M-TECH SYSTEMS LIMITED
Connectivity
Connectivity
Features
- Ultra-Fast
- End-to-End
- Data & Voice
- Great User-Experience
Benefits
- Cost-Effective
Pricing
£17.00 to £2,332.00 an instance a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at Stuart.Taylor@mtechsystems.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
4 0 5 2 7 5 3 1 2 3 3 5 4 5 9
Contact
M-TECH SYSTEMS LIMITED
Stuart Taylor
Telephone: 01323 404040
Email: Stuart.Taylor@mtechsystems.co.uk
Service scope
- Service constraints
- Planned maintenance bi-annually.
- System requirements
- Not Apliccable
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Automated receipt confirmation and then 4 Hours response time for tickets. Response times are the same for weekends.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Scaled SLA based on service type and severity. Service delivery management. Online access to our portal for incident/change management and reporting. 24/7 Service desk that follows ITIL methodology
Quarterly reviews with a dedicated Service Delivery Manager. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide migration support services as well as online and onsite training.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Via Secure FTP or can be seeded to a client provided NAS
- End-of-contract process
- At the end of the contract, M-Tech Systems delivers all documentation, data and any other IP to the client. Any onsite hardware provided for the service is returned to M-Tech.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Users can make changes on the web interface, depending on their hierarchical access permissions. Change controls can be tailored to client requests.
- Web interface accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web interface accessibility testing
- We have not performed any specific testing with assistive technology users.
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- No
- Independence of resources
- We guarantee each client the resource that is contracted. We use predictable, scalable architecture to ensure they can grow.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
- Other
- Other metrics
- N/A
- Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Hardware containing data is completely destroyed
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
- Firewall Reports
- Backup controls
- They are automated
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
-
- Users can recover backups themselves, for example through a web interface
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Bonded fibre optic connections
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- 99.9% availability SLA, with refund of service charges applicable for under-performance against these targets.
- Approach to resilience
- Our service is designed for resilience by using highly available architecture, connectivity, and carriers across multiple datacentres.
- Outage reporting
- We report any outages via status page, email alerts & a monitoring platform.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Access restrictions in management interfaces and support channels
- We restrict access via hierarchical channels
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- UKAS
- ISO/IEC 27001 accreditation date
- 25/08/2021
- What the ISO/IEC 27001 doesn’t cover
- No exclusions
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
- IASME Gold
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- ISO27001, ISO9001, Cyber Essentials Plus and IASME Gold
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- We have full integrated management system which combines the requirements of ISO 9001 and ISO 27001. We have defined security policies that are rigorously managed and checked
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Vulnerability management approach is based on ensuring all platforms are patched and maintained according to vendor best practice. All configuration changes are subject to strict change control and are reviewed, logged, and audited on a regular basis.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Intrusion detection from tier one vendors with analytics that is managed and monitored by our service desk and escalated via documented ISO procedures.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Pre-defined, ITIL and ISO27001 based processes are in place for common events and event management processes are followed so that incidents are automatically logged and handed over to the required technical contact for diagnosis, triage, and resolution. All incidents are included in formal quarterly service review reporting processes.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- Through our radical fresh-air cooling system, which won us Green Data Centre of the Year in its first year of operation, and evaporative cooling systems, our PUE (Power Usage Effectiveness) regularly drops below 1.2, meaning that for every 1kW used to power equipment hosted in the data centre, we use 0.2kW of power to operate all related areas of infrastructure, such as cooling, lighting etc.
Social Value
- Social Value
-
Social Value
Covid-19 recoveryCovid-19 recovery
M-Tech Systems Ltd specialises in data connectivity services, a crucial factor in aiding the recovery from COVID-19 by enhancing social value through various impactful ways:
1. Supporting Healthcare Systems: M-Tech Systems Ltd provides robust data connectivity solutions that are vital for healthcare providers. Efficient data transfer enables emergency services to manage patient information more effectively. This ensures that healthcare services remain uninterrupted, especially in remote areas, thus extending the reach and effectiveness of medical responses during and post the pandemic.
2. Enabling Remote Work and Education: Thehe pandemic necessitated a shift towards remote working, and the need for reliable internet connectivity soared. M-Tech Systems Ltd enhanced its infrastructure to support businesses and educational institutions to continue their operations smoothly. This shift helps maintain economic stability and ensures educational continuity, which are critical for societal recovery.
3. Data-Driven Decisions: By providing enhanced data connectivity, M-Tech Systems Ltd allows for the aggregation and analysis of large data sets related to COVID-19. This data is crucial for tracking virus spread, vaccine distribution, and resource allocation. Governments and health organisations can make informed decisions based on real-time data, thus improving response strategies and public health outcomes.
4. Promoting Community Resilience: Reliable connectivity helps communities stay informed about health regulations, vaccination updates, and safety measures. It also enables social interactions through digital platforms, reducing the sense of isolation and supporting mental health during challenging times.
5. Boosting Economic Recovery: Reliable data services are essential for businesses transitioning to digital models or enhancing their online presence. M-Tech Systems Ltd’s connectivity solutions support e-commerce and digital enterprises, which are pivotal in driving economic recovery and job creation post-pandemic.
Through these initiatives, M-Tech Systems Ltd not only aids in COVID-19 recovery but also enhances the overall social value by promoting health, education, economic stability, and community resilience.
Pricing
- Price
- £17.00 to £2,332.00 an instance a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- 30 day limited to 3 connected devices
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at Stuart.Taylor@mtechsystems.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.