Skip to main content

Help us improve the Digital Marketplace - send your feedback

CONTRUENT LIMITED

Hosting by Atlas Cloud

Contruent Hosting by Atlas can deploy the Contruent application from a cloud environment whilst leaving users’ local desktops as they are, with no business disruption. The Contruent application is then available on compatible devices with low bandwidth requirements and also works over Wi-Fi, 3G or 4G which makes it accessible.

Features

  • Access CONTRUENT application from a cloud environment
  • fully managed application (updates, security and support.)
  • the solution is scalable as and when required
  • data is stored in ISO 27001 certified data centers
  • Real Time Reporting
  • REMOTE ACCESS AND MOBILITY -
  • Backups take place daily
  • Disaster recovery provided
  • Atlas Cloud use the ITIL service management framework ..
  • Aligned with ITIL practices (service and help desk are accredited)

Benefits

  • Access the Contruent interface form any compatible device
  • Real time data Access
  • Scalable per your requirements in an ever changing enviroment
  • ISO accredited data security

Pricing

£85.60 to £210.66 a user a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at kvantine@contruent.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 9 5 2 9 6 3 0 6 9 9 3 3 8 5

Contact

CONTRUENT LIMITED Karl Vantine
Telephone: +1-650-823-0636
Email: kvantine@contruent.com

Service scope

Service constraints
“Planned Maintenance” The Atlas Cloud standard maintenance window is the third Saturday of each month starting at 18:00 UK time. This allows for any patches or updates required on the system. Users will be notified at least one week in advance if the maintenance window will be used.
“Emergency Maintenance” means any emergency maintenance of any of the infrastructure relating to the Services. Whenever possible, Atlas Cloud shall provide the Client with minimum six (6) hours’ advance notice.
No Customization of the underlying platform or software code is permitted. However clients are able to customize the functionality of the software
System requirements
  • A Device capable of running Citrix Workspace:
  • Suitable Firewall changes to enable the Contruent Applications to operate.
  • Suitable Network Connectivity

User support

Email or online ticketing support
Email or online ticketing
Support response times
Standard support hours are Monday – Friday 08:00 – 18:00, 24*7 can be made available upon request.
Atlas Cloud will provide Licensee with technical support in the form of telephone and/or online assistance for the purposes of answering questions relating to the Application Service, including but not limited to (a) clarification of functions and features of the Service; (b) clarification of the Documentation; (c) guidance in the operation of the Service; and (d) error verification, analysis, and correction, including the failure to produce results in accordance with the Documentation.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Atlas Cloud will provide Licensee with technical support in the form of telephone and/or online assistance for the purposes of answering questions relating to the Application Service, including but not limited to (a) clarification of functions and features of the Service; (b) clarification of the Documentation; (c) guidance in the operation of the Service; and (d) error verification, analysis, and correction, including the failure to produce results in accordance with the Documentation.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Once an order is agreed and accepted, Atlas Cloud’s implementation team will begin the on-boarding process. This will involve building and configuring the application(s) required by the customer and the migration of any associated data to the secure data centre environments. We provide a technical Project Manager to lead the design as well as an implementation team of experienced Architects and Senior Engineers to implement, test and transition to the Atlas Cloud. There would then be a handover to the Atlas Cloud support team which is staffed by experienced Engineers at 1st, 2nd and 3rd line levels of support. The entire process would be overseen by both the CTO and COO of Atlas Cloud from the very beginning, throughout the delivery and ongoing support thereafter.
Atlas Cloud uses the IT Service Delivery Management framework, ITIL, and all of the support processes are designed around this. In addition, we hold ISO certifications in 9001, 14001 and 27001:2013.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
If the client wishes to change to a different IT provider, the first step is for the client to file a request to leave. Next, an End of Contract date is agreed. Data is then collected via the client from the Atlas Cloud data centre or placed in an encrypted location at the request of the client. Atlas Cloud do not keep unencrypted data outside the data centre. The customer can extract their data at any time, whether by self-service request or a request for Atlas Cloud to perform on the customer’s behalf. The cost of this will be based upon a time and materials basis.

Client owned licenses are subsequently handed back to the client and any rented hardware is returned to Atlas cloud. Finally, the client’s desktops are deleted from the systems and a confirmation is sent to the client.
End-of-contract process
Client owned licenses are subsequently handed back to the client and any rented hardware is returned to Atlas cloud. Finally, the client’s desktops are deleted from the systems and a confirmation is sent to the client.

Using the service

Web browser interface
Yes
Using the web interface
Cloud Hosting-
Web interface accessibility standard
None or don’t know
How the web interface is accessible
CONTRUENT Hosting by Atlas can deploy the CONTRUENT application from a cloud environment whilst leaving users’ local desktops as they are, with no business disruption. The CONTRUENT application is then available on any compatible device with low bandwidth requirements and also works over Wi-Fi, 3G or 4G which makes it much more accessible.
Hosted CONTRUENT Applications also interact with existing software and can be integrated with other applications and the user’s desktop. Atlas fully manages the application and handles all updates, security and support.
The application is delivered via a ‘Citrix Virtual Apps and Desktops’ based solution, any application can be hosted, including graphically intense 3D design software.
Based on an OPEX model, the solution is scalable as and when required with pay per user per month pricing, which allows for better planning and forecasting.
The CONTRUENT Applications and data are stored in ISO 27001 certified data centres and Atlas Cloud as a company also holds an ISO 27001:2013 certification, guaranteeing Official level security.
Web interface accessibility testing
Details can be supplied at request
API
No
Command line interface
No

