Commvault Cloud Powered by Metallic AI
Commvault provide a cyber resilience platform built for the hybrid enterprise. Commvault Cloud delivers true cloud cyber resilience while ensuring the fastest recovery and we protect more workloads than anyone else.
Features
- Backup and Recovery for Microsoft Office 365 suite and eDiscovery.
Benefits
- Simplify your cloud data management with pre-configured networking and storage.
Pricing
£0.58 a user a month
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 6 5 2 1 1 4 8 7 5 8 6 0 4 9
Contact
Softcat Limited
Charles Harrison
Telephone: 01628 403403
Email: psitq@softcat.com
Service scope
- Service constraints
- N/A
- System requirements
- Network Connectivity & Bandwidth availability
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Support responses to questions are targeted between 1 hour for critical severity to 24 hours for Low severity
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 A
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 A
- Web chat accessibility testing
- None / Don’t Know
- Onsite support
- Yes, at extra cost
- Support levels
-
Support is included within the SaaS cost, with the following Targetted Response times
Critical Severity - 1 Hour
High Severity - 2 Hours
Medium Severity - 4 Hours
Low Severity - 24 Hours - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
To assist in onboarding and initial installation Commvault provide a customer success Manager. (CSM). The CSM is a name resource assigned and they will continue to stay in touch with regular review and update information.
An extensive Online Documentation portal is available to customers, and is a great instructional and informative resource, along that anyone interested can access our Self-Paced training including video library - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Data can be restored from the Service to a choice of the customers choosing as long as access exists.
- End-of-contract process
- At the end of the contract the Services are terminated preventing any further backups and recovery from the service...Where Storage has been selected as part of the service, all data will be removed from the storage service within 30 days of the temination date,
Using the service
- Web browser interface
- Yes
- Using the web interface
-
Commvault provides a frontend called Command Center which is supported on a number of different web browsers. All Commvault Cloud features are available via the web interface. The Command center provides access to users to:
Guided wizrd driven setup
Use Dashboards (customisable if required)
functions to protect and recover workloads
Protect and Recover data from Ransomware attack
Perform and set Disaster recovery options
Create and schedule backup plans
Look at and create reports
Monitor
Create Workflows
Manage all data protection functionality
Set global encryption
Access the web console for further 1 off tasks such applying WORM policies to a particular workload - Web interface accessibility standard
- WCAG 2.1 A
- Web interface accessibility testing
- None / Don’t Know
- API
- Yes
- What users can and can't do using the API
-
Commvault Cloud REST (Representational State Transfer) APIs represent operations that are performed via the Commvault Cloud API Gateway. You can use the REST APIs to create custom interfaces that focus on the operations your users need, such as authentication, creating resellers, submitting fulfillment requests, and getting account and usage information. The REST APIs are implemented on the HTTP protocol, so you can use them with your preferred programming language and tools.
Any tenant user can access Commvault Cloud APIs using username and password authentication. To perform operations using API, ensure all API call are made with the URL https://api.metallic.io/
The API Reference guide is found here https://developer.metallic.io/ - API automation tools
-
- Ansible
- Chef
- OpenStack
- Terraform
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- Global Infrastructure hosted on Azure.
- Usage notifications
- Yes
- Usage reporting
-
- Other
- Other usage reporting
- Customer Success Team contact.
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
- Other
- Other metrics
- Consumption metrics
- Reporting types
-
- Real-time dashboards
- Regular reports
Resellers
- Supplier type
- Reseller (no extras)
- Organisation whose services are being resold
- Commvault
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Backup and Recovery for Microsoft Office 365 suite and eDiscovery.
- Backup and Recovery for Virtual Servers.
- Backup and Recovery for File & Object Storage
- Backup and Recovery for Endpoints including E-Discovery
- Backup and Recovery for Databases
- Backup and Recovery for Microsoft Dynamics 365,
- Backup and Recovery for Salesforce including Sandbox environments
- Backup and Recovery for Kubernetes
- Backup controls
- Granular automated scheduling is provided via Role Based Access Controls allowing customers to schedule what they want, and when they want to be protected.
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Users schedule backups through a web interface
- Backup recovery
-
- Users can recover backups themselves, for example through a web interface
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Service Credits of 10% are offered for less than 99.9% availability, and 25% Services Credits is offered for less that 99% availability
- Approach to resilience
-
The Commvault Cloud Service is hosted in Microsoft Datacentres on Azure infrastructure and the physical security is provided by Microsoft.
