Storage and Backup copy
Groen Sky (green cloud) has developed the SaaS platform CopenCloud, where we offer climate-smart cloud storage and backup. The platform is climate certified and generates a CO2 report that can be used in the customers' ESG accounts. Likewise, the platform offers security by design and cost efficiency.
Features
- Climate-smart cloud storage
- Climate-smart cloud backup
- CO2 reporting for ESG accounting
- Active scale object storage
- Remote access
- S3 access
- Glasier access
- Security by design
Benefits
- Up to 90% less CO2 reduction
- Top notch security
- Cost efficiency
Pricing
£10 to £10 a terabyte a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 4 6 8 4 7 3 4 2 6 5 4 2 6 5
Contact
Grøn Sky ApS
Pierre Bennorth
Telephone: +4544 101 909
Email: pb@groensky.dk
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- All kinds of internal backup programs with S3 and Glacier integration.
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- No
- System requirements
-
- Access to the internet
- Internal backup programs with S3 and Glacier integration.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 24-72 hours, depending on whether it is a weekday or weekend.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Depending on individual agreement.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide user documentation and online support.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
- At the start of the agreement, the customer is provided with all necessary documentation.
- End-of-contract process
- At the start of the agreement, the customer is provided with all necessary documentation so there will be no additional cost.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Other
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- None
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- Full documentation.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- ODF
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- As long as the integration takes place through S3 and/or Glacier, the customer has all desirable options.
Scaling
- Independence of resources
- Since we offer a cloud service, there is no upper limit for storage space or performance.
Analytics
- Service usage metrics
- Yes
- Metrics types
- With our activity log, we offer a full report with a calculation of CO2 reduction.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- By downloading through their browser or backup program.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
- Plain files and folders
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
- Plain files and folders
Data-in-transit protection
- Data protection between buyer and supplier networks
- Other
- Other protection between networks
- Encrypting and immutable transfer and storage of data.
- Data protection within supplier network
- Other
- Other protection within supplier network
- Encrypting and immutable transfer and storage of data.
Availability and resilience
- Guaranteed availability
-
Monthly Uptime Percentage Service Credit Percentage
Less than 99.9% but greater than or equal to 99.0% 10%
Less than 99.0% but greater than or equal to 95.0% 25%
Less than 95.0% 100% - Approach to resilience
- Our setup is built with three geo-locations, where there are three nodes on the two and two nodes on the third. With this method, we can lose one geolocation and several nodes in the other two, without losing any data at all.
- Outage reporting
- The Danish Center For Cyber Security requires us to report all incidents - about which we send notification by email to the customer, and in extreme cases issue a press release.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- 2-factor authentication
- Access restrictions in management interfaces and support channels
- Compliant to NIS 2
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- Stripe
- PCI DSS accreditation date
- 01/06/2023
- What the PCI DSS doesn’t cover
- Nothing
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- ISO/IEC 27001
- Other
- Other security governance standards
- Compliant to NIS 2
- Information security policies and processes
- Compliant to NIS 2
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Compliant to NIS 2
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Compliant to NIS 2
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Compliant to NIS 2
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Compliant to NIS 2
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Up to 90% CO2 reduction on files and / or folders storageCovid-19 recovery
Remote working when necessary and full transparency and reporting from all emploise.Tackling economic inequality
Cost efficiency price structure on files and / or folders storage.Equal opportunity
No restrictions except for organizations dealing with terrorism, money laundering or similar crimes.Wellbeing
No restrictions except for organizations dealing with terrorism, money laundering or similar crimes.
Pricing
- Price
- £10 to £10 a terabyte a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- One month free access to our SaaS platform