Pre-Packed Cloud Hosting
Synapse Pre-Packed Cloud is infrastructure that is pre-built allowing customers to take advantage of a fast route to move to the cloud cost effectively and sustainably. This can be Private or Public Cloud including Trusted Cloud, Dynamics, O365. Fully Flexible & Scalable. Agile & Secure. Enabling effective positive business outcomes.
Features
- Private Managed Cloud - Fully Private Secure Cloud
- Public Managed Cloud - Flexible Public Managed Cloud
- Pre-Packed Cloud - Pre-Built Cloud. Allowing Fast Migration
- Data Backup - Managed Backup - Backup as a Service
- Disaster Recovery - Disaster Recovery as a Service
- Cyber Vault - Cyber Vault as a Service
- University Data Archive - University Data Backup
- Housing Data Backup - Storage as a Service
- BaaS DRaaS CRaaS STaaS PMC APEX Druva
- Microsoft O365 - Broadcom VMware VCF
Benefits
- Subscription Configuration Deployment of Base Components Migration Support
- 12x Faster Cloud Setup 4x Better Security 48% Reduced Cost
- 62% Less Machine Costs 68% Efficiency 6x Faster Migration
- Game Changing Cloud Data Backup Disaster Recovery
- Ready in 5 days for Public Cloud Fast PMC APEX
- Private Cloud Secure Versatile. Simple & Trusted
- Backup Simple Fast Effective Sustainable Scalable Secure High Security
- Backup 24x7 Protection 365 Days of the Year
- Fully Managed Cyber Attack Recovery Service Protected Critical Data
- Detailed Software for O365, Dynamics & VMware
Pricing
£36.00 to £120.00 a terabyte a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 7 1 9 6 9 3 0 1 1 9 7 1 5 0
Contact
SYNAPSE360
Sales Team
Telephone: 03306600001
Email: sales@synapse360.com
Service scope
- Service constraints
- No. We can be flexible aligned to customer requirements.
- System requirements
-
- Aligned to Dell Product Sets
- Flexible on Demand. Across Various Product Sets
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
SLA's inline with standard terms and conditions.
Initial response within 15 minutes. Fix times vary depending on on whether P1-P4 - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- N/a
- Onsite support
- Yes, at extra cost
- Support levels
- Support is typically included and we provide hosting in our Data Centres. Remote customer hosting can be provided at additional cost. Please review pricing sheet for details. Support will consist of fully trained personnel.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We will go through a full onboarding process end to end via our PMO and account manager teams and TAM where needed.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- This will be managed securely and will be defined in the Exit Plan of our MSA.
- End-of-contract process
- An off boarding process will be completed inline with Exit Terms of our MSA and or as defined in any SOW.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Details available on request
- Web interface accessibility standard
- WCAG 2.1 AAA
- Web interface accessibility testing
- N/A
- API
- No
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- Using the command line interface
- Specific details on request. This depends on specific circums
Scaling
- Scaling available
- No
- Independence of resources
- We scale and monitor on demand and this is flexible. We have significant capacity. But this depends on whether services and Shared on Dedicated.
- Usage notifications
- Yes
- Usage reporting
-
- SMS
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Hardware containing data is completely destroyed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Files
- Virtual Machines
- Databases
- All Common Product Sets. Functionality of PMC
- Backup controls
- This is defined via the backup interface and as agreed between both parties inline with the service description
- Datacentre setup
-
- Multiple datacentres with disaster recovery
- Multiple datacentres
- Single datacentre with multiple copies
- Single datacentre
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- Please review our Service Descriptions by Service for Details
- Approach to resilience
- Available on Request.
- Outage reporting
- Dashboard. SMS and E-Mail Alerts
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Details available on request.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Dedicated device over multiple services or networks
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- Users receive audit information on a regular basis
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- LRQA
- ISO/IEC 27001 accreditation date
- 06/11/2023
- What the ISO/IEC 27001 doesn’t cover
- See page 5 for Synapse inclusion part of MT Group
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- NCC Group
- PCI DSS accreditation date
- 06/09/23
- What the PCI DSS doesn’t cover
- See certificate for details. Applies to MT Group which Synapse 360 is part of.
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- Dell Titanium Partner
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- We have ISO27001, Cyber Essentials. & Internal policies and controls aligned to the Compliance team and that run through into the Group Risk Committee.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Details available on request. But ITIL based.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- We use a specific software product set for threat detection and management and a SIEM also.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- SOC, NOC & SIEM
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- ITIL and ISO27001
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Third-party
- Third-party virtualisation provider
- Dell
- How shared infrastructure is kept separate
- Specific Shared Instances and Security controls that can be reviewed on request. Product set details available on our website also
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- Tier 3 aligned DC's. We adhere to best practice standards.
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Equal opportunity
- Wellbeing
Fighting climate change
We have set targets at Group/Board level that we must adhere to and these are reported on. We have a firm target to be carbon neutral by 2023, ideally 2025 and we are focused on a year on year energy reduction alongside a sustainable supply chain. https://www.manxtelecom.com/about/esg/Equal opportunity
We comply and adhere to equal opportunities and this is mandated through our policies and procedures. This is reported on at a board level also.Wellbeing
We proactive focus on wellbeing and we do utilise a 3rd party training and specialist provider her to support alongside internal controls and focus on a regular and a consistent basis.
Pricing
- Price
- £36.00 to £120.00 a terabyte a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- POC - 2-6 Week Period. Details on Request.