Skip to main content

Help us improve the Digital Marketplace - send your feedback

Ultranyx

Prizsm

Prizsm ultra-secure data storage and communications in the public cloud.
Prizsm enables anyone to easily protect and secure their information in the public cloud. Prizsm’s unique multi-cloud distribution approach enables businesses to retain data safely at all levels of security classification.

Features

  • Quantum Resistant Data Security
  • Storage Orchestration
  • Full inbuilt data redundancy
  • API's for all major clouds and local storage options
  • User role defined storage
  • Set up and Management UI
  • Comprehensive logging
  • Secure Physical and Virtual Appliance options
  • Full random data storage distribution
  • Integration with HSM & PKI implementations

Benefits

  • Ultra-secure data storage for lower cost
  • Prizsm provides long-term data security by design
  • Provides data sovereignty compliance
  • Prevents vendor lock in
  • Information integrity functionality prevents data tampering
  • Future proof quantum resistant
  • Reduces data storage infrastructure costs
  • High resilience protects against system failure
  • Flexible data orchestration ensure efficient use of resources
  • Enable secure migration of dat files

Pricing

£400.00 to £2,000.00 a terabyte a year

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ian.drury@ultranyx.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

5 3 0 5 3 5 1 9 6 0 0 6 5 9 2

Contact

Ultranyx Ian Drury
Telephone: 02921 252020
Email: ian.drury@ultranyx.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Other cloud storage services. Works with any public/private cloud provider or data storage endpoint.
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
None
System requirements
  • Works with all layers of data protection
  • Access to public/private storage endpoints

User support

Email or online ticketing support
Email or online ticketing
Support response times
Response times are dependent on severity and will be detailed in the SOW
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Support levels depend on the customer's requirements and will be detailed in the SOW. Support is available up to and including full 24/7/365
Support available to third parties
Yes

Onboarding and offboarding

Getting started
A developers guide is provided online once an account has been created and the online services have been purchased. The comprehensive guide covers descriptions of all the available API calls and SDKs. Once you have registered and logged in, the guide will take you through how to make the first API call.

Ultranyx consultants are able to provide product training on a time & materials basis which is not included in the Prizsm subscription costs. Rates for consultancy can be found in the SIFA rate card.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
User data can be extracted or migrated to other platforms using standard ETL processes.
End-of-contract process
Client access can be renewed, extended or simply closed at the end of the contract.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
  • Other
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
None
Service interface
No
User support accessibility
WCAG 2.1 AA or EN 301 549
API
Yes
What users can and can't do using the API
The Prizsm data storage API offers a secure way to store and manage data across multiple cloud platforms.
• Users can initiate the service by integrating the Prizsm data storage API into their systems.
• The setup process involves configuring the API to distribute data across various cloud endpoints, ensuring quantum-resistant security.
• The API allows users to modify data storage configurations and manage how data is distributed and accessed.
• Users can implement store-and-forward communication capabilities for secure data sharing, particularly useful in edge computing and IoT environments.
Limitations:
• The API’s design ensures data integrity and security, which may impose certain constraints on how data can be manipulated.
• Detailed limitations and guidelines are provided in the Prizsm API documentation, which users must adhere to for maintaining system stability and data sovereignty compliance.
Prizsm’s API is built for resilience and security, leveraging disaggregation and random distribution to protect data against emerging threats like quantum computing. It’s essential for users to consult the official documentation to understand the full scope of what can and cannot be done with the API.
API documentation
Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Yes
Customisation available
No

Scaling

Independence of resources
The platform utilises full elasticity of cloud provisioning to ensure all resources are available based upon platform load.

Ultranyx uses a number of industry-standard approaches to ensure services are customised to the requirements of the client.

Full performance testing isperformed on the platform to ensure it is suitable for the requirements.

Analytics

Service usage metrics
Yes
Metrics types
Metrics on number of calls is provided
Reporting types
  • API access
  • Regular reports

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Prizsm Technologies

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Data can be exported via the client tools accessing the API.
Data export formats
  • CSV
  • Other
Other data export formats
All file formats
Data import formats
  • CSV
  • Other
Other data import formats
All file formats

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Bonded fibre optic connections
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
The service offers three nines (99.9%) availability for Standard Tier clients.
Standard Tier is designed with redundancy and failure protection architected in. This protects against a single point of failure. The platform utilises multiple hosting providers supporting full failover and maintaining redundant links to each provider.
Higher Tiers of availability can be provided, as required.
Approach to resilience
Standard platform resilience techniques are employed including full failover, physical security, data encryption, etc.
Prizsm disaggregates data so there is no single point of failure across your architecture. Unlike standard encryption, it is resistant to brute-force attacks by supercomputers and even quantum computers.
Full details are available on request.
Outage reporting
All outages are provided via a standard dashboard. Alerts are also available via an API, if required. Email alerts can also be configured.

