EUROPEAN DYNAMICS Hosting Services - EDHS
EDHS are modern hosting services offered from EUROPEAN DYNAMICS'
(ED) Tier-3 datacentres in the EEA. ED has ISO9001, ISO27001, and ISO20000-1 certifications and comply with UK GDPR requirements resulting in reliable and secure hosting services at affordable prices for all UK public sector customers. Add-on service options exist.
Features
- Secure hosting from EEA datacentres
- Modern HPE enterprise server architecture
- Disaster recovery
- Backup
- Encrypted storage
- Highly specialised operation support personnel
- Service monitoring
Benefits
- Value for money
- ISO27001 certified services
- Professional support
- Redundant infrastructure
- UK GDPR compliant services
- ISO20000-1 certified services
Pricing
£149 a virtual machine a month
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 7 9 7 5 1 8 1 5 0 6 1 2 7 8
Contact
EUROPEAN DYNAMICS UK LTD
Panagiotis Rentzepopoulos
Telephone: 020 34118309
Email: ibd-uk@eurodyn.com
Service scope
- Service constraints
- No inherent service constraints.
- System requirements
- No specific requirements from the buyer.
User support
- Email or online ticketing support
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Telephone/Email support workdays/workhours: included in price.
Extended hours/days options: cost detailed in pricing document.
Technical account manager/cloud support engineer included in the standard offering.
We maintain a 3-tier user support service (helpdesk, operational, functional) that escalates internally depending on the issue at hand. Our services are supported by vendor support programmes. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We are able to provide suitable training for standard procedures to customers taking on the service and if required bespoke training can be arranged on request ensuring customers’ proficient use of the service.
Training may include onsite training, online training, and user documentation. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
-
The de-provisioning of the service follows agreed processes, which ensure full access to client data before contract end.
Special requests such as large volume data storage in offline media and physical transport are also possible after prior arrangement. - End-of-contract process
-
At the end of the contract, the decommissioning of the service follows standard processes that include the permanent erasure of all Client data. Cancellation requests can be sent via email or phone by an authorised contact. Service cancellations are handled in line with the Client requirements.
Additional costs will be applied where we will need to carry out special instructions related to data transfer, data retention, and any other special services that may be ordered by the Client. Any such services will be carried out after an explicit approval of the relevant costs from the Client, which will be based on a firm quotation from the Service Provider.
Using the service
- Web browser interface
- No
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- No
- Independence of resources
- Virtual server configuration reserves server and storage resources that are provided independently from the load of other virtual servers.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- Memory
- Network
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Files
- Virtual machines
- (Selected) databases
- Backup controls
- Users may define the backup scope and schedule. Additional charges may apply. The exact backup specification will be agreed as part of the service definition phase at the beginning of the project.
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection between networks
- All communication of sensitive data is via HTTPS over the public internet - The Service also encrypts sensitive information in order to provide additional protection.
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection within supplier network
- Firewalls + Intrusion Prevention systems protect the perimeter of the service platform - The Service also encrypts sensitive information in order to provide additional protection additional access control/protection.
Availability and resilience
- Guaranteed availability
- Core Hours availability better than 99.9%. Detailed information can be found in the Terms and Conditions document.
- Approach to resilience
- Our data centres comply with Tier-3 requirements, i.e., they include redundant resources that allow operation even in case of partial hardware failure. We also maintain a separate Disaster Recovery site where operation is able to switch with minimal service disruption (depending on system configuration, we are able to offer a RPO of < 5 sec and an RTO of 30 minutes or less).
- Outage reporting
- The usual process of service outage report is through email alerts. In case additional options are required, we may offer specific solutions upon request.
Identity and authentication
- User authentication
-
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- There is no management interface available for clients. Support channels are available through alternative means, which all require the intervention of a suitably trained resource. Where the service includes the provision of an incident reporting mechanism, then a username/password combination is used to authenticate. Access to the incident reporting mechanism is not public and it is possible through secure channels.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
- Dedicated device on a segregated network (providers own provision)
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- TÜV HELLAS S.A. (TÜV NORD GROUP)
- ISO/IEC 27001 accreditation date
- 15/07/2022
- What the ISO/IEC 27001 doesn’t cover
- The complete EDHS service is within the scope of our current ISO/IEC 27001:2013 certification. There is no EDHS item not covered by our ISO/IEC 27001 certification.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- ISO 22301:2019 (Business Continuity Management)
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Our Information Security Management System (ISMS) follows ISO27001 recommendations and includes specific processes, roles, procedures, reporting mechanisms and resources necessary to ensure resilience in threats both external and internal.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- The Service Provider maintains an asset management infrastructure that tracks all offered services and their components throughout their lifetime. Any change in the configuration of the service are assessed against the ISO27001 documentation to ensure that potential security issues are identified and taken into account before committing said changes.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- The vulnerability management process is part of the ISO27001 documentation of EDHS. The Service Provider is part of the security issues disclosure method of all software and hardware vendors/communities so as to receive early notification of potential threats. Patches are evaluated and tested as soon as they become available to ensure no conflicts exist in the overall EDHS environment. A patch regression and roll-back procedure is also tested before applying patches to the production environment. Patches are applied soon afterwards, preferably during off hours, especially if service disruption is necessary.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Protective monitoring is part of the monitoring process implemented as described in the ISO27001 documentation of the service. The Service Provider has in place monitoring mechanisms that retrieve information from various sources, such as operating system logs, database logs, network events, etc. A central monitoring mechanism ensures consolidation of events, prioritisation and generation of alert events when security incidents are suspected. The response mechanism is presented in the incident management part of the service description.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- The ISO27001 documentation of the ISMS in place includes standard responses to common events that are tested regularly. All involved staff is trained to report incidents as soon as possible through the emergency communication mechanisms in place, which include both electronic and conventional means as appropriate. Incident reporting creation is part of the incident response mechanism so that a trace of all events, activities, decisions, etc. is maintained.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- VMware
- How shared infrastructure is kept separate
- We base our EDHS offering on HPE blade servers managed by VMWare. Each service is allocated its own VMs resources on a dedicated VLAN and the VMs of each client are fully isolated. The management of this configuration is running on a VMware cluster consisting of multiple physical servers and the security and isolation is maintained throughout the cluster.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
-
ED’s primary data centre operations are co-located in TI SPARKLE GREECE SA Tier III data centre facilities, which fully comply with the EU’s Code for Energy Efficient Datacentres. The newest TI SPARKLE DATA centre (MMII) in which ED’s infrastructure is co-located is the first Green Data Centre in Greece, maintains a Green Building Certification by LEED (Gold), and is powered solely from renewable sources.
