Skip to main content

Help us improve the Digital Marketplace - send your feedback

DEFENDED SOLUTIONS LIMITED

Cloud Platform & Hosting Services

Reselling of the following Cloud Services - Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
Data storage and management solutions
Networking services
Security and compliance features
Machine learning and artificial intelligence capabilities
Developer tools and integrations

Features

  • PaaS, SaaS, IaaS
  • AI, ML, NLP GANS
  • DR, BCP, HA, Failover, Backups, DRaaS, BaaS
  • Productivity, Teams, Collaboration, Document Management
  • Sentinel, SOC, Log Collections, Monitoring, Event, Reactive, Proactive
  • Azure AD, Entra, MFA, Domain Services, SSO, Federation, SAML, Policy
  • AVD, Virtual Desktop, Citrix, RDP, Horizon, Windows 365
  • SDN, NSX, Firewall, Routing, Switching, ADG, Cisco, Fortinet, JunOS
  • DevOps, Github, Stack, Ansible, Teraform, Jenkins, Code, YAML, Chef
  • AV, Malware, Spyware, Tenable, Vulnerability Scanning, Ransomware, Red, Blue

Benefits

  • ISO, compliance, policies, and accreditation to UKAS certified.
  • Deployment of informations rights and management.
  • Single pane of glass for development, deployment and management.
  • Security, assurance and real time protection.
  • Certified DEVOP engineers provding Agile/ITIL delivery.
  • SC and DV certified.
  • Enterprise architecture, strategy, and migration.
  • Work to Secure by Design principals and JSP 604.
  • Following Cloud Centre of Excellence model.
  • Delivery of design patterns and blueprints.

Pricing

£1 to £999,999 a unit a day

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at procurement@defendedsolutions.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

6 1 7 3 2 5 1 1 9 6 5 3 8 0 9

Contact

DEFENDED SOLUTIONS LIMITED Procurement Team
Telephone: +44 (0) 203 515 0315
Email: procurement@defendedsolutions.com

Service scope

Service constraints
None.
System requirements
None. All requirements are supported.

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Timers are depend on the priority of the issue or request. When a ticket is raised, we make an assessment.

Priority is based on two factors:
Impact
Urgency

LOW – there’s an easy and effective workaround, so more an irritation than a stoppage
MEDIUM – operational efficiency is degraded, but there is either a reasonable workaround or other members of team are unimpeded
HIGH – the issue is critical and one or more major business processes are stopped

LOW – person or small group of people affected
MEDIUM – department or large group affected
HIGH – whole organisation is affected
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Level 1

Support teams solve user problems by following standard operating procedures (SOP). If no solutions are available as per the training and instructions, Level 1 personnel forward the queries to Level 2 support.

Level 2

Take queries from Level 1. This level of help mostly deals with in-depth troubleshooting and backend analysis. First, a Level 2 technician reviews the work order from a Level 1 specialist to determine how much support was provided, what the client issue is, and how long the client has worked with the Level 1 agent.

Level 3

This level of support requires SMEs. Level 3 support consists of experts, who may include specialists such as architects, engineers, and creators. These support experts have access to the highest level of company and product information. They can provide solutions for a wide variety of technical problems.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide tailored documentation and procedure for end users which allows them to self-service smaller issues/queries.

Clear and concise signposting is used to assist usability and avoid misinterpretation. Prioritising content, using semantics and ensuring we’re using the right tone will also help users quickly get to the content they want and avoiding frustration.

Linking to provider/supplier documentation for certain tasks/issues will ensure that the most up to date advice/information is accessed.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
The cloud services/platform will be created in the customers name/account. When a contract ends we simply remove ourselves as an admin and hand over access. At no point do we have exclusive access/rights to customer data.
End-of-contract process
Three months before contract end, we will aim to renew/negotiate with the customer. If they are seeking a termination that we will hand over access to the platform/services.

Using the service

Web browser interface
Yes
Using the web interface
Web-based, unified console that provides an alternative to command-line tools. With the portal, you can manage your subscription using a graphical user interface. You can build, manage, and monitor everything from simple web apps to complex cloud deployments in the portal.
Web interface accessibility standard
None or don’t know
How the web interface is accessible
???
Web interface accessibility testing
???
API
Yes
What users can and can't do using the API
API Management provides a REST API for performing operations on selected entities, such as users, groups, products, and subscriptions. This reference provides a guide for working with the API Management REST API, and specific reference information for each available operation, grouped by entity.
API automation tools
  • Ansible
  • Chef
  • OpenStack
  • SaltStack
  • Terraform
  • Puppet
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • PDF
Command line interface
Yes
Command line interface compatibility
  • Linux or Unix
  • Windows
  • MacOS
Using the command line interface
Command-line tools automate routine operations, standardize database failovers, and pull data that provide powerful insight. Command-line tools not only give the ability to scale tasks in the Cloud, but they also make much easier to share. Sharing a script is much easier than a lengthy wiki page with time consuming screenshots.

- Cross-platform command-line interface, installable on Windows, macOS, Linux

- Runs in Windows PowerShell, Cmd, or Bash and other Unix shells.

