Long Term Backup Cloud Storage
MaseTek offers a secure cloud backup storage solution for offloading full data backups. Store unlimited backups offsite in our highly redundant cloud environment for long-term retention. Automated backups, encryption, and rapid data retrieval ensure business continuity without managing physical tapes.
Features
- Offsite Cloud Storage
- Unlimited Capacity
- Automated Backups
- Data Encryption
- Rapid Retrieval
- Scalable Architecture
- Multi-tenancy Support
- Versioning Support
- Global Availability
Benefits
- Store backups securely in our geographically remote cloud
- Virtually limitless storage capacity for your backup data
- Schedule regular, automated backup processes for consistent protection
- End-to-end encryption for data in transit and rest
- Quick restoration of backed-up data from the cloud
- Seamlessly scale storage capacity as your backup needs grow
- Separate backup environments for different organizational units
- Maintain multiple versions of backups for point-in-time recovery.
- Access your backups from anywhere with internet connectivity
Pricing
£10 to £25 a terabyte a month
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 7 9 7 7 3 1 3 2 5 1 9 7 5 8
Contact
MASE TEK LTD
Michael
Telephone: 07862784752
Email: info@masetek.co.uk
Service scope
- Service constraints
- Internet bandwidth impacts backup/restore speeds. Initial seeding via physical media may be required for very large backups. Software compatibility is essential across the customer's systems. Scheduled maintenance windows can temporarily disrupt operations. Long-term data retention may incur additional fees based on usage. Support covers the cloud service, not on-premises sources. Available storage regions are limited by data residency rules. Protection against ransomware encrypting new backups is limited. Retrieving backups from archival cold storage incurs fees. Backup/restore procedures must align with the customer's regulatory compliance obligations, which MaseTek can guide but not guarantee.
- System requirements
-
- Compatible backup client software e.g. Veeam
- Up-to-date operating systems and patches on backed up systems
- High-speed internet connectivity with sufficient bandwidth
- Site-to-site VPN or secure network connection for data transfer
- Firewall rules to allow required service ports and protocols
- Data encryption capabilities if sending backups un-encrypted
- Cloud accounts/identity source for authentication to the service
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- MaseTek guarantees responsive support for our cloud backup service. Monday-Friday business hours: inquiries receive an initial response within 2 business hours. Weekends and holidays: extended 4-hour initial response time. For critical, service-impacting emergencies: around-the-clock escalation with a 1-hour response target, any day. Support teams follow-the-sun across regions, intelligently routing issues for efficient resourcing based on type and severity. Whether a simple question or urgent incident, MaseTek prioritizes addressing your needs quickly while maintaining high-quality resolutions. With this responsive support model, you can rely on timely assistance to keep your cloud backups running smoothly.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
MaseTek's cloud backup storage service, we offer two primary services based on data sizes - Upload Service and Retrieval Service.
Upload Service:
This service covers the uploading and storing of your backup data in our secure cloud environment. Pricing is based on the total size of data uploaded each month, with competitive rates for every GB/TB uploaded. Higher data volumes qualify for further discounted rates.
Retrieval Service:
In the event you need to retrieve and restore backup data, our Retrieval Service handles downloading your data from the cloud back to your environment. Pricing is based on the size of data retrieved, charged per GB/TB downloaded. We offer flexible retrieval options from our hot storage tiers for rapidrecovery or cold storage for cost efficiency on infrequent restores.
Both the Upload and Retrieval services are designed with a simple, pay-as-you-go model based solely on the amount of data transferred. There are no upfront costs, termination fees, or penalties. You only pay for what you use each month.
This data transfer-based pricing model allows you to predict and optimize your cloud backup storage costs effectively based on your monthly backup volumes and retrieval needs. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
The process begins with an initial consultation to understand the customer's requirements and provide solution recommendations. Our technical team then designs a tailored cloud backup solution. For complex environments, a proof of concept may be conducted to validate the proposed approach. Once the solution is finalized, we provision the necessary cloud resources and contract with the customer.
Our professional services team deploys and configures the backup software in the customer's environment, integrating it with our cloud service. For the initial full backup, we may recommend seeding the cloud repository by physically shipping storage media to accelerate data transfer.
We then configure backup policies, schedules, retention rules, and custom settings per the customer's specifications. Comprehensive testing, including backup/restore simulations, validates the end-to-end process before go-live. In-depth training ensures the customer's staff can effectively manage and monitor backups.
