Cloud Advisory, Foundation Build , Migration, Consulting & Operations
Migrate, modernise, and optimise infrastructure and business applications using state-of-the-art cloud solution. Build a robust cloud strategy and roadmap to power your business needs. Maximise your ROI with an setup optimised for best practices in cost, security, and architecture.
Features
- Scalability: Easily adjusts resources to meet fluctuating demand and traffic
- Uptime: High availability with minimal downtime, ensuring constant accessibility
- Security: Advanced protection measures safeguard data against cyber threats
- Performance: Fast loading times with high-performance servers and SSD storage
- Flexibility: Accommodates various applications, from websites to complex databases
- Cost Efficiency: Pay only for resources used, avoiding unnecessary expenses
- Disaster Recovery: Quick data restoration capabilities in case of emergencies
- Global Reach: Content delivery networks offer low latency worldwide access
- Automation: Simplifies operations with APIs, web portals, and mobile apps
- Support: Access to technical support for troubleshooting and guidance
Benefits
- Publish Content: Seamlessly publish content from multiple devices, enhancing collaboration
- Manage Content: Quickly manage content on the move, boosting productivity
- Access Data: Access data remotely, ensuring continuity of work
- Collaborate Globally: Collaborate in real-time globally, breaking down geographical barriers
- Scale Resources: Instantly scale resources as needed, aligning growth dynamically
- Reduce Costs: Reduce operational costs by paying for resources utilised
- Improve Security: Benefit from advanced security protocols, protecting sensitive data
- Enhance Performance: Experience enhanced performance, with high-speed access to applications
- Automate Tasks: Automate routine tasks, allowing focus on strategic initiatives
- Disaster Recovery: Implement robust disaster recovery plans, minimizing downtime risks
Pricing
£152.00 to £432.00 a unit a day
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 8 9 5 9 2 6 2 2 4 5 0 4 8 0
Contact
LTIMINDTREE LIMITED
Alastair Norman
Telephone: 07872306860
Email: alastair.norman@ltimindtree.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
-
Amazon Web Services
Microsoft Azure
Google Cloud Platform
Oracle Cloud
IBM Cloud
SAP Business Technology Platform
Salesforce Cloud - Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- No
- System requirements
-
- Software Licenses: Specific software licenses for legal and operational compatibility
- Anti-Virus Technology: Essential anti-virus technology to secure virtual machines
- Operating System: Compatible operating system for optimal cloud service performance
- RAM: Adequate RAM to ensure efficient processing and multitasking capabilities
- Storage: Sufficient storage capacity for data management and scalability needs
- Bandwidth: High bandwidth for uninterrupted data transfer and communication
- Processor Speed: Minimum processor speed for effective cloud service utilisation
- Security Protocols: Robust security protocols to protect data and privacy
- Backup Solutions: Reliable backup solutions for data safety and recovery
- User Access Control: Proper controls to maintain security and integrity
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Depending on the agreed SLAs with the customer
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- Assistive technologies such as Soul machine being implemented to help achieve sentiment analysis through facial expression, speech synthesis markup language (SSML)
- Onsite support
- Yes, at extra cost
- Support levels
- We have three different support levels i.e. Gold, Silver and Bronze. Based on customer requirements and mutually agreed, support type will be provided. We provide technical account manager or cloud support engineer as required
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide onsite training, online training, or user documentation.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
- CSV, PDF, API
- End-of-contract process
- 1) Prices are exclusive of taxes and duties such as VAT, GST, Business tax, Sales and use tax, service tax, lease tax, custom duty and all similar taxes and duties. 2) Rates proposed are valid for a period of 12 months from the start of the engagement. End of each anniversary year, with mutual discussion rates are subject to annual increase and are linked to CPI - UK, CPI - India. 3) All Onsite services are rendered from premises owneḍd by customer and customer shall make available, at no charge adequate facilities for LTIMindtree personnel to work Onsite and will ensure that LTIMindtree personnel are assigned appropriate working space, IT equipment, including access to phone/fax./ email/ internet etc. 4) Price do not include cost of any customer specified background screening or checks, these shall be charged extra unless specifically communicated by LTIMindtree.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- Windows
- Windows Phone
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The services designed will be compatible for both desktop and mobile services.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AAA
- Description of service interface
- API CLI (Command Line Interface) used to interact with instance operation
- Accessibility standards
- WCAG 2.1 AAA
- Accessibility testing
- AAAA
- API
- Yes
- What users can and can't do using the API
- APIs are used for integrations and automations
- API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- We can customize our services through LTIMindtree MVC (Minimum Viable Cloud). Customer can define their own governance rules for each application and actions (Audit/Enforce/Remove). Some key feature of MVC are : Integrated solution for Cloud & Infrastructure process automation Manage the scale and complexity required for Cloud build, migrate, catalogues, management & Code Pipeline Enables cloud engineers and developers in delivering reliable and resilient implementations A policy engine that enforce policy across all the cloud services ~60% reduction in cloud environment infrastructure provisioning effort for variety of application
Scaling
- Independence of resources
- We perform on-going health checks and check parameters on regular basis and this guarantees that users are not affected by the demand.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
