Prizsm
Prizsm ultra-secure data storage and communications in the public cloud.
Prizsm enables anyone to easily protect and secure their information in the public cloud. Prizsm’s unique multi-cloud distribution approach enables businesses to retain data safely at all levels of security classification.
Features
- Quantum Resistant Data Security
- Storage Orchestration
- Full inbuilt data redundancy
- API's for all major clouds and local storage options
- User role defined storage
- Set up and Management UI
- Comprehensive logging
- Secure Physical and Virtual Appliance options
- Full random data storage distribution
- Integration with HSM & PKI implementations
Benefits
- Ultra-secure data storage for lower cost
- Prizsm provides long-term data security by design
- Provides data sovereignty compliance
- Prevents vendor lock in
- Information integrity functionality prevents data tampering
- Future proof quantum resistant
- Reduces data storage infrastructure costs
- High resilience protects against system failure
- Flexible data orchestration ensure efficient use of resources
- Enable secure migration of dat files
Pricing
£400.00 to £2,000.00 a terabyte a year
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 3 0 5 3 5 1 9 6 0 0 6 5 9 2
Contact
Ultranyx
Ian Drury
Telephone: 02921 252020
Email: ian.drury@ultranyx.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Other cloud storage services. Works with any public/private cloud provider or data storage endpoint.
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- None
- System requirements
-
- Works with all layers of data protection
- Access to public/private storage endpoints
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Response times are dependent on severity and will be detailed in the SOW
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Support levels depend on the customer's requirements and will be detailed in the SOW. Support is available up to and including full 24/7/365
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
A developers guide is provided online once an account has been created and the online services have been purchased. The comprehensive guide covers descriptions of all the available API calls and SDKs. Once you have registered and logged in, the guide will take you through how to make the first API call.
Ultranyx consultants are able to provide product training on a time & materials basis which is not included in the Prizsm subscription costs. Rates for consultancy can be found in the SIFA rate card. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- User data can be extracted or migrated to other platforms using standard ETL processes.
- End-of-contract process
- Client access can be renewed, extended or simply closed at the end of the contract.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Other
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- None
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- Yes
- What users can and can't do using the API
-
The Prizsm data storage API offers a secure way to store and manage data across multiple cloud platforms.
• Users can initiate the service by integrating the Prizsm data storage API into their systems.
• The setup process involves configuring the API to distribute data across various cloud endpoints, ensuring quantum-resistant security.
• The API allows users to modify data storage configurations and manage how data is distributed and accessed.
• Users can implement store-and-forward communication capabilities for secure data sharing, particularly useful in edge computing and IoT environments.
Limitations:
• The API’s design ensures data integrity and security, which may impose certain constraints on how data can be manipulated.
• Detailed limitations and guidelines are provided in the Prizsm API documentation, which users must adhere to for maintaining system stability and data sovereignty compliance.
Prizsm’s API is built for resilience and security, leveraging disaggregation and random distribution to protect data against emerging threats like quantum computing. It’s essential for users to consult the official documentation to understand the full scope of what can and cannot be done with the API. - API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
-
The platform utilises full elasticity of cloud provisioning to ensure all resources are available based upon platform load.
Ultranyx uses a number of industry-standard approaches to ensure services are customised to the requirements of the client.
Full performance testing isperformed on the platform to ensure it is suitable for the requirements.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Metrics on number of calls is provided
- Reporting types
-
- API access
- Regular reports
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Prizsm Technologies
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Data can be exported via the client tools accessing the API.
- Data export formats
-
- CSV
- Other
- Other data export formats
- All file formats
- Data import formats
-
- CSV
- Other
- Other data import formats
- All file formats
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Bonded fibre optic connections
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
The service offers three nines (99.9%) availability for Standard Tier clients.
Standard Tier is designed with redundancy and failure protection architected in. This protects against a single point of failure. The platform utilises multiple hosting providers supporting full failover and maintaining redundant links to each provider.
Higher Tiers of availability can be provided, as required. - Approach to resilience
-
Standard platform resilience techniques are employed including full failover, physical security, data encryption, etc.
Prizsm disaggregates data so there is no single point of failure across your architecture. Unlike standard encryption, it is resistant to brute-force attacks by supercomputers and even quantum computers.
