Cloudlake Backup for Google Workspace (G Suite)
Cloudlake Backup for Google Workspace (G Suite) protects your data from undetected deletions, corruption, and both internal and external threats. Our unique model allows you to protect, Gmail, Drive, Contacts, Calendar and Shared Drives against any event, whilst ensuring you only purchase exactly what you require with no wasted expense.
Features
- Unique service, including user licences/management with optional storage available
- Deploy as a fully managed service delivered by Autodata
- Store data on your premises/in public cloud/or managed by Autodata
- Both “Air-Gap” and “Immutability” provided as standard protecting from ransomware
- Only pay user licences for active users (historic backups free)
- Store an unlimited amount of backups for an unlimited time
- Automatically deployed updates and security improvements
- Easy to use restore portal
- Full onboarding included at no additional charge
- UK-based support, deployment and storage
Benefits
- Simple pricing: based on your actual usage
- No overpayments: pay only for what you require each month
- Scale: increase or decrease your licences at any time
- Modular: add or remove service elements at any time
- Protection: from any threat either internal or external
- Reduced operational costs: with support services included
- Flexible billing: pay monthly or yearly
- Sovereignty: you have access to storage and control its location
Pricing
£0.13 to £1.35 a user a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 1 4 6 4 3 9 6 6 8 5 0 0 6 3
Contact
AUTODATA PRODUCTS LIMITED
Ant Bucknor
Telephone: 020 7749 7949
Email: cloudlake@autodata.co.uk
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Google Workspace, G Suite, Gmail, Google Drive, Contacts, Calendar & Shared Drives
- Cloud deployment model
-
- Public cloud
- Hybrid cloud
- Service constraints
- No constraints
- System requirements
- Google Workspace (G Suite)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We have an SLA in place to respond to raised tickets within one hour, within standard business hours. Out of hours support available if required.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- No
- Support levels
- Autodata are able to support our clients with a range of service levels from simple "call-in" services to a fully managed platform. Delivery of support is available in both business hours and out-of-hours support and SLAs from 1-8hrs. Agreements available to suit each use case. Autodata assign a Technical Account Manager to ensure service levels are achieved and help sculpt the delivery to meet the organisational need.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide an initial demonstration and training, with Quick Start guides and Knowledge Base, and ongoing assistance where necessary.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
At the end of contract there are various options as to how to proceed.
1- The service can be renewed either monthly, annually or multi-yearly.
2- The backup element of the service can be discontinued but the storage service maintained, giving the ability to recover historical backups, at just the price of the storage.
3- All customers have direct access to the storage layer and so are able to simply access their storage repository and “move” the data to an alternative location.
4- Additionally the data can be recovered to an original or alternative location, or downloaded to a location of the user's choosing, via the portal. - End-of-contract process
- Our contracts are based on a monthly rolling agreement. The client is free to cancel at any time.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
-
Through our portal you are able to view users' backup data, choose objects for recovery, choose the destination of recovery (original location, different location, download etc) and/or recover entire user accounts or groups of accounts.
Search is provided to enable the correct objects to be retrieved and complex search criteria can be used to identify information even within extremely large data sets. - Accessibility standards
- None or don’t know
- Description of accessibility
- N/A
- Accessibility testing
- N/A
- API
- No
- Customisation available
- Yes
- Description of customisation
-
Customisation is provided in a fully managed process at the point of onboarding to our service. User accounts, ability to access, times and frequency of backups, retention periods and immutability periods are all discussed and implemented.
Changes can be made in the future at any time, as part of a change management process, designed to ensure that security policies can be maintained and best practice can be advised.
Scaling
- Independence of resources
- The service is designed to automatically scale, depending on user loads and is already provisioning over 300PB of protected data.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Number of active users being backed up. Quantity of storage within the storage repository.
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- MSP360
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Other
- Other data at rest protection approach
- Immutability is enabled for all Google Workspace (G Suite) backup repositories.
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Data is exported from within the application.
- Data export formats
-
- CSV
- Other
- Other data export formats
- PST
- Data import formats
- Other
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- All data stored within our repositories is available, with 11x9s of data durability.
- Approach to resilience
- Available on request
- Outage reporting
- Email alerts and public dashboard
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- The basic principle is that access to all systems, networks, services and information is forbidden, unless expressly permitted to individual users or groups of users. There is a user registration procedure for each system and service.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 17/12/2021
- What the ISO/IEC 27001 doesn’t cover
- The Access Controls to program source code and the separation of development, testing and operational environments are excluded from the scope as Autodata does not do any development
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Autodata has a system of processes in place to control how the company operates and maintains its Quality and Information Security Management Systems. These have been independently assessed and certified against ISO 9001 and ISO 27001 by BSI, a UKAS accredited audit body. Within the Information Security Policy are specific policies focusing on Access Control, Backup Management, Business Continuity Management, Change Management, Data Protection, Encryption and Password Management amongst others. All staff are trained in these systems as part of their onboarding.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Our change management processes are aligned with the ISO27001 requirements. Change requests must be submitted for risk assessment and testing prior to approval, including documented provisions for reversal, to prevent disruption to services.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Weekly vulnerability scans are scheduled and any non-informational 'High' and above vulnerabilities must be identified and resolved within 48 hours. Patching occurs as required and scan reports (including Remediate actions) are reviewed monthly.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Monitoring is in place via Cynet 360 XDR, Cisco Umbrella and Palo Alto NGFW IPS and IDS systems. Any potential compromises identified will trigger our Incident Management Procedure, which is in line with ISO27001 requirements.
- Incident management type
- Supplier-defined controls
- Incident management approach
- This process has been defined to meet ISO 27001 requirements. Incidents are classified on receipt as either a Security Weakness or Event, a Minor Incident or a Major Incident. Treatment processes are documented for each category, which include establishing the cause and taking preventative or corrective action; taking measures to contain the incident and logging the relevant details; liaising with the relevant authorities. External consultants are retained to identify, collect and preserve evidence in the event of a major incident and a disciplinary process will be invoked for any violation of the security rules.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Our storage partner's data centres are green by design. They are built to operate with high energy-efficiency standards and have the goal of using 100% clean and renewable energy (currently >90%). The data centres take advantage of innovative green solutions such as adaptive control systems, ASHRAE thermal guidelines, cold/hot aisle containment, energy-efficient lighting systems, fuel cells and high temperature chilled water set points. All of these systems together allow the data centres to reduce power consumption and increase efficiencies. Data centres are certified to meet rigorous environmental and energy management systems standards with all new builds targeting LEED silver or equivalent green building certifications. Our partner is recognised as a leader in sustainability receiving an A- rating from CDP and the EPA’s Green Power Partner of the Year award and has previously won the EU Code of Conduct Energy Efficiency Award; as well as having various other certifications such as ISO 14064, 14001 and 50001.
Pricing
- Price
- £0.13 to £1.35 a user a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- A free trial is available for 30 days' usage.