Hosting by Atlas Cloud
Contruent Hosting by Atlas can deploy the Contruent application from a cloud environment whilst leaving users’ local desktops as they are, with no business disruption. The Contruent application is then available on compatible devices with low bandwidth requirements and also works over Wi-Fi, 3G or 4G which makes it accessible.
Features
- Access CONTRUENT application from a cloud environment
- fully managed application (updates, security and support.)
- the solution is scalable as and when required
- data is stored in ISO 27001 certified data centers
- Real Time Reporting
- REMOTE ACCESS AND MOBILITY -
- Backups take place daily
- Disaster recovery provided
- Atlas Cloud use the ITIL service management framework ..
- Aligned with ITIL practices (service and help desk are accredited)
Benefits
- Access the Contruent interface form any compatible device
- Real time data Access
- Scalable per your requirements in an ever changing enviroment
- ISO accredited data security
Pricing
£85.60 to £210.66 a user a month
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 9 5 2 9 6 3 0 6 9 9 3 3 8 5
Contact
CONTRUENT LIMITED
Karl Vantine
Telephone: +1-650-823-0636
Email: kvantine@contruent.com
Service scope
- Service constraints
-
“Planned Maintenance” The Atlas Cloud standard maintenance window is the third Saturday of each month starting at 18:00 UK time. This allows for any patches or updates required on the system. Users will be notified at least one week in advance if the maintenance window will be used.
“Emergency Maintenance” means any emergency maintenance of any of the infrastructure relating to the Services. Whenever possible, Atlas Cloud shall provide the Client with minimum six (6) hours’ advance notice.
No Customization of the underlying platform or software code is permitted. However clients are able to customize the functionality of the software - System requirements
-
- A Device capable of running Citrix Workspace:
- Suitable Firewall changes to enable the Contruent Applications to operate.
- Suitable Network Connectivity
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Standard support hours are Monday – Friday 08:00 – 18:00, 24*7 can be made available upon request.
Atlas Cloud will provide Licensee with technical support in the form of telephone and/or online assistance for the purposes of answering questions relating to the Application Service, including but not limited to (a) clarification of functions and features of the Service; (b) clarification of the Documentation; (c) guidance in the operation of the Service; and (d) error verification, analysis, and correction, including the failure to produce results in accordance with the Documentation. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Atlas Cloud will provide Licensee with technical support in the form of telephone and/or online assistance for the purposes of answering questions relating to the Application Service, including but not limited to (a) clarification of functions and features of the Service; (b) clarification of the Documentation; (c) guidance in the operation of the Service; and (d) error verification, analysis, and correction, including the failure to produce results in accordance with the Documentation.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Once an order is agreed and accepted, Atlas Cloud’s implementation team will begin the on-boarding process. This will involve building and configuring the application(s) required by the customer and the migration of any associated data to the secure data centre environments. We provide a technical Project Manager to lead the design as well as an implementation team of experienced Architects and Senior Engineers to implement, test and transition to the Atlas Cloud. There would then be a handover to the Atlas Cloud support team which is staffed by experienced Engineers at 1st, 2nd and 3rd line levels of support. The entire process would be overseen by both the CTO and COO of Atlas Cloud from the very beginning, throughout the delivery and ongoing support thereafter.
Atlas Cloud uses the IT Service Delivery Management framework, ITIL, and all of the support processes are designed around this. In addition, we hold ISO certifications in 9001, 14001 and 27001:2013. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
If the client wishes to change to a different IT provider, the first step is for the client to file a request to leave. Next, an End of Contract date is agreed. Data is then collected via the client from the Atlas Cloud data centre or placed in an encrypted location at the request of the client. Atlas Cloud do not keep unencrypted data outside the data centre. The customer can extract their data at any time, whether by self-service request or a request for Atlas Cloud to perform on the customer’s behalf. The cost of this will be based upon a time and materials basis.
Client owned licenses are subsequently handed back to the client and any rented hardware is returned to Atlas cloud. Finally, the client’s desktops are deleted from the systems and a confirmation is sent to the client. - End-of-contract process
- Client owned licenses are subsequently handed back to the client and any rented hardware is returned to Atlas cloud. Finally, the client’s desktops are deleted from the systems and a confirmation is sent to the client.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Cloud Hosting-
- Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
-
CONTRUENT Hosting by Atlas can deploy the CONTRUENT application from a cloud environment whilst leaving users’ local desktops as they are, with no business disruption. The CONTRUENT application is then available on any compatible device with low bandwidth requirements and also works over Wi-Fi, 3G or 4G which makes it much more accessible.
Hosted CONTRUENT Applications also interact with existing software and can be integrated with other applications and the user’s desktop. Atlas fully manages the application and handles all updates, security and support.
The application is delivered via a ‘Citrix Virtual Apps and Desktops’ based solution, any application can be hosted, including graphically intense 3D design software.
Based on an OPEX model, the solution is scalable as and when required with pay per user per month pricing, which allows for better planning and forecasting.
