Skip to main content

Help us improve the Digital Marketplace - send your feedback

Transputec Limited

Hyper-V

Transputec's Hyper-V Implementation Services offer comprehensive solutions for cloud deployments, including consultation, architecture design, migration, and managed services. They ensure seamless integration, scalability, and security for AWS and Azure environments, optimising performance and cost-efficiency to meet business need

Features

  • Hypervisor
  • Scalability
  • High Availability
  • Integration with Windows Server
  • Security

Benefits

  • Failover Clustering
  • Live Migrations
  • Virtual TPM
  • Continuous Availability

Pricing

£5 a server a day

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at G-cloud@transputec.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 4 7 0 1 7 7 1 8 1 2 6 8 6 4

Contact

Transputec Limited G-Cloud Team
Telephone: 0203 5886570
Email: G-cloud@transputec.com

Service scope

Service constraints
None
System requirements
  • Hyper-V Servers have specific minimum requirements
  • Details on request

User support

Email or online ticketing support
Email or online ticketing
Support response times
Subject to the agreement 24x7x365
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Subject to the agreement 24x7x365
Fully Managed Service
Co-Managed Service (in collaboration with client existing IT team)
Technical Account Manager
Strategic Advisor

Cost variable based on scope of agreement
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Subject to agreement, formal training provided by 3rd party partners or informal training on one-to-one basis
Service documentation
Yes
Documentation formats
  • PDF
  • Other
Other documentation formats
Microsoft Word, Excel and PowerPoint
End-of-contract data extraction
Agreement on data to be anonymised or deleted. Transfer of any data subject to the data source and destination
End-of-contract process
Exit plan agreed as part of managed service agreement defines approach to exit and costs

Using the service

Web browser interface
Yes
Using the web interface
Subject to support framework:
Via VMware vSphere console
Via Transputec service desk web porta
Web interface accessibility standard
WCAG 2.1 AA or EN 301 549
Web interface accessibility testing
None
API
Yes
What users can and can't do using the API
All functionality is exposed via an API
API automation tools
Other
Other API automation tools
VSphere
API documentation
Yes
API documentation formats
HTML
Command line interface
Yes
Command line interface compatibility
  • Linux or Unix
  • Windows
  • MacOS
Using the command line interface
All functionality is available via the CLI

Scaling

Scaling available
Yes
Scaling type
Automatic
Independence of resources
Agreed as part of design
Usage notifications
Yes
Usage reporting
Email

Analytics

Infrastructure or application metrics
Yes
Metrics types
Other
Other metrics
Agreed metrics as part of managed service agreement
Reporting types
Real-time dashboards

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
VMWare

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Backup and recovery

Backup and recovery
Yes
What’s backed up
Virtual Machines
Backup controls
Scheduled backup services as part of the agreed service scope
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Users contact the support team to schedule backups
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Bonded fibre optic connections
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Service Levels subject to agreement and cloud service configuration
Approach to resilience
Agreed as part of design
Outage reporting
Email Alerts

Identity and authentication

User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Role based access provisions
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password
Devices users manage the service through
Dedicated device on a segregated network (providers own provision)

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
LRGA Limited
ISO/IEC 27001 accreditation date
31st May 2023
What the ISO/IEC 27001 doesn’t cover
Nothing relevent to this framework response
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
OSCP (Offensive Security Certified Professional)

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
ISO/IEC 27001:2013
CyberEssentials
All issues and suspected non-compliance and suspicious activities are reported immediately to our SoC and senior managment (Director level and above) via monitored mailbox/DL (nc@Transputec.com)

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Configuration management - subject to agreement full lifecycle management

Change management - RFCs raised for Change Board Authority decision include security impacts including change to availabity, integrity and confidentiality, along with rollback plan - subject to sign-off from a technical, service delivery, security and commercial decision maker
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Transputec - Internal network vulnerability scans are carried out periodically, based on Internals vulnerability scan program. All elements of corporate network must be covered by this internal vulnerability scans. Regular assessments, timely remediation, and continuous improvement is practiced.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Supplier provides full range of security services, tools and standards which can be enabled and configured.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Follow ISO27001 certified and ITIL processes for configuration and change management

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Supplier
Virtualisation technologies used
VMware
How shared infrastructure is kept separate
Network isolation using virtual private clouds (VPCs) or network security groups (NSGs).
Resource isolation through hypervisor-based isolation for VMs or containerization for containers.
Access controls and permissions to ensure that users from different organizations cannot access each other's resources.
Data encryption and segregation to prevent unauthorized access to data.

Energy efficiency

Energy-efficient datacentres
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Equal opportunity
  • Wellbeing

Fighting climate change

ISO 14001:2013 certified
Science Based Targets Initiative registered
Transputec is committed to managing its CO2 emissions and is focused on working with its clients and suppliers to address Scope 3 emissions For more information please visit https://www.transputec.com/about-us/sustainability/

Equal opportunity

Transputec is and always has been a non-discriminatory organisation, employing a global workforce without bias or prejudice and are supportive of gender diversity Transputec is part of the Minority Supplier Development UK (MSDUK) Ethnic Minority Business (EMB) network. As MSDUK EMB suppliers we are part of a broad network of innovative, high growth minority owned businesses, providing an important role in the UK and international IT services supply chain..

Wellbeing

Transputec has an open approach to health and wellbeing, encouraging communication and understanding through wellbeing events delivered generally on an annual basis as well as community out reach and our international outreach programme
https://www.transputec.com/about-us/our-charity-partners/

Pricing

Price
£5 a server a day
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
£200 of free credit to use on any type of Azure Hyper-V cloud server

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at G-cloud@transputec.com. Tell them what format you need. It will help if you say what assistive technology you use.