With everything properly set up and tested, the on-premises data backups commence to our cloud service based on defined schedules. Our support teams closely monitor the initial cycles, providing assistance as needed. Dedicated project managers coordinate all activities, providing regular updates throughout the transition. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
At the conclusion of a contract, it is vital that users have the ability to retrieve their data in a secure and accessible manner. Organisations must provide a clear and straightforward process for data extraction, which should be outlined in the contract terms or a dedicated data management policy.
Typically, users can initiate the data extraction process by submitting a formal request to Mase Tek Ltd. We are obligated to furnish the data in a commonly used format, ensuring compatibility with other systems, thereby facilitating ease of data transition or integration. The timeframe for data delivery should also be specified, often dictated by regulatory requirements or agreed upon during initial contract negotiations.
It is crucial for users to verify that the extracted data is complete and accurate. Additionally, they should confirm the cessation of their data usage by the provider post-contract to safeguard against unauthorised data retention or use. - End-of-contract process
-
At Mase Tek, the end of a contract is managed with clear and transparent procedures to ensure a smooth transition for our clients. Should a client decide not to renew their contract, they are entitled to extract their data. This process is initiated through a formal request via the client dashboard or directly through our support team. Mase Tek provides the extracted data in a commonly used format, ensuring it can be easily transferred and utilized elsewhere. This service is included in the contract at no additional cost, and the extraction is typically completed within a specified period, usually 30 days.
Regarding our pricing structure, the base price of a contract with Mase Tek covers:
Secure cloud storage access.
Standard backup and data redundancy services.
Basic customer support via email and phone during business hours.
Additional costs are incurred for services such as:
Expedited or large-scale data retrieval.
Advanced support or customized consultancy services.
Enhanced security features like dedicated encryption.
Extended data access post-contract expiry.
Our goal is to maintain full pricing transparency, allowing clients to effectively plan and budget their storage solutions according to their specific needs.
Using the service
- Web browser interface
- No
- API
- Yes
- What users can and can't do using the API
- MaseTek's comprehensive API enables programmatic control over our Upload and Retrieval cloud backup services. For Upload, initiate backups, set retention policies, monitor jobs. For Retrieval, restore data, browse backups, track retrieval status. Automate backup/recovery workflows by integrating with scripts/tools. Configure repositories, control access permissions, cross-region replication. Get usage/analytics. However, APIs have limitations around initial large backup seeding and direct low-level storage modifications to ensure data integrity. Overall, leverage the robust API capabilities to orchestrate and customize your cloud backup processes while maintaining core service guardrails for data protection and security.
- API automation tools
- Ansible
- API documentation
- No
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
-
At Mase Tek, we guarantee that user performance remains unaffected by others' demands through several key strategies:
Resource Isolation: Each client operates in a segregated virtual environment, ensuring private resource use.
Scalable Architecture: We employ load balancing and auto-scaling to adjust resources dynamically, maintaining performance during peak demand.
Traffic Management: Implementation of Quality of Service (QoS) rules prioritizes critical operations, stabilizing performance.
Capacity Planning: Proactive capacity management ensures our infrastructure supports growing demands and unexpected spikes.
Monitoring and Incident Management: Continuous system monitoring and an adept IT team provide swift issue resolution, preventing user impact. - Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- No
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- AWS / AZURE / GCP
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Files
- Virtual Machines
- Database
- Application Data
- Media Files
- Backup controls
- During the discovery phase at Mase Tek, clients provide detailed information about their data protection needs, including the types of data to be backed up, their criticality, volume, and compliance requirements. Based on this input, we tailor a backup strategy that aligns with their operational and regulatory needs. We then set up and manage the backup schedules, ensuring data integrity and availability. Our managed backup service allows clients to focus on core activities while we handle data security and recovery. This approach ensures efficient, compliant, and reliable data protection, giving our clients peace of mind.
- Datacentre setup
-
- Multiple datacentres with disaster recovery
- Multiple datacentres
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Bonded fibre optic connections
- Other
- Other protection between networks
- Buyer can be sent a disk or NAS device for faster upload
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
We provide high-level service availability, underpinned by robust Service Level Agreements (SLAs) to ensure reliability and trust. We guarantee an uptime of 99.9% across all our cloud storage and backup services. This target reflects our dedication to maintaining a resilient and operational service environment, minimizing downtime and ensuring continuous access for our clients.
Our SLA includes specific terms regarding service credits as a form of compensation if we fail to meet our guaranteed uptime. In cases where availability drops below the promised threshold, clients are eligible for service credits. These credits are calculated as a percentage of the monthly service fee paid by the client, proportionate to the amount of time the service was unavailable beyond the agreed terms. - Approach to resilience
- It’s available on request
- Outage reporting
- Email Alerts will be sent out
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
-
We restrict access to management interfaces and support channels through:
Role-Based Access Control (RBAC): Ensures only authorized personnel access sensitive areas.
