Cloudlake Backup - Veeam Software as a Service
Veeam software ensures that you can backup all workloads regardless of whether they are on premise, in the cloud or within a SaaS provider. Autodata’s Cloudlake Backup service ensures that you can protect every workload, regardless of location, whilst reducing costs and having support from an award-winning Veeam partner.
Features
- Available as individual licences (no packs)
- Flexibility to pay monthly or annually as required
- Support from a Veeam award-winning team included
- Purchase any edition (Standard, Enterprise or Enterprise+)
- Always have access to latest software releases
- Access to a customer portal for centralised management
- Scale up or down at any time
- Add low cost immutable cloud storage if required
- Veeam Backup & Replication, Veeam Availability Suite, Veeam One
- Veeam for Microsoft 365, Kasten, Veeam for Azure/AWS/GCP
Benefits
- Simple pricing: up to 50% lower than Veeam Universal Licence
- No overpayments: pay only for what you require each month
- Scale: increase or decrease your licences at any time
- Transform: change what you are licenced for at any time
- Reduce operational costs: with support services included
- Flexible billing: pay monthly or yearly
- Centralised: management visibility across entire environment, sites and workloads
- Protect: optional immutable cloud storage for ultimate protection from ransomware
Pricing
£0.89 to £26.55 a licence a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 0 9 3 6 2 8 8 4 0 9 6 2 9 2
Contact
AUTODATA PRODUCTS LIMITED
Ant Bucknor
Telephone: 020 7749 7949
Email: cloudlake@autodata.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- N/A
- System requirements
- Supported workload type
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We have an SLA in place to respond to raised tickets within one hour, within standard business hours. Out of hours support available if required.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Autodata are able to support our clients with a range of service levels from simple "call-in" services to a fully managed platform. Delivery of support is available in both business hours and out-of-hours support and SLAs from 1-8hrs. Agreements available to suit each use case. Autodata assign a Technical Account Manager to ensure service levels are achieved and help sculpt the delivery to meet the organisational need.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Reference documentation for Veeam is available directly from the Veeam Help Centre. Additionally, Autodata will support any deployment of Veeam software via a support ticket.
- Service documentation
- No
- End-of-contract data extraction
- N/A
- End-of-contract process
- Our contracts are based on a monthly rolling agreement. The client is free to cancel at any time.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Linux or Unix
- MacOS
- Windows
- Other
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Autodata provides a centralised management platform for the monitoring of all Veeam backup environments, to allow complete oversight of the environment and to facilitate improved resolution times of support tickets.
- Accessibility standards
- None or don’t know
- Description of accessibility
- N/A
- Accessibility testing
- N/A
- API
- Yes
- What users can and can't do using the API
-
Veeam Backup Enterprise Manager REST API reference contains a description of resources and their collections which stand for Veeam Backup & Replication and Veeam Backup Enterprise Manager entities. Every resource and collection has an XML and JSON data representation and one or more methods that represent operations available for the resource or collection.
The following can be actioned via REST API:
Logon Sessions - Accounts and Roles - Backup Infrastructure - Lookup Service - Jobs - Backup - Replication - Continuous Data Protection (CDP) - NAS Backup - Veeam Agent Management - Veeam Cloud - Connect - vCD Organisation Configurations - vSphere Self-Service - Backup Portal - Tasks - System Sessions - Reports - Query Service - API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- Purchasers of this service can protect any quantity of workloads within their infrastructure. Additionally, managed services can also be offered for any protected workload.
Scaling
- Independence of resources
- This service is designed to run within a client's infrastructure and is used exclusively by them. Therefore demand resources are completely controlled by the client.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Number of supported workloads, success of backup completion.
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Veeam
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
- Other
- Other data at rest protection approach
- This service is designed to run within a client's infrastructure and is used exclusively by them. Therefore security controls are solely managed by the client.
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- N/A
- Data export formats
- Other
- Other data export formats
- Veeam backup format
- Data import formats
- Other
Data-in-transit protection
- Data protection between buyer and supplier networks
- Other
- Other protection between networks
- N/A
- Data protection within supplier network
- Other
- Other protection within supplier network
- N/A
Availability and resilience
- Guaranteed availability
- Autodata are able to support our clients with a range of service levels from simple "call-in" services to a fully managed platform. Delivery of support is available in both business hours and out-of-hours support and SLAs from 1-8hrs. Agreements available to suit each use case. Autodata assign a Technical Account Manager to ensure service levels are achieved and help sculpt the delivery to meet the organisational need.
- Approach to resilience
- Information available on request
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Role-based access.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 17/12/2021
- What the ISO/IEC 27001 doesn’t cover
- The Access Controls to program source code and the separation of development, testing and operational environments are excluded from the scope as Autodata does not do any development
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Autodata has a system of processes in place to control how the company operates and maintains its Quality and Information Security Management Systems. These have been independently assessed and certified against ISO 9001 and ISO 27001 by BSI, a UKAS accredited audit body. Within the Information Security Policy are specific policies focusing on Access Control, Backup Management, Business Continuity Management, Change Management, Data Protection, Encryption and Password Management amongst others. All staff are trained in these systems as part of their onboarding and on an ongoing basis.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Our change management processes are aligned with the ISO27001 requirements. Change requests must be submitted for risk assessment and testing prior to approval, including documented provisions for reversal, to prevent disruption to services.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Weekly vulnerability scans are scheduled and any non-informational 'High' and above vulnerabilities must be identified and resolved within 48 hours. Patching occurs as required and scan reports (including Remediate actions) are reviewed monthly.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Monitoring is in place via Cynet 360 XDR, Cisco Umbrella and Palo Alto NGFW IPS and IDS systems. Any potential compromises identified will trigger our Incident Management Procedure, which is in line with ISO27001 requirements.
- Incident management type
- Supplier-defined controls
- Incident management approach
- This process has been defined to meet ISO 27001 requirements. Incidents are classified on receipt as either a Security Weakness or Event, a Minor Incident or a Major Incident. Treatment processes are documented for each category, which include establishing the cause and taking preventative or corrective action; taking measures to contain the incident and logging the relevant details; liaising with the relevant authorities. External consultants are retained to identify, collect and preserve evidence in the event of a major incident and a disciplinary process will be invoked for any violation of the security rules.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Our Cloudlake offering utilises cloud storage, which is proven to be more sustainable due to hyper-efficient architecture and higher utilisation rates. Our data centre partner is committed to using over 90% of renewable energy sources and has strong social commitments, supporting charities, diversity and inclusion.
Pricing
- Price
- £0.89 to £26.55 a licence a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Free trial licences available for 30 days