Skip to main content

Help us improve the Digital Marketplace - send your feedback

Cantarus

Kalani Cloud Kentico Hosting

Dedicated Kentico hosting focused on providing performance and security for your CMS

Features

  • Kentico Experts
  • Fully Managed Virtual Machine Hosting
  • Private Cloud Environment
  • High Availability Configuration Options
  • Real Time Server and Application Monitoring
  • Managed Backups with off-site options
  • Kentico Partner

Benefits

  • Fully Managed Service
  • Fully Managed Backup
  • High Availability
  • Secure environment
  • Dedicated resources
  • No hidden Ingress/Egress Fees

Pricing

£749 an instance a month

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at enquiries@cantarus.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

6 6 1 5 9 1 0 0 9 8 7 5 8 7 8

Contact

Cantarus Lee Adams
Telephone: 0161 971 3200
Email: enquiries@cantarus.com

Service scope

Service constraints
Depending on the solution which is selected there maybe a monthly window of downtime required for installing of OS level patches. This is only required if the selected solution does not have built in redundancy.
System requirements
  • Kentico-based Website
  • External WAN or VPN Connectivity Availability
  • Static IP range maybe required to restrict service access

User support

Email or online ticketing support
Email or online ticketing
Support response times
Our standard support is provided between the hours of 0900 and 1730 British time, Monday to Friday excluding public holidays.

We also provide dedicated 24/7 Business Critical support depending on the hosting package selected.

Service level targets – specifically the time within which we aim to be actively working on a resolution – for support are as follows (excluding on-site support):

Business Critical Within 1 business hour
High Priority Within 4 business hours
Medium Priority Within 2 business days
Low Priority Within 5 business days
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Our standard support is provided between the hours of 0900 and 1730 British time, Monday to Friday excluding public holidays. 24-Hour Severity 1 support is also available on some hosting packages.

Standard timebank support is purchased on a per man-day basis and can be used across any of the Cantarus service offerings - any purchased time which is unused during the month can be rolled over for up to 3 months.

Standard Timebank is charged at £995/day with a 1 day minimum.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
A member of the Cantarus Infrastructure team will assist the buyer to ensure virtual machines are correctly specified for the application and document this in a schedule of work for build of the environment.

A member our Client Success team will assist where possible to ensure your website is configured in the new environment correctly and complies with best practice.

Once services are migrated and tested a handover to our Client Success team will be provided, during which training on our support ticketing system and timebank reporting will be provided via an online session.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
The exact method will depend on the application and environment which is hosted, but we are able to provide one of the following options - - Full virtual machine backup - Full copy of virtual machine files - Copy of any relevant files - Database Backup These can be provided via raising a ticket with our Client Success team.
End-of-contract process
At the end of the contract, all hosted virtual machines or services which are used to host an application included within the contract will be shutdown and become inaccessible. These virtual machines will be left in a shutdown state for 7 days before being removed from the production environment. Backups of the live environment will be retained for the period of the agreed retention period

Using the service

Web browser interface
No
API
No
Command line interface
No

Scaling

Scaling available
Yes
Scaling type
Manual
Independence of resources
All client resource groups are allocated a dedicated resource pool and limits within the hosted infrastructure. If a client is using more resource than their allocated pool allows then then in times of high demand their usage will automatically be throttled back to their allocated level.
Usage notifications
Yes
Usage reporting
Email

