Skip to main content

Help us improve the Digital Marketplace - send your feedback

Nexstor

Backup as a Service

Off site backup as a service orchestrated by Veeam

Features

  • Off site secure backup
  • UK datacentre built to Tier 3 Plus certified standards
  • Encrypted in transit (SSL/TLS)

Benefits

  • S3 immutable option
  • UK datacentre locations
  • Off site backup orchestrated by Veeam
  • No ingress/egress charges
  • UK support desk

Pricing

£13.46 a terabyte a month

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at troy@nexstor.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 1 7 2 7 4 2 0 7 5 9 5 5 6 3

Contact

Nexstor Troy Platts
Telephone: 07879812072
Email: troy@nexstor.com

Service scope

Service constraints
Compatible with Veeam backup software, VMware and Hyper-V
System requirements
  • On premise Veeam version compatibility requirement
  • Suitable internet connection

User support

Email or online ticketing support
Email or online ticketing
Support response times
4 hours in hours (Monday - Friday 8am - 6pm) out of hours support available for P1 issues via telephone only.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Basic support is included, additional support can be purchased under a managed service agreement
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Trial available, onboarding supported by the service desk and documentation provided after setup.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
Data can be extracted via the portal. Nexstor can provide a copy of the data at the end of the contract before it is removed from the system. S3 is the exception to this as it is immutable.
End-of-contract process
The contract is backup as a service and the inclusion of specific products is dependant on the quote. At the end of the contract, or after notice is served, the customer is offered the opportunity to recover their data before it is removed from Nexstor's platform.

Using the service

Web browser interface
Yes
Using the web interface
Restore email, OneDrive and SharePoint available through the web interface.
Web interface accessibility standard
None or don’t know
How the web interface is accessible
N/a
Web interface accessibility testing
N/a
API
No
Command line interface
No

Scaling

Scaling available
Yes
Scaling type
Manual
Independence of resources
Utilise resource pools to guarantee availability
Usage notifications
Yes
Usage reporting
Email

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • Memory
  • Network
  • Number of active instances
Reporting types
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Hardware containing data is completely destroyed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • Office 365
  • Virtual Machines
  • File Servers
  • Databases
  • Physical Machines
  • Desktops
Backup controls
Retention and restore policies are agreed at point of onboarding, customers can change the schedule and backup requirements as they see fit.
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Users schedule backups through a web interface
Backup recovery
  • Users can recover backups themselves, for example through a web interface
  • Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Bonded fibre optic connections
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
N/a
Approach to resilience
Available on request
Outage reporting
Email alerts and public dashboard

Identity and authentication

User authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Privileged account management is enforced
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device over multiple services or networks

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
British Assessment Bureau
ISO/IEC 27001 accreditation date
17/12/2021
What the ISO/IEC 27001 doesn’t cover
Gloucester office
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Nexstor are ISO 27001 and Cyber Essentials certified and compliant

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Strict change management process is in place complying with ITIL, and ISO 9001 along with complying with ISO 27001 and Cyber Essentials.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Strict patch management process is in place complying with ITIL, and ISO 9001 along with complying with ISO 27001 and Cyber Essentials.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Monitoring platform is in place complying with ITIL, and ISO 9001 along with complying with ISO 27001 and Cyber Essentials.
Incident management type
Supplier-defined controls
Incident management approach
Strict incident management process is in place complying with ITIL, and ISO 9001 along with complying with ISO 27001 and Cyber Essentials.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Supplier
Virtualisation technologies used
VMware
How shared infrastructure is kept separate
VRF in place for network segregation
vCloud utilised for creating VDCs to separate clients
vDOMs are used on the firewall to further distinguish clients

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
All Nexstor Datacentre's are ISO 14001 certified.

Social Value

Social Value

Social Value

  • Tackling economic inequality
  • Equal opportunity

Tackling economic inequality

Nexstor are proud to be a National Living Wage employer

Equal opportunity

Nexstor are very proud to be an equal opportunities employer

Pricing

Price
£13.46 a terabyte a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
30 day trial for all services inclusive of 5TB data

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at troy@nexstor.com. Tell them what format you need. It will help if you say what assistive technology you use.