Skip to main content

Help us improve the Digital Marketplace - send your feedback

Trustmarque Solutions Limited

TRUSTMARQUE SafeGUARD BACK-UP AS A SERVICE

Unifying Backup & Recovery, DR, Archiving and Search, SafeGUARD provides a highly secure data management service to protect all your data. Eliminating the burden of performing traditional local backups, the service offers centralised visibility of all data and allows you to stream your data on demand from backups and archives.

Features

  • Rapid restore and recovery
  • Deduplication to reduce transmitted and stored data volumes
  • Located in UK Data Centres
  • Advanced Malware detection
  • Encryption (AES-256) to secure your data in the cloud
  • Archiving and search functionality
  • Centralised management console for ease of management
  • Automated reporting including exception-reporting
  • SaaS Backup for Microsoft 365 and Salesforce
  • Options for local copies of data

Benefits

  • Eliminate downtime. Instant Data provides on-demand access to data
  • Reduced backup window through advanced data reduction techniques
  • Reduced operation effort with simple ‘set and forget’ backups
  • Reduced bandwidth and low system overhead via data reduction techniques
  • Management console providing single point of view for all data
  • Simple, transparent pricing, no bandwidth charges, no hidden costs
  • Reduces primary storage requirements through automated archiving
  • Reduced maintenance overhead through automatic software updates
  • Recover anything, anywhere and at any time
  • Supported by data management specialists with experience since 1988.

Pricing

£0.10 to £0.45 a gigabyte a month

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@trustmarque.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 7 8 4 2 8 5 3 9 1 0 6 2 0 7

Contact

Trustmarque Solutions Limited Darren Moyes
Telephone: 01904 934435
Email: tenders@trustmarque.com

Service scope

Service constraints
An installed client software agent is used to protect devices running supported operating systems and applications. Please refer to the system requirements and compatibility matrix.
System requirements
  • Internet connectivity
  • Backup software client installed on a supported operating system
  • Resource availability (low) on systems to be protected

User support

Email or online ticketing support
Email or online ticketing
Support response times
Subject to an agreed SLA.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Business hours support is included as part of the service. Please refer to the Service Definition Document and End User Agreement.

Users can upgrade if required to Support Advantage, which offers 24/7 support, a Technical Account Manager and agreed levels of on-site resource.

Please contact Trustmarque for further information on Support Advantage.
Support available to third parties
No

Onboarding and offboarding

Getting started
A technical adviser from our dedicated Support team will
provide the relevant advice as to the most efficient way to
on-board the End User in pre-agreed and defined timeframes. All
relevant software, training and support to run and maintain the
Service will be provided by Trustmarque.

For further information, please refer to the Service Definition Document.
Service documentation
Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction
All data is fully recoverable for up to 30-days after contract ends. Longer terms can be negotiated.
End-of-contract process
All data is fully recoverable for up to 30-days after contract ends. Longer terms can be negotiated.

Using the service

Web browser interface
Yes
Using the web interface
A central management console allows IT departments to monitor and manage online backups, set-up schedules and automate administration and processes - true management by exception, reducing the time spent managing backups for data in hybrid or cloud storage.

Reporting is a key function, with scheduled reports and information on online backup status, enabling IT departments to intimately track, administer and manage backups and restores.
Web interface accessibility standard
None or don’t know
How the web interface is accessible
The management Console has full role based access security and audit logs.
Web interface accessibility testing
N/A
API
Yes
What users can and can't do using the API
The default graphical user interface of the SafeGUARD software can be replaced completely with customised branding and UX design through the API whilst maintaining the full functionality of the software.

SafeGUARD comes complete with a full reporting suite and centralised management console, all of which can be accessed through the extensive API.
API automation tools
Other
API documentation
Yes
API documentation formats
PDF
Command line interface
Yes
Command line interface compatibility
  • Linux or Unix
  • Windows
Using the command line interface
Backup and restore can be performed via the command line. This required that a backup selection has been performed via an installed client first.

Scaling

Scaling available
Yes
Scaling type
Automatic
Independence of resources
The service is underpinned by a scale out infrastructure which is scaled ahead of being needed so there is always availability to support demand. As the infrastructure scales, it scales in both performance and capacity.

