Multi cloud support
We provide specialised cloud infrastructure services with multi-cloud support, enabling businesses to utilize multiple cloud platforms seamlessly for their operations.
Features
- Multi-cloud integration.
- Scalability across platforms.
- Enhanced security measures.
- Regulatory compliance capabilities.
- Seamless data migration.
Benefits
- Flexibility in cloud provider selection.
- Efficient resource allocation.
- Robust data protection.
- Compliance with sector-specific regulations.
- Smooth transition and continuity of operations.
Pricing
£500 to £2,000 a unit a day
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 1 5 5 0 1 3 8 6 4 0 3 5 4 2
Contact
ABRAXOR LTD
Wasim Juned
Telephone: 07545814380
Email: wasim@abraxor.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- No
- System requirements
-
- AWS
- Azure
- GCP
- UKCloud
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Our response time to questions is typically within 24 hours on weekdays. During weekends, responses may take up to 48 hours due to reduced staffing. We prioritize urgent inquiries to ensure timely support regardless of the day.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- Supplied by third party.
- Onsite support
- Yes, at extra cost
- Support levels
-
We offer three tiers of support:
1. **Basic Support**: Includes access to our helpdesk during business hours, with a response time of 24 hours. Cost-effective for small businesses.
2. **Premium Support**: Offers 24/7 support with a response time of 1 hour, including a technical account manager for personalized service. Ideal for medium to large enterprises.
3. **Enterprise Support**: All features of Premium, plus dedicated cloud support engineers and proactive system management. Best for critical operations requiring instant support.
Pricing varies by tier, reflecting the level of service and resources provided. Each higher level offers increased direct access to specialized technical personnel. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We streamline the onboarding process for our multi-cloud support service, ensuring a seamless transition for users. Our comprehensive onboarding includes personalized guidance on platform setup, configuration, and integration with existing systems. We provide extensive documentation, tutorials, and dedicated support channels to assist users at every step. Additionally, our team offers hands-on training sessions and workshops to empower users with the knowledge and skills needed to leverage the full potential of our service. By prioritizing user experience and support, we ensure a smooth and efficient adoption of our multi-cloud support solution, maximizing its benefits for our clients.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- Other
- Other documentation formats
-
- Confluence
- Markdown
- End-of-contract data extraction
- XML
- End-of-contract process
-
At the end of the contract for our multi-cloud support service, several steps occur. Firstly, there's a review of services provided, ensuring all obligations are fulfilled. Data migration or termination assistance may be offered. Transition plans are devised for a smooth exit, including data retrieval and termination of access privileges. Post-contract support options might be discussed for continuity.
Included in the contract price are core services like multi-cloud integration, ongoing support, security measures, and regular updates. Additional costs may apply for customized solutions, extended support beyond agreed-upon parameters, and any usage-based fees for exceeding allocated resources.
Using the service
- Web browser interface
- No
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- No
- Customisation available
- Yes
- Description of customisation
- Customization options for multi-cloud support include configuring resource allocation, security protocols, and integration settings. Users can tailor these settings through intuitive interfaces or APIs. Administrators, IT personnel, and designated users with appropriate permissions can customize these aspects to align with specific business requirements.
Scaling
- Independence of resources
- To ensure users are not affected by demand fluctuations from other users, we employ robust resource allocation and management strategies. This includes dynamic scaling of resources based on demand, load balancing to evenly distribute workloads, and prioritization of critical tasks. Additionally, we implement redundancy and failover mechanisms to maintain service availability during peak usage periods. Continuous monitoring and proactive capacity planning help anticipate and mitigate potential performance issues. By optimizing resource utilization and capacity, we guarantee a consistent and reliable experience for all users, regardless of the demand placed on our service by others.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We offer comprehensive service metrics for our multi-cloud support service to ensure transparency and performance optimization. Key metrics include uptime and availability, response and resolution times for support tickets, resource utilization across cloud platforms, security incident detection and response metrics, and compliance with service level agreements (SLAs). Additionally, we provide detailed reports on cost management, including cloud spend analysis and optimization recommendations. These metrics enable clients to monitor the effectiveness of our service, make informed decisions, and continuously improve their cloud infrastructure operations.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Users can export their data from our multi-cloud support service through various methods depending on the platform and data type. Common options include accessing data through APIs for programmatic extraction, using built-in data export features within the service's interface, or utilizing third-party data migration tools compatible with the supported cloud platforms. Additionally, our support team can assist users in devising customized data export solutions tailored to their specific requirements, ensuring a seamless transition of data out of the service if needed.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- SQL
- JSON
- HCL
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- JSON
- SQL
- HCL
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- We offer the same SLAs as the underlying infrastructure (AWS, Azure, GCP or UKCloud).
- Approach to resilience
- We offer the same resiliency as the underlying infrastructure (AWS, Azure, GCP or UKCloud).
