Cantarus
Kalani Cloud Kentico Hosting
Dedicated Kentico hosting focused on providing performance and security for your CMS
Features
- Kentico Experts
- Fully Managed Virtual Machine Hosting
- Private Cloud Environment
- High Availability Configuration Options
- Real Time Server and Application Monitoring
- Managed Backups with off-site options
- Kentico Partner
Benefits
- Fully Managed Service
- Fully Managed Backup
- High Availability
- Secure environment
- Dedicated resources
- No hidden Ingress/Egress Fees
Pricing
£749 an instance a month
- Education pricing available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at enquiries@cantarus.com.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
6 6 1 5 9 1 0 0 9 8 7 5 8 7 8
Contact
Cantarus
Lee Adams
Telephone: 0161 971 3200
Email: enquiries@cantarus.com
Service scope
- Service constraints
- Depending on the solution which is selected there maybe a monthly window of downtime required for installing of OS level patches. This is only required if the selected solution does not have built in redundancy.
- System requirements
-
- Kentico-based Website
- External WAN or VPN Connectivity Availability
- Static IP range maybe required to restrict service access
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Our standard support is provided between the hours of 0900 and 1730 British time, Monday to Friday excluding public holidays.
We also provide dedicated 24/7 Business Critical support depending on the hosting package selected.
Service level targets – specifically the time within which we aim to be actively working on a resolution – for support are as follows (excluding on-site support):
Business Critical Within 1 business hour
High Priority Within 4 business hours
Medium Priority Within 2 business days
Low Priority Within 5 business days - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Our standard support is provided between the hours of 0900 and 1730 British time, Monday to Friday excluding public holidays. 24-Hour Severity 1 support is also available on some hosting packages.
Standard timebank support is purchased on a per man-day basis and can be used across any of the Cantarus service offerings - any purchased time which is unused during the month can be rolled over for up to 3 months.
Standard Timebank is charged at £995/day with a 1 day minimum. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
A member of the Cantarus Infrastructure team will assist the buyer to ensure virtual machines are correctly specified for the application and document this in a schedule of work for build of the environment.
A member our Client Success team will assist where possible to ensure your website is configured in the new environment correctly and complies with best practice.
Once services are migrated and tested a handover to our Client Success team will be provided, during which training on our support ticketing system and timebank reporting will be provided via an online session. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- The exact method will depend on the application and environment which is hosted, but we are able to provide one of the following options - - Full virtual machine backup - Full copy of virtual machine files - Copy of any relevant files - Database Backup These can be provided via raising a ticket with our Client Success team.
- End-of-contract process
- At the end of the contract, all hosted virtual machines or services which are used to host an application included within the contract will be shutdown and become inaccessible. These virtual machines will be left in a shutdown state for 7 days before being removed from the production environment. Backups of the live environment will be retained for the period of the agreed retention period
Using the service
- Web browser interface
- No
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Manual
- Independence of resources
- All client resource groups are allocated a dedicated resource pool and limits within the hosted infrastructure. If a client is using more resource than their allocated pool allows then then in times of high demand their usage will automatically be throttled back to their allocated level.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- Memory
- Network
- Other
- Other metrics
-
- Application Specific Checks
- SSL Expiry
- Application Level Security Issues
- Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Virtual Machines
- Files
- Database (MS SQL)
- Backup controls
- The entire virtual machine is backed up in all instances on a nightly basis. More frequent backups and be requested via raising a request with the Client Success team.
- Datacentre setup
-
- Multiple datacentres with disaster recovery
- Multiple datacentres
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- The Hosted Application shall be available to Visitors pursuant to the Services 99.99% of the time calculated on a monthly basis. Where the Hosted Application is not so available, the Customer will be credited with an amount calculated monthly as an aggregate of all Down Time in accordance with the following table: < 99.90 - 5% <99.00% - 15% <95.00% - 25% <90.00% - 50% <75.00% - 100%
- Approach to resilience
- Full resilience details will depend on the solution designed for the client, however all customers will benefit from the basic levels of resiliency - - Resource Monitoring and automated migration of VMs - Automatic reboot if VM or host is detected to have failed - Underlying Multi-node Cluster design - High Availability network design
- Outage reporting
- In the case of a designated at-risk or maintenance window, all clients will be notified in advance via e-mail. In the case of an unexpected outage or emergency maintenance window then the client will the sent an e-mail notification, and where possible contacted via telephone. A dashboard feature will be added in a future development phase.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Support channels are locked to a limited number of contacts who are allowed to raise requests on their behalf. These contacts are the only people who are allowed to raise tickets either via the web-portal, e-mail, or telephone.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Cyber Essentials Plus
- Information security policies and processes
- All details are available in the Cantarus Information Security Policy which is available on request. If a security issue is identified, then it should immediately be reported to the Cantarus information Security Manager, who will escalate this to the board of directors. Depending on the scope of the issue identified, a small team will be allocated to deal with the issue. The exact makeup of this team will depend on the skills required in order appropriately identify and resolve the issue, however all reports from this team will be returned to the Information Security Manager. Staff are regularly provided with updates on security trends and training on how to deal with them.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All changes should be requested via raising a support ticket with the Customer Success team. The request will then be triaged, and allocated to the relevant internal team. The change will be assessed for any potential security or availability impact, and if appropriate a quote provided to the customer. Once agreement is in place a change request is raised. Where the change is judged to have a possible affect on the security of the site, or requires a change to a global setting to be changed the CR is escalated to a senior manager for review.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Where available we subscribe to security feeds from all our suppliers. When notification of an issue is received, we immediately assess these based on the CVSS score and the use of the feature or application within our environment. Using this data we decide if the patch can be deployed as part of our regular monthly patching schedule, or if we need to directly contact customers in order to arrange an additional at-risk window.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Full monitoring is implemented for the server hardware, virtual machine OS and where available the application itself. This includes monitoring of the server exception logs, so that any spikes in application or OS errors can automatically be flagged. Our gateway firewall hardware also includes IPS systems which scan and log all traffic. IPS signatures are automatically updated to ensure new threats are covered.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Full details of this process are documented in the Cantarus Incident Management Policy. Users who suspect an issue should immediately report this to the Information Security Manager. Depending on the scope of the potential incident, this may then immediately be escalated to the board of directors. Once an event has been verified as a potential issue, this will also be raised with the customer. On completion on the investigation and and remediation activity, the customer will be provided with a full incident report.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- VMware
- How shared infrastructure is kept separate
- All network traffic is separated from other clients via the use of dedicated VLANs. All traffic between VLANs is blocked unless a rule is manually requested and added to override this.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- Cold Aisle Containment, Blanking Plates, Variable speed free air cooling used where possible, Smart energy battery storage system,
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Our credentials as a green data centre are supported by a range of accreditations and demonstrate our ability to deliver a secure and energy efficient environment for our clients’ critical IT infrastructures:
ISO 14001:2015 for Environmental Management
EU Code of Conduct for Data Centres
ISO 50001:2018 accreditation for Energy Management
GRESB rating (Global Real Estate Sustainability Benchmark) – four stars
Pricing
- Price
- £749 an instance a month
- Discount for educational organisations
- Yes
- Free trial available
- No
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at enquiries@cantarus.com.
Tell them what format you need. It will help if you say what assistive technology you use.