Cloud Hosting
Delivers robust and reliable solutions tailored to modern organizations. With cutting-edge infrastructure, we offer scalability, reliability, security, high performance, and cost efficiency. Service options include Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Managed Services. Benefit from our expertise, customization, and dedicated support for your cloud needs.
Features
- Archiving, backup and disaster recovery: Data protection and recovery solutions.
- Compute and application hosting: Hosts applications and computational tasks.
- Container service: Efficient application deployment and management.
- NoSQL database: Flexible, scalable, non-relational database.
- Relational database: Structured, scalable, relational data management.
- Infrastructure and platform security: Robust security for infrastructure/platform
- Load balancing: Distributes traffic for optimal performance.
- Logging and analysis: Tracks and analyzes system activities.
- Message queuing and processing: Efficient communication and task handling.
- Platform as a service (PaaS): Cloud-based application development platform.
Benefits
- Archiving, backup and disaster recovery: Safeguards data, ensures business continuity.
- Compute and application hosting: Scalable, efficient application deployment.
- Container service: Streamlined deployment and management.
- NoSQL database: Flexible data modeling, scalability.
- Relational database: Structured data management, ACID compliance.
- Infrastructure and platform security: Protects against cyber threats, compliance.
- Load balancing: Improved performance, fault tolerance.
- Logging and analysis: Enhanced visibility, troubleshooting capabilities
- Message queuing and processing: Efficient communication, workload management.
- Platform as a service (PaaS): Simplified development, reduced infrastructure management.
Pricing
£216 to £1,300 a unit a day
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 6 8 2 8 0 8 0 2 4 8 7 5 6 1
Contact
DATAMATICS INFOTECH LIMITED
Yamini Arun
Telephone: 7045152713
Email: yamini.arun@datamatics.com
Service scope
- Service constraints
- We are partnered with Azure, AWS & Google cloud services.Each cloud service has its constraints like for Azure: Azure services offer robust features, but there are constraints. For instance, in Archiving, Backup, and Disaster Recovery, Azure Backup may have limitations on supported workloads. Compute and Application Hosting on Azure may face constraints based on VM sizes or region availability. Azure Container Instances might have limitations on orchestration capabilities. Azure's NoSQL and Relational databases have constraints on data storage limits and performance tiers. However, Azure's continuous updates often address these constraints, and alternative Azure services or configurations can mitigate them
- System requirements
-
- Archiving, Backup, and Disaster Recovery: Adequate storage and network bandwidth
- Compute and Application Hosting: Compatible OS and application versions
- Container Service: Containerization support in underlying OS
- NoSQL Database: Compatible with NoSQL database engines.
- Relational Database: Compatible with SQL database engines.
- Advanced antivirus protection tailored for virtual environments
- Load Balancing: Compatible with load balancing solutions
- Logging and Analysis: Support for logging protocols
- Message Queuing and Processing: Support for message queuing protocols
- Platform as a Service (PaaS): Compatible development frameworks and tools
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Datamatics has an operational 24/7 support model that provides application and infrastructure support for its global customers. As a part of our engagements, we provide L1 and L2 support for our customers to monitor, resolve, and perform preventative maintenance on application and infrastructure components. Given below is a high level overview of the services that will be provided under the application and infrastructure tracks of work.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Users can connect with us using the Microsoft Teams group chat dedicatedly created during the onboarding.
- Web chat accessibility testing
- Yes , there are option available in Microsoft Teams chat like- Call, Text
- Onsite support
- Yes, at extra cost
- Support levels
-
We provide comprehensive support levels, including L1 and L2 support, to monitor, resolve, and perform preventative maintenance on application and infrastructure components.
