Skip to main content

Help us improve the Digital Marketplace - send your feedback

EASIPC SERVICES LTD

EasiPC SaaS Protect & Defense

EasiPC SaaS Protect & Defense are SaaS products designed to provide backup and advanced-threat-protection of SaaS platforms.
SaaS Protect - SaaS Protection backs up all data for selected user accounts from Microsoft 365 and Google Workspace.
SaaS Defense – SaaS Defense is an ATP spam filtering solution for Microsoft 365.

Features

  • Online Cloud to Cloud backup for Microsoft 365
  • Backup for Teams, SharePoint Online, OneDrive and Exchange Online
  • Unlimited data storage
  • Automatic reporting
  • File level restoration
  • SOC 2 Type II Compliance and HIPPA compliance support

Benefits

  • Dedicated UK based service desk support
  • Business continuity & disater recovery
  • Reduced Maintenance & infrastructure costs

Pricing

£26.40 to £60 a user a year

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at bids@easipc.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 8 2 6 9 2 6 5 6 1 9 8 6 8 2

Contact

EASIPC SERVICES LTD Rob Lloyd
Telephone: 01604286682
Email: bids@easipc.co.uk

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Office 365 and Google workspace
Cloud deployment model
Private cloud
Service constraints
None
System requirements
  • Microsoft 365
  • Google Workspace

User support

Email or online ticketing support
Yes, at extra cost
Support response times
All response times are defined in the service specification. Initial target response times are 30 minutes for non critical tickets up to a maximum of 8 hours for low priority service requests. No support is provided outside of working hours - Monday to Friday 8am to 5pm.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
All EasiPC customers are assigned an account manager for general service requests, escalation of service issues and general account management. The service is a fully managed service, and any support required due to issues with the service are covered by the EasiPC service desk. Support via the service desk can be obtained via email and phone, during business hours. EasiPC also offer a fully managed service desk, providing further reactive support which can be provided at additional cost. For customers who do not have onsite support an additional onsite support service can be provided at additional cost.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
EasiPC will provide a fully managed onboarding experience, managed by the Cloud Deployment team and following PRINCE2 project management processes. During initial consultancy, the EasiPC Cloud Deployment team will build a bespoke onboarding process defined by the exact service requirement. During onboarding, EasiPC will provide support and training, including but not limited to electronic resources, workshops and webinars.
Service documentation
Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction
In the event the service is no longer required, a termination of service can be requested 60 days in advance of the renewal date. During offboarding (at the end of contract) all data and virtual machine exports will be provided for download for a period of 30 days. The export of data and virtual machines are included within the contract costs, however any migration services required are chargeable at the EasiPC day rate.
End-of-contract process
Once the contract reaches it's end date, all data is exported and made available to the customer for 30 days. After 30 days, all data, user accounts and access is permanently deleted.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
Self service portal for end users to access backup and restore of files.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
N/A
API
Yes
What users can and can't do using the API
All API services are agreed separately with customers in line with their requirements.
API documentation
Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
All customisation requirements are agreed separately with Customers in line with their requirements.

Scaling

Independence of resources
The service is reviewed by Barracuda to look at resource levels.

Analytics

Service usage metrics
Yes
Metrics types
Storage usage, accounts protected, backup failures and restorations.
Reporting types
Real-time dashboards

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Barracuda

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
EasiPC will work with the customer to return control to the customer once the contract ends, this is included in the contract cost.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
All service level agreements are as per the ones supplied by Barracuda, and published by them.
Approach to resilience
Available upon request
Outage reporting
Customer dashboard and email alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
All access to EasiPC services are controlled by leveraging a combination of the following: Complex Username and Password Multifactor authentication IP restrictions UAC (User Access Control) lists Firewall
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
Cyber Essentials Plus
Information security policies and processes
EasiPC is compliant with ISO 27001 and certified Cyber Essentials Plus. All services that EasiPC have developed and deployed have been subject to strict security testing.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
EasiPC uses the ITIL change management processes for all services and all configuration items are controlled by the process. All change requests are managed by an internal CAB who support and work with other teams within EasiPC, ensuring changes are carried out following the ITIL standards. The CAB ensure all change requests and subsequent changes are recorded and carried out successfully.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
EasiPC leverage vendor support services to ensure current guidance and and recommendations are followed to reduce vulnerabilities. All systems are patched in accordance with vendor guidelines and within 14 days where they are non critical. Where critical patching is required, additional emergency maintenance windows my be required. Customers are alerted via direct notifications (email and or phone call) to allow for patching All patches are tested prior to being deployed to the production environment.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
All EasiPC systems are automatically monitored 24/7 using industry standard RMM and network tools. Alerts are automated and real time events and logs are reported to the service desk where they are handled by our ITIL aligned service desk team.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
EasiPC provide ITIL aligned incident management through our service desk team. Incidents reported by phone, email or ticket portal are reviewed and a response and resolution are provided within the agreed timeframes. All responses and resolutions follow EasiPC's documented incident management process.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

Barracuda supports ongoing efforts for the protection and preservation of the environment. Barracuda’s recycling efforts drive pollution prevention and promote sustainability in order to be better global citizens. Barracuda products do not contain and are not manufactured with any Class I or Class II ODS as defined in 40 CFR Part 82.

Barracuda products are compliant to article 4 of the European Union’s RoHS Directive. Barracuda’s WEEE registration number is WEE/DG0065TW. Please contact your local sales representative for additional information.

Pricing

Price
£26.40 to £60 a user a year
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at bids@easipc.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.