PROPEL TECH LTD
Cloud Hosting
We can setup new cloud infrastructure and also reduce complexity of existing cloud infrastructure to optimise costs and streamline operational processes.
Features
- Certified cloud experts to extend your existing Team
Benefits
- Reduce complexity of existing cloud infrastructure
- Optimise costs and streamline operational processes
Pricing
£800 a unit
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at sales@propeltech.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
5 3 8 5 6 4 1 0 0 1 0 5 2 1 8
Contact
PROPEL TECH LTD
Wil Jones
Telephone: 01727 537627
Email: sales@propeltech.co.uk
Service scope
- Service constraints
- Limited to AWS,Azure
- System requirements
-
- AWS
- Azure
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Maximum of 2 working hours during office hours. Out of hours available at an extra cost.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Request assistance via web chat.
- Web chat accessibility testing
- N/A
- Onsite support
- Onsite support
- Support levels
- We provide bespoke support agreements tailored for each individual client.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- We typically follow an onboarding process where we learn about our client's business/environments/processes.
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- Typically data resides with the client and this is not needed.
- End-of-contract process
- An additional cost would be charged to train internal or another supplier.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Access our helpdesk.
- Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- .
- Web interface accessibility testing
- .
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
-
- Automatic
- Manual
- Independence of resources
- The architecture design would consider this.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- AWS,Azure
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
- We would backup everything.
- Backup controls
- We would agree a schedule with the client, implement the schedule and monitor it is working on an ongoing basis.
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Users contact the support team to schedule backups
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Bonded fibre optic connections
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- 99.99%
- Approach to resilience
- The architecture design would ensure is built into any solution (based on budget)
- Outage reporting
- Yes, Dashboard, API and Email alerts
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
-
Access is limited to key personal only.
Individual logins are allocated and access permission has to be obtained. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Dedicated device on a government network (for example PSN)
- Dedicated device over multiple services or networks
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- British Assessment Bureau
- ISO/IEC 27001 accreditation date
- 03/04/2023
- What the ISO/IEC 27001 doesn’t cover
-
Our scope is as written on our certificate “Provision of software development, designing innovative bespoke software services consultancy, application maintenance services worldwide”.
Everything else is outside of the scope and not covered.
We also have 27001:2017 and working towards 27001:2022. - ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Best practice and applying clients standards.
- Information security policies and processes
-
CE+
Routine Audits and Certification
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- N/A
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Penetration/Security Audits
Security Alerts
Patches are applied as soon as a client will allow. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Monitoring of services that are accessed.
Any potential compromise is treated as a SEV1 incident and treated with a critical priority. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Scheduled checks will trigger automatic incidents.
Users can raise incidents via the helpdesk portal.
Incident reports and updates will be provided via the helpdesk unless a serious issue arises and a full detailed incident report will be created.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- Hyper-V
- How shared infrastructure is kept separate
- We rely on AWS/Azure
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- AWS/Azure DCs
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
We can carbon offset all hosting costs to combat climate change.
Pricing
- Price
- £800 a unit
- Discount for educational organisations
- No
- Free trial available
- No
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at sales@propeltech.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.