Skip to main content

Help us improve the Digital Marketplace - send your feedback

Chess CyberSecurity Ltd

Backup as a Service from Chess ICT

Delivered via our partner 11.11, simplified, flexible and secure enterprise class offsite cloud backup solutions for critical data built on VEAAM, Cohesity and HPE technology. Intelligent data backup/recovery to securely protect all devices and applications. Advanced de-duplication. simple to administer and manage through a central control panel.

Features

  • Fully secure, encrypted and hosting
  • Flexes with business requirements
  • Standard configurations are simple to set up
  • Flexible RPO and RTO
  • Supports cloud backup/on premises/multi-site hybrid backup
  • Managed by vendor certified experts
  • Customer can manage their cloud backups via 11.11
  • Backup failures are alerted and action taken
  • Delivers lower total cost of ownership
  • Global 24/7/365 fully managed & supported

Benefits

  • Proactive monitoring of backups
  • Web based monitoring portal easily accessible
  • Extensive support
  • Complete control of data sovereignty
  • Easily scalable
  • UK Data Centres

Pricing

£35.28 a terabyte

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at bids@cyberlab.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

7 3 0 0 2 7 3 0 4 3 9 7 0 1 9

Contact

Chess CyberSecurity Ltd Joanne Austin
Telephone: 08000461688
Email: bids@cyberlab.co.uk

Service scope

Service constraints
None
System requirements
  • Windows OS
  • Linux OS
  • Mac OS

User support

Email or online ticketing support
Email or online ticketing
Support response times
Support is provided through 11.11's support teams are available 24/7 to respond to alerts, take calls, make decisions and act to ensure that your services are operating effectively every second of the day. The support desk is accredited to lSO2000-2011 and IS027001-2013 standards and brings together 250 technical operations staff employed to cover everything with a guaranteed qualified engineering response within 15 minutes of notice dependent on the severity of the incident.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Support is provided from 11.11's support teams which are available 24/7 to respond to alerts, take calls, make decisions and act to ensure that your services are operating effectively every second of the day. The support desk is accredited to ISO2000O-2011 and ISO27001-2013 standards and technical operations staff employed to cover everything with a guaranteed qualified engineering response within 15 minutes of notice. As part of our on-going commitment to service excellence 11.11 will assign a dedicated Account Manager (Service Delivery Manager) and Technical Manager to the client.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide a full on boarding service with supported online training supporting user documentation.
Service documentation
No
End-of-contract data extraction
Data can be extracted through multiple means as defined by the client.
End-of-contract process
We will immediately stop providing the Service Payments due or payable by you under the Agreement will become due and payable immediately. including any unpaid Charges due for the remainder of the lnitial Term or any Renewal Term (except where the Agreement has ended for material breach Within 30 days after this Agreement ends, each of us will return all Confidential Information of the other in its possession at the time this Agreement ends and will not make or keep any copies of that Confidential Information except as required to comply with any applicable legal or accounting record keeping requirement.

Using the service

Web browser interface
Yes
Using the web interface
Interface is provided through 11.11 deliver service desk facilities primarily via the 11.11 interface customer control panel. 11:11 provides customers with a web-based Control Panel. which provides a broad view of information and services surrounding their solution which allows authorised users to create and manage cloud services as well as raise, track and report on support
Web interface accessibility standard
None or don’t know
How the web interface is accessible
The web interface is compatible with standard Windows accessibility options.
Web interface accessibility testing
None
API
No
Command line interface
No

Scaling

Scaling available
Yes
Scaling type
Manual
Independence of resources
Through or partner '11.11' the provision Cloud backup as a Service from our highly available data centre infrastructure. Each Data Centre is fully powered. secure, resilient and newly equipped to handle the demands of future computing trends such as high density computing. virtualisation. energy conservation. distributed storage and multi site disaster recovery. we are not hindered by lack of space. legacy operating systems or practices.
Usage notifications
Yes
Usage reporting
Email

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • Memory
Reporting types
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
11:11

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Hardware containing data is completely destroyed
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • Databases
  • Physical and Virtual Servers
  • Files
Backup controls
The Managed Service provides full support for backups
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Users schedule backups through a web interface
Backup recovery
Users can recover backups themselves, for example through a web interface

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • Bonded fibre optic connections
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection within supplier network
By default. network security is set to deny all network traffic in all directions. Our partner 11.11' will consult with clients to determine the most appropriate firewall configuration, enabling access to ports as required. Mechanisms are in place to restrict unauthorized internal and external access to data with access to data appropriately segregated. Firewalls configured not to permit traffic from a source IP or Media Access Control (MAC) address other than its own Data in transit protection for 11:11 services are subject to audit at least annually under ISO 27001 and PCI-DSS certification requirements.

