Skip to main content

Help us improve the Digital Marketplace - send your feedback

SYNAPSE360

Pre-Packed Cloud Hosting

Synapse Pre-Packed Cloud is infrastructure that is pre-built allowing customers to take advantage of a fast route to move to the cloud cost effectively and sustainably. This can be Private or Public Cloud including Trusted Cloud, Dynamics, O365. Fully Flexible & Scalable. Agile & Secure. Enabling effective positive business outcomes.

Features

  • Private Managed Cloud - Fully Private Secure Cloud
  • Public Managed Cloud - Flexible Public Managed Cloud
  • Pre-Packed Cloud - Pre-Built Cloud. Allowing Fast Migration
  • Data Backup - Managed Backup - Backup as a Service
  • Disaster Recovery - Disaster Recovery as a Service
  • Cyber Vault - Cyber Vault as a Service
  • University Data Archive - University Data Backup
  • Housing Data Backup - Storage as a Service
  • BaaS DRaaS CRaaS STaaS PMC APEX Druva
  • Microsoft O365 - Broadcom VMware VCF

Benefits

  • Subscription Configuration Deployment of Base Components Migration Support
  • 12x Faster Cloud Setup 4x Better Security 48% Reduced Cost
  • 62% Less Machine Costs 68% Efficiency 6x Faster Migration
  • Game Changing Cloud Data Backup Disaster Recovery
  • Ready in 5 days for Public Cloud Fast PMC APEX
  • Private Cloud Secure Versatile. Simple & Trusted
  • Backup Simple Fast Effective Sustainable Scalable Secure High Security
  • Backup 24x7 Protection 365 Days of the Year
  • Fully Managed Cyber Attack Recovery Service Protected Critical Data
  • Detailed Software for O365, Dynamics & VMware

Pricing

£36.00 to £120.00 a terabyte a month

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sales@synapse360.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

7 7 1 9 6 9 3 0 1 1 9 7 1 5 0

Contact

SYNAPSE360 Sales Team
Telephone: 03306600001
Email: sales@synapse360.com

Service scope

Service constraints
No. We can be flexible aligned to customer requirements.
System requirements
  • Aligned to Dell Product Sets
  • Flexible on Demand. Across Various Product Sets

User support

Email or online ticketing support
Email or online ticketing
Support response times
SLA's inline with standard terms and conditions.
Initial response within 15 minutes. Fix times vary depending on on whether P1-P4
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Yes, at an extra cost
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AAA
Web chat accessibility testing
N/a
Onsite support
Yes, at extra cost
Support levels
Support is typically included and we provide hosting in our Data Centres. Remote customer hosting can be provided at additional cost. Please review pricing sheet for details. Support will consist of fully trained personnel.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We will go through a full onboarding process end to end via our PMO and account manager teams and TAM where needed.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
This will be managed securely and will be defined in the Exit Plan of our MSA.
End-of-contract process
An off boarding process will be completed inline with Exit Terms of our MSA and or as defined in any SOW.

Using the service

Web browser interface
Yes
Using the web interface
Details available on request
Web interface accessibility standard
WCAG 2.1 AAA
Web interface accessibility testing
N/A
API
No
Command line interface
Yes
Command line interface compatibility
  • Linux or Unix
  • Windows
Using the command line interface
Specific details on request. This depends on specific circums

Scaling

Scaling available
No
Independence of resources
We scale and monitor on demand and this is flexible. We have significant capacity. But this depends on whether services and Shared on Dedicated.
Usage notifications
Yes
Usage reporting
  • Email
  • SMS

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
Hardware containing data is completely destroyed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • Files
  • Virtual Machines
  • Databases
  • All Common Product Sets. Functionality of PMC
Backup controls
This is defined via the backup interface and as agreed between both parties inline with the service description
Datacentre setup
  • Multiple datacentres with disaster recovery
  • Multiple datacentres
  • Single datacentre with multiple copies
  • Single datacentre
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
Please review our Service Descriptions by Service for Details
Approach to resilience
Available on Request.
Outage reporting
Dashboard. SMS and E-Mail Alerts

Identity and authentication

User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Details available on request.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device over multiple services or networks

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
Users receive audit information on a regular basis
How long supplier audit data is stored for
Between 6 months and 12 months
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
LRQA
ISO/IEC 27001 accreditation date
06/11/2023
What the ISO/IEC 27001 doesn’t cover
See page 5 for Synapse inclusion part of MT Group
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
Yes
Who accredited the PCI DSS certification
NCC Group
PCI DSS accreditation date
06/09/23
What the PCI DSS doesn’t cover
See certificate for details. Applies to MT Group which Synapse 360 is part of.
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
Dell Titanium Partner

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
We have ISO27001, Cyber Essentials. & Internal policies and controls aligned to the Compliance team and that run through into the Group Risk Committee.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Details available on request. But ITIL based.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
We use a specific software product set for threat detection and management and a SIEM also.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
SOC, NOC & SIEM
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
ITIL and ISO27001

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Third-party
Third-party virtualisation provider
Dell
How shared infrastructure is kept separate
Specific Shared Instances and Security controls that can be reviewed on request. Product set details available on our website also

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
Tier 3 aligned DC's. We adhere to best practice standards.

Social Value

Social Value

Social Value

  • Fighting climate change
  • Equal opportunity
  • Wellbeing

Fighting climate change

We have set targets at Group/Board level that we must adhere to and these are reported on. We have a firm target to be carbon neutral by 2023, ideally 2025 and we are focused on a year on year energy reduction alongside a sustainable supply chain. https://www.manxtelecom.com/about/esg/

Equal opportunity

We comply and adhere to equal opportunities and this is mandated through our policies and procedures. This is reported on at a board level also.

Wellbeing

We proactive focus on wellbeing and we do utilise a 3rd party training and specialist provider her to support alongside internal controls and focus on a regular and a consistent basis.

Pricing

Price
£36.00 to £120.00 a terabyte a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
POC - 2-6 Week Period. Details on Request.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sales@synapse360.com. Tell them what format you need. It will help if you say what assistive technology you use.