Skip to main content

Help us improve the Digital Marketplace - send your feedback

ABRAXOR LTD

Multi cloud support

We provide specialised cloud infrastructure services with multi-cloud support, enabling businesses to utilize multiple cloud platforms seamlessly for their operations.

Features

  • Multi-cloud integration.
  • Scalability across platforms.
  • Enhanced security measures.
  • Regulatory compliance capabilities.
  • Seamless data migration.

Benefits

  • Flexibility in cloud provider selection.
  • Efficient resource allocation.
  • Robust data protection.
  • Compliance with sector-specific regulations.
  • Smooth transition and continuity of operations.

Pricing

£500 to £2,000 a unit a day

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at wasim@abraxor.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

7 1 5 5 0 1 3 8 6 4 0 3 5 4 2

Contact

ABRAXOR LTD Wasim Juned
Telephone: 07545814380
Email: wasim@abraxor.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
No
System requirements
  • AWS
  • Azure
  • GCP
  • UKCloud

User support

Email or online ticketing support
Email or online ticketing
Support response times
Our response time to questions is typically within 24 hours on weekdays. During weekends, responses may take up to 48 hours due to reduced staffing. We prioritize urgent inquiries to ensure timely support regardless of the day.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
Supplied by third party.
Onsite support
Yes, at extra cost
Support levels
We offer three tiers of support:

1. **Basic Support**: Includes access to our helpdesk during business hours, with a response time of 24 hours. Cost-effective for small businesses.

2. **Premium Support**: Offers 24/7 support with a response time of 1 hour, including a technical account manager for personalized service. Ideal for medium to large enterprises.

3. **Enterprise Support**: All features of Premium, plus dedicated cloud support engineers and proactive system management. Best for critical operations requiring instant support.

Pricing varies by tier, reflecting the level of service and resources provided. Each higher level offers increased direct access to specialized technical personnel.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We streamline the onboarding process for our multi-cloud support service, ensuring a seamless transition for users. Our comprehensive onboarding includes personalized guidance on platform setup, configuration, and integration with existing systems. We provide extensive documentation, tutorials, and dedicated support channels to assist users at every step. Additionally, our team offers hands-on training sessions and workshops to empower users with the knowledge and skills needed to leverage the full potential of our service. By prioritizing user experience and support, we ensure a smooth and efficient adoption of our multi-cloud support solution, maximizing its benefits for our clients.
Service documentation
Yes
Documentation formats
  • HTML
  • ODF
  • PDF
  • Other
Other documentation formats
  • Confluence
  • Markdown
End-of-contract data extraction
XML
End-of-contract process
At the end of the contract for our multi-cloud support service, several steps occur. Firstly, there's a review of services provided, ensuring all obligations are fulfilled. Data migration or termination assistance may be offered. Transition plans are devised for a smooth exit, including data retrieval and termination of access privileges. Post-contract support options might be discussed for continuity.

Included in the contract price are core services like multi-cloud integration, ongoing support, security measures, and regular updates. Additional costs may apply for customized solutions, extended support beyond agreed-upon parameters, and any usage-based fees for exceeding allocated resources.

Using the service

Web browser interface
No
Application to install
No
Designed for use on mobile devices
No
Service interface
No
User support accessibility
WCAG 2.1 AA or EN 301 549
API
No
Customisation available
Yes
Description of customisation
Customization options for multi-cloud support include configuring resource allocation, security protocols, and integration settings. Users can tailor these settings through intuitive interfaces or APIs. Administrators, IT personnel, and designated users with appropriate permissions can customize these aspects to align with specific business requirements.

Scaling

Independence of resources
To ensure users are not affected by demand fluctuations from other users, we employ robust resource allocation and management strategies. This includes dynamic scaling of resources based on demand, load balancing to evenly distribute workloads, and prioritization of critical tasks. Additionally, we implement redundancy and failover mechanisms to maintain service availability during peak usage periods. Continuous monitoring and proactive capacity planning help anticipate and mitigate potential performance issues. By optimizing resource utilization and capacity, we guarantee a consistent and reliable experience for all users, regardless of the demand placed on our service by others.

Analytics

Service usage metrics
Yes
Metrics types
We offer comprehensive service metrics for our multi-cloud support service to ensure transparency and performance optimization. Key metrics include uptime and availability, response and resolution times for support tickets, resource utilization across cloud platforms, security incident detection and response metrics, and compliance with service level agreements (SLAs). Additionally, we provide detailed reports on cost management, including cloud spend analysis and optimization recommendations. These metrics enable clients to monitor the effectiveness of our service, make informed decisions, and continuously improve their cloud infrastructure operations.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users can export their data from our multi-cloud support service through various methods depending on the platform and data type. Common options include accessing data through APIs for programmatic extraction, using built-in data export features within the service's interface, or utilizing third-party data migration tools compatible with the supported cloud platforms. Additionally, our support team can assist users in devising customized data export solutions tailored to their specific requirements, ensuring a seamless transition of data out of the service if needed.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • SQL
  • JSON
  • HCL
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • JSON
  • SQL
  • HCL

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
We offer the same SLAs as the underlying infrastructure (AWS, Azure, GCP or UKCloud).
Approach to resilience
We offer the same resiliency as the underlying infrastructure (AWS, Azure, GCP or UKCloud).
Outage reporting
A public dashboard, API and alerts via PagerDuty (i.e. email, Slack, text message and app).

