Skip to main content

Help us improve the Digital Marketplace - send your feedback

Transputec Limited

AWS or Azure Cloud Backup

AWS & Azure Backup Service offers secure, scalable, and cost-effective cloud backup solutions for businesses. It ensures data protection with automated backups, easy recovery options, and seamless integration with appropriate services. Ideal for online backups, cloud storage, and disaster recovery, these backup Services are perfect for safeguarding critical business data

Features

  • Cloud-Native Backup:
  • Hybrid Data Protection
  • Centralised Data Protection Policies
  • Data Protection Compliance:
  • Simplify data protection of application resources
  • Build a foundation for disaster recovery and business continuity.
  • Perform automatic restore testing and validation of backups.
  • Protect and recover from ransomware and account compromise.
  • Govern data protection compliance using real-time analytics and insights.

Benefits

  • Protect volumes, databases file systems and data buckets
  • Centralise data protection management for applications in hybrid environments
  • Configure manage and govern backup activity across organisations and resources
  • Examine resources against data protection policies ensuring compliance requirements.

Pricing

£4.02 a gigabyte a month

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at G-cloud@transputec.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

7 1 0 2 9 9 7 7 9 8 6 9 1 6 5

Contact

Transputec Limited G-Cloud Team
Telephone: 0203 5886570
Email: G-cloud@transputec.com

Service scope

Service constraints
Provider constraints:
AWS: https://docs.aws.amazon.com/aws-backup/latest/devguide/aws-backup-limits.html
System requirements
None

User support

Email or online ticketing support
Email or online ticketing
Support response times
Response times are dependant on service level procured
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Yes, at an extra cost
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 AAA
Web chat accessibility testing
None
Onsite support
Yes, at extra cost
Support levels
Subject to the agreement 24x7x365
Fully Managed Service
Co-Managed Service (in collaboration with client existing IT team)
Technical Account Manager
Strategic Advisor

Cost variable based on scope of agreement
Support available to third parties
Yes

Onboarding and offboarding

Getting started
On-line videos /tutorials are available, Subject to agreement, formal training provided by 3rd party partners or informal training on one-to-one basis is also available
Service documentation
Yes
Documentation formats
  • PDF
  • Other
Other documentation formats
Microsoft Word, Excel and PowerPoint
End-of-contract data extraction
Agreement on data to be anonymised or deleted. Transfer of any data subject to the data source and destination
End-of-contract process
Exit plan agreed as part of managed service agreement defines approach to exit and costs

Using the service

Web browser interface
Yes
Using the web interface
Log support request
Subject to support framework:
Via AWS/Azure web console
Via Transputec service desk web portal
Web interface accessibility standard
WCAG 2.1 AAA
Web interface accessibility testing
AWS adheres to the Web Content Accessibility Guidelines (WCAG) 2.1
Microsoft Azure has commitments to accessibility but specific rating scores are not found
API
Yes
What users can and can't do using the API
The API can be used to integration to other Remote Management and Monitoring and Professional Services Automation tools.
API automation tools
  • Ansible
  • Chef
  • SaltStack
  • Terraform
  • Puppet
  • Other
Other API automation tools
  • AWS-CloudFormation & Kubernetes
  • Azure - Bicep & Azure Custom Script
API documentation
Yes
API documentation formats
PDF
Command line interface
Yes
Command line interface compatibility
  • Linux or Unix
  • Windows
  • MacOS
Using the command line interface
All functionality is available via the CLI

Scaling

Scaling available
Yes
Scaling type
Automatic
Independence of resources
AWS/Azure configuration services - agreed as part of design
Usage notifications
Yes
Usage reporting
  • API
  • Other
Other usage reporting
Dashboard

Analytics

Infrastructure or application metrics
Yes
Metrics types
Other
Other metrics
Agreed metrics as part of managed service agreement
Reporting types
Real-time dashboards

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Microsoft Azure and AWS

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with another standard
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Yes
What’s backed up
AWS and Azure services
Backup controls
Scheduled backup services as part of the agreed service scope
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Users contact the support team to schedule backups
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Service Levels subject to agreement and cloud service design and configuration. Azure SLA guarantees at least 99.9% uptime for its services while AWS Availability SLA stands at 99.99%, in both cases refunds are in the form of service credits, full legal terms and conditions for these can be provided upon request.
Approach to resilience
Available upon request
Outage reporting
- a public dashboard
- an API
- email alerts