Full details are available on request. - Outage reporting
- All outages are provided via a standard dashboard. Alerts are also available via an API, if required. Email alerts can also be configured.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
-
Ultranyx ensures secure access to management interfaces and support channels through a multi-layered approach:
• Role-Based Access Control (RBAC): Users are granted access rights based on their role within the organization, ensuring they can only access what is necessary for their job functions.
• Regular Audits: Access logs are reviewed regularly to detect any unauthorized attempts or policy violations.
• Training and Awareness: Staff are trained on the importance of access control and the proper use of support channels.
This comprehensive strategy ensures that access is tightly controlled and monitored, safeguarding sensitive information and systems. - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- Hellios JOSCAR
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
-
JOSCAR Hellios
Cyber Essentials
IASME Governance - Information security policies and processes
-
Ultranyx is committed to maintaining the highest standards of information security. Our policies and processes are designed to protect the integrity, confidentiality, and availability of information.
Policies and Processes:
• Risk Management: Regular assessments to identify and mitigate risks.
• Access Control: Strict protocols to ensure only authorized personnel have access to sensitive data.
• Data Encryption: All sensitive information is encrypted both in transit and at rest.
• Incident Response Plan: A structured approach to handle security breaches or incidents.
Reporting Structure:
• Chief Information Security Officer (CISO): Leads the security team and reports directly to the CEO.
• Security Team: Includes analysts and engineers who monitor systems and respond to incidents.
Ensuring Compliance:
• Training: Mandatory security awareness training for all employees.
• Audits: Regular internal and external audits to ensure policies are being followed.
• Monitoring: Continuous monitoring of systems for any unusual activities.
By integrating these practices into our daily operations, Ultranyx ensures that our information security posture is robust and resilient against threats. We foster a culture of security that empowers our employees to be vigilant and proactive in protecting our digital assets.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Ultranyx employs a rigorous configuration and change management process to ensure service reliability and security. Components are meticulously tracked from inception through decommissioning using a centralized Configuration Management Database (CMDB). Changes undergo a thorough impact analysis, with a focus on identifying potential security implications. This includes peer reviews and security testing before deployment. Our approach ensures that every modification enhances our service without compromising security or performance.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Ultranyx’s vulnerability management process is designed to proactively protect our services from potential threats. It entails:
Assessing Potential Threats:
Threat Intelligence: We gather information from reputable security databases and forums.
Automated Scanning: Our systems undergo continuous scans to detect vulnerabilities.
Deploying Patches:
Rapid Response: Patches are tested and deployed swiftly upon identification of credible threats, often within hours.
Sources of Information:
Security Partnerships: Collaborations with cybersecurity organizations provide us with early warnings.
Public Databases: Utilisation of CVE databases and other public security advisories.
Through these measures, Ultranyx ensures that our services remain secure and resilient against emerging threats. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Ultranyx’s protective monitoring processes are designed for swift detection and response to potential compromises. Identification is achieved through real-time analysis and anomaly detection tools. Upon detection, our incident response team is alerted, and we initiate a predefined protocol to contain and resolve the issue. Response time is critical; we aim to react to incidents within minutes, ensuring minimal impact and maintaining service integrity.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Ultranyx’s incident management processes are robust and systematic, ensuring effective handling of any security events:
Pre-defined Processes: We have established protocols for common incidents, enabling rapid and consistent response.
Reporting Incidents: Users can report incidents through our dedicated support portal or 24/7 helpline.
Incident Reports: We provide detailed incident reports via email or through our client dashboard, including the nature of the incident, impact assessment, and remediation steps taken.
Our approach ensures transparency and swift resolution, maintaining trust and security for our users.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Ultranyx Ltd is committed to minimising the impact of its activities on the environment by adhering to the following key points:
Minimise waste by evaluating operations and ensuring they are as efficient as possible.
Minimise toxic emissions through the selection and use of its fleet and the source of its power requirement.
Actively promote recycling both internally and amongst its customers and suppliers.
Source and promote a product range to minimise the environmental impact of both production and distribution.
Provides an employee electric car scheme to enable
Meet or exceed all the environmental legislation that relates to the Company.Covid-19 recovery
Through the COVID period, Ultranyx provided applications and technical expertise in support of the national infrastructure. Ultranyx continues to support the national resilience infrastructure in preparation for any further national disruptions.
