Cloudlake Storage
Cloudlake Storage powered by Wasabi provides fast, secure and immutable universal UK and Global cloud storage. Whether for files, backup, archive, large data sets, CCTV or almost any other unstructured data, Cloudlake Storage is available in one fast, low cost , secure, simple and flexible tier with no lock-ins.
Features
- Fast hot-storage, no cool or cold tiers
- Highly secure AES 256 encryption in transit and at rest
- 11x9s of data durability
- Tier 4 datacentres available in UK and 10 global locations
- No ingress/egress fees
- No API fees
- No data transfer fees
- No contract lock-in with monthly PAYG pricing
- Full premium support included as standard
- Implement immutability for ultimate data protection
Benefits
- Transparent: pay only for storage used with no other charges
- Predictable: avoid opaque pricing models often associated with cloud
- Modular: add additional services to use with storage as required
- Flexible: pay for what you use, scale indefinitely on-demand
- Retain control: choose from monthly, yearly or multi-year contracts
- Maintain data sovereignty: UK based service that you control
- Save time: reduce internal resource via a fully managed service
- Stay secure: protect critical data from ransomware, corruption and loss
- Save money: best value storage at £5.99 per TB/month
Pricing
£5.07 to £5.99 a terabyte a month
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 7 5 5 0 9 6 7 7 2 1 9 8 6 4
Contact
AUTODATA PRODUCTS LIMITED
Ant Bucknor
Telephone: 020 7749 7949
Email: cloudlake@autodata.co.uk
Service scope
- Service constraints
- No constraints
- System requirements
- None
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We have an SLA in place to respond to raised tickets within one hour, within standard business hours. Out of hours support available if required.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Autodata are able to support our clients with a range of service levels from simple "call-in" services to a fully managed platform. Delivery of support is available in both business hours and out-of-hours support and SLAs from 1-8hrs. Agreements available to suit each use case. Autodata assign a Technical Account Manager to ensure service levels are achieved and help sculpt the delivery to meet the organisational need.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide an initial demonstration and training, with Quick Start guides and Knowledge Base, and ongoing assistance where necessary.
- Service documentation
- Yes
- Documentation formats
-
- ODF
- Other
- Other documentation formats
- MS Word
- End-of-contract data extraction
- As our clients always have access to their data in our platform, they are free to extract their data at any time. This could be by downloading the data back to an on-premise hardware appliance or transferring to an alternative cloud service.
- End-of-contract process
- Our contracts are based on a monthly rolling agreement. The client is free to cancel at any time.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Our storage platforms are always accessible and controllable by our clients. This ensures data sovereignty, flexibility, accessibility and security.
- Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- N/A
- Web interface accessibility testing
- N/A
- API
- Yes
- What users can and can't do using the API
-
Wasabi provides 3 distinct APIs: Wasabi S3 API - Wasabi’s object storage service is built to be 100% bit-compatible with the Amazon Web Services’ Simple Storage Service (AWS S3) and Identity and Access Management (AWS IAM) APIs. Wasabi Account Control API: at a high level, WACA allows for the following functions:
Create a new sub-account that is linked to the Wasabi Control Account - Generate AWS key sets for sub-accounts - Query utilisation of sub-accounts both at the summary account level and bucket level - Manage account “profile” information, such as email address.
WACM Connect API - at a high level, the WACM Connect allows for the following functions: Query utilisation of sub-accounts at the account level and bucket level - Query invoices of sub-accounts - Query current utilisation of control accounts - Filter the responses with a wide range of parameters. - API automation tools
-
- Ansible
- Terraform
- API documentation
- Yes
- API documentation formats
-
- HTML
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- MacOS
- Other
- Using the command line interface
-
Wasabi is certified for use with the AWS CLI.
Functions include:
- Creating buckets
- Configuring buckets
- Listing buckets
- Enabling object-lock
- Cloud-to-cloud migrations
- Data transfer
- User creation
- Bucket sizes
- Downloading of files
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- Storage pools are increased depending on demand, storage availability is always 50% greater than currently used as a minimum.