Availability and resilience

Guaranteed availability
Chess partner '11.11' ensure 100% uptime for Cloud Hosting Platform services monitored by 11:11 systems, in line with industry best practice.
Approach to resilience
Regular testing and maintenance of infrastructure and the N+1 policy applied to data centres provides the basis of continuity controls. This is enhanced by the provision of multiple communication routes and the replication of 11:11 network infrastructure across 11:11 sites. 11:11 data centres are also located outside flight paths, flood plains, have no seismic threat, and are a minimum of 3km outside sites who could pose a potential accident or hazardous threat (as governed by HSE). Therefore. in the event of any given location being lost, the primary impact to 11:11 would be on office facilities, but with global office presence and 11 Data Centres providing hosting services and support. This impact is limited and mitigated with standing arrangements to relocate staff to the nearest 11:11 site.
Outage reporting
Email Alerts

Identity and authentication

User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Access to all service interfaces (for consumers and providers) is constrained to authenticated and authorised individuals. Remote management access is authenticated and directly associated to authorised individuals rather than group accounts. All managed systems monitored and access logged and tracked for auditing purposes.
Access restriction testing frequency
At least every 6 months
Management access authentication
2-factor authentication
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device on a government network (for example PSN)
  • Dedicated device over multiple services or networks

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
Our partner - 11:11 adheres to the Security Classification Definitions as described in the Government Security Classifications Policy (GSC P). This is outlined and defined in 11:11 Quality Manual and forms part of 11:11 overall integrated management system, which consists of UKAS / APMGI NCSC accredited systems.
Information security policies and processes
Notably: ISO 27001:2013 Information Security Management; ISO 20000-112011 IT Service Management; ISO 9001:2015 Quality Management; lSO14001:2015 Environmental Management and NCSC compliance for 11:11 service. All are regularly reviewed

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Our change management processes are in line with ISO27001 control A.12.2 Controlled mechanism for making changes to the operational environment are in place.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Vulnerability management process is aligned with |SO27001:2013 control A12.6.1 which addresses 3 key areas: - Timely identification of vulnerabilities - Assessment of or exposure to a vulnerability - Defined measures to address the risk.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Protective Monitoring process is aligned with ISO27001:2013 control A.12.4 which details: - Event Logging ~ Protection of log information - Admin & operator logs - Clock synchronisation - Incident Management
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Incident management process is aligned with ISO27001:2013 control A.16.1 which details: - The full incident management procedure - Responsibilities &

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Supplier
Virtualisation technologies used
VMware
How shared infrastructure is kept separate
Each tenant's servers are segregated into their own VLAN 11:11 consult with clients to determine if servers need configured to further split server farms over separate security zones. This ensures that uncontrolled network communications do not occur through adjacent architectural tiers Storage presentation is segregated through the use of fibre-channel zoning, prohibiting any host from accessing unauthorised storage areas.

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
The 11:11 EnMS combines best practices in project management, energy monitoring, and energy awareness along with an energy policy that governs our approach towards energy use and performance. EnMS records and reports on energy usage and Power Usage Effectiveness (PUE) for our data centre estate in the UK as well as how 11:11 is reducing energy consumption and improving energy efficiency as a Group. Monitored by the Environment Agency (EA) and the Scottish Environment Protection Agency (SEPA), 11:11 use our EnMS with Schneider Electric to analyse energy efficiency across our multiple UK data centres. We do this to ensure we meet our moral obligations and regulatory requirements under the Climate Change Agreement (CCA) and in accordance with the (ESOS) Energy Savings Opportunity Scheme.

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

"We have an environmental statement and are working to improve our ESG governance generally. Wwe formulated a plan to become net zero by 2030 which is available on our website.
What we are doing to reduce our emissions
-Our People – we launched a WIKI within Teams containing advice on how to minimise your environmental impact.
-Our Suppliers – 95% of our environmental impact comes from suppliers. We have reviewed our supplier onboarding process to score their environmental impact and are in discussion with Key suppliers so we understand what they are doing to limit Carbon emissions and how we can work with them to make this happen.
-Our Customers – our sales efforts focus on transitioning customers to cloud services and low energy products such as FTTP. These are more efficient and will reduce emissions over time.
95% of our emissions are from our supply chain/customer usage of our products and we are working on our supplier strategy to fully understand their plans and as well as proactively transitioning our customers onto more environmentally responsible products and services (e.g. Broadband -> FTTP) to help them hit their targets.
5%- us We have moved to 96% home working, reduced our office footprint from 6 to 1 and have seen a substantial reduction in our emissions and utilities usage (reported annually). This equates to over 350 people no longer commuting.
Our People come together if they need to at head office or in a network of small hubs, for example all teams meet at least once per quarter and some choose to more frequently.
This cuts carbon emissions significantly as
-over 350 people no longer need to commute every day,
-over 90% of internal, supplier and customer meetings take place over Teams
-We reduced our office footprint from 6 to 1.