We provide metrics reporting on the following typical areas:
- Application Error
- Hit Count Average
- Response time
- 90 percentile response time
- Error Count Success
- Failure count Request/second
These can be tailored to user and management requirements for individual deployments. - Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- CSV, PDF, API
- Data export formats
-
- CSV
- ODF
- Data import formats
-
- CSV
- ODF
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- The SLA's are defined by the cloud providers. You can find the links below to refer the same. https://aws.amazon.com/compute/sla/ https://azure.microsoft.com/en-in/support/legal/sla/summary/ Users are refunded with service credits if we don't meet guaranteed levels of availability
- Approach to resilience
- We can use the standard resilience principles. We design, build and support solutions in Cloud by leveraging resilient cloud infrastructure such as Datacentre, Storage, Network and compute sub systems
- Outage reporting
- We can report outages through: Service Health dashboards An API Email Alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Access restrictions in management interfaces and support channels
- We restrict access using RBAC, SSO
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Bureau Veritas
- ISO/IEC 27001 accreditation date
- 14/02/2024
- What the ISO/IEC 27001 doesn’t cover
- Not applicable
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- ISO/IEC 27001:2013 Enterprise level certification
- ISO27701:2019 Personal Information Management System
- ISO 20000:2011 Compliance for design, transition, delivery and improvement
- ISO 22301:2019 International standard for Business Continuity Management
- SSAE18 SOC1 and SOC2 Type 2 controls
- PCI DSS v3.2.1 Compliance to Payment Card industry Data Security
- Trusted Information Security Assessment Exchange (TISAX)
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
LTIMindtree across all its Service Delivery Center is ISO 27001:2013 Information Security certified, Attested for SOC 1 Type II and SOC 2 Type II. LTIMindtree follows NIST 800-53 guidelines, ISO 27001 as a benchmark for all its Information Security policies and processes
LTIMindtree's Information Security Program is envisioned as a top down approach where the senior/executive management along with the Chief Information Security Officer (CISO) are key stakeholders in designing the information security strategy/framework and necessary support is provided to LTIMindtree's Corporate Security team to drive the security initiatives and program across the organization. Information security manager to handle and manage IT security incidents and exceptions. Periodic updates on security aspects and incidents are shared with steering committee, senior management and board of directors.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- In configuration management, the focus is on the effective and efficient provision of IT services. The scope of service assets involves such things as IT services and related items. Configurations include individual and group combinations of historical, current, and future proposed or planned versions of hardware, software, locations, people, documentation, enterprise-wide activities, and supporting information. The change management process ensures that standardized methods and procedures are used for efficient and prompt handling of all changes and minimizes the impact of change-related Incidents upon service quality. This improves the day-to-day operations of the organization by allowing implementation of authorized changes.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Security vulnerabilities is a process that needs to be performed continuously in order to keep up with new systems being added to networks, changes that are made to systems, and the discovery of new vulnerabilities over time. The approach consists of 4 stages: 1. Discover: organizing all the company assets and uncovering any forgotten devices. 2. Prioritize : Is used to rate the severity of CVEs 3. Assess: Gaining timely, efficient access to the information 4. Report: Variety of customizable reports and dashboards. 5. Remediate: The goal is to monitor vulnerabilities, assign tickets, and manage exceptions.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
LTIMindtree has deployed state of the art next gen SIEM monitored by 24/7/365 manned skilled professional as part of our Cyber SOC operations.All security events are qualified for potential security threat offenses via the SIEM correlation rules configured to monitor the environment.
Security threat offenses are triaged with threat intel data feeds and enriched to qualify false and true events
In event of a true positive security threat offense the SOC team opens a security incident case and engages with concerned teams and process owners for further investigation and preliminary forensics analysis of raw logs and meta data. - Incident management type
- Supplier-defined controls
- Incident management approach
- Incident Identification/Reporting: Client reported/Internal reported/Incidents reported by users through LTIMindtree incident handling team for further validation and action. Incident Analysis: Incident Handling analyzes reported incidents based on severity and priority, interview stakeholders and gather evidence, data points and involve appropriate teams for analysis and investigation. Incident Investigation & Communication/Notification: LTIMindtree's security team identifies and analyses the cause of the incident and impact based on data. Identify action items and communicate to relevant stakeholders. Incident Resolution/Remediation: LTIMindtree coordinate with stakeholders to resolve incident. Stakeholders, delivery manager informed on the status of the incident and communicates to the client through agreed protocol.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
As a de-carbonization initiative, our facilities and business operations, we have challenged ourselves to find new ways to reduce our carbon footprint and invest in the low-carbon infrastructure and renewable and clean energy. We are working to attract partners to support on wheeling of solar power, hydro, usage of lithium batteries in future, solar charging infrastructure and other advanced technologies.