- Outage reporting
- A public dashboard, API and alerts via PagerDuty (i.e. email, Slack, text message and app).
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Access restrictions in management interfaces and support channels
- In our multi-cloud support, access restrictions in management interfaces and support channels are enforced through robust authentication mechanisms such as multi-factor authentication (MFA) and role-based access control (RBAC). User permissions are meticulously configured to grant access only to authorized personnel based on their roles and responsibilities. Additionally, access to sensitive functions and data within management interfaces is restricted to designated administrators. Regular audits and monitoring ensure compliance with access policies and bolster security across our support channels.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- CSA CCM version 3.0
- Information security policies and processes
-
1. **Data Encryption**: Implementing encryption protocols to protect data both in transit and at rest, ensuring confidentiality and integrity.
2. **Access Control**: Employing robust authentication and authorization mechanisms to restrict access to sensitive resources, following the principle of least privilege.
3. **Security Monitoring**: Continuously monitoring cloud environments for suspicious activities, unauthorized access attempts, and potential security breaches.
4. **Compliance**: Adhering to industry standards and regulatory requirements relevant to data privacy and security, such as GDPR, HIPAA, or PCI DSS.
5. **Incident Response**: Maintaining well-defined incident response procedures to promptly detect, contain, and mitigate security incidents.
6. **Patch Management**: Regularly updating and patching software and infrastructure components to address known vulnerabilities and strengthen defenses against emerging threats.
7. **Auditing and Compliance Reporting**: Conducting regular audits and generating compliance reports to assess adherence to security policies and regulatory standards.
8. **Training and Awareness**: Providing comprehensive security training and awareness programs for employees to promote security awareness and proactive risk mitigation.
9. **Vendor Management**: Evaluating and monitoring third-party vendors and service providers to ensure stringent security standards and contractual obligations.
10. **Continuous Improvement**: Continuously reviewing and refining security policies, processes, and technologies to adapt to evolving threats and industry best practices.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Our multi-cloud support employs robust configuration and change management processes to ensure stability, security, and compliance. We meticulously track service components throughout their lifecycle using centralized configuration management tools, enabling real-time visibility and control over configurations. Changes undergo rigorous assessment, including thorough risk analysis to identify potential security impacts. Our dedicated change review board evaluates proposed changes against security policies and best practices before implementation. Regular audits and version control mechanisms ensure accountability and traceability. By prioritizing meticulous tracking and stringent change assessment, we maintain the integrity and security of our multi-cloud environment while facilitating agile adaptation.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- In our multi-cloud support, our vulnerability management process involves proactive threat assessment, prompt patch deployment, and vigilant monitoring. We assess potential threats through continuous vulnerability scanning, using automated tools and manual inspections. Upon detection, patches are swiftly deployed based on risk severity and impact analysis. We gather threat information from various sources, including cloud provider advisories, industry-specific feeds, and cybersecurity forums. Our security team rigorously analyzes and validates threat data for accuracy and relevance. This approach ensures rapid response to emerging vulnerabilities, fortifying our multi-cloud environment and safeguarding client data and operations.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- In our multi-cloud support, protective monitoring involves proactive identification of potential compromises through continuous monitoring of network traffic, system logs, and user activities. When a potential compromise is detected, our incident response team promptly investigates the incident, containing and mitigating the threat to prevent further damage. We adhere to strict response time objectives, aiming to address incidents swiftly and decisively to minimize impact. Our goal is to maintain the integrity and security of our multi-cloud environment, ensuring uninterrupted service for our clients.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Our incident management in multi-cloud support includes pre-defined processes for common events, ensuring swift resolution and minimal disruption. Users report incidents through dedicated channels, such as a support portal or hotline, triggering immediate response from our incident response team. We provide detailed incident reports post-resolution, outlining the incident's timeline, impact, and actions taken. This transparent approach ensures clients are informed and reassured, fostering trust in our ability to effectively manage incidents and maintain service reliability.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
We adopt sustainable practices, reduce emissions, and utilize green technologies in our operations. We support initiatives that promote renewable energy and resource conservation, contributing to a healthier planet.Covid-19 recovery
We assist in recovery efforts by facilitating remote work solutions, supporting local businesses through partnerships, and contributing to community health initiatives. Our focus is on creating resilient infrastructure that can withstand future crises.Tackling economic inequality
We engage in fair employment practices, support local job creation, and offer training programs aimed at upskilling individuals from underrepresented communities, promoting economic diversity and stability.Equal opportunity
We are committed to creating a diverse and inclusive workplace. We implement unbiased recruitment and promotion practices, and actively support programs that aim to bridge opportunity gaps across different demographic groups.Wellbeing
We prioritise employee health and mental wellness through comprehensive benefits, flexible working conditions, and a supportive work environment. Our initiatives aim to enhance overall employee satisfaction and productivity.
Pricing
- Price
- £500 to £2,000 a unit a day
- Discount for educational organisations
- Yes
- Free trial available
- No