Covid-19 recovery

Cyberlab have in place a robust and tested Business Continuity Plan, recovery for pandemics would be included within this BCP.

Tackling economic inequality

"Our UK sites sponsor twelve charities a year. One of the main philanthropic successes we have seen in recent years is the launch of our Engage platform. Successfully linking Culture and Charity by introducing a fun and quick way to provide companywide recognition and praise for all to see. All our people are encouraged to recognise when their colleagues have performed well by giving them ‘Praise’, The best thing about this – every time someone is praised, they get to donate £1 to one of the 12 Charities. In 2023, we raised £9,000 through Praise recognition, which was part of the £45,000 total we donated.
When things happen in the world that we've not planned for, people will turn to their leaders to see how we will support them, recently, we sent medical and food supplies to the Romania – Ukraine border and donated to the Red Cross Ukraine Crisis Appeal.
Recent Regional and National Charity initiatives
Bare Necessities
Bare Necessities is a toiletry bank based in South Manchester, founded by two friends, determined to do something to help local people have equal access to personal hygiene products. We have set up toiletry drop off points at each of our hubs and will regularly be delivering these to be put into hygiene kits.

Mission Christmas Toys for Kids Appeal
Our people can gift £5 per month to go towards the Mission Christmas Toy Appeal that runs across the UK.

Wrap Up Campaign
Wrap Up is a project run by various Rotary Clubs working in partnership across the UK to provide coats directly to people across the UK. Each hub became a drop off point and our people donated over 50 of their old coats which were then circulated to the collection points across the UK."

Equal opportunity

"Our People have told us that they want to work flexibly and so the ability to work from different locations utilising all of the new technology we have embraced during the pandemic has become our new normal in terms of our working practices. This opens up an exciting opportunity to widen our recruitment activities to include groups of people who previously were not open to us because of the geographic and physical barriers that working in a fixed location bring. Removing these barriers and proactively searching out new ways to attract and recruit people from all areas of society will enable us to grow a much more diverse workforce with all of the cultural, social and financial benefits that this brings.
we have always considered that we drive a culture that promotes inclusion and diversity. We have always celebrated all our people's successes, but complacency is dangerous and there is always more we can do. We pay close attention to what other organisations are doing, we listen to our people, and our goal is to drive hard in this area, providing the opportunity for all who wish to take it.

Economic – employment, training and work-experience opportunities
We support localisation in the delivery of services through:

a)Local employment
We proactively look at ‘local’ employment, training and work-experience opportunities for individual where this is appropriate and deliverable.

b) Apprenticeships
Graduate and Apprentice Schemes - We employ 5no apprentices across the business including IT and people support.

c) Employability Training
We offer young people employability training via interview practice, CV assistance and familiarisation with an office environment. We have previously offered work experience and apprenticeships to young people we have been introduced to via this scheme."

Wellbeing

"Communication and collaboration are vital to maintaining energy and focus especially with most employees choosing to work from home.

Staff are encouraged to meet with their teams at one of the local hubs in a network spread across the UK. And there are two annual conferences to celebrate success and bring people together.

All teams have daily Teams 'huddles' to set the focus for the day and share any issues, as well as monthly 121s. Employees get monthly updates from the Chairman and Board of Directors to keep them up to speed on business performance, with daily 'need to knows' posted on internal channels. Additionally, the chairman hosts monthly lunches, allowing employees to express any concerns directly.
Working together in a positive environment
Every day, we encourage, motivate, and support each other to maintain a friendly positive atmosphere where everyone feels valued and cared for. We have created a culture that is inclusive and diverse where everyone is encouraged to bring innovative new ideas to the table and work together to achieve our organisational goals. It’s a place where hard work and success is rewarded. All our people set Goals and Responsibilities tied to our Blueprint which are reviewed regularly throughout the year, as well as a Personal Development Plan outlining their short and long term career objectives – both within and outside

• We are advocates of diversity and inclusion, and our culture is open to everyone.
• Looking after our employees - Future Fit wellbeing -
• Early career apprenticeship and graduate programmes
• Passionate about encouraging and supporting women in tech, with above average industry standards for women in tech and females in leadership roles - International Women’s Day -
• Flexible working options for every employee where possible "

Pricing

Price
£35.28 a terabyte
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at bids@cyberlab.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.