Enterprise Monitoring
Our Monitoring and Alerting solution unifies monitoring, logs, metrics, alerts, and historical data into a single platform for full visibility into the health and performance of your entire technology stack. Available as a SaaS platform or self-hosted (we build it for you – in your data centre or cloud).
Features
- An all-in-one monitoring, alerting, and visualisation solution
- Monitor clouds, servers, networks, devices and more
- Correlate root cause analysis and anomaly detection
- Configure in minutes, start small and scale as needed
- Out-of-the-box templates for most of the popular platform
- Support ping, port checks and SNMP (all versions)
- Support monitoring via HTTP/S, IPMI, SSH, WMI, ODBC, MQTT, Modbus
- Support monitoring via Java applications, Web APIs and HTTP endpoints
- Agent based monitoring (optional) for Windows, Linux, Unix, AIX, FreeBSD
- Works with 3rd party applications
Benefits
- Monitor anything, at scale
- Full setup and ongoing support provided
- We handle all optimisations, scaling, and security
- Supports UK data sovereignty
- Supports UK data sovereignty
Pricing
£35 a unit a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 5 1 3 7 0 0 1 0 2 1 8 5 2 2
Contact
QNETIX LTD
Qnetix - Your Trusted Technology Solutions Partner
Telephone: +443333355673
Email: gcloud@Qnetix.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- None
- System requirements
- Requires underlying provision of operating systems if provisioned locally
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Typical response times are : Request for Information – 4 hour response. Request for support – 2 hour response. Critical incident support – 1 hour response. This will be reviewed for each engagement and pre-agreed with the client.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Full end-end support during UK Business Hours as Standard. Options available for 24x7x365 support.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We pride ourselves on the fact that our services are easy to consume and simple to use. New customers provide a list of authorized contacts and their permission levels. We engage with those contacts, supply documentation, and offer training if needed on contacting support, accessing portals, and using our services. We do not charge for standard onboarding/offboarding. If extra onboarding support like project management or technical design is required, we may charge a pre-agreed rate.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
- We will work with you to create a plan for closing your account and provide assistance with exporting and downloading your data. Users can also directly download their data and applications.
- End-of-contract process
- We do not charge for standard off-boarding, allowing organizations to exit our service without penalty. We will provide reasonable support for customer service exit, data exporting, and resource decommissioning. If extensive project management or large-scale support is necessary, We reserve the right to charge the client, contingent on advance agreement before termination.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Web based service will full access to all features
- Accessibility standards
- None or don’t know
- Description of accessibility
- NA
- Accessibility testing
- NA
- API
- No
- Customisation available
- Yes
- Description of customisation
- Qnetix offers additional customisation of the service - from sizing through to the level of support required.
Scaling
- Independence of resources
- This service offering is for dedicated, customer specific environments and therefore by its nature is isolated and not affected by the demand of other customers and users.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We will pre-agree the metrics required as part of the onboarding service. This will generally cover service usage, availability, licensing and utilisation.
- Reporting types
- Regular reports
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- We will work with you to create a plan for closing your account and provide assistance with exporting and downloading your data. Users can also directly download their data and applications.
- Data export formats
- Other
- Other data export formats
- Any common data format
- Data import formats
- Other
- Other data import formats
- Any common data format
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- SLA driven availability guarantee based on services selected. 99.9% uptime SLA available.
- Approach to resilience
- All components have been built in fully resilience and availability in mind. Availability is dependant on services selected. More information is available on request.
- Outage reporting
- All infrastructure is monitored. Outage monitoring alerts are sent directly to customer main points of contact or pre-agreed operational points of contact via e-mail. Additional methods of escalation and alerting can be agreed as part of onboarding.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Access restrictions in management interfaces and support channels
- Only authorised contacts are granted access rights / access. All critical management and security systems are isolated, have multi-factor authentication enabled and confirm to the principle of least access and just in time access.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Qnetix operate a rolling internal audit and assurance programme to ensure continuity and compliance to any agreed standards and customer certification required. This includes internal technical auditing of our systems. NOTE: We are open to developing or implementing any additional standards and processes required.
