Cloud Platform & Hosting Services
Reselling of the following Cloud Services - Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
Data storage and management solutions
Networking services
Security and compliance features
Machine learning and artificial intelligence capabilities
Developer tools and integrations
Features
- PaaS, SaaS, IaaS
- AI, ML, NLP GANS
- DR, BCP, HA, Failover, Backups, DRaaS, BaaS
- Productivity, Teams, Collaboration, Document Management
- Sentinel, SOC, Log Collections, Monitoring, Event, Reactive, Proactive
- Azure AD, Entra, MFA, Domain Services, SSO, Federation, SAML, Policy
- AVD, Virtual Desktop, Citrix, RDP, Horizon, Windows 365
- SDN, NSX, Firewall, Routing, Switching, ADG, Cisco, Fortinet, JunOS
- DevOps, Github, Stack, Ansible, Teraform, Jenkins, Code, YAML, Chef
- AV, Malware, Spyware, Tenable, Vulnerability Scanning, Ransomware, Red, Blue
Benefits
- ISO, compliance, policies, and accreditation to UKAS certified.
- Deployment of informations rights and management.
- Single pane of glass for development, deployment and management.
- Security, assurance and real time protection.
- Certified DEVOP engineers provding Agile/ITIL delivery.
- SC and DV certified.
- Enterprise architecture, strategy, and migration.
- Work to Secure by Design principals and JSP 604.
- Following Cloud Centre of Excellence model.
- Delivery of design patterns and blueprints.
Pricing
£1 to £999,999 a unit a day
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 1 7 3 2 5 1 1 9 6 5 3 8 0 9
Contact
DEFENDED SOLUTIONS LIMITED
Procurement Team
Telephone: +44 (0) 203 515 0315
Email: procurement@defendedsolutions.com
Service scope
- Service constraints
- None.
- System requirements
- None. All requirements are supported.
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
-
Timers are depend on the priority of the issue or request. When a ticket is raised, we make an assessment.
Priority is based on two factors:
Impact
Urgency
LOW – there’s an easy and effective workaround, so more an irritation than a stoppage
MEDIUM – operational efficiency is degraded, but there is either a reasonable workaround or other members of team are unimpeded
HIGH – the issue is critical and one or more major business processes are stopped
LOW – person or small group of people affected
MEDIUM – department or large group affected
HIGH – whole organisation is affected - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Level 1
Support teams solve user problems by following standard operating procedures (SOP). If no solutions are available as per the training and instructions, Level 1 personnel forward the queries to Level 2 support.
Level 2
Take queries from Level 1. This level of help mostly deals with in-depth troubleshooting and backend analysis. First, a Level 2 technician reviews the work order from a Level 1 specialist to determine how much support was provided, what the client issue is, and how long the client has worked with the Level 1 agent.
Level 3
This level of support requires SMEs. Level 3 support consists of experts, who may include specialists such as architects, engineers, and creators. These support experts have access to the highest level of company and product information. They can provide solutions for a wide variety of technical problems. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We provide tailored documentation and procedure for end users which allows them to self-service smaller issues/queries.
Clear and concise signposting is used to assist usability and avoid misinterpretation. Prioritising content, using semantics and ensuring we’re using the right tone will also help users quickly get to the content they want and avoiding frustration.
Linking to provider/supplier documentation for certain tasks/issues will ensure that the most up to date advice/information is accessed. - Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- The cloud services/platform will be created in the customers name/account. When a contract ends we simply remove ourselves as an admin and hand over access. At no point do we have exclusive access/rights to customer data.
- End-of-contract process
- Three months before contract end, we will aim to renew/negotiate with the customer. If they are seeking a termination that we will hand over access to the platform/services.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Web-based, unified console that provides an alternative to command-line tools. With the portal, you can manage your subscription using a graphical user interface. You can build, manage, and monitor everything from simple web apps to complex cloud deployments in the portal.
- Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- ???
- Web interface accessibility testing
- ???
- API
- Yes
- What users can and can't do using the API
- API Management provides a REST API for performing operations on selected entities, such as users, groups, products, and subscriptions. This reference provides a guide for working with the API Management REST API, and specific reference information for each available operation, grouped by entity.
- API automation tools
-
- Ansible
- Chef
- OpenStack
- SaltStack
- Terraform
- Puppet
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- MacOS
- Using the command line interface
-
Command-line tools automate routine operations, standardize database failovers, and pull data that provide powerful insight. Command-line tools not only give the ability to scale tasks in the Cloud, but they also make much easier to share. Sharing a script is much easier than a lengthy wiki page with time consuming screenshots.
- Cross-platform command-line interface, installable on Windows, macOS, Linux
- Runs in Windows PowerShell, Cmd, or Bash and other Unix shells.
Scaling
- Scaling available
- Yes
- Scaling type
-
- Automatic
- Manual
- Independence of resources
- We can build services to scale automatically based on customised metrics that will predict load and required resources.