Application Support Services:
L1, L2 Application Monitoring support
Application Uptime Management and Support
Application Capacity Management Support
Periodic Security Assessment and remediation
Runbook Automation - Automating and Semi-Automating maintenance of applications
24/7 Monitoring of QoS, performance, and Security of the applications
Periodic Backup of Application data/Databases etc
Disaster Recovery and BCP in case of Application Failures
24*7 Infrastructure Support Services:
L1, L2 Cloud Infrastructure Support
Monitoring & Review of Infrastructure Dashboard(s) and Troubleshooting
Setup of alerting mechanism for P1, P2 issues
Monitoring of Cloud Infrastructure for performance, security, and vulnerability incidents
Periodic security and vulnerability assessment at infrastructure level
Review and resolution of performance, security, and vulnerability incidents
Proactive and periodic maintenance and right-sizing of Cloud Infrastructure - Backup and Restore, Upgrades, etc.
Infrastructure Optimization and Cost Optimization (L2)
Monthly Reporting on tickets resolved and SLA status
Costs and Additional Information:
Pricing for different support levels is available upon request and can vary based on the scope and scale of services.
We provide dedicated technical account managers as part of our support offerings, ensuring personalized assistance. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We offer cloud services from our partners Azure, AWS, and Google, granting users full access to their respective APIs.
We assist users in getting started with Azure, AWS, and Google service through a variety of resources tailored to their preferences and needs. Our support includes comprehensive user documentation, accessible online through our website or platform. This documentation offers step-by-step guides, tutorials, and FAQs to help users navigate our service effectively.
In addition to documentation, we provide online training sessions conducted by our experienced team members. These sessions cover various aspects of our service, from basic functionalities to advanced features, allowing users to interact with instructors and ask questions in real-time.
Additionally, we provide supplementary assistance to empower users in independently managing their tasks. - Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
-
Users can extract their data from Azure, AWS, and Google Cloud through various methods provided by each platform.
In Azure, users can utilize services like Azure Storage, Azure SQL Database, or Azure Backup to export their data. Azure Storage allows users to download their files directly through the Azure portal or programmatically through APIs. Azure SQL Database offers tools for exporting databases to various formats such as BACPAC or CSV. Azure Backup provides options for exporting backup data to storage accounts or local disks.
In AWS, users can use services like Amazon S3, Amazon RDS, or AWS Data Pipeline for data extraction. Amazon S3 enables users to download objects directly or use tools like AWS CLI or SDKs for programmatic access. Amazon RDS allows users to export databases to formats like SQL files or CSV. AWS Data Pipeline facilitates data transfer and transformation tasks, including exporting data from various AWS services to destinations like S3 or Redshift.
Overall, each cloud platform offers multiple tools and methods for users to extract their data efficiently, allowing them to choose the most suitable approach based on their requirements and preferences.
Additionally, we provide supplementary assistance to empower users in independently managing their tasks. - End-of-contract process
-
Once all the data has been extracted the cloud account has been deleted. Bill generated by the cloud partners like- AWS, Azure, Google will be the additional cost.
Contract cost includes supplementary assistance to empower users in independently managing their tasks.
Using the service
- Web browser interface
- Yes
- Using the web interface
- We offer cloud services from our partners Azure, AWS, and Google, granting users full access to their respective APIs/Web interface. Users can have full access to their account in the services provided by these cloud partners. Additionally, we provide supplementary assistance to empower users in independently managing their tasks.
- Web interface accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web interface accessibility testing
- We offer cloud services from our partners Azure, AWS, and Google, granting users full access to their respective APIs/ Web interface, They have taken care of this testing . Additionally, we provide supplementary assistance to empower users in independently manage their tasks.
- API
- Yes
- What users can and can't do using the API
- We offer cloud services from our partners Azure, AWS, and Google, granting users full access to their respective APIs. Additionally, we provide supplementary assistance to empower users in independently managing their tasks.
