CloudInfinit
Cloudinfinit is a collection of hosted services based in the UK. It forms part of a wider portfolio of remote-managed IT services for design, implementation and support services tailored to your needs and budget.
Features
- Backup/DR: policy configuration, media selection, monitoring, health checks, media management.
- Compute: Hypervisor and server provisioning, monitoring, upgrades and patching
- Container: Orchestration management, deep Integration, easy development
- NoSQL databases: OracleDB, MongoDB, DynamoDB all supported
- RDBMS: AuroraDB, MariaDB, MSSQL, MYSQL, PostgreSQL all supported
- Firewall: Configuration and maintenance, access to certified specialist, 24x7 monitoring
- SIEM: Centralised monitoring and management, 24x7 Incident response and remediation
- Networking: Includes, High Availability Routing, Load Balancing, SDN, WAN Optimisation
- Block/Object storage: NAS, SAN and Solid State Supported
Benefits
- Backup/DR: Service restoration designed around your RTO and RPO objectives
- Compute: service assurance that maintains rightsizing and steady state running
- Container: Faster Application startup, improved security
- Database: Support and expertise, reduced maintenance and operating costs
- Firewall: security assurance with reporting and cost savings
- SIEM: Vulnerability and Threat management offering total peace of mind
- Networking: Supported by Sify networking expertise backed by service assurance
- Block/Object storage: Cost efficient and easier data storage and recovery
Pricing
£30 to £76 an instance a month
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 8 8 4 4 1 4 3 3 9 6 5 2 2 8
Contact
SIFY DIGITAL SERVICES LIMITED
Justin Polley
Telephone: 07375416538
Email: justin.polley@sifycorp.com
Service scope
- Service constraints
- Design, planning and migration are offered as separate advisory and planning services. Support on some client-specific hardware specifications may be out of scope.
- System requirements
-
- Buyers may bring their own licenses or buy through Sify
- Sify supplied hardware specifications available on request
- Some specific hardware and platforms specifications may not be supported
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
P1 - P4 15 mins response to fault/trouble ticket
General enquiries within 24 hrs - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- No
- Support levels
-
P1 -Critical An incident affecting the Core Business application organisation-wide.
P2 - High An incident affecting multiple users/locations or service degrade of the core application.
P3 - Medium An incident affecting high availability of the infrastructure or a single user within a centre.
P4 - Low Service Request or Information Request
- All support levels are included in the service price as standard
- Sify provide a technical solutions manager - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
This is done as part of the onboarding exercise. Online Documentation is available for self-learning.
User Documentation & Training materials are available for self-learning - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- The decommissioning process is followed to disconnect and shut down the services.
- End-of-contract process
- The subscribed services rate card is defined with deliverables and some components like bandwidth, backup, etc are provided at additional cost. However, the same can also be included as a rate card model.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Users can self-manage their IaaS, like creating or delete Servers, Storage, and Network, Configure Firewall rules, and CPU/RAM/Disk for Servers. The user can provision the services in a user-friendly interface by providing the configuration details. The user can select the resource and can perform changes to the same like upgrade or degrade CPU/RAM, etc. The users are allowed to utilize the services up to the subscribed capacity. Utilization of resources beyond subscribed capacity is controlled by the Super Admin only.
- Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- The user interface is accessible over the internet with text and images relevant to the services. The interface does not support voice control but with keyboard accessibility.
- Web interface accessibility testing
- Web interface testing is done through internally developed tools for functionality and performance
- API
- Yes
- What users can and can't do using the API
-
API can be used to upload and manage predefined blueprints.
API documentation and support are provided to set up the subscribed services.
API documentation and support are provided to change the subscribed services. Concurrent connections are limited per tenant through API - API automation tools
-
- Ansible
- Terraform
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- MacOS
- Using the command line interface
-
The user can provision the services, select the resource and can perform changes to the same such as an upgrade or degrade CPU/RAM, etc.
Access via CLI are allowed to utilise the services up to the subscribed capacity. Utilisation of resources beyond subscribed capacity is controlled by the Super Admin only.
