Managed Cloud Services
We provide hosting services for any kind of applications to various cloud solutions like AWS, Azure, Google Cloud etc.
Features
- Cloud Hosting Services
- Application development
- Digital Transformation
- Agile
- Data
- Cybersecurity
Benefits
- Deploy the application to the cloud and provide maintenance support
- Develop a custom applications with a multidisciplinary team
- Our services enable digital transformation in your business flow
- Agile development allows rapid software development
- Our data science experts provides best insights of your data
- Implement cyber security best practices
- Containerize deployment strategy via infrastructure as Code
Pricing
£450 to £1,500 a unit a day
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 5 2 9 3 1 1 8 7 7 1 5 2 2 2
Contact
MS INFOTECH LTD.
Shital Jamod
Telephone: +44 020 807 93093
Email: contact@msit.co.uk
Service scope
- Service constraints
- Services availability depends on cloud service provides i.e. AWS, Azure, Google cloud etc
- System requirements
-
- All software licenses should be purchased by buyers
- Internet Connectivity
- Depending on application architecture
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- All kind of support provided based on support agreement, SLA defined based on priority of requests. For example ( High - within 2 hours, medium within 8 hours and low within 2-3 days)
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- We have few clients who are currently enrolled for this service and have chatbot accounts provided to them.
- Onsite support
- Onsite support
- Support levels
-
We provide dedicated full time support or part time support based on project.
Support levels can be defined based on project requirements
Resources can be assigned based on complexity of the project as well as based on delivery timeline - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We provide a dedicated team of engagement manager, technical staffs, business analysts etc based on project requirements during application delivery phase
We provide hands-on training, documentation and onsite support (if needed) during the application maintenance phase - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- We provide a complete backup of all the resources and documentation for restoring them on any other platform at end of contract
- End-of-contract process
- End of the contract follows the terms and conditions mentioned in call of the contract document
Using the service
- Web browser interface
- Yes
- Using the web interface
-
We utilize the latest industry-standard to collaborate like slack, Jira, confluence, Microsoft office tools etc with various clients
Users can reach out to daily support requests, we provide dedicated account for each clients
We provide dedicate application monitoring via various tools like Opegiene, pager duty etc - Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- We provide dedicate client area to all our customers to support their daily needs and collaboration of documents
- Web interface accessibility testing
- We havent done testing of web interface yet, however we follow industry best practices.
- API
- Yes
- What users can and can't do using the API
- All major cloud service providers have API for their services
- API automation tools
-
- Ansible
- Chef
- Terraform
- Puppet
- API documentation
- Yes
- API documentation formats
-
- HTML
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- Using the command line interface
- All major cloud service providers have CLI for their services
Scaling
- Scaling available
- Yes
- Scaling type
-
- Automatic
- Manual
- Independence of resources
- We implement auto scaling based on resource needs so with demand resources will automatically scaled up or down
- Usage notifications
- Yes
- Usage reporting
-
- API
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- AWS, Microsoft Azure, Google Cloud, Digital Ocean, etc
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Hardware containing data is completely destroyed
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Databases
- Source code ( infrastructure and application)
- Documentation
- Backup controls
- We configure backups based on user requirements
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Users contact the support team to schedule backups
- Backup recovery
-
- Users can recover backups themselves, for example through a web interface
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
SLAs are depending on service priority mentioned in the call of contract document
In case of missing SLA, we provide compensation to client in terms of extra services and free support - Approach to resilience
- We provide consultancy on best usage of well known cloud providers which are already resilient in terms of their backup services
- Outage reporting
-
A public dashboard
email alerts
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
-
We make sure that only resources assigned to particular project have access to all communicate mediums and we do full audit trail every month.
All resources use multi factor authentication to login on any platform we provide them to work. - Access restriction testing frequency
- Less than once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- No
- Security governance certified
- No
- Security governance approach
- We are following all security governance best practices, however we are in process of getting certified on security governance.
- Information security policies and processes
- We are following NDA mentioned in the call of contract document
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
We provide full documentation of all our services and we manage changes of any of the services via agile tools with audit logs
We maintain at least three different environments of live services so before applying any changes we test those changes minimum 2 times on separate environments. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
We conduct penetration testing before launching any service and we also schedule pen test after certain period on all live services
We do not expose any critical infrastructure on public internet
Our cyber security trained staff maintains patching and threat management on all infrastructure. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
We implement live dashboard to scan and report any threat. We use certain third party softwares to identify potential compromises.
We have alerts system configured in case of compromises and we respond high priority alerts immediately (24x7) - Incident management type
- Supplier-defined controls
- Incident management approach
- We are using various tools like Jira, Confluence, Slack, Opsgiene, Pager duty etc which provides us better process to manage any incidents.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- Other
- Other virtualisation technology used
- AWS, Microsoft Azure, Google Cloud, etc
- How shared infrastructure is kept separate
- Different organisations have separate accounts which provides highest level of isolation
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- We are using cloud hosting which are adhering all standards
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
We recognize the urgent need to address climate change and its far-reaching impacts on our planet and society. Every organization, regardless of its industry or size, has a responsibility to take meaningful action to mitigate climate change.
At MSInfoTech, we are committed to integrating sustainable practices into our operations and helping our clients do the same. Through our services and solutions, we strive to reduce carbon footprints, increase energy efficiency, and promote environmentally friendly practices.
We leverage our technology expertise to develop innovative solutions that support renewable energy, reduce greenhouse gas emissions, and foster a more sustainable future. Whether optimizing data centers for energy efficiency, implementing smart grid technologies, or developing software to track and reduce carbon emissions, we are dedicated to making a positive impact.
