Managed Virtual Data Centre

Our Managed Virtual Data Centre is a scalable cloud computing platform, providing storage, server resources and applications. It can integrate with your existing IT infrastructure as a cloud based extension to your network, or run independently, depending on your requirements.


  • Instant Flexible virtual hardware
  • Managed Infrastructure as a Service (IaaS)
  • Secure networking linking your vDC to your existing IT infrastructure
  • Regular Backups (Customised & Scheduled to fit with your workloads)


  • Hosting systems entirely and only within the UK
  • Support & Maintenance carried out by our experienced technical team
  • 24×7 Uptime Monitoring (Network, Server & Application Level)
  • ISO9001, ISO27001, ISO22301 & PCI DDS Compliant


£80 a virtual machine

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 13

Service ID

3 7 1 8 7 7 4 5 5 5 5 7 6 4 3


Telephone: 0333 335 5352

Service scope

Service constraints
System requirements
Internet Connection

User support

Email or online ticketing support
Email or online ticketing
Support response times
Standard Support is available Mon-Fri, 9am-5-30pm, however emergency support for Priority 1 issues is available 24x7.
User can manage status and priority of support tickets
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
We provide support for all queries between the hours of 9am - 5.30pm, Monday-Friday, but offer a 24hr service for emergencies.
Support available to third parties

Onboarding and offboarding

Getting started
A primary point of contact will be assigned to the client to assist with the onboarding process, ensuring the client has a full working knowledge of the system, and that it is configured as per their requirements.
Service documentation
End-of-contract data extraction
Data can be extracted through multiple means as defined by the client.
End-of-contract process
Provide 30 days written notice at the end of the agreement, and the service will be cancelled. At this point the service will be disabled and deleted.

Using the service

Web browser interface
Using the web interface
A web interface is provided allowing the client to manage the virtual data centre estate.
Web interface accessibility standard
None or don’t know
How the web interface is accessible
The web interface is compatible with standard Windows accessibility options.
Web interface accessibility testing
Command line interface


Scaling available
Independence of resources
Resources cannot be over-allocated, and hosts are never over-provisioned.
Usage notifications


Infrastructure or application metrics
Metrics types
  • CPU
  • Disk
  • Memory
Reporting types
  • Real-time dashboards
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
  • Hardware containing data is completely destroyed
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery
What’s backed up
Virtual Machine(s)
Backup controls
Backups are configured, managed and monitored by the service provider. The backups run daily, however the client can specify a time-window for the backup to run, to ensure it doesn't conflict with any business critical applications.
Datacentre setup
Single datacentre with multiple copies
Scheduling backups
Users contact the support team to schedule backups
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Custom Service Level Agreements (SLAs) can be agreed with the client based on individual requirements for the service.
Approach to resilience
Our Tier 4 Data centre has N+1 Redundant Heating Ventilation Air Conditioning (HVAC), Dual, Independant Power Feeds with UPS & 6 x 1.5MW Generators, 24x7x365 Manned Security, Monitoring & Network Operations Center (NoC). The network has multiple, redundant switches, firewalls & routers at the core, and the Virtual Servers are hosted in a Server Cluster, allowing the Virtual Server to migrate to another host in the event of an outage.
Outage reporting
E-mail alerts are sent in the event of an outage.

Identity and authentication

User authentication
Username or password
Access restrictions in management interfaces and support channels
Access to all service interfaces is constrained to authenticated and authorised individuals. Remote management access is authenticated and directly associated to authorised individuals rather than group accounts.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for
Less than 1 month

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Cyber essentials
Cyber essentials plus
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
We work towards an ISO/IEC 27001 standard.
Information security policies and processes
Can be provided on request.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Can be provided on request.
Vulnerability management type
Vulnerability management approach
Can be provided on request.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Can be provided on request.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Can be provided on request.

Secure development

Approach to secure software development best practice
Supplier-defined process

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Who implements virtualisation
Virtualisation technologies used
How shared infrastructure is kept separate
Each client is segregated into their own VLAN and Virtual Data Centre. Multiple Virtual Networks can be created for the client if required.

Energy efficiency

Energy-efficient datacentres
Description of energy efficient datacentres
The data centre we use for this service has an EnMS which combines best practices in project management, energy monitoring, and energy awareness along with an energy policy that governs our approach towards energy use and performance. EnMS records and reports on energy usage and Power Usage Effectiveness (PUE) for the data centre as well as how it is reducing energy consumption and improving energy efficiency.

Monitored by the Environment Agency (EA), The data centre use the EnMS with Schneider Electric to analyse energy efficiency. This is to ensure they meet their moral obligations and regulatory requirements under the Climate Change Agreement (CCA) and in accordance with the (ESOS) Energy Savings Opportunity Scheme.

Social Value

Covid-19 recovery

Covid-19 recovery

During the beginning of the Covid-19 pandemic, we provided discounted IT Consultancy Services to a number of local businesses who required assistance in preparing and setting up for remote working, to help ensure they could continue operating during such difficult times.


£80 a virtual machine
Discount for educational organisations
Free trial available
Description of free trial
A free trial period of the service is available as a proof of concept and to ensure it meets with your requirements.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.