Managed Hosting
Selcom provide a managed hosting platform for a range of web applications and servers based on LAMP and Windows technology. If your organisation utilises solutions such as ASP, .NET and SQL, or Linux based solutions including PHP, Python, Ruby and Perl, we have the hosting environment to support your applications.
Features
- 2-Factor Authentication
- Dedicated Server and Private Cloud segregated further by VLAN
- Site-to-site replication between our data centres for robust DR
- Unified Threat Management utilising WatchGuard firebox solutions
- Comprehensive infrastructure and network metrics
- Microsoft .NET Framework and SQL technologies application hosting environment
- Hosted Linux based solutions like PHP, Python, Ruby and Perl
- Microsoft Remote Desktop Services (RDP) and User Licensing
- Windows Server and SQL Hosting
- ISO27001 certified
Benefits
- 20+yrs experience implementing solutions for private and public sector
- Email and telephone support at no extra cost
- 99.9% availability, backed by service credits
- Unlimited off-site backups for secure audit accountability
- Automatic 24x7x365 system monitoring calling operations to action when necessary
- Hosting systems entirely within the UK
- Multiple environments: development, staging/UAT/pre-live, live
- Each customer has their own infrastructure, no shared services
- Automatic or ad hoc KPI and SLA performance reports
Pricing
£500.00 to £3,300.00 a server a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 5 7 5 4 0 3 4 2 8 2 5 1 4 7
Contact
Selcom
Stephanie Sellers
Telephone: 01904788181
Email: accounts@selcom.co.uk
Service scope
- Service constraints
-
Any routine downtime required for system maintenance is scheduled outside of normal office hours.
A maximum of 1 hour per month maintenance window is provisionally allocated for system maintenance, if required. However, this can be adapted based on buyer requirement. - System requirements
- No specific requirements
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Weekday during office hours we will respond within 1 hour.
Out of hours support is agreed on an individual basis. - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
- Our support levels can be found in our SLA, detailed in our Service Definition Document
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- On-boarding for our hosting services are fully supported by a named, dedicated Service Manager who provides a point of contact for the customer throughout the entire service delivery. They will assist with anything that you might need, and will walk through any training required, where necessary.
- Service documentation
- No
- End-of-contract data extraction
-
Selcom will securely export data and metadata using industry standards that can be re-used, such as Tab-Delimitated and XML formats.
Selcom will cooperate with any new cloud provider and there are no additional costs when switching. We will only retain data after contract termination for the timescale specified by the customer. Selcom will undertake full deletion of the data on our cloud service infrastructure after the time specified by the client. - End-of-contract process
-
Selcom will provide an exit plan which ensures continuity of service. This will set out Selcom’s methodology to ensure continuity of service and an orderly transition to the replacement supplier. Selcom will work with the buyer to ensure that the exit plan is aligned with the buyers own exit plan and strategy.
When requested, Selcom will help the buyer migrate the services to a replacement supplier in line with the exit plan. This will be at Selcom’s own expense if the call-off contract ended before the expiry date due to supplier cause.
