are flexible and can design the web interface as per the client needs
Web interface accessibility standard
None or don’t know
How the web interface is accessible
We are flexible and can design the web interface as per the client needs
Web interface accessibility testing
We are flexible and can design the web interface as per the client needs
API
Yes
What users can and can't do using the API
We are flexible and can design the API as per the client needs
API automation tools
  • OpenStack
  • SaltStack
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • PDF
Command line interface
Yes
Command line interface compatibility
  • Linux or Unix
  • Windows
  • MacOS
Using the command line interface
We are flexible and can design the command line interface as per the client needs

Scaling

Scaling available
Yes
Scaling type
  • Automatic
  • Manual
Independence of resources
We provide industry standards cloud services such as Azure, AWS and CGP and ensure the required elasticity is maintained
Usage notifications
Yes
Usage reporting
  • API
  • Email
  • SMS
  • Other
Other usage reporting
Call

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
  • Other
Other metrics
Network components such as firewalls
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Microsoft - Azure, AWS, Google Cloud

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Yes
What’s backed up
Everything as per the client needs
Backup controls
Users are asked for the required backup schedule and requirements and data. As per the user needs backup services are configured
Datacentre setup
  • Multiple datacentres with disaster recovery
  • Multiple datacentres
  • Single datacentre with multiple copies
Scheduling backups
Users contact the support team to schedule backups
Backup recovery
  • Users can recover backups themselves, for example through a web interface
  • Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Bonded fibre optic connections
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
We are flexible to meet the client needs
Approach to resilience
We go for standard cloud providers such as Azure, AWS and CGP. They have a resilient setup
Outage reporting
A public dashboard
an API
email alerts

Identity and authentication

User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Access restrictions are done through role-based access controls. Technical controls are implemented for the access restrictions
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device over multiple services or networks
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
  • Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • CSA CCM version 3.0
  • ISO/IEC 27001
Information security policies and processes
We follow ISMS framework (ISO27001) as well as NIST and CSA CCM version 3.0, where applicable

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
We have our configuration and change management process complying with ISO27001 and NIST framework
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
We conduct regular risk assessments and vulnerability scans, and pen testing of our environment.
we have a strong patch management process in which the high risk and critical patches are applied within 7 days and other patches are applied maximum within a month.
we get information about potential threats from various security product providers
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
We have logging and monitoring mechanisms setup to identify the potential compromises.
once alert is raised, we investigate the alert and assess the impact to take action based on the risk level. we can respond to an incident as soon as we are alerted
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Yes we have a predefined process aligned to NIST and ISO27001 standard.
users report incidents to our incident mail id
incident reports are provided to the required and relevant stakeholders through email

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Supplier
Virtualisation technologies used
Hyper-V
How shared infrastructure is kept separate
We establish separate instances of the cloud environment for different clients.
for shared instances this is achieved through firewall and network segregation controls

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
We partner with Azure, AWS and CGP who comply with these standards

Social Value

Social Value

Social Value

  • Fighting climate change
  • Tackling economic inequality
  • Wellbeing

Fighting climate change

We encourage employees to work from home and avoid travel as much as possible. This ensures zero emissions, a reduced carbon footprint, and less traffic congestion. In our CSR activities, our key focus is on the environmental aspects, and we encourage our staff to undertake activities such as tree planting.
We also choose suppliers and partners who prioritise sustainability, opting for products and services with lower environmental footprints.
We are Collaborating with other organisations, NGOs, governments, and communities to amplify efforts and create synergies for addressing climate challenges.

Tackling economic inequality

We are working very closely with startups and small businesses to ensure they benefit from our services through our most cost-effective service offerings. We are also involved in establishing training courses at a discounted price to help those who are struggling to upgrade their skills.
We focus on creating a diverse supply chain across multiple countries, including Asia, MENA, the UK, and Europe. This includes consultants, small companies, startups, and SMEs.

Wellbeing

We undertake regular activities to ensure the happiness and well-being of our employees are maintained well. These activities include social meetings, 1:1 talks, and encouraging hobbies.
We also conduct multiple motivational talks with the employees.
We encourage our staff to undertake social and community activities.

Pricing

Price
£50 to £1,000 a server a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
We are flexible and need to discuss this with the client

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at paresh@baseel.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.