Skip to main content

Help us improve the Digital Marketplace - send your feedback

CUSTODIANDC LIMITED

Hybrid Cloud Connect (NaaS)

Multi-cloud breakout / handoff locations. Combining internet connectivity for Cloud hosting services, firewalling, DDoS protection, data storage, backup and archiving in a single managed solution.

Features

  • DDoS Protection
  • Multi-Cloud Connectivity
  • Data Storage
  • Data Warehousing
  • Physical breakout and handoff to carriers
  • IXP Access
  • Multisite load-balancing

Benefits

  • Multihomed BGP
  • Over 5 Tbps DDoS Capacity
  • Security
  • Protected 2N infrastructure

Pricing

£1 to £10 a unit a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sales@custodiandc.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

6 1 8 7 4 5 2 6 3 9 4 1 1 6 1

Contact

CUSTODIANDC LIMITED Custodian Sales
Telephone: 01622 230382
Email: sales@custodiandc.com

Service scope

Service constraints
Optimised for endpoints within the UK only.
System requirements
Licensing to be provided by client

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 1hr
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
No
Support levels
24/7/365 Free Support for all connectivity services
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Welcome email with technical handover documentation for service connection.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
N/A - service is internet connectivity, no user data to extract at contract termination.
End-of-contract process
Service is either terminated or renewed.

Using the service

Web browser interface
No
API
No
Command line interface
No

Scaling

Scaling available
Yes
Scaling type
Automatic
Independence of resources
Constant service monitoring and dynamic load balancing.
Usage notifications
Yes
Usage reporting
Email

Analytics

Infrastructure or application metrics
Yes
Metrics types
Network
Reporting types
Real-time dashboards

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Yes
Data sanitisation type
Hardware containing data is completely destroyed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
No

Data-in-transit protection

Data protection between buyer and supplier networks
Other
Other protection between networks
All connections are direct to internet. No segregation applies. Customer to use appropriate encryption on public data transfers.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
99.999% uptime on all connectivity services
Approach to resilience
All services are at N+1 minimum. All connectivity services are fully 2N.
Outage reporting
Yes, via dashboard, service status page and monitoring metrics.

Identity and authentication

User authentication
  • 2-factor authentication
  • Other
Other user authentication
Internet connectivity services are provided as IP/BGP connections and therefore do not involve authentication. Access to the customer service portal enforces 2FA.
Access restrictions in management interfaces and support channels
2FA is required for access to all support channels. Staff must be authenticated via the internal network, and customers must be using SSL via our portal with 2FA to reach engineering support.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password
Devices users manage the service through
Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
01/07/2013
What the ISO/IEC 27001 doesn’t cover
N/A.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
We are fully BSI / ISO 27001:2013 certified. We are migrating to ISO 27001:2022 currently.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We follow a full change management process, from configuration prep to cross-checking changes before and after they are applied. All to our ISO 27001 workflow processes.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We use several 3rd party patch testing and deployment/monitoring services for all internal and public facing infrastructure. As well as intrusion detection/mitigation technologies.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Our operations centre is staffed 24/7 by experienced engineers. We have a number of custom in-house and 3rd party monitoring systems which alert engineers to faults or (attempted) breaches. All control-plane access is restricted from off-net, and all internal access to management interfaces is restricted at multiple layers.
Incident management type
Supplier-defined controls
Incident management approach
We follow our standard Incident management and analysis process from our ISO 27001 policies.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
No

Energy efficiency

Energy-efficient datacentres
No

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

All of CustodianDC's services are designed and managed with the view of keeping energy efficiency at their core.

Pricing

Price
£1 to £10 a unit a month
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sales@custodiandc.com. Tell them what format you need. It will help if you say what assistive technology you use.