M-TECH SYSTEMS LIMITED
Cloud Virtual Machine
Hosted private cloud virtual machine
Features
- Highly Scalable
- Resilient
- Windows or Linux Supported
- Automated 60 Day Back-Up
- Enhanced Security & Compliance
- Built-In Virtual Networking
- Fully Supported
Benefits
- Improved security
- Highest standards of compliance
- Cost-Effective
- Policy-Based Access Improves Flexibility
- Flexible Opex Costs
Pricing
£45.00 to £326.00 a server
- Education pricing available
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at Stuart.Taylor@mtechsystems.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
4 1 9 3 4 3 6 2 0 4 2 9 7 2 1
Contact
M-TECH SYSTEMS LIMITED
Stuart Taylor
Telephone: 01323 404040
Email: Stuart.Taylor@mtechsystems.co.uk
Service scope
- Service constraints
- Planned maintenance bi-annually.
- System requirements
- Windows or Linux
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Automated receipt confirmation and then 4 Hours response time for tickets. Response times are the same for weekends.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Scaled SLA based on service type and severity. Service delivery management. Online access to our portal for incident/change management and reporting. 24/7 Service desk that follows ITIL methodology
Quarterly reviews with a dedicated Service Delivery Manager. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide migration support services as well as online and onsite training.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Via Secure FTP or can be seeded to a client provided NAS
- End-of-contract process
- At the end of the contract, M-Tech Systems delivers all documentation, data and any other IP to the client.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Users can make changes on the web interface, depending on their hierarchical access permissions. Change controls can be tailored to client requests.
- Web interface accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web interface accessibility testing
- We have not performed any specific testing with assistive technology users.
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Manual
- Independence of resources
- We guarantee each client the resource that is contracted. We use predictable, scalable architecture to ensure they can grow independently of other users.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- Memory
- Network
- Number of active instances
- Other
- Other metrics
- N/A
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Hardware containing data is completely destroyed
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Files
- Servers
- Backup controls
- Clients can define back-up requirements
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
-
- Users can recover backups themselves, for example through a web interface
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Bonded fibre optic connections
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- 99.9% availability SLA, with refund of service charges applicable for under-performance against these targets.
- Approach to resilience
- Our service is designed for resilience by using highly available architecture, connectivity, and carriers across multiple datacentres.
- Outage reporting
- We report any outages via status page, email alerts & a monitoring platform.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Access restrictions in management interfaces and support channels
- We restrict access via hierarchical channels
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- UKAS
- ISO/IEC 27001 accreditation date
- 25/08/2021
- What the ISO/IEC 27001 doesn’t cover
- No exclusions
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
- IASME Gold
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- ISO27001, ISO9001, Cyber Essentials Plus and IASME Gold
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- We have full integrated management system which combines the requirements of ISO 9001 and ISO 27001. We have defined security policies that are rigorously managed and checked
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Vulnerability management approach is based on ensuring all platforms are patched and maintained according to vendor best practice. All configuration changes are subject to strict change control and are reviewed, logged, and audited on a regular basis.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Intrusion detection from tier one vendors with analytics that is managed and monitored by our service desk and escalated via documented ISO procedures.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Pre-defined, ITIL and ISO27001 based processes are in place for common events and event management processes are followed so that incidents are automatically logged and handed over to the required technical contact for diagnosis, triage, and resolution. All incidents are included in formal quarterly service review reporting processes.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Third-party
- Third-party virtualisation provider
- Nutanix AHV
- How shared infrastructure is kept separate
- Virtual machines are separated from each other using standard network security topologies such as VLANs and vSwitches. Microsegmentation can also be deployed on request.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- Through our radical fresh-air cooling system, which won us Green Data Centre of the Year in its first year of operation, and evaporative cooling systems, our PUE (Power Usage Effectiveness) regularly drops below 1.2, meaning that for every 1kW used to power equipment hosted in the data centre, we use 0.2kW of power to operate all related areas of infrastructure, such as cooling, lighting etc.
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
M-Tech Cloud Hosting can play a role in fighting climate change, and promote environmental sustainability. Here’s how:
1. Energy Efficiency: Cloud hosting enables more efficient use of hardware through virtualisation, which allows multiple virtual servers to run on a single physical server. This maximises the use of physical resources and reduces the need for numerous power-consuming servers. Our data centre optimises hardware and software to run at peak efficiency, significantly reducing energy use compared to traditional on-site data centres.
2. Reducing Carbon Footprint: By centralising resources in highly efficient data centres and reducing the need for individual businesses to maintain their own physical servers, cloud hosting minimises the overall carbon footprint. The centralised nature of cloud hosting means that energy can be sourced more responsibly and used more efficiently.
3. Encouraging Remote Work: Cloud hosting facilitates remote working by providing reliable access to applications and data from any location. This reduces the need for commuting, which lowers greenhouse gas emissions from vehicles. The pandemic demonstrated the potential for remote work to significantly cut commuting-related emissions.
4. Resource Optimisation: M-Tech Systems uses advanced technologies to monitor and dynamically allocate resources, ensuring that infrastructure is not over-provisioned and wasteful. This not only conserves energy but also optimises the lifecycle of hardware components.
Through these strategies, M-Tech Systems contributes to the fight against climate change, enhancing social value by promoting a healthier environment and sustainable practices.
Pricing
- Price
- £45.00 to £326.00 a server
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- 30 day limited to 3 connected devices
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at Stuart.Taylor@mtechsystems.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.