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- Resource scheduling on the infrastructure layer and sizing of the infrastructure is considered to ensure committed performance is delivered.
- Usage notifications
- Yes
- Usage reporting
- Other
- Other usage reporting
- Dashboard
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Centersquare
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- In-house destruction process
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Files & Folders
- Virtual Machines
- Databases
- Backup controls
- A backup selection list and schedule form is made available for the users to decide. The services are configured based on the user confirmation.
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- SLA are defined for every service along with the service credits. Different services are committed for different SLA and can be made available as part of the contract.
- Approach to resilience
- All components are configured in HA mode to avoid single point of failure.
- Outage reporting
- Email Alerts
Identity and authentication
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Role-based access controls are defined to provide authentication and authorisation to access any service.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- TÜV SÜD
- ISO/IEC 27001 accreditation date
- 22/01/2022
- What the ISO/IEC 27001 doesn’t cover
- A.14.2.7 (outsourced development) . As per SoA V7.0
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- TÜV SÜD
- PCI DSS accreditation date
- 15/06/2023
- What the PCI DSS doesn’t cover
- Req 1, 2, 3, 4, 5, 6, 7, 8, 10, 11
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- ISO 27001:2013 that covers our cloud related security controls
- SOC -1 Type II Report
- SOC -2 Type II Report
- SOC -3
- PCI DSS V3.2.1
- ISO 27017:2015
- ISO 27018:2019
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- ISO 27001:2013
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- The support team performs based on the ITIL framework and is registered/tracked through ITSM tools
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Assets are scanned for Vulnerabilities using the Vulnerability Management Software
Mitigation timelines are categorised based on the severity of the identified vulnerability.
We have subscribed with multiple Threat Intelligence Services to get information about potential threats - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Monitoring tools and processes are in place for ensuring service availability and performance.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- The Process is based on ITIL and is managed through the ITSM Tool available through a secure web portal. The process follows a well-defined management process that includes: Incident Identification, Incident Logging, Incident Categorization, Incident Prioritization, Response and Resolution and, Closure.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- VMware
- How shared infrastructure is kept separate
-
VMware ensures isolation between VMs and organizations through the following mechanisms:
Hypervisor: this is a thin layer of software that sits between the physical hardware and the VMs. It manages the allocation of resources (CPU, memory, storage) to each VM.
Resource Pools: Organizations can create resource pools within vSphere. Network Segmentation: VMware allows organizations to create separate virtual networks (VLANs) for different groups of VMs.
Storage Isolation: VMs use virtual disks (VMDK files) stored on shared storage.
Access Controls: Organizations can set granular access controls to restrict which users or groups can manage specific VMs or resource pools.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
-
Sify’s (Partner) Data Center in Reading has not been certified by the EU DC CoC but does comply with the same energy-saving ethics and code of conduct set out by the two main areas IT Load and Facilities Load. Our Reading facilities also boosts high sustainability and efficiency credentials for its wireless sensors and smart lighting.
In 2023 a new strategic investment into liquid cooling was implemented that will now vastly reduce our carbon footprint impact. Liquid Cooling now efficiently manages the thermal output of our facility by directly absorbing heat from components that significantly reduce the energy required for cooling. This effectively translates into lower operational costs and a smaller carbon footprint.