Multi-Factor Authentication (MFA): Requires verification of multiple credentials for access.
Secure VPNs: Mandatory VPN use for remote access ensures encrypted data transmission.
Audit Logs: All actions within interfaces are logged and monitored for unusual activity.
Regular Access Reviews: Frequent reviews and adjustments of access rights to align with current roles.
Security Training: Staff accessing these areas undergo regular security training to reinforce responsible usage and awareness of protocols. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- UKAS
- ISO/IEC 27001 accreditation date
- 01/01/2020
- What the ISO/IEC 27001 doesn’t cover
-
Geographical Exclusions: If Mase Tek operates in multiple locations, the certification might only apply to certain offices or data centers, excluding others that don’t implement the ISMS.
Service Exclusions: Certain services offered by the company might not be included if they do not fall within the defined scope of the ISMS. For example, if Mase Tek has a division that deals with physical security solutions separate from their main IT services, this might not be included.
Operational Exclusions: Specific operations or departments may be excluded, such as subcontracted processes or auxiliary support functions that are outside the core IT services.
Product Exclusions: If Mase Tek develops or sells software products, the development environment or certain products might not be covered by the ISMS. - ISO 28000:2007 certification
- No
- CSA STAR certification
- Yes
- CSA STAR accreditation date
- 01/01/2020
- CSA STAR certification level
- Level 1: CSA STAR Self-Assessment
- What the CSA STAR doesn’t cover
- N/A
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
We designed to safeguard our clients' data and ensure compliance with industry standards, such as ISO 27001 and GDPR. Our comprehensive approach includes several key elements:
Policy Framework: We maintain a suite of security policies covering data protection, access control, risk management, and incident response. These policies are regularly updated to reflect the latest security practices and regulatory requirements.
Access Control: We employ strict access control measures to ensure that only authorized personnel have access to sensitive information. This includes using multi-factor authentication, role-based access controls, and regular access audits.
Regular Audits and Compliance Checks: Our security team conducts regular audits to ensure compliance with our security policies. Any discrepancies are addressed promptly through corrective actions.
Reporting Structure: Our Chief Information Security Officer (CISO) oversees our security program and reports directly to the CEO. This ensures that security concerns are escalated efficiently and receive the necessary executive attention.
Incident Response: We have a formal incident response plan that outlines procedures for managing security breaches. This plan is tested regularly to ensure effectiveness and is updated based on lessons learned from exercises and actual incidents.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Changes to our systems are rigorously assessed for potential security impacts before implementation. This assessment includes a thorough review by our security team, who evaluate the change against our security standards and the potential risks it may pose. Any identified risks must be mitigated, and approvals obtained from relevant stakeholders, including our security and operations teams, before changes are deployed. This structured approach ensures that our services remain secure and reliable, even as they evolve.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Our vulnerability management process involves continuous monitoring and assessment of potential threats to our services. We utilize leading industry sources, such as CVE databases, security bulletins, and threat intelligence feeds, to stay informed about new vulnerabilities. Upon identifying potential threats, our security team conducts risk assessments to prioritize responses based on severity and potential impact. Patches are deployed swiftly—critical vulnerabilities are addressed within 24 hours, and less critical ones within a week, ensuring robust protection. This proactive approach to vulnerability management safeguards our systems and maintains the integrity and security of our client data.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Our protective monitoring process is designed to swiftly identify and respond to potential security compromises. We use advanced monitoring tools that analyze system logs, network traffic, and user behaviors to detect unusual activities that may indicate a security breach. When a potential compromise is identified, our incident response team is alerted immediately. They assess the situation and, depending on the severity, respond within minutes to mitigate risks. Our response protocol includes isolating affected systems, conducting forensic analysis, and implementing necessary patches or configurations. This prompt and decisive action minimizes potential damage and restores normal operations as quickly as possible.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
We have established protocols for a range of typical incidents, as data breaches, service disruptions, and unauthorized access, which enable our team to respond promptly and effectively.
Users can report incidents through multiple channels, including a dedicated support email, phone, and a ticketing system accessible via our client portal. It is logged and tracked through our incident management system.
We provide comprehensive incident reports to affected users, detailing the nature of the incident, actions taken to resolve it, and measures implemented to prevent recurrence. These reports are communicated through the initial reporting channel used by the user.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- Handled by Third Party (Microsoft/Amazon)
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
We employ anyone from everyone despite, race, gender, ethnicity, sex.
Pricing
- Price
- £10 to £25 a terabyte a month
- Discount for educational organisations
- No
- Free trial available
- No