- Usage notifications
- No
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
- Disk
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Wasabi
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Other
- Other data at rest protection approach
- All data is encrypted with AES 256 in transit and at rest
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- No
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Other
- Other protection between networks
- All data is encrypted with AES 256 in transit
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection within supplier network
- Information Protection Policies, DNS-Layer Security, Endpoint Protection
Availability and resilience
- Guaranteed availability
- All data stored within our repositories is available, with 11x9s of data durability
- Approach to resilience
- Available on request
- Outage reporting
- Any outages are reported with both public dashboards and co-ordinated with email and/or telephone communication where appropriate.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Users of our service are defined by our clients. Access controls, rights controls and MFA are available and defined by groups and users.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
- Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 17/12/2021
- What the ISO/IEC 27001 doesn’t cover
- The Access Controls to program source code and the separation of development, testing and operational environments are excluded from the scope as Autodata does not do any development
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- ISO 9001 and Cyber Essentials Plus
- Information security policies and processes
- Autodata has a system of processes in place to control how the company operates and maintains its Quality and Information Security Management Systems. These have been independently assessed and certified against ISO 9001 and ISO 27001 by BSI, a UKAS accredited audit body. Within the Information Security Policy are specific policies focusing on Access Control, Backup Management, Business Continuity Management, Change Management, Data Protection, Encryption and Password Management amongst others. All staff are trained in these systems as part of their onboarding and on an ongoing basis.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Our change management processes are aligned with the ISO27001 requirements. Change requests must be submitted for risk assessment and testing prior to approval, including documented provisions for reversal, to prevent disruption to services.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Weekly vulnerability scans are scheduled and any non-informational 'High' and above vulnerabilities must be identified and resolved within 48 hours. Patching occurs as required and scan reports (including Remediate actions) are reviewed monthly.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Monitoring is in place via Cynet 360 XDR, Cisco Umbrella and Palo Alto NGFW IPS and IDS systems. Any potential compromises identified will trigger our Incident Management Procedure, which is in line with ISO27001 requirements.
- Incident management type
- Supplier-defined controls
- Incident management approach
- This process has been defined to meet ISO 27001 requirements. Incidents are classified on receipt as either a Security Weakness or Event, a Minor Incident or a Major Incident. Treatment processes are documented for each category, which include establishing the cause and taking preventative or corrective action; taking measures to contain the incident and logging the relevant details; liaising with the relevant authorities. External consultants are retained to identify, collect and preserve evidence in the event of a major incident and a disciplinary process will be invoked for any violation of the security rules.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- Our partner's data centres are green by design. They are built to operate with high energy-efficiency standards and have the goal of using 100% clean and renewable energy (currently >90%). The data centres take advantage of innovative green solutions such as adaptive control systems, ASHRAE thermal guidelines, cold/hot aisle containment, energy-efficient lighting systems, fuel cells and high temperature chilled water set points. All of these systems together allow the data centres to reduce power consumption and increase efficiencies. Data centres are certified to meet rigorous environmental and energy management systems standards with all new builds targeting LEED silver or equivalent green building certifications. Our partner is recognised as a leader in sustainability receiving an A- rating from CDP and the EPA’s Green Power Partner of the Year award and has previously won the EU Code of Conduct Energy Efficiency Award; as well as having various other certifications such as ISO 14064, 14001 and 50001.
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Our Cloudlake offering utilises cloud storage, which is proven to be more sustainable due to hyper-efficient architecture and higher utilisation rates. Our data centre partner is committed to using over 90% of renewable energy sources and has strong social commitments, supporting charities, diversity and inclusion.
Pricing
- Price
- £5.07 to £5.99 a terabyte a month
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- A free trial of our storage platform is available, offering 5TB of storage for 30 days. This is a fully featured trial and is identical to our paid service. Larger size and longer length trials available on request.
- Link to free trial
- https://cloudlake.autodata.co.uk/powered-by-wasabi