IOCO SOLUTIONS LIMITED
Cloudbolt
CloudBolt gives enterprises the power to innovate on their terms with intelligent, governed, automated orchestration of hybrid IT environments.
Features
- Modern cloud experience
- Centralised cloud management
- Self service automation
- Automation & Orchestration
- Technology Integration
- Compliance & Governance
Benefits
- A common experience for every cloud environment
- A marketplace for your users to consume your cloud
- Cost Optimisation
- Accelerate innovation and reduce risk
- Secure, Compliant, and Financially-Aware Cloud Management
Pricing
£6 a unit
- Education pricing available
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at michael.morey@ioco.tech.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
6 2 0 1 6 9 1 2 3 0 2 4 0 0 3
Contact
IOCO SOLUTIONS LIMITED
Mick Morey
Telephone: 0118 206 2938
Email: michael.morey@ioco.tech
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Public Cloud Providers, Private Cloud Platforms, Configuration Management Tools, IT Service Management (ITSM) Tools, Container Orchestration Platforms, Infrastructure as Code (IaC) Tools and Monitoring and Analytics Platforms.
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- N/A
- System requirements
-
- RedHat Enterprise Linux system
- Enterprise Linux 8
- AWS Machine Image
- Azure Virtual Machine
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Support response times Severity 1 - 1 Hour,
Severity 2 - 4 hours,
Severity 3 - 8 hours,
Severity 4 - 1 Business Day or as per service catalog - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- IOCO's24/7 Service Desk providing a single point of access for all incidents and requests. The service is available via telephone, email or iOCO Support portal. Responses are prioritised and addressed in line with the service levels detailed in the Service Level Agreement document. All engagements have a named Service Manager for engagement and escalations with a Technical Service Manager who attend service review meetings.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Onsite or online training is available for the solution and a Getting started full set of documentation is provided with an online Help Center.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- CloudBolt shall promptly upon the termination date of any Services involving the Processing of Customer Personal Data (the “ Termination Date”) return or delete, at the choice of the Customer, all copies of Customer Personal Data.
- End-of-contract process
- N/A
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
- Linux or Unix
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- The CloudBolt service interface provides users with a centralized platform for managing and orchestrating their IT resources across hybrid cloud environments via a modern web browser.
- Accessibility standards
- None or don’t know
- Description of accessibility
- CloudBolt offers a self-service portal that enables users to request and manage resources independently without manual intervention from IT administrators. Users can submit requests, track their progress, and perform actions such as starting, stopping, or resizing resources.
- Accessibility testing
- N/A
- API
- Yes
- What users can and can't do using the API
-
CloudBolt's API is one way to get information into and out of the CloudBolt Platform. Use the CloudBolt API to automate your processes and increase efficiency when accessing information in CloudBolt from your third party application.
Perform a wide variety of tasks using API v3, such as creating Environments, Groups, and Resource Handlers, creating, deleting, and managing Servers, updating Roles, and more.
API v3 follows the RESTful methodology.
Our API:
Has predictable resource-oriented URLs.
Accepts JSON request bodies. Some endpoints also accept form-encoded request bodies and multipart form-data for file uploads (importing Blueprints, for example).
Returns HAL JSON-encoded responses.
Uses standard HTTP response codes, authentication, and verbs. - API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
-
Yes, users can customize CloudBolt to meet their specific requirements and preferences. Some items include:
1. User Interface Customisation.
2. Resource Catalog Customisation.
3. Automation Workflow Customisation.
4. Policy and Governance Customisation.
5. Integration Customisation.
6. Reporting and Analytics Customisation.
7. User Role and Permission Customization.
Users with administrative privileges can customize user roles and permissions in CloudBolt to control access and privileges based on organizational requirements. They can define custom role-based access control (RBAC) policies to restrict or grant permissions for specific actions, features, or resources within the platform.
Scaling
- Independence of resources
- Cloudbolt is deployed by the customer in their own environments.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- CloudBolt
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Scale, obfuscating techniques, or data storage sharding
- Other
- Other data at rest protection approach
- The customer is responsible for the protection of data at rest as the solution is deployed in their own environments.
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Data can be exported from the solution in a number of ways: GUI, .csv or .xls formats, via REST API, via a Business Intelligence (BI) integration module
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- XLS
- CSV
- Database Export / backup
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- As CloudBolt is deployed within the customer's environment, the responsibility for meeting availability Service Level Agreements (SLAs) falls on the customer. Since CloudBolt operates within the customer's infrastructure, the customer is accountable for ensuring that the necessary resources and configurations are in place to meet agreed-upon availability targets. This includes maintaining the underlying infrastructure, such as servers, networks, and databases, as well as implementing redundancy, failover mechanisms, and disaster recovery plans to minimize downtime and ensure high availability of the CloudBolt platform.
- Approach to resilience
- While CloudBolt offers architecture guidelines to support a resilient deployment of the software, it's ultimately the customer's responsibility to ensure that these procedures are followed. CloudBolt provides recommendations and best practices for architecting a robust infrastructure, but the implementation and adherence to these guidelines lie with the customer. This entails configuring the environment according to the prescribed architecture, maintaining system updates, and monitoring performance to uphold resilience. By proactively adhering to these guidelines, customers can optimize the reliability and stability of their CloudBolt deployment.
- Outage reporting
- CloudBolt employs a combination of real-time alerts, email notifications, integrations with monitoring tools, API access, historical reporting, and self-service capabilities to effectively report service outages and ensure timely resolution, minimizing the impact on users and maintaining high service availability.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Access restrictions in management interfaces and support channels
- There are no access restrictions in management interfaces and support channels, as CloudBolt is deployed in the customer's environment.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- No
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Security is managed at three levels: Infrastructure, Environment, Customer. iOCO Cloud team are wholly responsible for Infrastructure security, governing DC / Hardware, Network and Security devices. iOCO Application Management team is responsible for managing the environment where the application is running - for example building and hardening the application to vendor recommendations. Customer is responsible for in-application security.(e.g. user role access) and the security of on-premise components that maybe required for integration purposes.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- The change management processes follow ISO27001 A.12.1.2 controlled mechanism for making changes to operational environments.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We subscribe to multiple vendor provided vulnerability notification services. All vulnerabilities are reviewed and applicable patches are administered through the change control process . Mitigation measures will always be considered first, with critical patches targeted for resolution within 30 days.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Denial of Service is applied on all Internet links , with Intrusion detection\protection available to customers on request. All security events are logged\notified based on severity. Any attempted platform security compromises are dealt with 24/7 by security engineers. The responsibility remains with the customer to ensure detected intrusions are re-mediated where customershavecontrol,permission,oraccesstomodifytheir service. iOCO recommends that customers follow security best practices including, but not limited to: • Maintaining effective firewall rules • Limiting the communication ports to only the necessary, for conducting business • Locking down access
- Incident management type
- Supplier-defined controls
- Incident management approach
- The incident response process complies with industry standards for legally admissible chain-of-custody and forensic data collection management processes and controls. Response standards, procedures, and methods are implemented based on the severity level of an incident. Incident reports are produced as part of standard post incident process and provided to customers on request.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
CloudBolt plays a role in fighting climate change by enabling organizations to optimize their IT infrastructure and operations, leading to reduced energy consumption, resource efficiency, and sustainability.
Pricing
- Price
- £6 a unit
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Cloudbolt offers a fully functional trial for 30 days with a limited amount of resources.
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at michael.morey@ioco.tech.
Tell them what format you need. It will help if you say what assistive technology you use.