- Information security policies and processes
- Qnetix actively embraces industry standards and guidance (for example ISO 27001). Our internal auditing process and annual audits ensure that the policies are being followed. Any breach of our information security policy is logged and escalated to the information security officer for a full and thorough review. Where needed, remediation action plans are put in place and process changed, including staff training. NOTE: We are open to developing or implementing any additional standards and processes required.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All non-standard changes are reviewed and must be pre-authorised by going through a peer, senior and change board approval process. Standard changes are created in template form and are reviewed and approved as a standard prior to implementation. Where feasible, all changes are tested in lab / development environments prior to production implementation. NOTE: We are open to developing or implementing any additional standards and processes required.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Qnetix conduct regular vulnerability testing and scanning and all key systems are regularly monitored for vulnerabilities. All vulnerabilities found are recorded, categorised into priority depending on the severity and remediated. NOTE: We are open to developing or implementing any additional standards and processes required.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Qnetix proactively monitors key systems - this includes logging all key security and access information to a centralised location. Logs and systems are checked daily for potential security breaches using several key search filters. Alerts are sent out for high risk activity and are pro-actively responded to by the Qnetix Operations Team. NOTE: We are open to developing or implementing any additional standards and processes required.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Qnetix operate an ITIL centric incident management process with associated procedures for security related incidents. The process has a clearly defined governance framework, including roles & responsibilities, clear policies and associated KPIs. NOTE: We are open to developing or implementing any additional standards and processes required.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
- Other
- Other public sector networks
- Connectivity will be pre-agreed as part of service initiation
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
While Qnetix is not a manufacturer of hardware or software, we are committed to minimizing any activities that could harm the environment. To achieve this goal, we will: /1/ Assess and seek to reduce the environmental impact of our current and future operations. /2/ Continuously improve our environmental performance and reduce waste by promoting recycling and reuse. /3 / Purchase environmentally responsible goods and services whenever possible. /4/ Train employees on environmental matters and make information available as needed. /5/ Expect similar environmental standards from our suppliers and contractors. /6 / Assist customers in using our products and services in environmentally sensitive ways. /7/ Participate in discussions about environmental issues as necessary. /8/ Comply with all legal and regulatory environmental requirements. /9/ Review this policy annually and update as needed. We share the industry's concern about the environmental impact of obsolete IT equipment that is not recycled. We believe no computer should go to waste. We work with suppliers to enable materials to be reused or recycled, helping conserve natural resources. We have a strong commitment to keeping environmentally sensitive IT materials out of landfills.Covid-19 recovery
Qnetix remain committed to supporting our teams and community in the recovery of the affects of Covid 19. To achieve this goal, we will: /1/ Continue to offer training and education support for those left unemployed by COVID-19. /2 / Support people and communities to manage and recover from the impacts of COVID-19. /3/ Support organisations and businesses to manage and recover from the impacts of COVID-19. /4/ Support the physical and mental health of people affected by COVID-19. /5/ Improve workplace conditions that support the COVID-19 recovery effort including effective social distancing, remote working, and sustainable travel solutions.Tackling economic inequality
Qnetix is committed to addressing economic inequality at its core by creating new businesses and employment opportunities, as well as improving education and training. Our overriding vision is to help reduce the unequal distribution of income and opportunity between different groups in society.Equal opportunity
Qnetix aims to promote equal opportunities and fair management practices beyond legal requirements. Qnetix provides a work environment free from unlawful discrimination, harassment, bullying, or victimization based on sex, marital status, sexuality, disability, age, race, color, ethnicity, nationality, religion, or political beliefs. This principle applies equally to recruitment, training, promotion, dismissal, transfer, benefits, and all terms and conditions of employment. Qnetix does not tolerate breaches of this policy. All such instances will be thoroughly investigated and proven cases subject to disciplinary procedures. Policies for recruitment, selection, training, development, and promotion ensure individuals are treated solely based on relevant aptitudes, skills, and abilities.Wellbeing
At Qnetix, we understand that nurturing employee well-being is critical to developing workplace resilience. We focus on the following key areas: /1/ Physical - We ensure employees have routine in their roles, enough time for exercise, sleep, work-life balance, and nutrition. /2/ Career - We provide learning and development programs for employee growth. /3/ Financial - We offer fair compensation and aim to alleviate financial stress, which has been more prominent during the pandemic. /4/ Social - We host social events, especially now as people emerge from isolation, to build community. /5/ Community - We engage with local schools, colleges, and apprenticeship programs when possible. /6/ Emotional - We support employees through one-on-one meetings and external assistance to aid their mental health. /7/ Purpose - Our regular team meetings set work goals and align individual roles with the company's overall mission.
Pricing
- Price
- £35 a unit a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Free trials are available. Resource limits and timeframe are agreed on a case basis.