The following information is supplied by Microsoft and the full document can be accessed here https://docs.microsoft.com/en-us/azure/security/fundamentals/physical-security
Microsoft designs, builds, and operates datacentres in a way that strictly controls physical access to the areas where your data is stored. Microsoft understands the importance of protecting your data and is committed to helping secure the datacentres that contain your data. We have an entire division at Microsoft devoted to designing, building, and operating the physical facilities supporting Azure. This team is invested in maintaining state-of-the-art physical security.
Azure keeps your data durable in two locations. You can choose the location of the backup site. In both locations, Azure constantly maintains three healthy replicas of your data.
Database availability
Azure ensures that a database is internet accessible through an internet gateway with sustained database availability. Monitoring assesses the health and state of the active databases at five-minute time intervals. - Outage reporting
- Outages are communicated through the HTML Interface dashboard.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Other
- Other user authentication
- Okta
- Access restrictions in management interfaces and support channels
- Metallic has built in Role Based Access Controls (RBACs) to restrict access to authorized users. A role is a collection of permissions administrators assign to users and entities to create a three-way security association. Roles can be assigned to grant appropriate access to any user or user group.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
- Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Available on request
- ISO/IEC 27001 accreditation date
- Available on request
- What the ISO/IEC 27001 doesn’t cover
- Available on request
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- CSA
- ISO/IEC 27001:2013
- SOC 2 Type II
- FedRAMP High Compliant
- FIPS 140-2
- GDPR
- HIPAA
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- ISO/IEC 27001
- Other
- Other security governance standards
-
1. CSA
2. ISO/IEC 27001:2013
3. SOC 2 Type II
4. FedRAMP High Compliant
5. FIPS 140-2
6. GDPR
7. HIPAA
https://metallic.io/trust - Information security policies and processes
-
Security threat detection and response, zero trust authentication, zero trust access, virtual air-gap, immutability.
https://metallic.io/security-compliance-overview
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
At a minimum, the change control process includes the following steps:
•All requests are logged
•Undergoes a preliminary review and is appropriately prioritized
•Authorized by appropriate personnel
•Requirements to implement the change are identified and analyzed
•Dependencies resulting from the change are identified
•Impact analysis to the current environment or business units assessed
•Change approach is identified and reviewed
•Change is tested in a controlled environment
•Acceptance of the change tested and approved
•Implementation and release of the change into production
•Change process from initiation to post-implementation is documented
•Ongoing monitoring and logging of the change into production - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Any vulnerability or threat detected through automated or manual scans must be remediated within the timeframes specified below:
Critical - A week from detection date. If vulnerability is detected on a critical server/device, it should be remediated within 24- 48 hours.
High - Within 2 weeks from Within a week if it is a Page Information Technology Vulnerability Management Policy 3 detection date critical server/device.
Medium - Condition based remediation Medium vulnerabilities are not required to be remediated immediately. However, Information Security Team may upgrade the Severity level of vulnerability to High as necessary to ensure appropriate action is taken. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Cloud Alerts are standard Commvault Alerts that syncs to cloud.comvault.com. The Cloud Alert feature is the framework for the Event Monitoring service. Cloud Alerts for event monitoring are based around the following purposes:
•Detect when Commvault is operating outside of the normal based on historic data and smart algorithms.
•Detect anomalies using machine learning/AI based code integrated into Commvault’s core.
•Detect thresholds, conditions and standard events that occur within Commvault.
•Detect CommCell events or exceeded thresholds
•Detect parameter and configuration changes in the Commvault software and its protected data
•Detect failures on various CommCell and Job based entities. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Commvault’s Incident Response Plan includes the following processes:
•To protect information and information systems.
•To provide reporting incidents step-by-step.
•To detect attacks or intrusions.
•Restoration process to mitigate the effects of incidents and services.
•Closeout process for reporting and documenting lessons learned.
Every incident is different, our guidelines are flexible and unique shaped by the incident. Our IRP documents information about responding to incidents that can be used regardless of hardware platform or operating system. It describes the five stages of incident handling, with the focus on preparation, follow-up, including reporting guidelines and requirements with defined roles and responsibilities
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Third-party
- Third-party virtualisation provider
- (Microsoft Azure)
- How shared infrastructure is kept separate
- Commvault Cloud uses Cloud Security Alliance Controls to ensure compliance of customer segregation
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- Commvault Cloud is hosted on Azure which has achieved adherence to the EU Cloud Code of Conduct (EU Cloud CoC), developed for cloud providers to align with the EU’s General Data Protection Regulation (GDPR).
