Total Cloud
Total Cloud is a centrally managed platform which integrates HSCN, Azure and our own data centre services into a single pane of glass to provide a seamless cloud user experience
Features
- Provide companies the ability for remote working solutions.
- Hosted applications in a customised protective private cloud,
- Integration of your environment with Microsoft 365
- Microsoft remote desktop virtual environment (RDS) hosting and support,
- for backups, restores, maintainance on behalf of customers.
- Redundancy on all cloud infrastructure equipment including storage,
- Solutions provides real time reporting and monitoring of customers environment.
- We provide customised desktop solutions.
- customised private cloud hosting solutions.
- Azure, Storagecraft, Smoothwall, HSCN.
Benefits
- remote office working from any internet connection.
- network is maintained, analysed and reported
- availability of the servers is maintained, analysed and reported
- able to use any device to access the service
- Hardware lasts longer as the computing power is in cloud
- carbon emissions of the company is reduced for hosting
- higher security level
- high calibre support and protection
- Files can be recovered easily and backed up hourly
Pricing
£3,072 an instance
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 1 7 7 5 0 8 2 8 1 7 1 9 1 0
Contact
IGC TECHNICAL SOLUTIONS LTD
Sharon Walker
Telephone: 0161 660 5154
Email: sharon.walker@igcts.co.uk
Service scope
- Service constraints
- Users of the hosted service must be aware for a hosting service they should have a good internet connection that is reliable and relatively fast. The services will be hosted at a data centre and they will be requesting this information over an internet line from the data centre. High resoltuion motion graphics for example hosting something like "google maps" may not work well because of the graphics motion of the service. Very old equipment may not work well as endpoints to receive the data we recommend not more than 8 years old.
- System requirements
-
- Minimum of 5 users for deployment of the hosting service
- Up-to-date supported version of Windows or RDP client
- Adequate internet is a requirement to access the services
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 30 minutes response for critical support.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Our cloud infrastructure has proactive, unlimited remote support 24/7 for critical failures, with a 30 minute response during business hours for all other support requests, unless agreed differently. User sessions and local desktops are also supported. We monitor, update, upgrade and maintain the cloud infrastructure as necessary to ensure the highest uptime and an excellent end user experience.We will install configure and diagnose cloud, hardware and software faults. Realtime automated monitoring to protect your company and provide disaster recovery and scheduled granular backups and restoration of files. Call center with automated helpdesk is part of the service. Proactive maintenace is conducted. Personalised support for improving the end user experience. Training on use of hosted environment "will show you to use to use the hosted environment".
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
User documentation on a private portal.
Face to face/remote training provided where necessary at onboarding stage.
Online training on user portal. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Project to move to data off cloud hosting sites.
- End-of-contract process
-
If the contract isnt renewed then a offboarding process wil start
Assessment quoting,
planning,
risk,
project.
Using the service
- Web browser interface
- Yes
- Using the web interface
-
Gain access to relevant hosted service.
Self service Management platform. - Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- Na
- Web interface accessibility testing
- Na
- API
- No
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- Using the command line interface
- Command line interfaces are locked down and are useable only if required for the service. Command line and powershell available on request.
Scaling
- Scaling available
- Yes
- Scaling type
- Manual
- Independence of resources
- Capacity monitoring of user profiles. Content filtering. Realtime monitoring of services and hosted services. Trend analysis of client usage.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Other
- Other metrics
- Extensive list of metrics can be provided.
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Microsoft licensing and software resold including backup software services.
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Hardware containing data is completely destroyed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Data backup - file sturcture
- Data backup - hourly backups
- Data backup - granular file backups
- Data backup - image backups
- Data backups - Databases
- Data backup - Delta backup service
- N+1 on network
- N+1 on compute
- N+1 on storage
- Encryption on backups
- Backup controls
- Backups managed as a service.
- Datacentre setup
-
- Multiple datacentres with disaster recovery
- Multiple datacentres
- Single datacentre with multiple copies
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
To contractual terms and conditions.
99.95%
Service credit request process below this value - Approach to resilience
- Networking hardware is redundant. Disaster Recovery provided to each hosted customer. Regular backups plus hourly data backups with server and storage redunadancy inplace, infrasturcture designed cluster with fallover and 24/7 monitoring support and protection of the critical data centre services. Data centre failover.
- Outage reporting
- Automated reporting of outages are reported to the service desk based on outages of the hosted environment sensors. Customers are informed by email and telephonically.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Na
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Other
- Description of management access authentication
- Management VLAN.
- Devices users manage the service through
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- UCAS
- ISO/IEC 27001 accreditation date
- 09/02/2021
- What the ISO/IEC 27001 doesn’t cover
- Everything is accredited.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- ISO 27001 audited and vetted policies and procedures. UCAS accredited auditing and control.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- A risk assessment and change control process is followed and documented.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Vulnerability assessment is conducted and any threats are mitigated and then rescanned to determine if the threat has been resolved. Realtime threat management system and premiere software is used and alerts and antivirus Ddos prevention and unusual activity detection.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Pre-determined thresholds for early warning alerting. As soon as incidents are discovered or identified instantaneous response is acted upon by the team. Through security awareness and Automated realtime monitoring of incidents and events and threat management scanning and vulnerability assessment is also conducted and reported to the helpdesk automatically.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Incident management process complies with ISO 27001
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- Citrix XenServer
- How shared infrastructure is kept separate
- Na
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
Fighting climate change
IGC are contributing to the fight against climate change by providing customers and end users with the option of having Virtual Desktop Infrastructure (VDI). With our own energy efficient data centres we are able to allow users to access their desktop environments remotely from anywhere with an internet connection. By providing this alternative option for our customers, rather than the traditional desktop environments, IGC and its customers can contribute to :
• Reducing energy consumption by consolidating computing resources onto more efficient server hardware
• Reduce electronic waste by allowing organisations to extend lifespan of their hardware
• Reduce carbon emissions by removing the need to commute
• Providing a paperless environment
Whilst we understand that VDI is not a panacea for resolving climate change, it is a positive step that our customers can take when considering their IT operations.Covid-19 recovery
With the onset of the Covid-19 pandemic, IGC had the ability to provide its customers with VDI alternative within a short space of time, to allow them to continue operating without compromising on productivity.
Moving from traditional desktop environments to VDI working has aided Covid-19 recovery efforts in many ways and IGC are proud to be a contributing factor in that process. We helped our customers in very challenging times to ensure the continuity of their businesses by providing VDI to:
• Enable remote working, allowing users to access their work desktops and applications remotely
• Provide flexibility to businesses to quickly adjust their IT infrastructure when faced with fluctuations in demanding workforce availability.
• Help with costs savings to businesses by centralizing desktop management and leveraging virtualization technology
• Enhance customers business continuity plans by enabling them to continue working regardless of their location
• Enhance security by hosting customers data and applications in the data center ensuring sensitive information remains secure when accessed remotely.
• Support healthcare professionals to access remotely patient records and work in collaboration with researchers to accelerate the development and training of treatments and vaccines.
• Continue with training and development specifically within educational institutions by delivering remote learning.
By offering VDI as a solution to our existing and potential customers, IGC can allow businesses to have the ability to continue to operate through periods of economic uncertainty caused by a pandemic.
Pricing
- Price
- £3,072 an instance
- Discount for educational organisations
- No
- Free trial available
- No