Meridian IT Enterprise Managed Cloud Services
Meridian IT's Enterprise Hosting Cloud service provides an easy and cost-effective way to manage your cloud services, utilising either a hybrid cloud, private cloud or a multi-cloud environments. Virtual hosting, IaaS, Application integration, managed hosting and hosting migration are all services we can tailor to client's specific requirements.
Features
- Virtual IaaS or Private IaaS (Public Azure/IBM)
- Remote Monitoring and Remote Management of customer infrastructure systems.
- Application Modernisation, development and integration using many languages
- Managed security service with SIEM services from Meridian's SOC
- Fully managed Data Protection Services for any OS or platform
- Backup services using Commvault, FalconStor, Veeam and IBM.
- Recovery service for business-critical systems, applications, and data
- High Availability, continuous replication of business-critical systems.
- Provision of Public Cloud facilities such as Azure, AWS
- Provision of IBM's Power VS
Benefits
- IaaS can be fixed cost, on-demand or pay-as-you-go basis.
- SLA driven and tailored to fit the customer's business need.
- Avoid technology debt and achieve continuous Digital Transformation.
- Highly flexible approach to hybrid services or multi-cloud services.
- New business critical application integration.
- Best use of Public, Private and on-premise cloud services
- Complete Cyber protection of IBM i, AIX, Linux and Windows.
- Flexible approach to hybrid or fully managed Data Protection Services
- Confidence in Export, Import, transfer process of our Migration Factory
- Reduce costs, increase ROI, reliability and security
Pricing
£243 a unit a month
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 9 8 9 6 6 1 1 8 4 5 1 1 2 2
Contact
Meridian IT
Service Desk Team
Telephone: 0800 085 899
Email: servicedesk@meridianit.co.uk
Service scope
- Service constraints
- Meridian IT will work with the client against any constraints they may have. We provide a 24/7/365 service to work best with our clients needs and budget.
- System requirements
-
- Applications and services on IBM Power I & AIX, HPE
- Applications and services supported on Intel x86 systems
- Applications and services supported on RedHat, Linux
- Meridian IT can adapt to the clients requirements.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Severity 1: Critical impact to Business / System resulting in business critical applications being unavailable; 1 Hour response, 24x7. Severity 2: Severe impact to Business / System resulting in use of business critical applications being restricted / slow; 4 Hour response, 24x7. Severity 3: Some Business impact / inconvenience but business processes able to continue; 1 working day response. Severity 4: Minimal or no Business impact, Perhaps requests for information or explanation; 3 working day response.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- No
- Support levels
-
Severity 1 Critical impact to Business / system down resulting in Business critical applications being unavailable, 1 hour response – 24*7;
Severity 2 Severe impact to Business / system resulting in use of Business critical applications being restricted/slow, 4 working hours response;
Severity 3 Some Business impact/inconvenience but Business processes able to continue, 1 working day response;
Severity 4 Minimal or no Business impact. Perhaps requests for information or explanation, 3 working days response. Prices vary dependant on service option required, i.e. fixed price managed service or call off - reactive support where hourly or day rates are agreed. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Meridian IT will provide the client with a cloud readiness assessment followed by a workshop to fully understand their requirements. This will be carried out by experienced consultants using ‘discovery tools’ for the entire connected infrastructure of a business including all hardware and software components. The raw data is transformed into a management view via an augmentation process so that a clear hierarchy and structure of ownership is presented along with an analytical view of usage and costs. The discovery phase of the service will provide an assessment of which components of the IT infrastructure can be delivered through private or public cloud consumption. It also assesses the business impact of moving to a cloud services so that a holistic view can be taken as to the appropriate level of transformation required to achieve the optimum business results. The customer would be allocated a Service Delivery Manager and Project Manager, who would agree a plan with the customer that would highlight relevant service levels and agreements, along with the various alerts and responses that would be addressed by the Meridian Support Cloud.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- This forms part of the Exit plan. Client Data will be returned within a reasonable period, normally 60 days in an agreed format and method, there are a number of options available for this, upon receiving written instructions from the Client prior to termination or expiration of current agreed contract.
