Central Networks and Technologies Ltd
Microsoft Site Recovery and Backup
Backup and replication to Azure for on-premise or hosted servers
Features
- File Level Backup
- System State Level Backup
- Low RPO Replication
- Disaster Recovery
- Automated Recovery
- Unlimited Storage
- Customisable Retention
- Multiple Recovery
- Multiple Storage Options
- Immuntiability
Benefits
- Microsoft Managed Data Centres
- Easy backup and restoration
- Automated DR Plans
- Granular recovery - File Level
- Microsoft Azure Login for easy management
- Customisable Data Retention Options - RPO/RTO
- Unlimited Data Storage
- Multiple Storage Locations and Options
- Immuitable Storage Vaults
Pricing
£12.67 to £78.94 a virtual machine
- Education pricing available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at sales@centralnetworks.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
3 2 2 3 2 1 8 9 3 6 2 6 8 4 7
Contact
Central Networks and Technologies Ltd
John Blackburn
Telephone: 01706747474
Email: sales@centralnetworks.co.uk
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Microsoft Azure
- Cloud deployment model
- Public cloud
- Service constraints
- None
- System requirements
-
- Dependant on Customer Environment
- If on premise hosted - Backup Agent required for backup
- If on premise hosted - Recovery Agent required for replication
- If hosted in Azure - No additional requirements
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- The aim is to respond to questions on the first call, through an escalation 1st-3rd line classification.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Our operations team is broken down into two areas, Service Desk and Engineering. The Service Desk acts as the primary source of all activity, where calls are categorised, prioritised and filtered to the relevant specialist if required. Our calls are given a priority level from 1-5; whereas P1 is Disaster, business is non-operational all the way through to P5, of which could be a cosmetic incident, for example. Our response times and levels are summarised below: P1 - Urgent - 15mins Response Time (RT), 4 hrs Target Full Fix Time(TFFT) P2 - Critical - 30 mins RT, 8 hrs TFFT P3 - Very Important - 4 hrs RT, 20 hrs TFFT P4 - Important - 10 hrs RT, 30 hrs TFFT P5 - Informational - 3 days RT, 90 days TFFT (never normally this long) The majority of activity will be remote based working, however we will send either a senior engineer to the client site, or a cloud specialist to a cloud hosting datacentre site, as and when required, depending on the incident. All priority incidents are included in our pricing, defined by customised SLA's and can be in unlimited numbers if required, depending on the client's needs
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Azure is a public enviroment with various learning materials available.
Support and knowledge is available from Central is the customer wishes to increase their knowledge on the platform. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
Replications and backups can be completed but the entire data cannot be extracted from Azure.
The data will sit in the customers Azure Subscription which belongs to the customer and not Central. - End-of-contract process
-
At the end of the contract Central will stop support on the Azure Backup and Replication and will reliquish access to the subscription.
It is then the customers responsibility to continue with the Azure Backup and Replication or to delete the Azure Subscription
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- The service sits within the customers Azure Subscription and has no impact on any other customers.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Backup and replication health, state and consumption
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Microsoft
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Other
- Other data at rest protection approach
- Protected by Microsoft infrastructure and protocols
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Data cannot be exported - It remains within the Azure Subscription
- Data export formats
- Other
- Other data export formats
- Data cannot be exported
- Data import formats
- Other
- Other data import formats
- N/A
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Microsoft supply a service with an SLA of 99.9%
- Approach to resilience
- Microsoft Azure spans multiple regions and availability zones to ensure the solution is always available.
- Outage reporting
- Customer may subscribe to outage notifications via SMS and Email for the relevant services.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Access restrictions in management interfaces and support channels
- Accsses is based on username and password with MFA. Access to functions is control via RBAC. There are a number of levels of roles including Backup, Restore, Reporting and Full Admin
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- QMS International
- ISO/IEC 27001 accreditation date
- 19/05/2014
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
- Soc 2 type 2
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- SOC 2 Type 2
- Information security policies and processes
- Details around policies and procedures are not published to the public. Information can be requested during procurment if required
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Details around policies and procedures are not published to the public. Information can be requested during procurment if required
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Details around policies and procedures are not published to the public. Information can be requested during procurment if required
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Details around policies and procedures are not published to the public. Information can be requested during procurment if required
- Incident management type
- Supplier-defined controls
- Incident management approach
- Details around policies and procedures are not published to the public. Information can be requested during procurment if required
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
Our Social Value Policy is Available on request more information can be found on our website
Pricing
- Price
- £12.67 to £78.94 a virtual machine
- Discount for educational organisations
- Yes
- Free trial available
- No
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at sales@centralnetworks.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.