Additionally, the datacentre maintains an ISO14001 Certification for Environmental Management, makes use of Efficient UPS with Li-ion batteries and uses LED lighting. Furthermore, ED’s ICT infrastructure is deployed within an APC Eco-Aisle cold-aisle containment system which manages airflow efficiently and prevents the mixing of hot and cold air, thereby enhancing cooling effectiveness and reducing energy consumption.
The data-centre provider deploys high efficiency Evaporative Free Cooling (EFC) units to cool the data-centre load, and in “free cooling" mode (when outdoor conditions permit) the units utilize ambient air for cooling without the need for mechanical refrigeration, further reducing energy consumption.
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Equal opportunity
- Wellbeing
Fighting climate change
EUROPEAN DYNAMICS (ED) is a group of companies operating primarily from Luxembourg, Belgium, and Greece. We have a branch in London collocated at the premises of our accountant, with no employees.
We maintain a net-zero footprint in the UK since 2022 when we started keeping records. We issue annual Carbon Reduction Plans that document our contribution in fighting climate change. We advocate environmental protection in our interactions with our employees, contractors, and partners.
For the UK company, our Carbon Reduction Plan is already at zero as it does not have any operations in the UK: all activities are outsourced to other companies of the ED group and the contractual/financial management activities are also carried out abroad. We do not have any transportation activity in the UK. We do not produce any waste and we have no employees.
For other companies in the ED group offering services in the UK, the services are provided remotely (in Software as a Service mode) in all but one contract. With respect to all these contracts, our carbon footprint is zero, as far as the UK is concerned. We have one contract for IT services, which are offered through a UK data centre who is reporting its emissions.
Based on the above, there are no emission reduction targets as we are already at Net Zero.Covid-19 recovery
To address the negative effects of the COVID-19 pandemic we take the following measures:
• Most of our consultants work remotely. We provide pre-configured laptops enabling secure access through VPN to our resources. This has also a positive impact to the environment, since transport to company premises is no more necessary.
• Bottles containing antiseptic liquid are available on all the floors.
• Posters remind our personnel about standard measures preventing spread of the virus, such as covering the nose and mouth when sneezing, frequent hand wash with soap, etc.
• Scholastic cleaning of WCs and surfaces on which the virus can survive.
• Frequent ventilation of all the rooms by regularly opening windows.Equal opportunity
EUROPEAN DYNAMICS is an equal opportunity employer and applies an Equal Opportunities Policy (EOP) for this purpose. This policy covers all aspects of employment, from advertising of vacancies, selection, recruitment and training to working conditions and reasons for termination of employment.
We take measures to increase the representation of disabled people in our workforce. We support disabled people in developing new skills relevant to our activities, including through training schemes that result in recognised qualifications.
We regularly monitor the working environment and take appropriate action if necessary to ensure that our EOP operates effectively. Our actions eliminate immediately unlawful direct and indirect discrimination and promote equality of opportunity.
We influence staff, suppliers, customers, and communities to support disabled people. We also take measures to identify and tackle inequality in employment, skills and pay in our workforce. We support career development to help people, including those from disadvantaged or minority groups, to move into higher paid work by developing new skills relevant to our activities.
Our long-term aim is to proportionally represent all socially disadvantaged groups in the composition of our workforce. We set targets with a fixed timetable for hiring people belonging to groups that are underrepresented in the workforce. Where necessary, specific steps in conformance with relevant legislation are taken to help disadvantaged and/or underrepresented groups to compete for jobs on a genuine equal opportunity basis. Our EOP and the measures for its implementation are based on advice from relevant bodies and in consultation with representatives of our employees.Wellbeing
We promote a healthy work-life balance to prevent our staff burnout and improve retention. We use actions to promote the well-being of our people, such as subscription in team sports academies and training and education by professional fitness trainers.
We also promote collaboration with the community and participate in, sponsor or organise events that support the health and wellbeing in our workforce and the community at large.
We also have an annual program of bonding events aiming to enhance bonding among teams across the company. Events include evening gatherings, parties, and excursions to promote the spirit of corporate affinity.
Pricing
- Price
- £149 a virtual machine a month
- Discount for educational organisations
- No
- Free trial available
- No