- Usage notifications
- Yes
- Usage reporting
-
- API
- SMS
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Services offered by Azure, AWS and Google.
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Files
- Virtual Machine
- Databases
- SaaS
- SharePoint
- Teams
- Backup controls
- The backup schedule will be controlled by ourselves based on the service and how critical it is. Customers can steer this to their own requirements if required.
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
Depending on how services are built will affect the SLA. IE - if a service is built to be highly available across two region datacentres in two regions, we can offer as high as a 99.9999%.
Any loss in revenue will be matched to the cloud provider of choice. This will then be passed to the customer. - Approach to resilience
- The cloud providers we utilise are able to host platform/services in multiple data centre and geographical regions across the UK and rest of the world. This will require the customer’s services to be built in such a way to utilise the resilience.
- Outage reporting
- These can be customised as a web portal, email, sms or X Tweet alert.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
-
1. Role-Based Access Control (RBAC)
2. Multi-Factor Authentication (MFA)
3. Network Segmentation
4. Access Control Lists (ACLs)
5. Audit Logging and Monitoring
6. Regular Access Reviews
7. Security Awareness Training - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- URS (UKAS Level)
- ISO/IEC 27001 accreditation date
- 30/10/2025
- What the ISO/IEC 27001 doesn’t cover
- None
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- ISO 9001
- ISO 20000
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
1. Clear data security rules with clear guidelines for handling sensitive information within the organization.
2. Proper cybersecurity controls by defining security goals, to help security officers deploy appropriate solutions.
3. Quick and efficient response to security incidents by outlining step-by-step incident response actions.
4. Ability to meet IT compliance requirements can help with SWIFT CSP, GDPR, SOX, and other standards, laws, and regulations
5. User and stakeholder accountability when they clearly define roles and responsibilities for each user and stakeholder.
6. Enhanced brand reputation commitment to information security standards and practices fosters trust among customers.
7. Increased operational efficiency by having clear policies in place can help keep data protection efforts standardized, consistent, and synchronized.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
We confirm to 9001 QMS.
1 Formally requesting a change, also known as a RfC
2 Reviewing any requested changes
3 Approving any requested changes
4 Creating a detailed project plan for changes
5 Reviewing and refining the plan. This is done by a team of stakeholders.
6 Planning or scheduling the implementation of changes
7 Testing the change
8 Assessing and reporting on the results of the change - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
We confirm to ISO 27001.
Vulnerability management is the process of identifying and mitigating vulnerabilities within the organization's information systems in order to preserve the confidentiality, integrity, and availability of sensitive data.
Patches are applied based on suppliers’ recommendations. IE a zero-day patch will be applied asap. Standard updates will be planned with the customer during a planned maintenance window.
Our sources of current threats are found -
1. National Vulnerability Database (NVD):
2. CVE Website (cve.mitre.org):
3. Exploit Database (Exploit-DB)
4. Security Research Blogs and Websites
5. Vendor Security Advisories
6. Threat Intelligence Platforms
7. Cyber security News Outlets - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
1 Identification of Potential Compromises:
Continuous Monitoring
Intrusion Detection Systems (IDS)
Log Analysis
Threat Intelligence
2 Response to Potential Compromises:
Incident Response Plan
Escalation Procedures
Containment
Forensic Analysis
3 Response Time:
Real-Time Alerts
SLA Compliance
Rapid Response
Our effective protective monitoring approach requires a combination of proactive monitoring, rapid incident response, and continuous improvement through post-incident analysis and feedback to enhance the security posture. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
1 Pre-defined Processes for Common Events:
Establishing a comprehensive set of pre-defined processes and procedures
Developing incident response playbooks or runbooks
Regularly reviewing and updating the incident response processes
2 Incident Reporting by Users:
Providing multiple channels for users to report security incidents.
Educating users
Implementing automated incident reporting mechanisms.
3 Incident Response and Reporting:
Rapid Response
Incident Triage
Communication and Collaboration
Incident Resolution
Incident Reporting
Continuous Improvement
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- Other
- Other virtualisation technology used
- This depends on the cloud platform.
- How shared infrastructure is kept separate
- This is handled by the upstream cloud provider.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
-
All of our upstream cloud providers implement the below -
Energy Efficiency Practices
Monitoring and Measurement
Efficient Cooling Systems
Renewable Energy Integration
Energy Management Strategies
Employee Awareness and Training
Regular Reporting and Compliance
Social Value
- Social Value
-
Social Value
- Tackling economic inequality
- Equal opportunity
Tackling economic inequality
Can be found via our two below policies on our website -
https://www.defendedsolutions.com/social-responsibility-policy
https://www.defendedsolutions.com/carbon-neutral-policyEqual opportunity
Can be found via our two below policies on our website -
https://www.defendedsolutions.com/social-responsibility-policy
https://www.defendedsolutions.com/carbon-neutral-policy
Pricing
- Price
- £1 to £999,999 a unit a day
- Discount for educational organisations
- Yes
- Free trial available
- No