Identity and authentication

User authentication needed
Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Ultranyx ensures secure access to management interfaces and support channels through a multi-layered approach:
• Role-Based Access Control (RBAC): Users are granted access rights based on their role within the organization, ensuring they can only access what is necessary for their job functions.
• Regular Audits: Access logs are reviewed regularly to detect any unauthorized attempts or policy violations.
• Training and Awareness: Staff are trained on the importance of access control and the proper use of support channels.
This comprehensive strategy ensures that access is tightly controlled and monitored, safeguarding sensitive information and systems.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
Hellios JOSCAR

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
JOSCAR Hellios
Cyber Essentials
IASME Governance
Information security policies and processes
Ultranyx is committed to maintaining the highest standards of information security. Our policies and processes are designed to protect the integrity, confidentiality, and availability of information.
Policies and Processes:
• Risk Management: Regular assessments to identify and mitigate risks.
• Access Control: Strict protocols to ensure only authorized personnel have access to sensitive data.
• Data Encryption: All sensitive information is encrypted both in transit and at rest.
• Incident Response Plan: A structured approach to handle security breaches or incidents.
Reporting Structure:
• Chief Information Security Officer (CISO): Leads the security team and reports directly to the CEO.
• Security Team: Includes analysts and engineers who monitor systems and respond to incidents.
Ensuring Compliance:
• Training: Mandatory security awareness training for all employees.
• Audits: Regular internal and external audits to ensure policies are being followed.
• Monitoring: Continuous monitoring of systems for any unusual activities.
By integrating these practices into our daily operations, Ultranyx ensures that our information security posture is robust and resilient against threats. We foster a culture of security that empowers our employees to be vigilant and proactive in protecting our digital assets.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Ultranyx employs a rigorous configuration and change management process to ensure service reliability and security. Components are meticulously tracked from inception through decommissioning using a centralized Configuration Management Database (CMDB). Changes undergo a thorough impact analysis, with a focus on identifying potential security implications. This includes peer reviews and security testing before deployment. Our approach ensures that every modification enhances our service without compromising security or performance.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Ultranyx’s vulnerability management process is designed to proactively protect our services from potential threats. It entails:
Assessing Potential Threats:
Threat Intelligence: We gather information from reputable security databases and forums.
Automated Scanning: Our systems undergo continuous scans to detect vulnerabilities.
Deploying Patches:
Rapid Response: Patches are tested and deployed swiftly upon identification of credible threats, often within hours.
Sources of Information:
Security Partnerships: Collaborations with cybersecurity organizations provide us with early warnings.
Public Databases: Utilisation of CVE databases and other public security advisories.
Through these measures, Ultranyx ensures that our services remain secure and resilient against emerging threats.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Ultranyx’s protective monitoring processes are designed for swift detection and response to potential compromises. Identification is achieved through real-time analysis and anomaly detection tools. Upon detection, our incident response team is alerted, and we initiate a predefined protocol to contain and resolve the issue. Response time is critical; we aim to react to incidents within minutes, ensuring minimal impact and maintaining service integrity.
Incident management type
Supplier-defined controls
Incident management approach
Ultranyx’s incident management processes are robust and systematic, ensuring effective handling of any security events:

Pre-defined Processes: We have established protocols for common incidents, enabling rapid and consistent response.
Reporting Incidents: Users can report incidents through our dedicated support portal or 24/7 helpline.
Incident Reports: We provide detailed incident reports via email or through our client dashboard, including the nature of the incident, impact assessment, and remediation steps taken.
Our approach ensures transparency and swift resolution, maintaining trust and security for our users.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Ultranyx Ltd is committed to minimising the impact of its activities on the environment by adhering to the following key points:
Minimise waste by evaluating operations and ensuring they are as efficient as possible.
Minimise toxic emissions through the selection and use of its fleet and the source of its power requirement.
Actively promote recycling both internally and amongst its customers and suppliers.
Source and promote a product range to minimise the environmental impact of both production and distribution.
Provides an employee electric car scheme to enable
Meet or exceed all the environmental legislation that relates to the Company.

