Skip to main content

Help us improve the Digital Marketplace - send your feedback

Netscan Limited

Secure Virtual Machines

Virtual Machines based on our Enterprise Infrastructure, delivering a cost effective platform for all hosting applications. Optional 24 hour UK support and management.

Features

  • Flexible, Scalable Cloud Infrastructure
  • Enterprise Grade Performance in a UK Energy Efficient Datacentre
  • Full Image and incremental backups of all VMs
  • Robust security across the platform, providing a secure environment
  • Linux and Windows Server options
  • Choose your own hardware requirements, and scale immediately when required
  • 24hr proactive management, monitoring and optimisation by our experts
  • Disaster Recovery options available
  • Accelerate website performance and delivery by up to 100%
  • Full Microsoft range available including MS SQL and Office.

Benefits

  • Integrated SAN for maximum affordability
  • Full server image backups included
  • Powerful, fast storage, based on SSD and SAS hybrid arrays
  • Autoscaling for peaks in traffic
  • Unlimited 24x7x365 technical support
  • Automatic Failover giving true High Availability (HA) and maximum uptime
  • High end security throughout the platform
  • Migration Assistance from our team
  • Total control of cloud servers through a user-friendly control panel
  • All data stored within the UK and protected under ISO27001.

Pricing

£0.03 a virtual machine an hour

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at gcloud@netscangroup.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

3 9 8 5 9 8 5 6 1 5 4 0 8 9 6

Contact

Netscan Limited Peter Duggal
Telephone: 44(0)2088168812
Email: gcloud@netscangroup.com

Service scope

Service constraints
Scheduled maintenance is always carried out with at least 4 weeks advance notice
System requirements
Antivirus software is recommended on virtual servers

User support

Email or online ticketing support
Email or online ticketing
Support response times
60 minutes SLA, 24/7/365
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Onsite support
Support levels
NetscanUK provide response times from 5 minutes depending on the priority/severity of the incident or request 24/7.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Onsite training is provided where agreed.
Service documentation
No
End-of-contract data extraction
All data is provided in a portable archive.
End-of-contract process
The services are provided as outlined, with no additional costs except where the service is customised in agreement with the user.

Using the service

Web browser interface
Yes
Using the web interface
Users can manage VMs and Cloud Resources within the client area.
(Servers can be created/deleted/rebooted/suspended/powered on and off etc.)

All support requests can be raised through the web interface.

Profile and account information can be managed through the web interface. Additional contacts can be added/removed.
Web interface accessibility standard
None or don’t know
How the web interface is accessible
Web interface is responsive, and scalable.
Web interface accessibility testing
Basic testing
API
Yes
What users can and can't do using the API
All API access/management is carried out on a custom basis directly with our technicians.
API automation tools
Other
API documentation
Yes
API documentation formats
PDF
Command line interface
Yes
Command line interface compatibility
  • Linux or Unix
  • Windows
Using the command line interface
Root access to all services is provided.

Scaling

Scaling available
Yes
Scaling type
Automatic
Independence of resources
All instances are segregated with defined limits on usage.
Usage notifications
Yes
Usage reporting
Email

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
Reporting types
Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
  • Hardware containing data is completely destroyed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • Virtual Machines
  • Configuration
  • Files
  • Folders
  • Databases
Backup controls
Requests can be made through the support channel to manage backup schedules as per the user requirement.
Datacentre setup
Single datacentre with multiple copies
Scheduling backups
Users contact the support team to schedule backups
Backup recovery
  • Users can recover backups themselves, for example through a web interface
  • Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
NetscanUK guarantees that the NetscanUK network will be available 100% of the time, excluding Maintenance. Customer is eligible for a credit for Network Downtime for any breach of this guarantee, which can be verified by NetscanUK’s technical support team. “Network Downtime” is defined as an inability to transmit and receive data caused by failure of network equipment managed and owned by NetscanUK and/or any upstream partners of NetscanUK, excluding Maintenance, but including managed switches, routers, and cabling.
Approach to resilience
Available on request
Outage reporting
Email alerts

Identity and authentication

User authentication
Public key authentication (including by TLS client certificate)
Access restrictions in management interfaces and support channels
VPN access only with 2FA
Access restriction testing frequency
At least every 6 months
Management access authentication
2-factor authentication
Devices users manage the service through
Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
ISOQAR
ISO/IEC 27001 accreditation date
12/11/2015
What the ISO/IEC 27001 doesn’t cover
-
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
CIFCOP

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Adherence to ISO 27001 throughout

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Internal system developed that audits and logs all changes made to any system/configuration. Changes are implemented on test infrastructure before being placed in production.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Internal systems developed over an 18 year period to monitor and mitigate threats.

Patches are deployed for any known vulnerability/exploit within 4 hours.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Infrastructure is monitored on a 2 minute basis, 24 hours a day.
Potential compromises are mitigated through custom software developed in house over an 18 year period that can be demonstrated to the user on request.
Incidents are responded to within an average of 10 minutes.
Incident management type
Supplier-defined controls
Incident management approach
Incidents managed as per ISO 27001 guidelines.
Users report incidents through support channel (ticket/phone).

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Third-party
Third-party virtualisation provider
KVM
How shared infrastructure is kept separate
Strict firewall implementation along with built in cloud management layer segregation

Energy efficiency

Energy-efficient datacentres
No

Social Value

Fighting climate change

Fighting climate change

We have calculated our carbon footprint and have offset the emissions generated by the energy we use to run our servers. We also continue to offset our emissions on an annual basis, making us fully carbon neutral since 2006.

We robustly pursue a policy of remote working to minimise commuting and the need for large, energy hungry office space, and now partner with the greenest datacentre in the UK.
Covid-19 recovery

Covid-19 recovery

-
Tackling economic inequality

Tackling economic inequality

-
Equal opportunity

Equal opportunity

Netscan is committed to encouraging equality, diversity and inclusion among our workforce, and eliminating unlawful discrimination.

The aim is for our workforce to be truly representative of all sections of society and our customers, and for each employee to feel respected and able to give their best.

The organisation – in providing goods and/or services and/or facilities – is also committed against unlawful discrimination of customers or the public.

We

1. Provide equality, fairness and respect for all in our employment, whether temporary, part-time or full-time

2. Do not unlawfully discriminate because of the Equality Act 2010 protected characteristics of:

age
disability
gender reassignment
marriage or civil partnership
pregnancy and maternity
race (including colour, nationality, and ethnic or national origin)
religion or belief
sex
sexual orientation

3. Oppose and avoid all forms of unlawful discrimination. This includes in:

pay and benefits
terms and conditions of employment
dealing with grievances and discipline
dismissal
redundancy
leave for parents
requests for flexible working
selection for employment, promotion, training or other development opportunities
Wellbeing

Wellbeing

-

Pricing

Price
£0.03 a virtual machine an hour
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
For customers making a 2 year commitment, we provide a 3 month free trial on all services rendered.

(No cancellation fee within first 3 months of the free trial)

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at gcloud@netscangroup.com. Tell them what format you need. It will help if you say what assistive technology you use.