1Cloud Infrastructure as a Service Platform
1Cloud is a flexible, scalable Infrastructure as a Service (IaaS) platform, built into the core of our network across geographically diverse Tier 3 UK data centres.
Features
- No additional data ingress and egress charges
- Builtin resilience and contingency from Tier 3 data centre
- Pay-as-you-go or fixed resource pricing
- Platform resides within the core of our network
Benefits
- Connect privately and securely for free when using our connectivity
- Vmware hypervisor
Pricing
£0.10 a virtual machine an hour
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 6 8 5 2 5 2 0 6 4 8 5 1 9 7
Contact
Communication-STEM Ltd
Andrea le Velle
Telephone: 0345 241 0000
Email: andrea.le.velle@c-stem.co.uk
Service scope
- Service constraints
- No
- System requirements
- Supported web browser for management console
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Standard support response time in one hour Monday to Friday 09:00 to 17:00 excluding English and Welsh bank holidays. Support can be extended to 24x7 if required.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- C-STEM provide standard UK working hours support but for an additional cost, this can be extended to 24x7 support. A TAM can be allocated at an additional cost.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- C-STEM will create a project team who will walk new customers through the on boarding process including discovery of current systems and the creation of a migration plan. As part of this, on-site or remote training will be provided to the users of the service to help them take over the day to day operations of the platform. C-STEM is also able to continue post-project to support the on-going operations. Generic documentation is also available along with bespoke documentation if required.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Virtual machines can be backed up and migrated to other platforms before the end of the contract. Once the contract is finished, if the virtual machines are not paid for they will be shut down and removed.
- End-of-contract process
- If the contract is not renewed, the virtual machines will be shut down at the end of the contract and the customer's data securely deleted.
Using the service
- Web browser interface
- Yes
- Using the web interface
- The web interface provides day to day control over the platform with access to the most popular features. In exceptional circumstances, if required by the customer the service can also be customised beyond what is available in the web interface to meet customer demands. Most customers find that the web interface provides them with everything they need.
- Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- The web interface uses standard HTML however it has not been tested with users of assistive technology. Accessing virtual machine consoles is likely to be difficult for users of assistive technology.
- Web interface accessibility testing
- No testing has been performed.
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- No
- Independence of resources
- We follow VMWare's maximum contention ratios for resources. These are 4:1 for CPUs and 1:1.2 for memory and 1:1.5 for HDD storage.
- Usage notifications
- No
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- Memory
- Number of active instances
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- PCX
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Backup to the cloud or on-site
- Backup all machines, included hosted and on site
- Backs up Windows, Linux, MacOS, vSphere, Hyper-V and Virtuozzo
- Backs up Android, iOS, Office 365, G Suite and Exchange
- Backs up MSSQL, Oracle, Sharepoint, AD and SAP
- Backup controls
- Web interface allows for full control of the product.
- Datacentre setup
- Multiple datacentres
- Scheduling backups
- Users schedule backups through a web interface
- Backup recovery
- Users can recover backups themselves, for example through a web interface
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Bonded fibre optic connections
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- The service has a standard availability of 99.95%. The management console has an availability of 99.9%. Service credits can be claimed as discounts on the monthly charge. Note that for calculation purposes, a month is 43800 minutes long.
- Approach to resilience
- We use enterprise grade hardware located in ISO27001 accredited datacentres connected into the core of PCX's UK carrier network. More detailed information is available on request.
- Outage reporting
- Service outages can be reported by email if required by the customer.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- There is a data hierarchy for the management of the orchestration and an additional tier for vCentre management. PlatformX retains direct management of vCentre although all virtual machines are identified by only machine-readable names and only modifiable via the orchestration layer. vCentre access is limited to senior Cloud Architects and the overall Head of Architecture.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- URS
- ISO/IEC 27001 accreditation date
- 28/04/2022
- What the ISO/IEC 27001 doesn’t cover
- All business activities are covered.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- BS7799
- ISO 22301:2019
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
There is a Master Security Policy (MSP) which the whole organisation must adhere to, this contains information relating to physical, people, organisational and technological security. This is reviewed annually and approved by our Security Committee and Security Leadership team.
Under this MSP are a number of Security Standards and Frameworks which provide further detail and guidance on how to comply with the measures in the MSP.
Our MSP and security standards are available to all employees for reference via our Security intranet page. The MSP is also referenced in annual security training for employees as well as regular awareness communications.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Our approach for general review of point releases in any system and customer solution is to take our current version of the vendors software and look ahead, stepping through the subsequent releases and check the release notes for fixes, features and existing issues and decide on the next
increment to move to. In some cases, we will opt to wait, in others we identify a candidate and test it against our use cases.
In addition to this, where appropriate, we conduct half-yearly reviews to look at the latest release and assess a suitable candidate. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Any suspected or actual vulnerabilities should be reported to C-STEM's service desk who will add the details into our Security Incident Register or escalate to PCX as a appropriate. PCX will also subscribe to vendor notifications and perform internal testing to ensure that any vulnerabilities are discovered as soon as possible. Critical vulnerabilities are reviewed daily and patched within 7 days. Important updates are reviewed weekly and applied in 14 days. Moderate updates are reviewed weekly and applied within 21 days but only if relevant. Low updates are reviewed monthly and only applied if they resolve an issue.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- Potential compromises can be reported by customers, partners, staff or any other individual or organisation that becomes aware of a compromise. The response time varies depending on the severity and potential impact of the compromise but is within the legal limits set by UK legislation. The DPO, Ofcom or any other interested party that is legally required to be informed by UK law will be informed.
- Incident management type
- Undisclosed
- Incident management approach
- Users report incidents to C-STEM's service desk. They have pre-defined plans that they will follow to resolve the incident with the assistance of our partners. Incident reports are available post incident on request.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Third-party
- Third-party virtualisation provider
- PCX
- How shared infrastructure is kept separate
- The solution consists of an Orchestration layer sitting on top of VMWare vCentre. The Orchestration layer is there to simplify the operation of the vCentre services and to capture data to allow for things like billing and reporting. It also leads towards consideration of the underlying vCentre security as the main method for data partitioning.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- Our datacentre has a Power Usage Effectiveness (PUE) of less than 1.2, making it some of the most efficient data centres in UK. We also hold ISO 50001:2011 (Energy Management) certification and ISO 14001:2004 (Environmental Management) to demonstrate our commitment to the environment and energy usage reduction.
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
Our employees are our most valuable resource and are a key factor in the delivery of services to our clients. We recognise that it is the calibre of the people that make up our teams that differentiates us from our competitors. As such, we work hard to recruit, develop and retain the best talent in the industry. As part of their personal development, each of our employees is given a clear route for progression, including technical and professional training. Further to this, it is crucial that all employees maintain a high level of safety and technical expertise, therefore regular training and advice is made available. We provide our employees with training to ensure they are aware of the company's legal obligations, policies and internal procedures relating to the provision of Equality and Diversity. This understanding of their obligations allows them to interact with their colleagues fairly and equally in all areas of their employment. Annual appraisals are conducted with all employees, allowing quality one-to-one time with their manager to discuss their performance, establish new objectives and determine the employee's individual training and development needs that are required to assist in achieving their goals.
Pricing
- Price
- £0.10 a virtual machine an hour
- Discount for educational organisations
- No
- Free trial available
- No