- API automation tools
-
- Ansible
- Chef
- OpenStack
- SaltStack
- Terraform
- Puppet
- API documentation
- Yes
- API documentation formats
- HTML
- Command line interface
- Yes
- Command line interface compatibility
- Linux or Unix
- Using the command line interface
-
Users can leverage the command line interface (CLI) to set up and manage cloud services provided by Azure, AWS, and Google. Through the CLI, users can initiate service setup by running commands to create resources, configure settings, and deploy applications. They can also make changes to existing resources, such as scaling instances, updating configurations, or deleting resources, by executing corresponding CLI commands.
However, there may be limitations to the extent of setup and changes achievable through the CLI. While users have full access to the APIs of these cloud platforms, certain complex configurations or tasks might be more efficiently performed using graphical user interfaces (GUIs) or other management tools. Additionally, intricate network setups or advanced security configurations may require manual intervention or supplementary assistance beyond what the CLI can offer.
Nevertheless, with our support, users can navigate these limitations effectively, ensuring they can independently manage their tasks while leveraging the flexibility and control provided by the command line interface.
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- Concerning scaling- we ensure users are unaffected by demand fluctuations through scalable infrastructure. Our service dynamically allocates resources to meet demand spikes, maintaining consistent performance levels for all users. Additionally, load-balancing techniques distribute incoming traffic evenly across servers, preventing congestion and bottlenecks. Automated monitoring and scaling mechanisms continuously adjust resource allocation based on usage patterns, ensuring optimal performance and reliability regardless of fluctuations in demand from other users.
- Usage notifications
- Yes
- Usage reporting
-
- API
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Amazon Web Services (AWS),Microsoft Azure,Google Cloud
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- Backup controls
-
We offer cloud services from our partners Azure, AWS, and Google, granting users full access to their respective APIs/ Web interface.
Users control backups by configuring backup policies or schedules within the cloud service provider's platform, such as Azure, AWS, Google. They can specify which resources or data to back up and define the frequency and timing of backups based on their needs. This flexibility allows users to back up different types of data, applications, or resources on different schedules, ensuring optimal protection and efficient resource utilization
Additionally, we provide supplementary assistance to empower users in independently manage their tasks. - Datacentre setup
-
- Multiple datacentres with disaster recovery
- Multiple datacentres
- Single datacentre with multiple copies
- Single datacentre
- Scheduling backups
- Users contact the support team to schedule backups
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Prompt Support: We prioritize prompt and effective support through channels like email or a ticketing system.
Tailored SLAs: Our Service Level Agreements (SLAs) are customized to meet each client's unique needs issue.
Structured SLAs: SLAs are categorized into four severity levels: Critical (S1), Major (S2), Minor (S3), and Service Requests (S4).
Response Time: Guaranteed timely responses
Regular Updates: Clients receive regular updates at specified intervals to ensure transparency
Resolution Time: Ranging from 0-2 hours for critical issues to 0-8 hours for service requests.
Uptime Commitment: High uptime level with a minimum SLA of 99.95% across all severity levels - Approach to resilience
- It’s available on request
- Outage reporting
-
Public Dashboard: Both AWS and Azure offer public dashboards that display the current status of their services. These dashboards provide real-time updates on service availability, performance, and any ongoing incidents or outages.
API: Both AWS and Azure offer APIs that allow users to programmatically retrieve information about service status and incidents. Users can integrate these APIs into their monitoring systems to receive automated updates and alerts about outages.
Email Alerts: Both AWS and Azure offer email alerts to notify users about service outages or incidents. Users can subscribe to email notifications for specific services or regions to receive timely updates about any disruptions affecting their operations.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Access restrictions in management interfaces and support channels are implemented through robust security measures. Multi-factor authentication (MFA) is enforced to verify user identities and prevent unauthorized access. Role-based access control (RBAC) limits permissions based on user roles, ensuring only authorized personnel can perform specific actions. Additionally, access policies define who can access which resources and under what conditions, minimizing the risk of unauthorized access. Regular audits and reviews of access controls help maintain security posture, while encryption protocols safeguard sensitive data during transmission and storage. Continuous monitoring and logging of access activities enable rapid detection.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Dedicated device on a government network (for example PSN)
- Dedicated device over multiple services or networks
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- STQC-Standardization Testing and Quality Certification
- ISO/IEC 27001 accreditation date
- Recently audit for ISO27001:2013 was conducted in Nov2022. Certification valid till May2025
- What the ISO/IEC 27001 doesn’t cover
- None
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- No
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
We offer cloud services from our partners Azure, AWS, and Google, granting users full access to their respective APIs/ web interfaces.