Using the service
- Web browser interface
- No
- API
- No
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- MacOS
- Using the command line interface
- There are no limitations regarding what users can set up or make changes through the command line
Scaling
- Scaling available
- Yes
- Scaling type
-
- Automatic
- Manual
- Independence of resources
- We can traffic shape based on user experience and usage patterns. We can also segment system resources to protect service levels
- Usage notifications
- No
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Hardware containing data is completely destroyed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Files
- Virtual Machines
- Databases
- Operating Systems
- Active Directory
- SQL Database
- Backup controls
- We offer fully customisable back up options which will be agreed before the Contract is taken out
- Datacentre setup
-
- Multiple datacentres with disaster recovery
- Single datacentre with multiple copies
- Scheduling backups
- Users contact the support team to schedule backups
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- 99.9% application uptime as measured through 1-minute polls using ICMP echo-requests. 99.9% network connectivity uptime of the customer service as measured through 1-minute polls using ICMP echo-requests Users are refunded by negotiated settlement outlined in the SLA
- Approach to resilience
- Selcom do not want to make this information public. However, we are willing to share information with a specialist security expert on how we have designed our service to be resilient
- Outage reporting
- Our system issues email, text and telephone call alerts to named contacts
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Other
- Other user authentication
- IP and or network level authentication
- Access restrictions in management interfaces and support channels
- All access to service interfaces and support channels are constrained to authenticated and authorised individuals with appropriate access privileges.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
-
- Dedicated device over multiple services or networks
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- 3Core2 (IAS Accredited)
- ISO/IEC 27001 accreditation date
- 14/03/2024
- What the ISO/IEC 27001 doesn’t cover
- All of Selcom's network is covered by the ISO 27001
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- QG GDPR Management Standard and GDPR Practitioner
- Microsoft (MCSE, DBA) and VMware accreditation
- WatchGuard (security, firewalls) partner
- Nominet Membership
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Selcom have an Information Security Management System which incorporates all of the requirements of the ISO 27001 Standard including policies such as Access Contol, Asset Management, Communications Security, Cryptography, Information Classification and Handling, Incident Management, Physical and Equipment Security, Back Ups Procedure, amongst others.
These are audited every quarter through external and internal audits and management reviews, and during the audit evidence is seen and recorded to ensure compliance with the policies.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Physical storage, internet bandwidth and operational systems are monitored with 24/7 automatic monitoring alerting when predefined thresholds are exceeded.
Changes are identified on the Change Request form and logged in the change Change Control log. The originator obtains sufficient information to complete the Change Request. The Internet Services Director then reviews and/or carries out a risk assessment identifying potential risks, security impacts and then identifies and costs the required controls in line with the Selcom's risk management framework. The Internet Services Director in consultation with the Managing Director is then responsible for authorising the change to go ahead. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Firewalls are configured 24/7 to alert in the event of significant intrusions or incidents occurring.
We use advanced monitoring and live detection defence systems to detect vulnerabilities Anti-Virus is configured to be patched automatically. Our automatic patch policy covers binary, executable source code modification, service pack and firmware patches. Technical services will then identify the priority for the update to be tested and deployed dependant on the nature of the treat and any known exploits.
Any patch deployment and software updates must comply with our defined change management process. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Systems are monitored 24/7 by RMM software and in-house systems, calling the operations team to action when necessary. The RMM notifies of: Warning Alerts, Critical Alerts, System Down and System Recovery Regular scanning using Barracuda’s Vulnerability Manager (BVM) tool finds vulnerabilities such as those on the OWASP Top 10, including SSL injection, cross-site scripting, and others. Any issues found will be imported into the Barracuda Web Application Filter, which will automatically generate and apply mitigation rules. Servers are professionally managed and conform to guidelines under the Government's e-Government programme.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
We have an Incident Management policy for our ISO 27001 certification, this works hand in hand with a Disaster Recovery plan, BCP plan and incident management plan which details the processes to take for common incidents.
Users report incidents either by email or telephone, and Selcom's staff reports these in our job system, this generates an incident report which staff fill out and use to report to clients as necessary.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- Other
- Other virtualisation technology used
- VMWare and Proxmox
- How shared infrastructure is kept separate
- Separate VLANS and Firewalls are deployed therefore segmenting system resources ensuring different organisations sharing the same infrastructure are kept apart.
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
To improve server consolidation, increase operational efficiency and increase utilisation rates, Selcom deploy servers on industry standard virtualisation platforms. This has enabled our customers to reduce power consumption, cooling and management demands.
Utilising technologies such as Microsoft RDP allows customers to work remotely, reducing carbon emissions from travel across all industries, RDP and other technologies have also allowed remote support in a way that is consistently improving, and therefore our staff are required to travel less for support queries, further reducing our environmental footprint. Our own team is also hybrid remote and office based, therefore reducing our own carbon footprint.
More information can be found in the 'Energy Efficieny' section of our Service Definition document.
Pricing
- Price
- £500.00 to £3,300.00 a server a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Available only on a secured shared hosted service for a limited time to test speed and performance