Identity and authentication

User authentication
2-factor authentication
Access restrictions in management interfaces and support channels
Identity and Access Management (IAM) manage permissions for users within AWS
Access control heirarchy for authentificaton and authorisation
IAM roles and users for approved access
Azure App Services manage access to the environment at a multi layer leve providing control over management interfaces and support channels through access restrictions
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password
Devices users manage the service through
Dedicated device on a segregated network (providers own provision)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
LRGA Limited
ISO/IEC 27001 accreditation date
31st May 2023
What the ISO/IEC 27001 doesn’t cover
Nothing relevant to this framework response
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
ISO/IEC 27001:2013
CyberEssentials
All issues and suspected non-compliance and suspicious activities are reported immediately to our SoC and senior managment (Director level and above) via monitored mailbox/DL (nc@Transputec.com)

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Configuration management - configuration management is documented with any changes being formally defined and agreed.

Change management - RFCs raised for Change Board Authority decision include security impacts including change to availability, integrity and confidentiality, along with rollback plan - subject to sign-off from a technical, service delivery, security and commercial decision maker. Delivery of RFC is in accordance with agreed works including testing and rollback if necessary
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
AWS Security performs vulnerability scans on host operating system, web applications, and databases in the AWS environment. Approved 3rd party vendors conduct external assessments (quarterly). Identified vulnerabilities are monitored and evaluated. Countermeasures are designed and implemented to neutralise known/newly identified vulnerabilities.

Security and Compliance is a shared responsibility, the customer must perform some of the vulnerability management process. See https://aws.amazon.com/compliance/shared-responsibility-model/ for more details."

Microsoft Azure vulnerability management is layered across multiple services: https://learn.microsoft.com/en-us/azure/?product=security

Transputec - Internal network vulnerability scans are carried out periodically, Regular assessments, timely remediation, and continuous improvement is practiced.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
AWS deploys (pan-environmental) monitoring devices to collect information on unauthorized intrusion attempts, usage abuse, and network/application bandwidth-usage.

Azure Monitor provides robust collection, analysis and response to monitoring data: https://learn.microsoft.com/en-us/azure/azure-monitor/overview

Transputec uses multiple industry tools to monitor threats and vulnerabilities with a SOC team to assess and mitigate any threats.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Multiple approach:
User reports to service desk
Business continuity testing
Major incident post event assessment/lessons learned and remedial action
Retraining/training

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Supplier
Virtualisation technologies used
Other
Other virtualisation technology used
"AWS uses the Xen hypervisor for EC2 instances and the Nitro System for hardware offloading and isolation.
Azure uses Hyper-V as its hypervisor for Azure Virtual Machines and other virtualized services."
How shared infrastructure is kept separate
Network isolation using virtual private clouds (VPCs) or network security groups (NSGs).
Resource isolation through hypervisor-based isolation for VMs or containerization for containers.
Access controls and permissions to ensure that users from different organizations cannot access each other's resources.
Data encryption and segregation to prevent unauthorized access to data.

Energy efficiency

Energy-efficient datacentres
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Equal opportunity
  • Wellbeing

Fighting climate change

ISO 14001:2013 certified
Science Based Targets Initiative registered
Transputec is committed to managing its CO2 emissions and is focused on working with its clients and suppliers to address Scope 3 emissions

ISO 14001:2013 certified
Science Based Targets Initiative registered
Transputec is committed to managing its CO2 emissions and is focused on working with its clients and suppliers to address Scope 3 emissions For more information please visit https://www.transputec.com/about-us/sustainability/

Equal opportunity

Transputec is and always has been a non-discriminatory organisation, employing a global workforce without bias or prejudice and are supportive of gender diversity Transputec is part of the Minority Supplier Development UK (MSDUK) Ethnic Minority Business (EMB) network. As MSDUK EMB suppliers we are part of a broad network of innovative, high growth minority owned businesses, providing an important role in the UK and international IT services supply chain.. for more information please see of website.
https://www.transputec.com/about-us/social-responsibility/

Wellbeing

Transputec has an open approach to health and wellbeing, encouraging communication and understanding through wellbeing events delivered generally on an annual basis as well as community out reach and our international outreach programme
https://www.transputec.com/about-us/our-charity-partners/

Pricing

Price
£4.02 a gigabyte a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
AWS: Amazon S3: Offers 5 GB of standard storage for secure, durable, and scalable object storage.

Azure: $200 credit within the first 30 days. This credit can be applied to Azure Blob Storage: Get 5 GB of locally redundant storage (LRS) hot block with 20,000 read and 10,000 write operations.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at G-cloud@transputec.com. Tell them what format you need. It will help if you say what assistive technology you use.