In AWS, Azure, and Google Cloud, stringent information security policies and processes are adhered to. These include comprehensive frameworks such as AWS Well-Architected Framework, Azure Security Center, and Google Cloud Security Command Center. Each platform implements a multi-layered approach to security, encompassing network security, data encryption, access controls, and threat detection.
Reporting structures typically involve designated security teams responsible for monitoring, incident response, and compliance. Regular audits and assessments ensure adherence to security policies and industry standards like ISO 27001 and SOC 2. Additionally, automated tools and alerts are utilized for continuous monitoring and real-time threat detection.
To ensure policies are followed, access controls, identity management, and role-based permissions are enforced rigorously. Training programs educate users on security best practices, while regular reviews and assessments verify compliance. Furthermore, each cloud provider offers compliance certifications and documentation to demonstrate adherence to security standards, providing transparency and assurance to customers.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
With regards to Change Requests of new functionalities, will initiate Change Management Process.
Activities in the Change Management Process will be as follows:
Changes to be shared by client’s Project Manager to Datamatics Team in a predefined format
Assessing the impact of proposed change will be performed by us
Propose cost & timeline for the changes
Approval of Changes to be given by the client.
After a change is accepted, Datamatics would:
Publish the schedule for implementation
Incorporate the change and get it tested and accepted
Maintain records of all changes to base lined items. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- AWS and Azure employ robust vulnerability management processes. They assess threats through continuous monitoring, penetration testing, and threat intelligence analysis. Rapid patch deployment is facilitated through automated systems and prioritized based on severity. Both platforms gather threat information from multiple sources, including security advisories, industry reports, and community forums, ensuring comprehensive coverage. This proactive approach to vulnerability management helps mitigate risks and safeguard the security and integrity of their services
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Cloud services employ advanced protective monitoring processes. They continuously monitor network traffic, system logs, and user activities to detect potential compromises. When a compromise is identified, they promptly initiate incident response procedures, isolating affected systems and containing the threat. Response times are swift, with automated alerts triggering immediate actions and human intervention as necessary. Both platforms prioritize rapid incident resolution to minimize impact and ensure the security and integrity of their services and users' data.
- Incident management type
- Supplier-defined controls
- Incident management approach
- We have a predefined process in place. However, the process may vary as per the requirement and it would be mutually agreed with the client and our team.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Third-party
- Third-party virtualisation provider
- AWS, Azure, Google
- How shared infrastructure is kept separate
- Cloud services providers implement strict isolation measures using virtualization and network segmentation to keep organizations sharing the same infrastructure apart. Through techniques like virtual private clouds (VPCs) in AWS and virtual networks in Azure, each organization operates within its designated network space, with separate security groups, access controls, and resource pools. Additionally, both platforms offer encryption and authentication mechanisms to safeguard data and ensure privacy and confidentiality between organizations using their shared infrastructure.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- We offer cloud services from our partners Azure, AWS, and Google, granting users full access to their respective APIs/ Web portal.Azure, AWS, and Google data centers adhere to the EU Code of Conduct for Energy Efficient Data Centers through various strategies and practices. These include optimizing cooling systems and airflow management to reduce energy consumption, using energy-efficient hardware and equipment, and implementing advanced power distribution and monitoring technologies. Additionally, they employ renewable energy sources, such as solar and wind power, to minimize environmental impact. Continuous monitoring and data analysis help identify areas for improvement and ensure compliance with energy efficiency standards. Regular audits and reporting provide transparency and accountability regarding energy usage and efficiency measures. By prioritizing sustainability and energy efficiency, Azure, AWS, and Google contribute to the EU's goals of reducing carbon emissions and promoting environmentally responsible practices in data center operations.
