Skip to main content

Help us improve the Digital Marketplace - send your feedback

QNETIX LTD

Enterprise Monitoring

Our Monitoring and Alerting solution unifies monitoring, logs, metrics, alerts, and historical data into a single platform for full visibility into the health and performance of your entire technology stack. Available as a SaaS platform or self-hosted (we build it for you – in your data centre or cloud).

Features

  • An all-in-one monitoring, alerting, and visualisation solution
  • Monitor clouds, servers, networks, devices and more
  • Correlate root cause analysis and anomaly detection
  • Configure in minutes, start small and scale as needed
  • Out-of-the-box templates for most of the popular platform
  • Support ping, port checks and SNMP (all versions)
  • Support monitoring via HTTP/S, IPMI, SSH, WMI, ODBC, MQTT, Modbus
  • Support monitoring via Java applications, Web APIs and HTTP endpoints
  • Agent based monitoring (optional) for Windows, Linux, Unix, AIX, FreeBSD
  • Works with 3rd party applications

Benefits

  • Monitor anything, at scale
  • Full setup and ongoing support provided
  • We handle all optimisations, scaling, and security
  • Supports UK data sovereignty
  • Supports UK data sovereignty

Pricing

£35 a unit a month

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at gcloud@Qnetix.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 5 1 3 7 0 0 1 0 2 1 8 5 2 2

Contact

QNETIX LTD Qnetix - Your Trusted Technology Solutions Partner
Telephone: +443333355673
Email: gcloud@Qnetix.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
None
System requirements
Requires underlying provision of operating systems if provisioned locally

User support

Email or online ticketing support
Email or online ticketing
Support response times
Typical response times are : Request for Information – 4 hour response. Request for support – 2 hour response. Critical incident support – 1 hour response. This will be reviewed for each engagement and pre-agreed with the client.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Full end-end support during UK Business Hours as Standard. Options available for 24x7x365 support.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We pride ourselves on the fact that our services are easy to consume and simple to use. New customers provide a list of authorized contacts and their permission levels. We engage with those contacts, supply documentation, and offer training if needed on contacting support, accessing portals, and using our services. We do not charge for standard onboarding/offboarding. If extra onboarding support like project management or technical design is required, we may charge a pre-agreed rate.
Service documentation
Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction
We will work with you to create a plan for closing your account and provide assistance with exporting and downloading your data. Users can also directly download their data and applications.
End-of-contract process
We do not charge for standard off-boarding, allowing organizations to exit our service without penalty. We will provide reasonable support for customer service exit, data exporting, and resource decommissioning. If extensive project management or large-scale support is necessary, We reserve the right to charge the client, contingent on advance agreement before termination.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
Web based service will full access to all features
Accessibility standards
None or don’t know
Description of accessibility
NA
Accessibility testing
NA
API
No
Customisation available
Yes
Description of customisation
Qnetix offers additional customisation of the service - from sizing through to the level of support required.

Scaling

Independence of resources
This service offering is for dedicated, customer specific environments and therefore by its nature is isolated and not affected by the demand of other customers and users.

Analytics

Service usage metrics
Yes
Metrics types
We will pre-agree the metrics required as part of the onboarding service. This will generally cover service usage, availability, licensing and utilisation.
Reporting types
Regular reports

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
We will work with you to create a plan for closing your account and provide assistance with exporting and downloading your data. Users can also directly download their data and applications.
Data export formats
Other
Other data export formats
Any common data format
Data import formats
Other
Other data import formats
Any common data format