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
Access restrictions in management interfaces and support channels
In our multi-cloud support, access restrictions in management interfaces and support channels are enforced through robust authentication mechanisms such as multi-factor authentication (MFA) and role-based access control (RBAC). User permissions are meticulously configured to grant access only to authorized personnel based on their roles and responsibilities. Additionally, access to sensitive functions and data within management interfaces is restricted to designated administrators. Regular audits and monitoring ensure compliance with access policies and bolster security across our support channels.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
CSA CCM version 3.0
Information security policies and processes
1. **Data Encryption**: Implementing encryption protocols to protect data both in transit and at rest, ensuring confidentiality and integrity.

2. **Access Control**: Employing robust authentication and authorization mechanisms to restrict access to sensitive resources, following the principle of least privilege.

3. **Security Monitoring**: Continuously monitoring cloud environments for suspicious activities, unauthorized access attempts, and potential security breaches.

4. **Compliance**: Adhering to industry standards and regulatory requirements relevant to data privacy and security, such as GDPR, HIPAA, or PCI DSS.

5. **Incident Response**: Maintaining well-defined incident response procedures to promptly detect, contain, and mitigate security incidents.

6. **Patch Management**: Regularly updating and patching software and infrastructure components to address known vulnerabilities and strengthen defenses against emerging threats.

7. **Auditing and Compliance Reporting**: Conducting regular audits and generating compliance reports to assess adherence to security policies and regulatory standards.

8. **Training and Awareness**: Providing comprehensive security training and awareness programs for employees to promote security awareness and proactive risk mitigation.

9. **Vendor Management**: Evaluating and monitoring third-party vendors and service providers to ensure stringent security standards and contractual obligations.

10. **Continuous Improvement**: Continuously reviewing and refining security policies, processes, and technologies to adapt to evolving threats and industry best practices.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Our multi-cloud support employs robust configuration and change management processes to ensure stability, security, and compliance. We meticulously track service components throughout their lifecycle using centralized configuration management tools, enabling real-time visibility and control over configurations. Changes undergo rigorous assessment, including thorough risk analysis to identify potential security impacts. Our dedicated change review board evaluates proposed changes against security policies and best practices before implementation. Regular audits and version control mechanisms ensure accountability and traceability. By prioritizing meticulous tracking and stringent change assessment, we maintain the integrity and security of our multi-cloud environment while facilitating agile adaptation.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
In our multi-cloud support, our vulnerability management process involves proactive threat assessment, prompt patch deployment, and vigilant monitoring. We assess potential threats through continuous vulnerability scanning, using automated tools and manual inspections. Upon detection, patches are swiftly deployed based on risk severity and impact analysis. We gather threat information from various sources, including cloud provider advisories, industry-specific feeds, and cybersecurity forums. Our security team rigorously analyzes and validates threat data for accuracy and relevance. This approach ensures rapid response to emerging vulnerabilities, fortifying our multi-cloud environment and safeguarding client data and operations.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
In our multi-cloud support, protective monitoring involves proactive identification of potential compromises through continuous monitoring of network traffic, system logs, and user activities. When a potential compromise is detected, our incident response team promptly investigates the incident, containing and mitigating the threat to prevent further damage. We adhere to strict response time objectives, aiming to address incidents swiftly and decisively to minimize impact. Our goal is to maintain the integrity and security of our multi-cloud environment, ensuring uninterrupted service for our clients.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Our incident management in multi-cloud support includes pre-defined processes for common events, ensuring swift resolution and minimal disruption. Users report incidents through dedicated channels, such as a support portal or hotline, triggering immediate response from our incident response team. We provide detailed incident reports post-resolution, outlining the incident's timeline, impact, and actions taken. This transparent approach ensures clients are informed and reassured, fostering trust in our ability to effectively manage incidents and maintain service reliability.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

We adopt sustainable practices, reduce emissions, and utilize green technologies in our operations. We support initiatives that promote renewable energy and resource conservation, contributing to a healthier planet.

Covid-19 recovery

We assist in recovery efforts by facilitating remote work solutions, supporting local businesses through partnerships, and contributing to community health initiatives. Our focus is on creating resilient infrastructure that can withstand future crises.

Tackling economic inequality

We engage in fair employment practices, support local job creation, and offer training programs aimed at upskilling individuals from underrepresented communities, promoting economic diversity and stability.

Equal opportunity

We are committed to creating a diverse and inclusive workplace. We implement unbiased recruitment and promotion practices, and actively support programs that aim to bridge opportunity gaps across different demographic groups.

Wellbeing

We prioritise employee health and mental wellness through comprehensive benefits, flexible working conditions, and a supportive work environment. Our initiatives aim to enhance overall employee satisfaction and productivity.

Pricing

Price
£500 to £2,000 a unit a day
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at wasim@abraxor.com. Tell them what format you need. It will help if you say what assistive technology you use.