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Equal opportunity
- Wellbeing
Fighting climate change
We have a Corporate Environment Policy in place. It cover the following: Management of the organization recognizes people as the most important assets and commits to provide a safe, healthy, and pollution free environment including climate change mitigation and adoption, sustainable resource use and protection of biodiversity and related ecosystems for those who are working in the premises precincts, for those who are visiting our operations/premises as business associates for business purposes and common visitors as well. Positive challenge will be demonstrated by overall leadership and commitment by the management towards this end. At the same time it is the duty of every employee to work in a safe manner so as not to endanger himself and his colleagues at the work place. The objective of this policy is to sustain zero incidents, zero occupational health hazard and pollution-free working environmental organization.Equal opportunity
As a global player, we take immense pride in the rich diversity of knowledge, skills, abilities, and uniqueness of our people. With one of the best gender diversity ratio of 39%, we believe in providing equal opportunities to our people. Datamatics was recognised for being among the Top Companies in the Private sector at the United Nations Global Compact Network India (UN GCNI) Innovative Practices Award “Women at Work” – 2020. Acknowledged to be amongst the top 10 companies in the private sector, by United Nations Global Compact Network India (UN GCNI), for its innovative practices of “Women at Work”. The Company is dedicated to creating a working environment with the highest degree of ethical and virtuous work practices by ensuring fairness at every step of the employee life-cycle; to build a progressive and diverse workforce. The Company holds in high regard the guidelines laid down under the international conventions and laws relating to slavery. It aims to maintain a safe and harmonious working environment for each individual, irrespective of work, designation, ethnicity, race, caste, nationality, gender, religion, and other parameters. The Company aims to provide its employees with an environment of equality and respect for all employees and contractors and not discriminating against any individuals on the basis of their gender, age, disability, ethnicity, sexual orientation, family status, religious beliefs and abilities. The Company ensures that its Personnel or potential hires are not unlawfully discriminated against, directly or indirectly, as a result of their colour, creed, race, nationality, ethnic or national origin, connections with a national minority, marital or civil partnership status, pregnancy, age, disability, religion, or similar philosophical belief, sexual orientation, gender or gender reassignment or trade union membership etc. and never tolerate harassment in any form. https://www.datamatics.com/human-resources/diversity-charterWellbeing
We have well defined six dimension Employee Wellness plan for the following areas: Social, Professional, Emotional, Physical, Financial, Environmental. Datamatics believes that people are the most important assets of any organization, and are instrumental in the growth of the Company. Datamatics considers its employees a pivotal part of the Company and is committed to treating all associates with dignity and respect. In principle and practice, Datamatics is driven by its people, we truly believe in the mantra of ‘In your success, lies our success Celebrating our people and every milestone they achieve professionally as well as personally! Our people are conferred through various reward and recognition programs which includes our Annual Achievers Awards, SPOT Awards, Employee of the Month Awards, Long Service Awards, Badges and more. We nurture our peoples’ strength, potential, and ambition. Continuous learning is integral to the success of every Datamatician. We co-create a culture of learning and continuous improvement with our people. Celebrating our people and every milestone they achieve professionally as well as personally! Our people are conferred through various reward and recognition programs which includes our Annual Achievers Awards, SPOT Awards, Employee of the Month Awards, Long Service Awards, Badges and more.
Pricing
- Price
- £216 to £1,300 a unit a day
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Indeed, Azure, AWS, and Google Cloud provide free trial options, enabling users to test their platforms before subscribing. Datamatics acknowledges the significance of firsthand experience, hence offers a free trial for our cloud hosting services. This allows organizations to evaluate our solutions' performance and suitability without financial obligation.