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
SLA driven availability guarantee based on services selected. 99.9% uptime SLA available.
Approach to resilience
All components have been built in fully resilience and availability in mind. Availability is dependant on services selected. More information is available on request.
Outage reporting
All infrastructure is monitored. Outage monitoring alerts are sent directly to customer main points of contact or pre-agreed operational points of contact via e-mail. Additional methods of escalation and alerting can be agreed as part of onboarding.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
Access restrictions in management interfaces and support channels
Only authorised contacts are granted access rights / access. All critical management and security systems are isolated, have multi-factor authentication enabled and confirm to the principle of least access and just in time access.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Qnetix operate a rolling internal audit and assurance programme to ensure continuity and compliance to any agreed standards and customer certification required. This includes internal technical auditing of our systems. NOTE: We are open to developing or implementing any additional standards and processes required.
Information security policies and processes
Qnetix actively embraces industry standards and guidance (for example ISO 27001). Our internal auditing process and annual audits ensure that the policies are being followed. Any breach of our information security policy is logged and escalated to the information security officer for a full and thorough review. Where needed, remediation action plans are put in place and process changed, including staff training. NOTE: We are open to developing or implementing any additional standards and processes required.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All non-standard changes are reviewed and must be pre-authorised by going through a peer, senior and change board approval process. Standard changes are created in template form and are reviewed and approved as a standard prior to implementation. Where feasible, all changes are tested in lab / development environments prior to production implementation. NOTE: We are open to developing or implementing any additional standards and processes required.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Qnetix conduct regular vulnerability testing and scanning and all key systems are regularly monitored for vulnerabilities. All vulnerabilities found are recorded, categorised into priority depending on the severity and remediated. NOTE: We are open to developing or implementing any additional standards and processes required.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Qnetix proactively monitors key systems - this includes logging all key security and access information to a centralised location. Logs and systems are checked daily for potential security breaches using several key search filters. Alerts are sent out for high risk activity and are pro-actively responded to by the Qnetix Operations Team. NOTE: We are open to developing or implementing any additional standards and processes required.
Incident management type
Supplier-defined controls
Incident management approach
Qnetix operate an ITIL centric incident management process with associated procedures for security related incidents. The process has a clearly defined governance framework, including roles & responsibilities, clear policies and associated KPIs. NOTE: We are open to developing or implementing any additional standards and processes required.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
Yes
Connected networks
Other
Other public sector networks
Connectivity will be pre-agreed as part of service initiation

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

While Qnetix is not a manufacturer of hardware or software, we are committed to minimizing any activities that could harm the environment. To achieve this goal, we will: /1/ Assess and seek to reduce the environmental impact of our current and future operations. /2/ Continuously improve our environmental performance and reduce waste by promoting recycling and reuse. /3 / Purchase environmentally responsible goods and services whenever possible. /4/ Train employees on environmental matters and make information available as needed. /5/ Expect similar environmental standards from our suppliers and contractors. /6 / Assist customers in using our products and services in environmentally sensitive ways. /7/ Participate in discussions about environmental issues as necessary. /8/ Comply with all legal and regulatory environmental requirements. /9/ Review this policy annually and update as needed. We share the industry's concern about the environmental impact of obsolete IT equipment that is not recycled. We believe no computer should go to waste. We work with suppliers to enable materials to be reused or recycled, helping conserve natural resources. We have a strong commitment to keeping environmentally sensitive IT materials out of landfills.

Covid-19 recovery

Qnetix remain committed to supporting our teams and community in the recovery of the affects of Covid 19. To achieve this goal, we will: /1/ Continue to offer training and education support for those left unemployed by COVID-19. /2 / Support people and communities to manage and recover from the impacts of COVID-19. /3/ Support organisations and businesses to manage and recover from the impacts of COVID-19. /4/ Support the physical and mental health of people affected by COVID-19. /5/ Improve workplace conditions that support the COVID-19 recovery effort including effective social distancing, remote working, and sustainable travel solutions.

Tackling economic inequality

Qnetix is committed to addressing economic inequality at its core by creating new businesses and employment opportunities, as well as improving education and training. Our overriding vision is to help reduce the unequal distribution of income and opportunity between different groups in society.

Equal opportunity

Qnetix aims to promote equal opportunities and fair management practices beyond legal requirements. Qnetix provides a work environment free from unlawful discrimination, harassment, bullying, or victimization based on sex, marital status, sexuality, disability, age, race, color, ethnicity, nationality, religion, or political beliefs. This principle applies equally to recruitment, training, promotion, dismissal, transfer, benefits, and all terms and conditions of employment. Qnetix does not tolerate breaches of this policy. All such instances will be thoroughly investigated and proven cases subject to disciplinary procedures. Policies for recruitment, selection, training, development, and promotion ensure individuals are treated solely based on relevant aptitudes, skills, and abilities.

Wellbeing

At Qnetix, we understand that nurturing employee well-being is critical to developing workplace resilience. We focus on the following key areas: /1/ Physical - We ensure employees have routine in their roles, enough time for exercise, sleep, work-life balance, and nutrition. /2/ Career - We provide learning and development programs for employee growth. /3/ Financial - We offer fair compensation and aim to alleviate financial stress, which has been more prominent during the pandemic. /4/ Social - We host social events, especially now as people emerge from isolation, to build community. /5/ Community - We engage with local schools, colleges, and apprenticeship programs when possible. /6/ Emotional - We support employees through one-on-one meetings and external assistance to aid their mental health. /7/ Purpose - Our regular team meetings set work goals and align individual roles with the company's overall mission.

Pricing

Price
£35 a unit a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Free trials are available. Resource limits and timeframe are agreed on a case basis.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at gcloud@Qnetix.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.