- End-of-contract process
-
At the End of a contract an Exit Plan is agreed including; Accommodate Exit Planning Meetings/Con calls, liaise with the customer teams. Provide all reasonable access to data, applications and network devices. Liaise with alternative service providers to assist with the transition.
Provide connectivity information. Agree a Data Plan so that access is provided to all relevant data, data is destroyed or archived as required by the customer.
Access is provided so that data Backups can be made either by the customer or other service provider. Hand over all customer system configuration details, security access rights. Hand over all documentation relating to the customer service. Project Management may be chargeable for this dependant on the agreement.
Using the service
- Web browser interface
- No
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- IBM & Intel Infrastructure Platform (hardware and software), virtualisation with cloud backup and network redundancy.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- Memory
- Network
- Number of active instances
- Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Node4, Equinix, Pulsant, Dell, Lenovo, HPE, IBM, Cyber, Microsoft, Commvault
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Other
- Other data at rest protection approach
-
Meridian IT hosts a variety of options for managing data securely, from internal asset management traceability (audited under ISO 27001 and Cyber Essential Plus certifications); data monitoring tools; to our carefully selected tier 3 data centres who each hold ISO 27001, PCI and many other recognised audited accreditations.
We are able to manage your data security solution against your required landscape covering key areas of weakness. Encryption at rest and in transit is AES256.
Other options available: SIEM technology, intrusion detection, vulnerability management services, PEN testing delivered at three levels: essential, enhanced and elite to accommodate any business requirement. - Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- All data
- Evault Cloud Backup
- Veeam Backup
- Commvault
- Backup controls
- Bespoke backup schedule and data retention available. We will work with the client accordingly to the service being provided.
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
- Other
- Other protection between networks
- Network controls – All servers are protected by Firewalls with strict access rules and sensitive information transmitted via VPN connections.
- Data protection within supplier network
- Other
- Other protection within supplier network
- Network controls – All servers are protected by Firewalls with strict access rules and sensitive information transmitted via VPN connections. Devices and services are logically grouped based and are assigned to Virtual LAN’s which provides network segmentation. Policies and procedures are in places internally to transfer data and are also in line with InfoSec classification.
Availability and resilience
- Guaranteed availability
-
Typically handled by Service Credits:-eg: Contractor warrants that it will resolve all properly notified Incidents classified as Critical or High within the Target Resolution Time specified in Section 2.3. If Contractor does not resolve these Incidents within the Target Resolution Time, then the Maintenance Fee shall be automatically reduced by the percentage set out below and Contractor shall disburse the respective amounts to Customer:
• by 5% if Contractor fails to resolve more than 10% of notified Incidents within the Target Resolution Time;
• by 20% if Contractor fails to resolve more than 20% of notified Incidents within the Target Resolution Time;
• by 30% if Contractor fails to resolve more than 30% of notified Incidents within the Target Resolution Time;
• by 50% if Contractor fails to resolve more than 40% of notified Incidents within the Target Resolution Time;
• by 60% if Contractor fails to resolve more than 50% of notified Incidents within the Target Resolution Time. Bespoke to each customer. - Approach to resilience
- Multiple data centre locations for high availability and data replication ensures availability within agreed SLAs. Tier 3 Data Centre. Cloud data is replicated between sites. All other specific information can be obtained upon request.
- Outage reporting
- SMS, email (automation).
Identity and authentication
- User authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Other
- Other user authentication
- Our services are managed in line with our clients requirements, we can adapt and tailor to clients access and security management keeping our clients primarily in control. Our Solutions Architecture, Project Management and Technical Services will work closely with our clients to establish the best, safest and most effective approach for a smooth transition of service.
- Access restrictions in management interfaces and support channels
- Username and password requirements, employees only.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- 2-factor authentication
- Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- The British Assessment Bureau on an annual basis.