Ultranyx is dedicated to developing economic revitalization post-COVID-19, especially th a focus on locally. We encourage spending in the local community as well as supporting regionally.
At Ultranyx, employee welfare is of utmost importance. We supply comprehensive office amenities to promote optimal well-being and support. For roles necessitating physical presence, we ensure COVID-19 safety protocols align with our stringent standardsTackling economic inequality
Ultranyx is compliant to the Modern Slavery Act 2015, ensuring our operations are free from slavery and human trafficking. Our comprehensive policy extends to all personnel and representatives, encompassing every level of employment, as well as our contractors and suppliers. Upholding the highest ethical standards is at the core of our business ethos, with an unwavering stance against any form of bribery and corruption. We conduct our business with utmost integrity and fairness.
We take pride in paying our staff and associates above the real living wage, reflecting our commitment to their financial well-being. Performance reviews are followed by salary evaluations, reinforcing our dedication to fair salary levels. Our supply chain is built on strong, reliable partnerships, eschewing zero-hour contracts in favor of fixed-price agreements.
Furthermore, Ultranyx encourages the development of young talent via our apprenticeships in software engineering, contributing to the growth of the industry and providing valuable opportunities for aspiring professionals.Equal opportunity
Ultranyx is committed to fostering a workplace where all individuals are treated with respect and dignity. The company’s Equal Opportunity Policy is a testament to its dedication to creating an environment free from discrimination, ensuring that every employee and job applicant is given fair treatment regardless of sex, race, disability, marital status, contract status, age, sexual orientation, or religion.
Key Points of the Equal Opportunity Policy:
• Non-Discrimination: No individual will face less favorable treatment or discrimination at Ultranyx.
• Diversity and Inclusion: The company values a diverse workforce, hiring based on ability and merit.
• Fair Recruitment: Job advertisements and recruitment processes are designed to be inclusive and based solely on job requirements and individual qualifications.
• Equal Employment: Duties are allocated fairly, and reasonable accommodations are made for disabled employees.
• Career Development: All employees have equal opportunities for career advancement and are judged solely on their merits.
• Training: Training opportunities are provided equally, supporting personal and professional growth.
• Grievance Handling: Discrimination is not tolerated, and complaints are addressed seriously and promptly.
Ultranyx’s policy is not just about compliance with legal standards; it’s about actively promoting equality and maximising the potential of its workforce. By adhering to this policy, the company ensures that all employees are aware of their rights and responsibilities, fostering a culture of fairness and respect. This approach benefits both the organisation and its employees, leading to a more harmonious and productive workplace.Wellbeing
Ultranyx places a high priority on the wellbeing of its employees, recognizing that a healthy work environment is essential for both personal satisfaction and corporate success. The company’s comprehensive wellbeing program is designed to support employees in various aspects of their lives, ensuring they feel valued and supported.
Mental Health Support: Ultranyx understands the importance of mental health and offers resources such as counseling services, stress management workshops, and mindfulness training. These initiatives aim to create a supportive atmosphere where employees can openly discuss mental health issues and seek help without stigma.
Work-Life Balance: The company promotes a healthy work-life balance through flexible working hours, remote work options, and generous leave policies. By accommodating different lifestyles and family responsibilities, Ultranyx helps employees maintain a balance between their professional and personal lives.
Physical Health Initiatives: To encourage physical health, employees are also encouraged to participate in sports teams and wellness challenges, fostering a sense of community and friendly competition.
Professional Development: Employee growth is supported through continuous learning opportunities, such as professional courses, seminars, and mentorship programs. By investing in the development of its workforce, Ultranyx ensures that employees feel engaged and motivated.
Social Wellbeing: The company organizes regular team-building activities, social events, and volunteer opportunities. These events are designed to strengthen relationships among colleagues and promote a sense of belonging and purpose within the organization.
Financial Wellbeing: Understanding that financial security is a key component of overall wellbeing, Ultranyx offers competitive salaries, retirement plans, and financial planning services.
In conclusion, Ultranyx’s commitment to wellbeing is evident in its holistic approach, addressing the mental, physical, social, and financial aspects of its employees’ lives. By creating a supportive and caring environment, the company not only enhances the wellbeing of its workforce but also drives organizational performance and productivity.
Pricing
- Price
- £400.00 to £2,000.00 a terabyte a year
- Discount for educational organisations
- Yes
- Free trial available
- No