Voyager
Voyager automates the migration of one desktop platform to another, whether on premise or to cloud. Voyager also automates the migration of mailboxes to M365, along with the ability to automate the enablement of other M365 services. Voyager keeps clients informed of their migration progress with customisable email communications.
Features
- E-Mail Communications
- Physical Computer Migrations
- VDI Computer Migrations
- Application Management
- Reporting And Dashboards
- Legacy Device Decommissioning
- Migration Database
- User Metadata
- User Application Association
- M365 Migrations
Benefits
- Automated repeatable processes
- Accessible from multiple devices concurrently
- Automated data ingestion
- Single pane of glass for multiple data sources
- Fully customisable for bespoke migration requirements
- Accelerated workspace migrations
- Familiar yet powerful user interface
- Unattended M365 migrations
- Fully configurable RBAC model for user access
- Automated e-mail communications based on customisable T-minus process
Pricing
£10 a unit a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 6 1 5 3 3 6 5 8 5 1 3 6 4 5
Contact
CLOUD JOURNEY LLP
Stephen Addy
Telephone: 02036420438
Email: info@cloudjourneypartners.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- No
- System requirements
-
- Microsoft SQL Server
- Microsoft IIS
- Microsoft Windows Server
- PowerShell Connectivity
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- To the agreed SLAs
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Up to 24/7 support provided covering the product.
The support cost is based on a percentage of the overall contract value.
Yes a Technical Account Manager and Cloud Support Engineer will be provided. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We offer a mixture of onsite training and user documentation as part of the handover process. This will be tailored to the needs of the customer.
We also include consultancy for more in-depth assistance where required. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- A countdown for the software expiration will be displayed within the Voyager application, giving users ample opportunity to extract any data required through standard means.
- End-of-contract process
- The software will stop working once the expiry date has passed.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
-
Voyager is accessed via a Windows or Web client with a full RBAC model
determined through referencing the Identity Access Management solution in place. - Accessibility standards
- None or don’t know
- Description of accessibility
- Users can access Voyager Windows or web client to access relevant data to perform migrations.
- Accessibility testing
- None
- API
- No
- Customisation available
- Yes
- Description of customisation
-
Voyager includes various modules such as Desktop Migrations, M365 Migrations, Reporting/Dashboards etc which will be customised to client requirements as a part of the installation and onboarding service. This will include any user interface adds/changes and ingestion of specific datapoints relevant to migrations agreed with the client.
User interface customisation can be performed by users of the application.
Scaling
- Independence of resources
- Voyager is built on industry standard scalable architecture in scope of the customers requirements as part of the onboarding process.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Migrated Users, Upcoming Migrations, Migration Status etc.
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Through built-in tools within the application.
- Data export formats
- CSV
- Data import formats
- Other
- Other data import formats
- Standard Extract Transform Load processes through SQL
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Voyager's standard core hours are 9am - 5pm, Monday to Friday (excluding UK Bank holidays). Access to the service (remote access to data centre, domain names, network connections, IP addresses, hosted software and equipment) during core hours will have an uptime availability of 99.99%
- Approach to resilience
- Available on request.
- Outage reporting
- Voyager will inform of any outages via email alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Access to Voyager is restricted through applying security settings based on the login credentials identified through referencing the Active Directory.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Voyager only use Cloud hosting providers who are certified with ISO/IEC 27001 certifications.
- Information security policies and processes
- Cyber security is the responsibility of the entire Board.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All hosted configuration items are virtual, and stored in a 3rd party database. Changes follow a standard ITIL compliant process, which can be customised to client requirements.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
As a company, we only use software that is fully vendor supported. Critical & security patches are applied monthly, or out of band where criticality dictates so.
Although our software has been fully penetration tested, we recommend as a part of any client engagement that penetration testing is performed on our software that is customised for each client. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
We follow the principle of least privilege and only allow access to systems where required, with the least permission needed to perform the required actions.
All of our systems are protected by anti-malware & antivirus software, complimented with firewall systems in place for ingress and egress traffic.
All alerts are surfaced to our teams who manage security & infrastructure. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Voyager uses an Incident Management process via a 3rd party solution this managed end user Incidents and Requests for changes.
A nominated user will have access to raise incidents where needed.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Wellbeing
Fighting climate change
Voyager as a service reduces the personnel overhead by a minimum of 50% used in a typical technology migration. 50% reduction equates to a lower carbon in an organisation using such service.Wellbeing
Voyager's capabilities reduces the complexities and number of hours needed to perform typical manual migrations in any enterprise - and also removes the typical stresses and strains of such activities.
Pricing
- Price
- £10 a unit a year
- Discount for educational organisations
- No
- Free trial available
- No