Skip to main content

Help us improve the Digital Marketplace - send your feedback

IGC TECHNICAL SOLUTIONS LTD

Total Cloud

Total Cloud is a centrally managed platform which integrates HSCN, Azure and our own data centre services into a single pane of glass to provide a seamless cloud user experience

Features

  • Provide companies the ability for remote working solutions.
  • Hosted applications in a customised protective private cloud,
  • Integration of your environment with Microsoft 365
  • Microsoft remote desktop virtual environment (RDS) hosting and support,
  • for backups, restores, maintainance on behalf of customers.
  • Redundancy on all cloud infrastructure equipment including storage,
  • Solutions provides real time reporting and monitoring of customers environment.
  • We provide customised desktop solutions.
  • customised private cloud hosting solutions.
  • Azure, Storagecraft, Smoothwall, HSCN.

Benefits

  • remote office working from any internet connection.
  • network is maintained, analysed and reported
  • availability of the servers is maintained, analysed and reported
  • able to use any device to access the service
  • Hardware lasts longer as the computing power is in cloud
  • carbon emissions of the company is reduced for hosting
  • higher security level
  • high calibre support and protection
  • Files can be recovered easily and backed up hourly

Pricing

£3,072 an instance

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sharon.walker@igcts.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

6 1 7 7 5 0 8 2 8 1 7 1 9 1 0

Contact

IGC TECHNICAL SOLUTIONS LTD Sharon Walker
Telephone: 0161 660 5154
Email: sharon.walker@igcts.co.uk

Service scope

Service constraints
Users of the hosted service must be aware for a hosting service they should have a good internet connection that is reliable and relatively fast. The services will be hosted at a data centre and they will be requesting this information over an internet line from the data centre. High resoltuion motion graphics for example hosting something like "google maps" may not work well because of the graphics motion of the service. Very old equipment may not work well as endpoints to receive the data we recommend not more than 8 years old.
System requirements
  • Minimum of 5 users for deployment of the hosting service
  • Up-to-date supported version of Windows or RDP client
  • Adequate internet is a requirement to access the services

User support

Email or online ticketing support
Email or online ticketing
Support response times
30 minutes response for critical support.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Our cloud infrastructure has proactive, unlimited remote support 24/7 for critical failures, with a 30 minute response during business hours for all other support requests, unless agreed differently. User sessions and local desktops are also supported. We monitor, update, upgrade and maintain the cloud infrastructure as necessary to ensure the highest uptime and an excellent end user experience.We will install configure and diagnose cloud, hardware and software faults. Realtime automated monitoring to protect your company and provide disaster recovery and scheduled granular backups and restoration of files. Call center with automated helpdesk is part of the service. Proactive maintenace is conducted. Personalised support for improving the end user experience. Training on use of hosted environment "will show you to use to use the hosted environment".
Support available to third parties
Yes

Onboarding and offboarding

Getting started
User documentation on a private portal.
Face to face/remote training provided where necessary at onboarding stage.
Online training on user portal.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Project to move to data off cloud hosting sites.
End-of-contract process
If the contract isnt renewed then a offboarding process wil start
Assessment quoting,
planning,
risk,
project.

Using the service

Web browser interface
Yes
Using the web interface
Gain access to relevant hosted service.
Self service Management platform.
Web interface accessibility standard
None or don’t know
How the web interface is accessible
Na
Web interface accessibility testing
Na
API
No
Command line interface
Yes
Command line interface compatibility
  • Linux or Unix
  • Windows
Using the command line interface
Command line interfaces are locked down and are useable only if required for the service. Command line and powershell available on request.

Scaling

Scaling available
Yes
Scaling type
Manual
Independence of resources
Capacity monitoring of user profiles. Content filtering. Realtime monitoring of services and hosted services. Trend analysis of client usage.
Usage notifications
Yes
Usage reporting
Email

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
  • Other
Other metrics
Extensive list of metrics can be provided.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Microsoft licensing and software resold including backup software services.