Scaling

Scaling available
No
Independence of resources
Sizing allocation- initially correct sizing and then sizing thresholds to ensure the allocated amount of users do not affect the performance
Usage notifications
Yes
Usage reporting
  • Email
  • Other
Other usage reporting
Notifications on storage quota

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • Memory
  • Network
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Atlas Cloud

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Other
Other data at rest protection approach
Physical access control, complying with another standard
- Physical Data Encryption (SAN Encryption Keys)
- All backups are encrypted.
Data sanitisation process
Yes
Data sanitisation type
  • Deleted data can’t be directly accessed
  • Hardware containing data is completely destroyed
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • Daily Backups
  • Backups stored across 2 UK based Servers
  • Environments reprovisioned
  • Dedicated DR Virtual Application Resources
  • Live-standby DR Service enabled by Zerto
Backup controls
Organisations will have backups stored at the remote site. In the event of a major failure affecting the primary data centre, Atlas Cloud will assist Consumers to re-provision their environment within the second data centre. Consumers should note that this is subject to available capacity within the second data centre. If consumers require certainty that capacity will be available in the event of DR, it is recommended that Dedicated DR Virtual Application Resources are permanently secured for the client – as an additional service Atlas Cloud will provide a live-standby DR Service enabled by Zerto.
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
The standard Atlas Cloud SLA or availability is 99.5%
Approach to resilience
All critical infrastructure is redundant
More info available upon request
Outage reporting
Email alerts

Identity and authentication

User authentication
Username or password
Access restrictions in management interfaces and support channels
Authentication: Ensure that only authorized individuals can access management interfaces username and password, with multi-factor authentication for added security.
Authorizations: Role-based access control (RBAC)
Audit Logging: Auditing software keeps a record of who does what within management interfaces and support channels, helping identify any unauthorized or suspicious activity.
Secure Communication: We use tools such as Mimcast and Citrix Files to secure communication and prevent attackers from intercepting sensitive information.
Session Management: We have timeouts for inactive sessions and limit the number of failed login attempts to protect against brute force attacks.
Regular Updates and Patches:
Training:
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Alcumus ISOQAR
ISO/IEC 27001 accreditation date
1/8/2023
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Following the ISO 27001 standards
- Data Privacy: Personal data is not stored without a specific use.
- Data Security: Data is protected during transmission and storage.
- Compliance with Regulations: We comply with applicable laws and regulations related to data protection and privacy.

We have strict process and procedure around data protection we adhere to ISO 27001 standards we posses a Cyber Essentials Plus accreditation.
- Access Control: Only authorized entities have access to the data, and such access is strictly controlled and logged.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Atlas Cloud have a detailed change management process which spans customer changes, internal infrastructure changes and security configuration updates.
All changes go through change management, changes are subject to peer review and customer approval before being actioned.
More details can be provided in the form of the Atlas Cloud change management documentation if required.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We conduct monthly vulnerability scans on our infrastructure as well as a yearly PEN Test.
All patches are applied with 14 days of release adhering cyber essentials plus requirements.
All servers are onboarded within MS365 Defender cloud infrastructure and we utilise Azure Sentinel as a SIEM.
We use official vendor channels to keep up to date with vulnerabilities as well as third party news outlets.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Defender for Endpoints is deployed on all infrastructure, our internal security team as well as senior technical people are alerted to any potential security threats via email.
Automated response ensures endpoints are isolated if the threat is real.
Process and procedure dictate that any potential security threats are immediately acted upon and thoroughly investigated.
Incident management type
Supplier-defined controls
Incident management approach
Incident Identification:
Incident Logging:
Incident Categorization:
Incident Prioritization:
Incident Assignment:
Incident Investigation and Diagnosis:
Incident Resolution and Recovery
Incident Closure: incident is resolved and the system or service is back to normal, the incident is closed in the incident management system.
Incident Review and Reporting: it is reviewed to learn from the experience and improve future incident management.
User can report incidents via online portal, telephone or email.
Incident report can be produced on request or are sometimes issued on mass depending on the incident. Reports are created at senior leadership level.

Secure development

Approach to secure software development best practice
Supplier-defined process

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Supplier
Virtualisation technologies used
VMware
How shared infrastructure is kept separate
Tenant and shared infrastructure is segregated with strict access control lists configured on Cisco ASA enterprise firewalls.
Segregation also occurs at the hypervisor layer utilizing VMWare network filtering.

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
- ISO 14001 (Environmental Management)

Social Value

Social Value

Social Value

  • Fighting climate change
  • Tackling economic inequality

Fighting climate change

ISO 14001 accredited- EMS standard
an internationally agreed standard that sets out the requirements for an environmental management system. It helps organizations improve their environmental performance through more efficient use of resources and reduction of waste, gaining a competitive advantage and the trust of stakeholders.

Tackling economic inequality

Accredited Living wage employer, pay all directly employed staff a Living Wage, and have a plan in place to extend that to regular sub-contracted staff as well

Pricing

Price
£85.60 to £210.66 a user a month
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at kvantine@contruent.com. Tell them what format you need. It will help if you say what assistive technology you use.