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Softcat are dedicated to reducing our environmental impact and actively promoting sustainability. Our commitment to sustainability is a core aspect of our business strategy, driving us to innovate and lead in the creation of a more sustainable future for our company and the communities we serve. This commitment is embedded in our policies, operating procedures, and training programs.
We are proud to be the first FTSE 250 company to be awarded 5-star status in relation to the United Nations Sustainable Development Goals.
We aim to achieve a Carbon Net-Zero Value Circle by 2040 by prioritising renewable energy, reducing natural resource use, minimising waste, and safeguarding biodiversity in compliance with environmental legislation.
At Softcat, we have taken significant steps towards securing renewable energy across our organisation, reducing our scope 1 & 2 emissions. We had the target of using 100% Renewable Energy across all our locations by 2024. We successfully delivered against this target ~2 years early.
In May 2023 we took delivery of 15 electric vehicles, replacing all existing fossil-fuelled company cars used by employees for business means. The implementation of the EV pool fleet will see a saving of over 80 tons of CO2e per year. A huge impact on our Net Zero targets.Tackling economic inequality
As a value-add reseller, Softcat outsources the products, services, and solutions through our extensive network of partners, to best suit the needs of our broad client base. We always consider and promote SMEs and local providers where appropriate, particularly for the products and services we offer via the G Cloud framework.
We remain dedicated to improving employability and educational awareness across schools, colleges, and universities to help break down the barriers to joining technology organisations.
We work collaboratively with many schools that are close in proximity to our offices, to ensure we are actively supporting the community as well as schools from lower socio-economic backgrounds.
We visit the schools to talk about the IT sector and the roles in our organisation, as well as promoting work-experience opportunities during the summer. In particular, we actively encourage students from diverse backgrounds to engage in work experience to appreciate the roles available in our sector.
For ambitious school and college leavers, a Softcat Apprenticeship is a great first step into the world of work, with 94% of our apprentices offered a permanent position at Softcat post apprenticeships, which goes to show the amazing opportunity available with us.
We were ranked 1st in IT & Consultancy, and 10th overall in by RateMyApprenticeship.com - Best 100 Apprenticeship Employers 2023-2024 list.
Softcat now also offer 12 month paid internships to University students looking to complete a year in industry as part of their undergraduate studies.Equal opportunity
Our approach to diversity and inclusion is introduced first during our induction training, as part of our Softcat values, outlining responsibility to uphold our principles. This message is reinforced by our process and policies, networks, Allyship Training and Inclusion Awareness campaigns.
Softcat supports diversity and inclusion through various networks including:
- Supporting Women in Business (SWIB)
- The Ethnic and Cultural Network
- The Pride Network
- The Family Network
- The Empowering Disability and Neurodiversity Network (EDN)
- The Faith at Work Network
- Armed Forces & Veterans Network
These networks aim to create a supportive and inclusive work environment for all employees, regardless of gender, ethnicity, sexual orientation, disability, or family commitments.
Our allyship programme, Stronger Together, is a mixture of event and workshop-based training available to all staff. Programme topics include, bias, power, privilege, and being a greater ally.
Inclusion Awareness campaigns include race, disability, sexual orientation, gender, faith, and caring responsibilities. These sessions highlight and celebrate minority groups, through panel sessions, Q&A sessions and training, providing an opportunity to discuss and understand ways to be more inclusive.
Our efforts to improve diversity and inclusion have been incredibly successful. Since 2020, the number of female employees below management level has increased to 35%, and the number of ethnic minority employees rose to 17%.Wellbeing
At Softcat, all employees are provided with access to our multidimensional wellbeing programme which includes flexible work arrangements, free nutritious breakfast, mental health support, employee benefits scheme, health and wellbeing week activities, and online workshops.
Giving back to the community is an innate part of who we are as a company. All Softcat employees are therefore given two volunteer days per year to support a charitable or community cause.
Each of our 10 regional offices also support local charities through fundraising, donations and events. For example, our Manchester office has raised over £30,000 for the WeLoveMCR charity. This funding has supported young, disadvantaged Manchester citizens in gaining qualifications to broaden their work opportunities and supporting local groups in delivering indispensable services that enable community cohesion.
Pricing
- Price
- £0.58 a user a month
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Commvault Cloud offers a Free of Charge 30 day, 1TB Licence that can be leveraged of any of the Commvault Cloud SaaS Backup and Recovery service offerings.
- Link to free trial
- https://www.commvault.com/free-trial