Managed Virtual Data Centre
Our Managed Virtual Data Centre is a scalable cloud computing platform, providing storage, server resources and applications. It can integrate with your existing IT infrastructure as a cloud based extension to your network, or run independently, depending on your requirements.
Features
- Instant Flexible virtual hardware
- Managed Infrastructure as a Service (IaaS)
- Secure networking linking your vDC to your existing IT infrastructure
- Regular Backups (Customised & Scheduled to fit with your workloads)
Benefits
- Hosting systems entirely and only within the UK
- Support & Maintenance carried out by our experienced technical team
- 24×7 Uptime Monitoring (Network, Server & Application Level)
- ISO9001, ISO27001, ISO22301 & PCI DDS Compliant
Pricing
£80 a virtual machine
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
3 7 1 8 7 7 4 5 5 5 5 7 6 4 3
Contact
NETLINK TECHNOLOGY LTD
Ross Morgan
Telephone: 0333 335 5352
Email: enquiries@netlinktechnology.co.uk
Service scope
- Service constraints
- None
- System requirements
- Internet Connection
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Standard Support is available Mon-Fri, 9am-5-30pm, however emergency support for Priority 1 issues is available 24x7.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- We provide support for all queries between the hours of 9am - 5.30pm, Monday-Friday, but offer a 24hr service for emergencies.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- A primary point of contact will be assigned to the client to assist with the onboarding process, ensuring the client has a full working knowledge of the system, and that it is configured as per their requirements.
- Service documentation
- No
- End-of-contract data extraction
- Data can be extracted through multiple means as defined by the client.
- End-of-contract process
- Provide 30 days written notice at the end of the agreement, and the service will be cancelled. At this point the service will be disabled and deleted.
Using the service
- Web browser interface
- Yes
- Using the web interface
- A web interface is provided allowing the client to manage the virtual data centre estate.
- Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- The web interface is compatible with standard Windows accessibility options.
- Web interface accessibility testing
- None
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- No
- Independence of resources
- Resources cannot be over-allocated, and hosts are never over-provisioned.
- Usage notifications
- No
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- Memory
- Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Hardware containing data is completely destroyed
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
- Virtual Machine(s)
- Backup controls
- Backups are configured, managed and monitored by the service provider. The backups run daily, however the client can specify a time-window for the backup to run, to ensure it doesn't conflict with any business critical applications.
- Datacentre setup
- Single datacentre with multiple copies
- Scheduling backups
- Users contact the support team to schedule backups
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Custom Service Level Agreements (SLAs) can be agreed with the client based on individual requirements for the service.
- Approach to resilience
- Our Tier 4 Data centre has N+1 Redundant Heating Ventilation Air Conditioning (HVAC), Dual, Independant Power Feeds with UPS & 6 x 1.5MW Generators, 24x7x365 Manned Security, Monitoring & Network Operations Center (NoC). The network has multiple, redundant switches, firewalls & routers at the core, and the Virtual Servers are hosted in a Server Cluster, allowing the Virtual Server to migrate to another host in the event of an outage.
- Outage reporting
- E-mail alerts are sent in the event of an outage.
Identity and authentication
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Access to all service interfaces is constrained to authenticated and authorised individuals. Remote management access is authenticated and directly associated to authorised individuals rather than group accounts.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- Less than 1 month
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We work towards an ISO/IEC 27001 standard.
- Information security policies and processes
- Can be provided on request.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Can be provided on request.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Can be provided on request.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Can be provided on request.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Can be provided on request.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- VMware
- How shared infrastructure is kept separate
- Each client is segregated into their own VLAN and Virtual Data Centre. Multiple Virtual Networks can be created for the client if required.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
-
The data centre we use for this service has an EnMS which combines best practices in project management, energy monitoring, and energy awareness along with an energy policy that governs our approach towards energy use and performance. EnMS records and reports on energy usage and Power Usage Effectiveness (PUE) for the data centre as well as how it is reducing energy consumption and improving energy efficiency.
Monitored by the Environment Agency (EA), The data centre use the EnMS with Schneider Electric to analyse energy efficiency. This is to ensure they meet their moral obligations and regulatory requirements under the Climate Change Agreement (CCA) and in accordance with the (ESOS) Energy Savings Opportunity Scheme.
Social Value
- Covid-19 recovery
-
Covid-19 recovery
During the beginning of the Covid-19 pandemic, we provided discounted IT Consultancy Services to a number of local businesses who required assistance in preparing and setting up for remote working, to help ensure they could continue operating during such difficult times.
Pricing
- Price
- £80 a virtual machine
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- A free trial period of the service is available as a proof of concept and to ensure it meets with your requirements.