Covid-19 recovery

Through the COVID period, Ultranyx provided applications and technical expertise in support of the national infrastructure. Ultranyx continues to support the national resilience infrastructure in preparation for any further national disruptions.
Ultranyx is dedicated to developing economic revitalization post-COVID-19, especially th a focus on locally. We encourage spending in the local community as well as supporting regionally.
At Ultranyx, employee welfare is of utmost importance. We supply comprehensive office amenities to promote optimal well-being and support. For roles necessitating physical presence, we ensure COVID-19 safety protocols align with our stringent standards

Tackling economic inequality

Ultranyx is compliant to the Modern Slavery Act 2015, ensuring our operations are free from slavery and human trafficking. Our comprehensive policy extends to all personnel and representatives, encompassing every level of employment, as well as our contractors and suppliers. Upholding the highest ethical standards is at the core of our business ethos, with an unwavering stance against any form of bribery and corruption. We conduct our business with utmost integrity and fairness.
We take pride in paying our staff and associates above the real living wage, reflecting our commitment to their financial well-being. Performance reviews are followed by salary evaluations, reinforcing our dedication to fair salary levels. Our supply chain is built on strong, reliable partnerships, eschewing zero-hour contracts in favor of fixed-price agreements.
Furthermore, Ultranyx encourages the development of young talent via our apprenticeships in software engineering, contributing to the growth of the industry and providing valuable opportunities for aspiring professionals.

Equal opportunity

Ultranyx is committed to fostering a workplace where all individuals are treated with respect and dignity. The company’s Equal Opportunity Policy is a testament to its dedication to creating an environment free from discrimination, ensuring that every employee and job applicant is given fair treatment regardless of sex, race, disability, marital status, contract status, age, sexual orientation, or religion.
Key Points of the Equal Opportunity Policy:
• Non-Discrimination: No individual will face less favorable treatment or discrimination at Ultranyx.
• Diversity and Inclusion: The company values a diverse workforce, hiring based on ability and merit.
• Fair Recruitment: Job advertisements and recruitment processes are designed to be inclusive and based solely on job requirements and individual qualifications.
• Equal Employment: Duties are allocated fairly, and reasonable accommodations are made for disabled employees.
• Career Development: All employees have equal opportunities for career advancement and are judged solely on their merits.
• Training: Training opportunities are provided equally, supporting personal and professional growth.
• Grievance Handling: Discrimination is not tolerated, and complaints are addressed seriously and promptly.
Ultranyx’s policy is not just about compliance with legal standards; it’s about actively promoting equality and maximising the potential of its workforce. By adhering to this policy, the company ensures that all employees are aware of their rights and responsibilities, fostering a culture of fairness and respect. This approach benefits both the organisation and its employees, leading to a more harmonious and productive workplace.

Wellbeing

Ultranyx places a high priority on the wellbeing of its employees, recognizing that a healthy work environment is essential for both personal satisfaction and corporate success. The company’s comprehensive wellbeing program is designed to support employees in various aspects of their lives, ensuring they feel valued and supported.
Mental Health Support: Ultranyx understands the importance of mental health and offers resources such as counseling services, stress management workshops, and mindfulness training. These initiatives aim to create a supportive atmosphere where employees can openly discuss mental health issues and seek help without stigma.
Work-Life Balance: The company promotes a healthy work-life balance through flexible working hours, remote work options, and generous leave policies. By accommodating different lifestyles and family responsibilities, Ultranyx helps employees maintain a balance between their professional and personal lives.
Physical Health Initiatives: To encourage physical health, employees are also encouraged to participate in sports teams and wellness challenges, fostering a sense of community and friendly competition.
Professional Development: Employee growth is supported through continuous learning opportunities, such as professional courses, seminars, and mentorship programs. By investing in the development of its workforce, Ultranyx ensures that employees feel engaged and motivated.
Social Wellbeing: The company organizes regular team-building activities, social events, and volunteer opportunities. These events are designed to strengthen relationships among colleagues and promote a sense of belonging and purpose within the organization.
Financial Wellbeing: Understanding that financial security is a key component of overall wellbeing, Ultranyx offers competitive salaries, retirement plans, and financial planning services.
In conclusion, Ultranyx’s commitment to wellbeing is evident in its holistic approach, addressing the mental, physical, social, and financial aspects of its employees’ lives. By creating a supportive and caring environment, the company not only enhances the wellbeing of its workforce but also drives organizational performance and productivity.

Pricing

Price
£400.00 to £2,000.00 a terabyte a year
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ian.drury@ultranyx.com. Tell them what format you need. It will help if you say what assistive technology you use.