A comprehensive Service level Agreement (SLA) is offered to Customers.
Usage notifications
Yes
Usage reporting
  • API
  • Other
Other usage reporting
Uses can see usage in the management interface.

Analytics

Infrastructure or application metrics
Yes
Metrics types
Memory
Reporting types
Real-time dashboards

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Redstor - https://www.redstor.com/

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • Files
  • Virtual Machines
  • Azure VM's and BLOB Storage
  • Network Attached Storage (NAS)
  • Laptops, PCs and Servers
  • M365 including; Exchange, SharePoint, OneDrive, Teams and EntraID (Coming Soon)
  • Google Workspace
  • AWS and Azure Kubernetes
  • Salesforce
  • Applications
Backup controls
The SafeGUARD Backup Service provides an online storage platform which enables a Customer to back up a specified device.

The associated software that is provided by Trustmarque to enable use of the Service allows automated or manual backup, as well as Customer initiated data recovery.

Backups can be scheduled to run unattended at a particular time and at a frequency defined by the Customer. Different backup selections can be scheduled to run at different times and frequencies.
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Users schedule backups through a web interface
Backup recovery
Users can recover backups themselves, for example through a web interface

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection between networks
The SafeGUARD software fully encrypts the Customer’s data using 256-bit AES encryption and transfers the Customer's fully encrypted data via any TCP-IP enabled network connection over TCP port 443.

Data is encrypted before leaving the Customer’s device in relation to which the Service is provided and remains so until recovered by the Customer.
Data protection within supplier network
Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
Trustmarque uses reasonable endeavours to provide the Services in accordance with the Service Level Agreement which is that the Service is available at a minimum of 99.5% per month.

In calculating availability, no account shall be taken of time the Service is unavailable due to any installation work or due to any maintenance in relation to the Service.

If Trustmarque fails to achieve the Services Level targets specified for the Service, the End User may claim a credit (limited per month) based on the monthly recurring charge for the Service.

Please refer to Schedule 3 - Service Level Agreement in the SafeGUARD End User Agreement for further details.
Approach to resilience
The data centres provide high levels of uptime. Ensuring electricity is always available, the primary data centre facility provides a minimum of N+1 power redundancy, meaning every mission-critical component has at least one backup power feed that kicks in when there’s an outage. Data centres also have enough fuel on site to provide 24 to 48 hours of emergency power using backup generators with guaranteed fuel delivery.
Outage reporting
Any outages are reported to Customers via email alerts

Identity and authentication

User authentication
  • Username or password
  • Other
Other user authentication
One set of security credentials (account name, password and encryption key) is required for each device, and the security credentials may not be shared between devices.

Security credentials include an encryption key. The key can be combination of alphanumeric characters of the customer’s choosing and is used when the encryption algorithm encrypts files to keep data confidential. Without the key, no one can access the data.
Access restrictions in management interfaces and support channels
The management interface offers role based access meaning you can restrict each user to allow only the functionality required. An audit trail allows tracking of changes made by different users.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password
Devices users manage the service through
Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Less than 1 month
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
Less than 1 month
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
IMSM (International Management Systems Marketing)
ISO/IEC 27001 accreditation date
2024
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
  • ISO 27001 certified for Information Security Management
  • SOC 2 Type 1

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
S3 is ISO9001 and ISO27001 accredited and as such adheres to the policies and procedures set out under these schemes.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Further information can be provided upon request.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Further information can be provided upon request.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Further information can be provided upon request.
Incident management type
Supplier-defined controls
Incident management approach
Further information can be provided upon request.

Secure development

Approach to secure software development best practice
Supplier-defined process

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
No

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
Tbc

Social Value

Social Value

Social Value

Wellbeing

Wellbeing

Cloud backup services offer significant social value for businesses by fostering resilience and ensuring continuity of operations. In the event of a cyberattack, hardware failure, or natural disaster, a secure, off-site backup allows businesses to recover critical data quickly and minimize downtime. This translates to a reduced risk of lost revenue, maintains customer trust by protecting sensitive information, and safeguards jobs by ensuring employees can keep working. Overall, cloud backups contribute to a more stable and secure business environment, benefiting both the company and the wider community it serves.

Pricing

Price
£0.10 to £0.45 a gigabyte a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
A 14-day unlimited, full version, free trail is available on request.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@trustmarque.com. Tell them what format you need. It will help if you say what assistive technology you use.