The CONTRUENT Applications and data are stored in ISO 27001 certified data centres and Atlas Cloud as a company also holds an ISO 27001:2013 certification, guaranteeing Official level security. - Web interface accessibility testing
- Details can be supplied at request
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- No
- Independence of resources
- Sizing allocation- initially correct sizing and then sizing thresholds to ensure the allocated amount of users do not affect the performance
- Usage notifications
- Yes
- Usage reporting
-
- Other
- Other usage reporting
- Notifications on storage quota
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- Memory
- Network
- Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Atlas Cloud
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Other
- Other data at rest protection approach
-
Physical access control, complying with another standard
- Physical Data Encryption (SAN Encryption Keys)
- All backups are encrypted. - Data sanitisation process
- Yes
- Data sanitisation type
-
- Deleted data can’t be directly accessed
- Hardware containing data is completely destroyed
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Daily Backups
- Backups stored across 2 UK based Servers
- Environments reprovisioned
- Dedicated DR Virtual Application Resources
- Live-standby DR Service enabled by Zerto
- Backup controls
- Organisations will have backups stored at the remote site. In the event of a major failure affecting the primary data centre, Atlas Cloud will assist Consumers to re-provision their environment within the second data centre. Consumers should note that this is subject to available capacity within the second data centre. If consumers require certainty that capacity will be available in the event of DR, it is recommended that Dedicated DR Virtual Application Resources are permanently secured for the client – as an additional service Atlas Cloud will provide a live-standby DR Service enabled by Zerto.
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- The standard Atlas Cloud SLA or availability is 99.5%
- Approach to resilience
-
All critical infrastructure is redundant
More info available upon request - Outage reporting
- Email alerts
Identity and authentication
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
-
Authentication: Ensure that only authorized individuals can access management interfaces username and password, with multi-factor authentication for added security.
Authorizations: Role-based access control (RBAC)
Audit Logging: Auditing software keeps a record of who does what within management interfaces and support channels, helping identify any unauthorized or suspicious activity.
Secure Communication: We use tools such as Mimcast and Citrix Files to secure communication and prevent attackers from intercepting sensitive information.
Session Management: We have timeouts for inactive sessions and limit the number of failed login attempts to protect against brute force attacks.
Regular Updates and Patches:
Training: - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Alcumus ISOQAR
- ISO/IEC 27001 accreditation date
- 1/8/2023
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Following the ISO 27001 standards
- Data Privacy: Personal data is not stored without a specific use.
- Data Security: Data is protected during transmission and storage.
- Compliance with Regulations: We comply with applicable laws and regulations related to data protection and privacy.
We have strict process and procedure around data protection we adhere to ISO 27001 standards we posses a Cyber Essentials Plus accreditation.
- Access Control: Only authorized entities have access to the data, and such access is strictly controlled and logged.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Atlas Cloud have a detailed change management process which spans customer changes, internal infrastructure changes and security configuration updates.
All changes go through change management, changes are subject to peer review and customer approval before being actioned.
More details can be provided in the form of the Atlas Cloud change management documentation if required. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
We conduct monthly vulnerability scans on our infrastructure as well as a yearly PEN Test.
All patches are applied with 14 days of release adhering cyber essentials plus requirements.
All servers are onboarded within MS365 Defender cloud infrastructure and we utilise Azure Sentinel as a SIEM.
We use official vendor channels to keep up to date with vulnerabilities as well as third party news outlets. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Defender for Endpoints is deployed on all infrastructure, our internal security team as well as senior technical people are alerted to any potential security threats via email.
Automated response ensures endpoints are isolated if the threat is real.
Process and procedure dictate that any potential security threats are immediately acted upon and thoroughly investigated. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Incident Identification:
Incident Logging:
Incident Categorization:
Incident Prioritization:
Incident Assignment:
Incident Investigation and Diagnosis:
Incident Resolution and Recovery
Incident Closure: incident is resolved and the system or service is back to normal, the incident is closed in the incident management system.
Incident Review and Reporting: it is reviewed to learn from the experience and improve future incident management.
User can report incidents via online portal, telephone or email.
Incident report can be produced on request or are sometimes issued on mass depending on the incident. Reports are created at senior leadership level.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- VMware
- How shared infrastructure is kept separate
-
Tenant and shared infrastructure is segregated with strict access control lists configured on Cisco ASA enterprise firewalls.
Segregation also occurs at the hypervisor layer utilizing VMWare network filtering.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- - ISO 14001 (Environmental Management)
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
Fighting climate change
ISO 14001 accredited- EMS standard
an internationally agreed standard that sets out the requirements for an environmental management system. It helps organizations improve their environmental performance through more efficient use of resources and reduction of waste, gaining a competitive advantage and the trust of stakeholders.Tackling economic inequality
Accredited Living wage employer, pay all directly employed staff a Living Wage, and have a plan in place to extend that to regular sub-contracted staff as well
Pricing
- Price
- £85.60 to £210.66 a user a month
- Discount for educational organisations
- No
- Free trial available
- No