Hybrid Cloud Connect (NaaS)
Multi-cloud breakout / handoff locations. Combining internet connectivity for Cloud hosting services, firewalling, DDoS protection, data storage, backup and archiving in a single managed solution.
Features
- DDoS Protection
- Multi-Cloud Connectivity
- Data Storage
- Data Warehousing
- Physical breakout and handoff to carriers
- IXP Access
- Multisite load-balancing
Benefits
- Multihomed BGP
- Over 5 Tbps DDoS Capacity
- Security
- Protected 2N infrastructure
Pricing
£1 to £10 a unit a month
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 1 8 7 4 5 2 6 3 9 4 1 1 6 1
Contact
CUSTODIANDC LIMITED
Custodian Sales
Telephone: 01622 230382
Email: sales@custodiandc.com
Service scope
- Service constraints
- Optimised for endpoints within the UK only.
- System requirements
- Licensing to be provided by client
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 1hr
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- No
- Support levels
- 24/7/365 Free Support for all connectivity services
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Welcome email with technical handover documentation for service connection.
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- N/A - service is internet connectivity, no user data to extract at contract termination.
- End-of-contract process
- Service is either terminated or renewed.
Using the service
- Web browser interface
- No
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- Constant service monitoring and dynamic load balancing.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
- Network
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
- Hardware containing data is completely destroyed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- No
Data-in-transit protection
- Data protection between buyer and supplier networks
- Other
- Other protection between networks
- All connections are direct to internet. No segregation applies. Customer to use appropriate encryption on public data transfers.
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- 99.999% uptime on all connectivity services
- Approach to resilience
- All services are at N+1 minimum. All connectivity services are fully 2N.
- Outage reporting
- Yes, via dashboard, service status page and monitoring metrics.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Other
- Other user authentication
- Internet connectivity services are provided as IP/BGP connections and therefore do not involve authentication. Access to the customer service portal enforces 2FA.
- Access restrictions in management interfaces and support channels
- 2FA is required for access to all support channels. Staff must be authenticated via the internal network, and customers must be using SSL via our portal with 2FA to reach engineering support.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
- Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 01/07/2013
- What the ISO/IEC 27001 doesn’t cover
- N/A.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- We are fully BSI / ISO 27001:2013 certified. We are migrating to ISO 27001:2022 currently.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- We follow a full change management process, from configuration prep to cross-checking changes before and after they are applied. All to our ISO 27001 workflow processes.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We use several 3rd party patch testing and deployment/monitoring services for all internal and public facing infrastructure. As well as intrusion detection/mitigation technologies.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Our operations centre is staffed 24/7 by experienced engineers. We have a number of custom in-house and 3rd party monitoring systems which alert engineers to faults or (attempted) breaches. All control-plane access is restricted from off-net, and all internal access to management interfaces is restricted at multiple layers.
- Incident management type
- Supplier-defined controls
- Incident management approach
- We follow our standard Incident management and analysis process from our ISO 27001 policies.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
All of CustodianDC's services are designed and managed with the view of keeping energy efficiency at their core.
Pricing
- Price
- £1 to £10 a unit a month
- Discount for educational organisations
- No
- Free trial available
- No