Scaling

Scaling available
Yes
Scaling type
  • Automatic
  • Manual
Independence of resources
We can build services to scale automatically based on customised metrics that will predict load and required resources.
Usage notifications
Yes
Usage reporting
  • API
  • Email
  • SMS

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Services offered by Azure, AWS and Google.

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • Files
  • Virtual Machine
  • Databases
  • Email
  • SaaS
  • SharePoint
  • Teams
Backup controls
The backup schedule will be controlled by ourselves based on the service and how critical it is. Customers can steer this to their own requirements if required.
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Depending on how services are built will affect the SLA. IE - if a service is built to be highly available across two region datacentres in two regions, we can offer as high as a 99.9999%.

Any loss in revenue will be matched to the cloud provider of choice. This will then be passed to the customer.
Approach to resilience
The cloud providers we utilise are able to host platform/services in multiple data centre and geographical regions across the UK and rest of the world. This will require the customer’s services to be built in such a way to utilise the resilience.
Outage reporting
These can be customised as a web portal, email, sms or X Tweet alert.

Identity and authentication

User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
1. Role-Based Access Control (RBAC)
2. Multi-Factor Authentication (MFA)
3. Network Segmentation
4. Access Control Lists (ACLs)
5. Audit Logging and Monitoring
6. Regular Access Reviews
7. Security Awareness Training
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
URS (UKAS Level)
ISO/IEC 27001 accreditation date
30/10/2025
What the ISO/IEC 27001 doesn’t cover
None
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
  • ISO 9001
  • ISO 20000

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
1. Clear data security rules with clear guidelines for handling sensitive information within the organization.
2. Proper cybersecurity controls by defining security goals, to help security officers deploy appropriate solutions.
3. Quick and efficient response to security incidents by outlining step-by-step incident response actions.
4. Ability to meet IT compliance requirements can help with SWIFT CSP, GDPR, SOX, and other standards, laws, and regulations
5. User and stakeholder accountability when they clearly define roles and responsibilities for each user and stakeholder.
6. Enhanced brand reputation commitment to information security standards and practices fosters trust among customers.
7. Increased operational efficiency by having clear policies in place can help keep data protection efforts standardized, consistent, and synchronized.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
We confirm to 9001 QMS.

1 Formally requesting a change, also known as a RfC
2 Reviewing any requested changes
3 Approving any requested changes
4 Creating a detailed project plan for changes
5 Reviewing and refining the plan. This is done by a team of stakeholders.
6 Planning or scheduling the implementation of changes
7 Testing the change
8 Assessing and reporting on the results of the change
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
We confirm to ISO 27001.

Vulnerability management is the process of identifying and mitigating vulnerabilities within the organization's information systems in order to preserve the confidentiality, integrity, and availability of sensitive data.

Patches are applied based on suppliers’ recommendations. IE a zero-day patch will be applied asap. Standard updates will be planned with the customer during a planned maintenance window.

Our sources of current threats are found -

1. National Vulnerability Database (NVD):
2. CVE Website (cve.mitre.org):
3. Exploit Database (Exploit-DB)
4. Security Research Blogs and Websites
5. Vendor Security Advisories
6. Threat Intelligence Platforms
7. Cyber security News Outlets
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
1 Identification of Potential Compromises:

Continuous Monitoring
Intrusion Detection Systems (IDS)
Log Analysis
Threat Intelligence

2 Response to Potential Compromises:

Incident Response Plan
Escalation Procedures
Containment
Forensic Analysis

3 Response Time:

Real-Time Alerts
SLA Compliance
Rapid Response

Our effective protective monitoring approach requires a combination of proactive monitoring, rapid incident response, and continuous improvement through post-incident analysis and feedback to enhance the security posture.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
1 Pre-defined Processes for Common Events:

Establishing a comprehensive set of pre-defined processes and procedures
Developing incident response playbooks or runbooks
Regularly reviewing and updating the incident response processes

2 Incident Reporting by Users:

Providing multiple channels for users to report security incidents.
Educating users
Implementing automated incident reporting mechanisms.

3 Incident Response and Reporting:

Rapid Response
Incident Triage
Communication and Collaboration
Incident Resolution
Incident Reporting
Continuous Improvement

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Supplier
Virtualisation technologies used
Other
Other virtualisation technology used
This depends on the cloud platform.
How shared infrastructure is kept separate
This is handled by the upstream cloud provider.

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
All of our upstream cloud providers implement the below -

Energy Efficiency Practices
Monitoring and Measurement
Efficient Cooling Systems
Renewable Energy Integration
Energy Management Strategies
Employee Awareness and Training
Regular Reporting and Compliance

Social Value

Social Value

Social Value

  • Tackling economic inequality
  • Equal opportunity

Tackling economic inequality

Can be found via our two below policies on our website -

https://www.defendedsolutions.com/social-responsibility-policy
https://www.defendedsolutions.com/carbon-neutral-policy

Equal opportunity

Can be found via our two below policies on our website -

https://www.defendedsolutions.com/social-responsibility-policy
https://www.defendedsolutions.com/carbon-neutral-policy

Pricing

Price
£1 to £999,999 a unit a day
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at procurement@defendedsolutions.com. Tell them what format you need. It will help if you say what assistive technology you use.