Deploying energy management platform and controls to provide energy bill reductions, energy operations transformation initiatives, Replacement of Ozone depleting substance with eco-friendly refrigerants, Replacement of existing UPS model with energy efficient models, Replacement of CFL lights with LED lights with smart sensors, Implementation of battery monitoring system, Installation of catalytic convertors to reduce emissions from DG, chiller descaling, automation of all AHU units, Influencing builders to opt for renewable resources to meet the energy requirement, retrofits, replacement of inefficient equipment etc are taken up . Also, the learnings from these activities resulted in efficient design of the building architecture that helped us maintaining lowest energy intensity. We have invested in Clean Energy with a dedicated budget to move towards green power.
We have been working on Waste Management strongly advocating waste reduction, building awareness campaigns around the imperative. As a result, we have seen our overall per capita waste generation trends dip, and recycling discipline improve which led to reducing the burden on the city landfills. Our waste recycling has improved in the last few years and saw progress in reducing incineration. All the waste generated within our office premises get disposed by authorized recyclers as per the legislations.Covid-19 recovery
The COVID-19 pandemic has had an unprecedented impact on societies and economies worldwide. LTIMindtree faces impact from this event at different levels. Risks include health and safety risks for our employees, impact on our customers, which may lead to reduction in customer discretionary IT spends, risk of delivery disruptions as well as increase in financial, compliance and operational risks. In addition, the pandemic impact may result in an increase in political and macro-economic risks. Some key indicators of our successful response include:
• Enablement of 99.5% of employee to work remotely
• Increase in Project Feedback Survey scores from customers for Q4
• Multiple customer appreciations have been received for the smooth and seamless support provided by LTIMindtree.Tackling economic inequality
As a socially conscious global enterprise, we realize that the future needs to be benchmarked not just by the financial resources we invest in, but also measured by the care, compassion and time that we willingly give. To us, CSR presents a whole new space of opportunities for ideas, technology, innovation and human energies to intersect and Together shape a transformational landscape. Strengthening our belief that yes, Together we can reach a Future that is really better, Faster.
Our CSR Strategy
Conversation, collaboration and commitment is the way forward for us, as we seek to nurture and grow pockets of thriving local communities that are making a tangible difference.
Through consistent engagements with credible NGOs, we have a handle on the ground realities in the social vectors we choose to impact. We monitor activities, respond to feedback and ensure a result-oriented framework is in place to expedite change. Our own volunteers are an important component of this endeavor too.
Our collaborations with every accredited body, individual and the beneficiary is built on a synergy of ideas, vision and realistic long-term goals. As the harbinger of positive change, we intend to convert every interaction into a constructive transformation. Most importantly we remain patiently and steadfastly committed to the causes we have taken up and ensure that each activity is taken to a logical and successful conclusion.
Our CSR Domains & Impacts:
As we keep evolving, being accountable to the communities around us is what defines us at LTIMindtree.
Our proactive approach drives us to focus our CSR efforts on the 4 vital pillars that we believe are the fundamental catalysts for social progress – Education, Empowerment, Environment, Health & Wellness. These pillars form the bedrock of our staunch commitment to creating meaningful change and fostering a brighter future for all.Equal opportunity
Diversity, Equity and Inclusion (DEI) is an integral part of life at LTIMindtree. We promote a performance-driven and customer-centric work culture to help clients achieve their business goals. We have Diversity data by Gender (Male, Female, Others), grades, location etc. We track this at an organization level, for eg- % of women in senior management, % of people with disabilities etc
As part of Voluntary DEI self-identification in India and US geos we also request information on
1. Ethnicity (US)
2. LGBTQ+
3. Disability and
4. Veteran status
As part of our HR processes, we track attrition, promotion, and gender pay-parity for gender as well.
We use DEI data to gather valuable information to guide long-term decisions -
1. Identify trends - The data is used in four key areas; retention, promotion, pay, and organizational representation. Eg, to identify if underrepresented groups have disproportionate levels of attrition, or if there is a gender pay gap.
2. Monitor equal opportunities – we use the data to understand if there’s a balanced spread of opportunities across all diversity groups. Identify if there are low levels of representation in decision-making positions or within leadership teams. This will help us understand where the most underrepresented individuals are positioned within the organization.
3. Employee Engagement – DEI Data gives us a better understanding of the people who make up our workforce. Identifying and addressing biases or other issues will validate our commitment to improving the overall employee experienceWellbeing
LTIMindtree has a comprehensive health and safety policy in place and in addition has partnered with best-in-class service providers for the below
• Employee assistance program (EAP)
• Competent Source of Advice basis ‘The Management of Health and Safety at Work Regulations’
• Comprehensive private medical insurance
• Competitive life insurance coverage
Other measures include -
• UK based employees receive laptops and benefit from flexi and hybrid working arrangements.
• Employees are encouraged to cycle to work via the cycle to work scheme as per the policy in effect.
• Close monitoring of medical/sickness related absenteeism patterns basis which support is provided on a case-to-case basis
• Providing positive strokes for a job well done via a comprehensive rewards and recognition program
• Ensuring adequate staffing levels thereby ensuring work life balance.
• Fully paid sick/medical leave days as per policy in effect"
Pricing
- Price
- £152.00 to £432.00 a unit a day
- Discount for educational organisations
- No
- Free trial available
- No