Virtual Servers and Cloud Backup
VmWare virtualisation software featuring fault tolerance and high availability the maximize system availability utilising reliable HP and Dell based server and Storage hardware.
Features
- VmWare virtualisation software.
- fault tolerance and high availability of service.
- secure datacentre environment.
- fully redundant network infrastructure.
Benefits
- Accessible workspace when mobile
- User defined workspace
Pricing
£1.00 to £5,000.00 a user
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 2 2 7 0 0 8 1 4 0 3 7 3 7 9
Contact
Rockstone Technologies Ltd
John Grocock
Telephone: 07799663882
Email: john.grocock@rockstone-technologies.co.uk
Service scope
- Service constraints
-
Standard data service availability of 99.9%
If the client requires a higher level of availability that can be discussed and costed according to the end users needs. - System requirements
-
- VmWare
- Cisco IPS
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Tickets can be reported on a 24x7 basis, by email.
. - User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Level 4 support engineer on a call of arrangement to suit the customers specific needs. This can be negotiated as part of the contract.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
New users and customers will receive specific documentation that has been created to suit their requirements.
Each Customer has a different set of requirements and we tailor out onboaring to suit their requirements. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
End users remove all applicable information and backups, either by download or secure download on suppliers site to a secure portable storage.
Once Complete End user confirms all applicable data has been recovered and the supplier then securely wipes all the end users data storage areas. - End-of-contract process
- The End user confirms the contract is finishing and 30 days prior to contract end informs the supplier how they wish to recover their data. If the customer wishes to visit the suppliers site to recover the data there is an additional charge for this service. The cost of this depends upon the time the client needs to spend at the suppliers site.
Using the service
- Web browser interface
- No
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- No
- Independence of resources
-
Each customer has an allocated CPU, storage and Bandwidth allocation. Our overall allocation is below the overall thresholds of our systems and bandwidths. Hardware resources are never over committed so virtual machines can always operate at full performance.
Storage hardware operating out cloud backup soluton never operates at over 60% available capacity. - Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Files
- Virtual Machines
- Databases
- Exhange services and Mailboxes
- Backup controls
- Dependant upon the service purchased the backup solution can be tailored to meet the end users requirements
- Datacentre setup
- Single datacentre with multiple copies
- Scheduling backups
- Users schedule backups through a web interface
- Backup recovery
- Users can recover backups themselves, for example through a web interface
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- In line with Tier 4 level Datacentre requirements we provide 99.5% availability.
- Approach to resilience
- All service provider links are redndant as is Cisco Router, Firewall and Switching infrastructure. Virtual Machine operates on a redundant VMware cluster environemnt with redundant VM host and datastore environmemts.
- Outage reporting
- Email alerts
Identity and authentication
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Management channels and access are tunnelled from end user location.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- CESG IA Architect
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- CESG IA Standards
- Information security policies and processes
- CESG IA principles and practices
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Current server builds are validated against Microsoft Agreed and advised build state.
Change Management is conducted internally through a change control board. This reviews the change and the Impact and Risk to the system. - Vulnerability management type
- Undisclosed
- Vulnerability management approach
- '
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- '
- Incident management type
- Undisclosed
- Incident management approach
- '
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- VMware
- How shared infrastructure is kept separate
- Logical Machines assigned to
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
Rockstone Technologies is an Equal Opportunities Employer. The company is committed to equal employment opportunities regardless of age, sexual orientation, gender, pregnancy, religion, nationality, ethnic origin, disability, medical history, skin colour, marital status, genetic information or parental status. We base all our employment decisions on merit, job requirements and business needs
Pricing
- Price
- £1.00 to £5,000.00 a user
- Discount for educational organisations
- No
- Free trial available
- No