- ISO/IEC 27001 accreditation date
- First accredited on 16th April 2016
- What the ISO/IEC 27001 doesn’t cover
- We have no exemptions. All requirements under ISO 27001 are effectively covered.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- ISO 9001 and Cyber Essential's Plus
- Information security policies and processes
- Meridian IT hold the ISO27001, ISO 9001 and Cyber Essential's Plus Certificates. We are fully aligned to the ISO 27001 Standard with no exemptions. We have a dedicated Compliance Manager to oversee our compliance assurance and work with our Leadership Team to implement and embed our required ISM practices. Our Leadership team and all employees hold clear and defined responsibilities (RACI) across our security management. Compulsory security training is held annual across all staff, along with a defined competence matrix against role types.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Meridian has a Change Management Policy in line with ITIL which is adhered to.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
A Vulnerability Management Policy is in place and audited both internally and externally (under ISO 27001).
A Business Continuity is in place covering all our business operations.
Meridian IT work with various and specifically selected third party vendors and partners to deliver an effective and secure service for our clients in accordance to heir contractual requirements.
Patch and threat management is carried out at least monthly, or as required, as per our clients requests. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Meridian IT have a defined monitoring tools, policy and processes in place. Our protective monitoring is regularly monitored as well as audited both internally and externally under ISO 27001.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Meridian IT have a defined Incident Management Policy with supporting process in place. Our incident management is audited both internally and externally under ISO 27001.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- Other
- Other virtualisation technology used
- IBM Power VM
- How shared infrastructure is kept separate
- We separate environments with different VLAN’s and ACL’s (Access Control List’s) defined to restrict access to just the customer.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
-
We use specially selected Data Centre facilities throughout the UK that have achieved a Tier 3 status with tracked and closely monitored energy efficiency, holding the ISO 15001.
ISO 50001, the most current version being ISO 50001:2011, specifies requirements for establishing, implementing, maintaining and improving an energy management system, whose purpose is to enable an organization to follow a systematic approach in achieving continual improvement of energy performance, including efficiency, use and consumption. It has been designed to be used independently, but it can be aligned or integrated with other management systems.
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Equal opportunity
- Wellbeing
Fighting climate change
Meridian IT are proud to be a carbon neutral organisation for our offices and general operations across the UK. To achieve our net zero footprint is by having various workplace initiatives in place and supporting our employees be environmental and sustainable conscious. We are aligned with the Carbon Footprint company to plant trees within Kenya and support the local communities.
Workplace initiatives include minimum paper printing and use; lights on sensor alerts; recycling printer cartridges; maximised and fit-for-purpose office utilisation to avoid unnecessary space voids reducing footprint and utility usage.
We support our employees by encouraging recycling activities; avoid unnecessary travelling by encouraging remote working and virtual meetings. We actively promote wellbeing, ethical thinking and environmental consciousness through our CSR programmes.Covid-19 recovery
During 2020 and 2021 we formed a matrix COVID Management Team to regularly review our operational and client needs, align with our Business Continuity system, follow the latest UK Governments advice and keep our employees and clients continually informed. We have a risk assessment and policy in place covering all operations, which was regularly reviewed as the pandemic progressed. No clients, operations, workforce, or contractual obligations were affected throughout the COVID-19 pandemic, we successfully maintained the high level of service as expected with a 100% retention rate. Today all business is resumed back to 'normal operations', with the greatest difference being, to continue supporting our employees by encouraging a new way of hybrid working, virtual meetings, and reminders to the ongoing considerations of COVID awareness through management control.Equal opportunity
Meridian IT have an Equal Opportunity Policy and an Inclusion and Diversity Policy in place. Our key suppliers are audited formally each year which incorporates ethical practices and their equal opportunity policies.
We have a corporate D&I community group, sponsored by our Group CEO, to push and encourage D&I initiatives across our global offices. The purpose is to build a more diverse, open and inclusive company; identify and encourage behaviours that nurture diversity and inclusion; be change agents for equality and inclusion for our workplace and our communities; and, foster a climate and culture in which each employee is accepted and has the opportunity to grow and develop in their career.Wellbeing
Meridian IT have a Wellbeing Policy in place to support our employees whilst at work, including a guide for line managers to best work with their team members identifying signs of potential stress. We support our employees mental health through an independent and confidential external EAP service. Meridian IT have a Corporate Social Responsibility Policy and actively supports selected charities through hands-on employee led activities annually.
Pricing
- Price
- £243 a unit a month
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- There is a POC option available which is for a single LPAR for a period of up to 4 weeks. Additional POC options are available such as a second LPAR for DR, costs may apply.