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Hardware containing data is completely destroyed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • Data backup - file sturcture
  • Data backup - hourly backups
  • Data backup - granular file backups
  • Data backup - image backups
  • Data backups - Databases
  • Data backup - Delta backup service
  • N+1 on network
  • N+1 on compute
  • N+1 on storage
  • Encryption on backups
Backup controls
Backups managed as a service.
Datacentre setup
  • Multiple datacentres with disaster recovery
  • Multiple datacentres
  • Single datacentre with multiple copies
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
To contractual terms and conditions.
99.95%
Service credit request process below this value
Approach to resilience
Networking hardware is redundant. Disaster Recovery provided to each hosted customer. Regular backups plus hourly data backups with server and storage redunadancy inplace, infrasturcture designed cluster with fallover and 24/7 monitoring support and protection of the critical data centre services. Data centre failover.
Outage reporting
Automated reporting of outages are reported to the service desk based on outages of the hosted environment sensors. Customers are informed by email and telephonically.

Identity and authentication

User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Na
Access restriction testing frequency
At least every 6 months
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Description of management access authentication
Management VLAN.
Devices users manage the service through
Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
UCAS
ISO/IEC 27001 accreditation date
09/02/2021
What the ISO/IEC 27001 doesn’t cover
Everything is accredited.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
ISO 27001 audited and vetted policies and procedures. UCAS accredited auditing and control.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
A risk assessment and change control process is followed and documented.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Vulnerability assessment is conducted and any threats are mitigated and then rescanned to determine if the threat has been resolved. Realtime threat management system and premiere software is used and alerts and antivirus Ddos prevention and unusual activity detection.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Pre-determined thresholds for early warning alerting. As soon as incidents are discovered or identified instantaneous response is acted upon by the team. Through security awareness and Automated realtime monitoring of incidents and events and threat management scanning and vulnerability assessment is also conducted and reported to the helpdesk automatically.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Incident management process complies with ISO 27001

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Supplier
Virtualisation technologies used
Citrix XenServer
How shared infrastructure is kept separate
Na

Energy efficiency

Energy-efficient datacentres
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery

Fighting climate change

IGC are contributing to the fight against climate change by providing customers and end users with the option of having Virtual Desktop Infrastructure (VDI). With our own energy efficient data centres we are able to allow users to access their desktop environments remotely from anywhere with an internet connection. By providing this alternative option for our customers, rather than the traditional desktop environments, IGC and its customers can contribute to :
• Reducing energy consumption by consolidating computing resources onto more efficient server hardware
• Reduce electronic waste by allowing organisations to extend lifespan of their hardware
• Reduce carbon emissions by removing the need to commute
• Providing a paperless environment
Whilst we understand that VDI is not a panacea for resolving climate change, it is a positive step that our customers can take when considering their IT operations.

Covid-19 recovery

With the onset of the Covid-19 pandemic, IGC had the ability to provide its customers with VDI alternative within a short space of time, to allow them to continue operating without compromising on productivity.
Moving from traditional desktop environments to VDI working has aided Covid-19 recovery efforts in many ways and IGC are proud to be a contributing factor in that process. We helped our customers in very challenging times to ensure the continuity of their businesses by providing VDI to:
• Enable remote working, allowing users to access their work desktops and applications remotely
• Provide flexibility to businesses to quickly adjust their IT infrastructure when faced with fluctuations in demanding workforce availability.
• Help with costs savings to businesses by centralizing desktop management and leveraging virtualization technology
• Enhance customers business continuity plans by enabling them to continue working regardless of their location
• Enhance security by hosting customers data and applications in the data center ensuring sensitive information remains secure when accessed remotely.
• Support healthcare professionals to access remotely patient records and work in collaboration with researchers to accelerate the development and training of treatments and vaccines.
• Continue with training and development specifically within educational institutions by delivering remote learning.

By offering VDI as a solution to our existing and potential customers, IGC can allow businesses to have the ability to continue to operate through periods of economic uncertainty caused by a pandemic.

Pricing

Price
£3,072 an instance
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sharon.walker@igcts.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.