Altitude Hybrid Cloud
WhiteSpider’s cloud solution, Alt:itude, helps organisations wherever they are on the cloud journey. Our services are scalable and capable of designing, building and supporting any size or use of cloud activity.
Alt:itude provides a turnkey solution enabling organisations to leverage major cloud providers along with a scalable on premises platform.
Features
- 24x7 Proactive NOC
- Delivers scalability whilst reducing demand on the private cloud
- Reduces capital investments by storing sensitive data on private cloud
- Flexibility to choose balance of public and high-performance private cloud
- Visibility and Management from the Customer Portal
- Multiple tiers of service available
- Transformation and Migration solutions optional as part of service
Benefits
- Flexibility: Users work on differing environments, adjusting infrastructure accordingly
- Cost-efficiency: Choose to run workloads in whichever environment whenever needed
- Security and resilience: Hybrid cloud offers high levels of security.
- Scalability: When demand spikes and capacity reached on private infrastructure
Pricing
£20 to £50 an instance a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 3 6 1 1 3 7 4 7 9 1 3 2 9 8
Contact
Whitespider
Jonny Malcolm
Telephone: 02037732380
Email: jonny.malcolm@whitespider.com
Service scope
- Service constraints
- No known constraints
- System requirements
- None
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Priority 1: 4 working hours
Priority 2: 8 working hours
Priority 3: 2 working days
Priority 4: 3 working days - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Customers have different support options. These include:
1. 'In Hours' support. 8*5 Weekday support which is the base level, 9am-5pm on week days (excludes Public Holidays)
2. 'Extended' support. 15*5 Weekday support, 7pm-10pm on week days. This is additional cost, priced per customer
2. 'OOH' Support. This 24*7 support, again additional cost priced per customer.
All of these will have a Support Engineer - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Onboarding customers is critical.
1. We will support customers by uploading all data we can directly, then giving them online demonstrations using their data (where possible)
2. We provide online video and documentation for customer training and support
3. We provide web support for customers - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Users have full, unrestricted access to their data so can extract it whenever they need.
- End-of-contract process
- Each customer contract is defined individually so will include all the services that the customer requires. There is no additional cost
Using the service
- Web browser interface
- Yes
- Using the web interface
-
Users can:
- Add new users to the system, however only with their permision levels or lower
- View data and performance dashboards related to their estate
- Raise, edit and close tickets and service requests.
- Build and run their own services to the level of the features purchased and their user pemission - Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- No knonwn contraints
- Web interface accessibility testing
- None
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Manual
- Independence of resources
- All hosted services are load balanced across all tiers in a multi-tenanted environment.
- Usage notifications
- No
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- Memory
- Number of active instances
- Reporting types
- Regular reports
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- User data and files
- Virtual Machines
- Backup controls
- The backups are defined on the service level that the customer purchases. This can include a different schedule for each service, but the customer cannot change this themselves. Any changes have to be performed by WhiteSpider
- Datacentre setup
- Single datacentre with multiple copies
- Scheduling backups
- Users contact the support team to schedule backups
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Services are hosted in a Tier 3 Data centre for hardware and environmental resilience.
From a service perspective all tiers are redundant and load balanced. - Approach to resilience
- Available on request
- Outage reporting
-
Any failures or outages are reported on a public dashboard.
Email alerts will be issued to users
Identity and authentication
- User authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- The service utilised standard Role Based Access Control
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
- Devices users manage the service through
- Dedicated device over multiple services or networks
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 04/12/2023
- What the ISO/IEC 27001 doesn’t cover
- Nothing in this service is not covered
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
The approach to security for the service includes:
- Defining appropriate Role Based Access controls to the system
- Continually monitoring for potential cyber threats and implementing safeguards
- Maintaining secure environment and processes for handling customer data
- Ensuring software development follows appropriate standards and testing - Information security policies and processes
-
The following processes are in place to ensure appropriate security is maintained:
Documentation and Software
- Document control: Managing storage and revision of all documentation
- Approvals: Defined approval process for all documentation and software revisions
- Code Development: Processes for managing the development and release of software code
Customer Data
- Access control: Ensure that users have appropriate access for their role to customer data
- Physical Security: Employees are appropriately checked prior to being given access. The Premises are secured, with full CCTV and visitors escorted in the premises
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
The process ensures changes are undertaken by an expert with appropriate level of expertise and experience who understands the impact. The change board consists of:
a. At least one WhiteSpider individual
b. At least) one customer individual.
2. The CAB will have a weekly approval meeting
3. Change requests include:
a. Summary and Priority of change
b. Expected impact, including risk assessment and security impact
c. Time required
d. Devices and people involved
e. Details of changes to production environment.
f. Escalation process
g. Testing details
Change details are stored on a shared environment for access by customer and WhiteSpider - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
We determine potential threats through subscribing to relevant organisations to receive vulnerability alerts and information. Examples include Cisco's PSIRTs and VMWare Knowledge Base
Any potential threats are assessed to determine criticallity and likely impact
Customer alerts are then created, along with appropriate corrective action
Relevant patches are then applied, following any necessary change process.
Updates are issued when the corrective action is completed. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
The services is supported by IDS and IPS at a network level with advanced firewall capabilities at the perimeter, and process monitoring at a compute level.
Incidents are responded to according to the customer specific SLAs for the service. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Incidents are detected and reported either by WhiteSpider's monitoring service (alerts issued automatically) or by end-users who report by phone, email or web portal.
Alerts are issued to the service desk, allocated a priority and impact and passed onto the relevant support teams.
Depending on SLAs, allocated priority and complexity, the incident may be passed to 3rd line support. Escalation process are followed if the issue is not resolved as SLA thresholds are reached.
Once resolved, tickets are closed, customer informed and - if required - detailed incident reports creat-d and either emailed to customer or presented in person.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- VMware
- How shared infrastructure is kept separate
- The service uses VMWare DRS and Resource Groups
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Social Value
-
Social Value
- Tackling economic inequality
- Wellbeing
Tackling economic inequality
WhiteSpider is a rapidly growing SME. As our business grows, we continue to recruit staff from all social and economic backgrounds. Our focus is always to recruit based on attitude, work ethic and how they will fit into our business culture. We then train them to give them a wide range of technical skills. This helps to improve their future employability.
We also work with apprentice schemes giving opportunities to school leavers and other young people.Wellbeing
We strongly focus on employee wellbeing. We ensure employees have the flexibility to work in the office, as well as from home, however we do insist on regular monthly face-to-face work time to vary their working location.
We provide employees with an external, confidential wellbeing service that they can contact for concern whether this is personal, family, financial, or work related.
We run a voluntary scheme focused on getting staff out into the mountains, giving them time outdoors in the mountains and teaching them new skills.
Pricing
- Price
- £20 to £50 an instance a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Users have full access to all services for a limited time period (typically 30 days)