Joskos Solutions
JKloud Hosting
Joskos JKloud Hosting provides a robust hosting platform for virtual machines, data storage and traditional app delivery and hosting.
Features
- Real time reporting
- Multi region redundancy
- Rapid Scalability
- Pay-As-You-Go Options
Benefits
- Simplified Server estate management
- Ease of scalability to introduce new server resources
- Redundancy
- Ability to manage the device estate centrally
Pricing
£68.62 to £551.15 a virtual machine a month
- Education pricing available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at tenders@joskos.com.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
6 0 5 6 8 1 0 5 5 2 3 2 9 5 0
Contact
Joskos Solutions
Tom Singh
Telephone: 07950914002
Email: tenders@joskos.com
Service scope
- Service constraints
- Services are primarily only constrained by the limitations of the technologies and client budgets, although we do our best to implement solutions to overcome the limitations where possible through comprehensive engagement
- System requirements
-
- Licences for operating systems
- Licences for cloud services such as Microsoft 365
- Licences for cloud services such as Microsoft Azure
- Licences for management solutions such as Microsoft Endpoint Manager
- Licences for specific platforms
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Depending on the priority and urgency of the ticket we respond to tickets between 30 min and 2 hours. Priority 1 tickets our first response time is within 30 min, Priority 2 within 1 hour and Priority 3 within 2 hours. Our service desk is closed over weekends so any issues raised over a weekend are handled in the following week.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- Web chat is accessed via our live webchat widget on our website www.joskos.com. This is directly linked to our ticketing system and our support desk. Customers can directly speak with one of engineers, initiate a remote session and share their screen if required directly from the chat.
- Onsite support
- Yes, at extra cost
- Support levels
- We can provide both a technical account manager and a cloud support engineer if required by the customer and is subject to the customers needs and budget. We can adapt our services to meets the needs of our customers and provide anything from just remote support to a fully comprehensive cloud managed service support.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- We provide a mixture of documentation, online training, videos and also onsite training and CPD which is done by our in-house team. We will conduct a service launch session online where all users are invited as this will be recorded so it can be accessed in their own time again. We provide how to guides which are saved into the service page when they login and for certain users we also have physical how to guides to place in their workplace, We can conduct bite size refresher sessions throughout the year to accomodate any new staff.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
-
Onboarding and offboarding documentation is accessible through a secure, invite-only link to a shared workspace. This ensures that sensitive information remains protected and is only available to authorised personnel.
At the end of the contract we provide a full documentation pack via an encrypted and secure link and this is then provided to the customer for them to access and download all thier documentation, credentials and passwords are transferred securely using our password and credentials vault software. Once the customer has confired they have all their documentation and credentials we destroy the data in line with our data retention policy after 30 days from receiving notice from the customer. - End-of-contract process
- At the end of the contract the customer has the opportunity to either renew the contract or not. They need to provide suitable notice of 6 months prior notice to cancel the contract which will initiate the offboarding process. Should the client not wish to renew the contract then there are no fees for the offboarding process. The client will be expected to settle all payments of the service in full as per the initial contract terms. Should the customer wish to renew then we would present the new contract fees to include any adjustment in line with CPI, adapt services based on feedback etc and adjust the new contract accordingly.
Using the service
- Web browser interface
- Yes
- Using the web interface
- We have a client support portal which users can access via the web aligned to their work email address. This portal allows to them view, monitor, add notes and updates to tickets and track their tickets raised with our support desk as well as raise new tickets via the portal. Users are setup by our service desk and recieve a link to access the portal. Users are categorised into certain groups which determines the level of detail they can see through the cloud dashboards - i.e. Senior Management will have more detail on activity across the whole organisation as opposed to a staff member who will only see their personal ticket log.
- Web interface accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web interface accessibility testing
- User can access our help centre using the https://support.joskos.com/portal/ link. Once they are signed up they can access our help topics, articles, community areas as well as raise tickets and view, monitor and respond to tickets via the help centre. As this is browser based they can use the assistive technology functions on their device and browser.
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
-
- Automatic
- Manual
- Independence of resources
- We allocate the appropriate infrastructure from Microsoft Azure datacenters to that clients organisation which does not crossover with other users/organisations. The Microsoft Azure datacentres in the UK load balance to ensure there is appropriate resource allocation between customers.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- Memory
- Number of active instances
- Reporting types
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Microsoft Azure and Google
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Hardware containing data is completely destroyed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Microsoft 365, Azure, Server level backups, database backups
- Virtual machines can be restored down to file level
- Backup controls
- As part of the backup implementation project the users will engage with our solution design team to request their preferences on the backup schedule. They are provided with suitable access to the backup console and can contact the support team in the first instance to discuss any future changes needed to their backup requirements by logging a ticket.
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Users contact the support team to schedule backups
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
- Private network or public sector network
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
The Service Level Agreements (SLA) relate to Microsoft’s commitments for uptime and connectivity for Microsoft Online Services.