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • Memory
  • Network
  • Other
Other metrics
  • Application Specific Checks
  • SSL Expiry
  • Application Level Security Issues
Reporting types
Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
Less than once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • Virtual Machines
  • Files
  • Database (MS SQL)
Backup controls
The entire virtual machine is backed up in all instances on a nightly basis. More frequent backups and be requested via raising a request with the Client Success team.
Datacentre setup
  • Multiple datacentres with disaster recovery
  • Multiple datacentres
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
The Hosted Application shall be available to Visitors pursuant to the Services 99.99% of the time calculated on a monthly basis. Where the Hosted Application is not so available, the Customer will be credited with an amount calculated monthly as an aggregate of all Down Time in accordance with the following table: < 99.90 - 5% <99.00% - 15% <95.00% - 25% <90.00% - 50% <75.00% - 100%
Approach to resilience
Full resilience details will depend on the solution designed for the client, however all customers will benefit from the basic levels of resiliency - - Resource Monitoring and automated migration of VMs - Automatic reboot if VM or host is detected to have failed - Underlying Multi-node Cluster design - High Availability network design
Outage reporting
In the case of a designated at-risk or maintenance window, all clients will be notified in advance via e-mail. In the case of an unexpected outage or emergency maintenance window then the client will the sent an e-mail notification, and where possible contacted via telephone. A dashboard feature will be added in a future development phase.

Identity and authentication

User authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Support channels are locked to a limited number of contacts who are allowed to raise requests on their behalf. These contacts are the only people who are allowed to raise tickets either via the web-portal, e-mail, or telephone.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
Cyber Essentials Plus
Information security policies and processes
All details are available in the Cantarus Information Security Policy which is available on request. If a security issue is identified, then it should immediately be reported to the Cantarus information Security Manager, who will escalate this to the board of directors. Depending on the scope of the issue identified, a small team will be allocated to deal with the issue. The exact makeup of this team will depend on the skills required in order appropriately identify and resolve the issue, however all reports from this team will be returned to the Information Security Manager. Staff are regularly provided with updates on security trends and training on how to deal with them.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All changes should be requested via raising a support ticket with the Customer Success team. The request will then be triaged, and allocated to the relevant internal team. The change will be assessed for any potential security or availability impact, and if appropriate a quote provided to the customer. Once agreement is in place a change request is raised. Where the change is judged to have a possible affect on the security of the site, or requires a change to a global setting to be changed the CR is escalated to a senior manager for review.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Where available we subscribe to security feeds from all our suppliers. When notification of an issue is received, we immediately assess these based on the CVSS score and the use of the feature or application within our environment. Using this data we decide if the patch can be deployed as part of our regular monthly patching schedule, or if we need to directly contact customers in order to arrange an additional at-risk window.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Full monitoring is implemented for the server hardware, virtual machine OS and where available the application itself. This includes monitoring of the server exception logs, so that any spikes in application or OS errors can automatically be flagged. Our gateway firewall hardware also includes IPS systems which scan and log all traffic. IPS signatures are automatically updated to ensure new threats are covered.
Incident management type
Supplier-defined controls
Incident management approach
Full details of this process are documented in the Cantarus Incident Management Policy. Users who suspect an issue should immediately report this to the Information Security Manager. Depending on the scope of the potential incident, this may then immediately be escalated to the board of directors. Once an event has been verified as a potential issue, this will also be raised with the customer. On completion on the investigation and and remediation activity, the customer will be provided with a full incident report.

Secure development

Approach to secure software development best practice
Supplier-defined process

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Supplier
Virtualisation technologies used
VMware
How shared infrastructure is kept separate
All network traffic is separated from other clients via the use of dedicated VLANs. All traffic between VLANs is blocked unless a rule is manually requested and added to override this.

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
Cold Aisle Containment, Blanking Plates, Variable speed free air cooling used where possible, Smart energy battery storage system,

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

Our credentials as a green data centre are supported by a range of accreditations and demonstrate our ability to deliver a secure and energy efficient environment for our clients’ critical IT infrastructures:

ISO 14001:2015 for Environmental Management
EU Code of Conduct for Data Centres
ISO 50001:2018 accreditation for Energy Management
GRESB rating (Global Real Estate Sustainability Benchmark) – four stars

Pricing

Price
£749 an instance a month
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at enquiries@cantarus.com. Tell them what format you need. It will help if you say what assistive technology you use.