Furthermore, we are committed to minimizing our own environmental footprint by reducing waste, conserving resources, and promoting eco-friendly practices throughout our organization. We believe that by leading by example, we can inspire others to join us in the fight against climate change.
Together, we can harness the power of technology to create a greener, more sustainable world for future generations. Join us as we take meaningful steps towards combating climate change and building a better future for all.Covid-19 recovery
We recognize the profound impact that the COVID-19 pandemic has had on individuals, businesses, and communities worldwide. As we navigate through these unprecedented times, we are committed to supporting our clients in their recovery efforts and helping them emerge stronger and more resilient than ever before.
At MSInfoTech, we understand the critical role that technology plays in facilitating recovery and adaptation in a post-pandemic world. From enabling remote work solutions to supporting digital transformation initiatives, we are dedicated to providing the expertise and support our clients need to thrive in the new normal.
We are committed to leveraging our technological know-how to assist organizations in adapting to the evolving business landscape, whether it's through developing custom software solutions, optimizing IT infrastructure for remote operations, or providing cybersecurity measures to protect against emerging threats.
Furthermore, we recognize the importance of collaboration and partnership in overcoming the challenges posed by the pandemic. We stand ready to work closely with our clients, industry partners, and communities to innovate, adapt, and rebuild after COVID-19.
As we move forward, we remain committed to delivering exceptional service, driving innovation, and supporting our clients on their journey to recovery. Together, we will emerge from this crisis more robust, agile, and better prepared to face whatever future challenges.Tackling economic inequality
We understand the profound implications of economic inequality for individuals, communities, and society. Every person deserves equal opportunities to thrive, regardless of their background or circumstances. Therefore, we are committed to leveraging our expertise and resources to tackle economic inequality and promote inclusivity and fairness in all aspects of our work.
At MSInfoTech, we recognize that technology can be a powerful force for positive change in addressing economic disparities. Through our services and solutions, we strive to empower marginalized communities, bridge digital divides, and create pathways to economic advancement for all.
We are dedicated to working with organizations that share our commitment to social responsibility and equity. Whether it's through providing pro bono consulting services to non-profit organizations, supporting initiatives that promote digital literacy and skills training in underserved communities, or advocating for policies that promote economic inclusivity, we are actively engaged in efforts to address economic inequality at local, national, and global levels.
Internally, we are committed to fostering a diverse and inclusive workplace where everyone is valued, respected, and given equal opportunities to succeed. We believe that diversity drives innovation and creativity, and we are dedicated to creating an environment where everyone can thrive and reach their full potential.
By harnessing the power of technology and working collaboratively with our partners and communities, we believe we can make meaningful strides towards building a more equitable and inclusive society. Together, we can create a future where economic opportunities are accessible to all, regardless of background or circumstance.Equal opportunity
At MSInfoTech, we are committed to fostering an environment of equal opportunity where every individual is treated with respect, dignity, and fairness. We believe that diversity is our strength, and we are dedicated to creating a workplace that embraces the unique perspectives, backgrounds, and talents of all our employees.
We strive to provide equal employment opportunities, professional growth, and advancement to all qualified individuals, regardless of race, ethnicity, gender, sexual orientation, age, religion, disability, or any other characteristic protected by applicable laws and regulations.
In our hiring practices, we prioritize merit and qualifications, ensuring that candidates are evaluated based on their skills, experience, and potential to contribute to our team and our clients' success. We actively seek to attract and retain a diverse workforce that reflects the communities we serve and the global nature of our business.
Furthermore, we are committed to providing a supportive and inclusive work environment where all employees feel valued, empowered, and encouraged to reach their full potential. We offer ongoing training and development opportunities, mentorship programs, and initiatives to promote diversity, equity, and inclusion throughout the organization.
Discrimination, harassment, and bias have no place at MSInfoTech. We have clear policies and procedures in place to address and prevent discrimination or harassment, and we encourage open communication and reporting of any concerns.
By embracing diversity and fostering a culture of inclusion, we believe we can unleash our team's full potential and drive innovation, creativity, and success. Together, we are committed to building a workplace where everyone has an equal opportunity to thrive and succeed.Wellbeing
At MSInfoTech, we prioritize the well-being of our employees, clients, and communities as a core value of our organization. We understand that individuals' health, happiness, and fulfilment are essential not only for personal growth but also for professional success and organizational resilience.
We are committed to creating a supportive and inclusive work environment that promotes physical, mental, and emotional wellbeing. This commitment is reflected in our policies, programs, and initiatives designed to support the holistic health of our team members.
Physically, we strive to provide a safe and healthy workplace, whether in-office or remote, by implementing best practices for workplace safety, ergonomic design, and access to wellness resources. We encourage regular physical activity and offer flexible work arrangements to accommodate personal health needs.
Mentally and emotionally, we recognize the importance of managing stress, fostering work-life balance, and promoting mental health awareness. To support our employees in maintaining optimal mental well-being, we provide access to counselling services, mental health resources, and workshops.
We also understand that social connection and a sense of belonging are crucial for overall wellbeing. We encourage camaraderie, collaboration, and mutual support among our employees through team-building activities, social events, and community engagement initiatives.
Furthermore, we are committed to promoting a culture of work-life integration, where individuals are encouraged to pursue their passions, interests, and personal goals outside of work. We offer flexible schedules, remote work options, and generous time-off policies to help our employees achieve a healthy balance between work and personal life.
As an organization, we are dedicated to continuously evolving and improving our wellbeing initiatives to meet the changing needs of our employees and society. By prioritizing wellbeing, we believe we can foster a happier, healthier, and more engaged workforce, driving greater productivity, creativity, and success for our company.
Pricing
- Price
- £450 to £1,500 a unit a day
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Free trial subscriptions are available from cloud service providers