The current SLA is available for download and covers Azure, Dynamics 365, Office 365, and Intune. - https://www.microsoft.com/licensing/docs/view/Service-Level-Agreements-SLA-for-Online-Services?lang=1 - Approach to resilience
- Our solutions are designed and implemented with redundancy in mind, including power. Virtual machines and infrastructure are clustered and geo-redundant where feasible.
- Outage reporting
- Outages are reported through email alerts and phone call via the dedicated Service delivery allocated to each client. There is a clear plan of action and communication plan outlined at the beginning of the service going live should an outage occur.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google apps)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- We use Single Sign On with Multi-factor Authentication wherever possible. We also employ Microsoft Entra ID conditional access policies to enforce device heath requirements, geographical and time based restrictions.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Citation ISO
- ISO/IEC 27001 accreditation date
- 28/03/2024
- What the ISO/IEC 27001 doesn’t cover
- We are fully covered by ISO27001:2022 and includes all aspects of information security
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- The Managing Director has approved the Information Security Policy. Overall responsibility for Information Security rests with the ISMS Manager. Day-to-day responsibility for procedural matters, legal compliance, maintenance and updating of documentation, promotion of security awareness, liaison with external organisations, incident investigation and management reporting etc. rests with the ISMS Manager. Day-to-day responsibility for data protection rests with the Data Protection Officer (DPO). Day-to-day responsibility for technical matters, including technical documentation, systems monitoring, technical incident investigation and liaison with technical contacts at external organisations, rests with the ISMS Manager. All employees or agents acting on the Organisation’s behalf have a duty to safeguard assets, including locations, hardware, software, systems or information, in their care and to report any suspected breach in security without delay directly to the ISMS Manager. Employees attending sites that are not occupied by the Organisation must ensure the security of the Organisation’s data and access their systems by taking particular care of laptops and similar computers and of any information on paper or other media that they have in their possession. The ISMS Manager is responsible for drafting, maintaining and implementing this Security Policy and similarly related documents.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Any configuration or change request follows our very clearly defined ISO27001 and ITIL process for change management. A change request ticket is raised in our ticketing system which is then reviewed and the CAB is setup. The request goes through the following steps to determine the risks and outline the change plan.
Scope Definition
Change Request Submission
Change Evaluation
Change Approval
RIsk Assessment
Change Implementation
Change Verification
Documentation
Monitoring and Review
Training and Awareness
Incident Response
Continuous Improvement" - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
All our services and our internal network is hosted in Azure, we have multiple redundancies in place as well as full cloud backup of all our services and data. We conduct regular penetration testing and vulnerability checks to ensure our network is secure at all times. Patches are automatically deployed and installed in real-time ensuring we are using the latest patches.
We get our information from the following:
NPSA
NCSC
Crowdstrike - Falcon X
Fortiguard - Threatmap" - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Our protective monitoring approach is designed to swiftly identify and respond to potential compromises to ensure the security and integrity of our systems and data as follows:
Identification of Potential Compromises:
We employ a combination of automated tools and manual checks to continuously monitor our systems for any suspicious activities or indicators of compromise.
Response to Potential Compromises:
The incident response team follows predefined procedures and protocols to assess the severity of the incident and mitigate any immediate risks.
Actions may include isolating affected systems, blocking suspicious traffic, or initiating forensic analysis to determine the extent of the breach. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Our incident management process is efficient and user-friendly. Users report incidents via email, phone, or our portal, following clearly communicated procedures.
The company ensures employees and contractors understand their reporting responsibilities and the prohibition on attempting to exploit security weaknesses.
Any observed or suspected incidents are promptly reported to the IT Department. Incident management procedures are easily accessible for quick reference.
Incident reports detail the incident, actions taken, and recommendations. We prioritise transparency and swift resolution to minimise disruption.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- Hyper-V
- How shared infrastructure is kept separate
- Organisations using our service primarily have their own dedicated infrastructure contained within their own cloud provider tenant or on-premises which has no links to any other organisations networks.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- Microsoft datacentres comply with the EU Code of Conduct for Energy Efficient Datacentres by adopting best practices that aim to reduce energy consumption and increase energy efficiency. These datacentres are designed with advanced cooling and power management technologies, as well as using renewable energy sources wherever feasible. Microsoft actively participates in industry-wide efforts to improve datacentre energy efficiency, demonstrating their commitment by aligning with standards that promote sustainability in their operations across the European Union.
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Cloud hosting in Microsoft Azure datacentres supports the fight against climate change by actively working towards net zero greenhouse gas emissions. These datacentres implement energy-efficient technologies and use renewable energy sources, reducing the overall carbon footprint of cloud services. Moreover, through the delivery of contracts, Joskos influences its staff, suppliers, customers, and communities to engage in and support environmental protection and improvement. This comprehensive approach promotes sustainability and awareness, contributing to a broader impact on climate change mitigation efforts.
Pricing
- Price
- £68.62 to £551.15 a virtual machine a month
- Discount for educational organisations
- Yes
- Free trial available
- No
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at tenders@joskos.com.
Tell them what format you need. It will help if you say what assistive technology you use.