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
At Sify, we recognise that addressing climate change is not only a global imperative but also a fundamental responsibility. As stewards of the environment, we are committed to making a positive impact by reducing our carbon footprint and promoting sustainable practices. Our approach to fighting climate change encompasses several key principles: Net Zero Emissions, We are dedicated to achieving net-zero greenhouse gas emissions across our operations; Innovation and Collaboration, We believe that innovation is essential for combating climate change. We actively collaborate with industry partners, research institutions, and startups to develop solutions; Supply Chain Sustainability, our commitment extends beyond our immediate operations. We work closely with our suppliers to ensure that they share our climate goals; Employee Engagement: Our employees are our greatest asset. We empower them to contribute to our climate initiatives through education, awareness campaigns, and volunteer opportunities.Covid-19 recovery
As we navigate the aftermath of the COVID-19 pandemic, Sify remains steadfast in its commitment to fostering a resilient community and economy. Our dedication to corporate social responsibility is unwavering, and we pledge to: • Support Health and Well-being: Prioritise the health of our employees, customers, and community members by maintaining safe work environments and promoting mental health awareness. • Enhance Digital Inclusivity: Bridge the digital divide by providing technology access and training, ensuring everyone can benefit from the digital economy. • Strengthen Community Ties: Collaborate with local organisations to support those most affected by the pandemic, focusing on education, healthcare, and social services. • Champion Sustainable Practices: Integrate sustainability into our operations and supply chain, reducing our environmental footprint and contributing to a healthier planet. In unity, we have emerged stronger and more connected than ever before. Sify is dedicated to building a future that reflects our core values of integrity, innovation, and inclusivity, as we believe that our collective efforts today will pave the way for a brighter tomorrow.Tackling economic inequality
At Sify, we recognise that technology has the power to transform lives and societies. As we advance into the future, we are committed to using this power to address and reduce economic inequality. Our corporate social responsibility is rooted in the belief that everyone deserves equal opportunities to thrive in the digital era. We are dedicated to: • Empower Through Education: Provide accessible and inclusive educational programs to equip individuals from underserved communities with the skills needed to succeed in the tech-driven economy. • Foster Entrepreneurship: We offer initiatives to support startups, particularly those led by underrepresented groups, with resources, and financial assistance. • Promote Fair Employment: Ensure fair hiring practices and create a diverse workforce that reflects the communities we serve, offering competitive wages and growth opportunities. • Invest in Community Infrastructure: Build and enhance technological infrastructure in areas lacking access, enabling communities to connect and participate in the global economy. • Advocate for Policy Change: Work alongside policymakers to advocate for regulations that promote economic equality and protect against the digital divide. Sify is more than a technology provider; we are a catalyst for positive change. By integrating these commitments into our business model, we aim to create a world where progress benefits all, not just a few. Together, we can build a future of shared prosperity and enduring success.Equal opportunity
At Sify, we believe in the transformative power of technology to create a level playing field for all. Our mission extends beyond innovation; it is about ensuring that every person, regardless of background, has the opportunity to reach their full potential. We are committed to: • Cultivate Diversity and Inclusion: Foster a workplace culture that embraces diversity, equity, and inclusion, where every voice is heard and valued. • Access to Technology: Strive to make our products and services accessible to all, breaking down barriers that prevent people from using technology to improve their lives. • Education for All: We partner with educational institutions to provide internships, and training programs, especially for those from historically marginalised communities. • Transparent Governance: Uphold the highest standards of corporate governance, ensuring fairness and transparency in all our business dealings. Sify is dedicated to building an inclusive future where technology empowers everyone equally. We pledge to continuously evaluate and improve our practices to ensure that we try to be a force for good in the world, driving equal opportunities for growth, learning, and success.Wellbeing
At Sify, we understand that well-being is the cornerstone of a productive and happy society. Our commitment to enhancing well-being extends through every aspect of our operations and into the communities we serve. We are dedicated to: • Promote Work-Life Balance: Implement policies that support flexible work arrangements, allowing our team to thrive both professionally and personally. • Mental Health Initiatives: Introduce mental health programs and resources to support our employees' emotional and psychological health. • Healthy Living Technologies: Develop and provide technologies that encourage and facilitate healthier lifestyles for our customers and communities. • Sustainable Solutions: Ensure that our products and services are designed with sustainability in mind, contributing to the well-being of our planet. Sify is committed to being a catalyst for positive change, fostering an environment where well-being is accessible to all. Through innovation and empathy, we pledge to contribute to a world where technology serves as a tool for health and happiness.
Pricing
- Price
- £30 to £76 an instance a month
- Discount for educational organisations
- Yes
- Free trial available
- No