Cloud Hosting
Synergi provide cloud hosting services in public, private and hybrid cloud models. Our high-skilled consultants will assist with strategy, platform build, maintenance and live service support to ensure a smooth transition.
Features
- Support and design of cloud architecture
- Scalability
- Transparent pricing
- Proactive monitoring and management
Benefits
- Fully managed service
- Flexible
- Scalability
Pricing
£90 to £7,000 a server a month
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 8 1 6 1 1 2 8 1 6 8 6 8 4 3
Contact
Synergi Software Limited
Team Synergi
Telephone: 01914770365
Email: info@teamsynergi.co.uk
Service scope
- Service constraints
- Maintenance periods will be planned outside of core business hours and communicated in advance unless they are Vendor specific maintenance windows which may not be adjusted.
- System requirements
- All requirements would be scoped out by a Synergi Consultant
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
-
Synergi operates an ITIL compliant Service Desk that operates Monday -Friday 08:00-18:00 as standard. Incidents can be logged proactively via our RMM toolkit, via phone, via email, via the client portal or via the RMM functionality from a users desktop.
Critical incident response is 30 working mins
High incident response is 1 working hour
Medium incident is 3 working hours
Service request response is 6 working hours - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Synergi operates an ITIL compliant Service Desk that operates Monday -Friday 08:00-18:00 as standard. Incidents can be logged proactively via our RMM toolkit, via phone, via email, via the client portal or via the RMM functionality from a users desktop.
Critical incident response is 30 working mins
High incident response is 1 working hour
Medium incident is 3 working hours
Service request response is 6 working hours - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Learning and adoption represent an active component of each phase of a Synergi Client Project Engagement. Inclusive focus on the complete learning and adoption for users is the best way to ensure ultimate success.
Sponsorship and Leadership: Recognising that executive-level sponsorship is a key success factor, Synergi will seek the participation of a director or mid-level executives from each business unit. This component also forms an organisational change management team to address the process changes that accompany the new implementation.
Adoption Strategy: Synergi will determine at a high level what types of training and support are most likely to accelerate end user adoption of the new platform and processes included.
Detailed Programme Planning: Taking the strategy to a more practical level, Synergi IT create detailed plans based on users training needs, where they were located, and how to accommodate diverse learning needs and preferences. Synergi will additionally define a communications plan to build awareness and understanding of the changes to come, and a content plan to support all aspects of the adoption program.
Blended Learning: To accommodate individual learning preferences, Synergi IT delivers a blended approach, combining instructor-led classroom and on-demand training, along with over-the-shoulder mentoring. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Data can be easily migrated utilising common migration tools readily available in the market.
- End-of-contract process
- The associated costs for end of life contract where appropriate will be determined between both parties depending on the level of technical expertise on the client side, these costs are not described in an initial deployment contract.
Using the service
- Web browser interface
- No
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
-
- Automatic
- Manual
- Independence of resources
- Synergi will utilise dedicated virtual machines for individual clients.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- Memory
- Network
- Number of active instances
- Reporting types
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Azure
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Virtual machines
- Files
- Databases
- Backup controls
- Synergi's backup solution is able to be customised to suit the client's needs.
- Datacentre setup
-
- Multiple datacentres with disaster recovery
- Single datacentre with multiple copies
- Single datacentre
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- Uptime target of 99.9% with Service Credits available on request.
- Approach to resilience
- Available on request.
- Outage reporting
- Email or text alerting.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google apps)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Access restrictions will be delivered by user authentication tools.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
- Dedicated device on a segregated network (providers own provision)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Internal security policies.
- Information security policies and processes
- Synergi have an internal security policy that is published to all employees, this is regularly reviewed at board level.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- We have a change management process that has a multi level approval process and a dedicated Change Manager. Components of the service are monitored and maintained proactively, with any risks to service noted on a risk register. Any changes to service can be viewed via a audit history in our internal PSA system.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We have various monitoring systems in place that identify potential threats. We can deploy emergency patches in line with our Change Management process.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We use industry leading monitoring tools to manage our systems. Should a potential threat be detected an incident would be auto created into our PSA system. The incident is then catergorised based on its priority and severity and resolved within our SLA guidelines.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Incidents can be raised pro-actively via our monitoring systems, via email, via phone, via our RMM tool or via a client portal. We have a standardised incident management process that is in line with ITIL principles. Major incident reports will be provided by email where appropriate, monthly, quarterly and annual incident reports and analysis are also available.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- The Datacentre is accredited at the Code of Conduct’s Participant level and are actively engaging in reducing energy consumption whilst delivering business critical datacentre services.
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Synergi are committed to being an environmentally friendly company, in 2022 we have introduced an initiative to plant 1 tree for every consultancy day sold. All of our company vehicles are hybrid, we encourage remote first meetings and the use of public transport when remote is not possible, we have swapped all of our office lighting to be more energy efficient and will continue to be committed to further opportunities to improve where possible.Covid-19 recovery
Synergi has employed a number of people who were made redundant due to the Covid-19 pandemic, we have ran free webinars to encourage the use to Team and help train people who would otherwise have not used remote tools as part of their daily working life. We have ensured that our offices are Covid 19 secure by introducing social distancing and making some roles fully remote and some hybrid. We have also worked on a number of client projects that have focused around “return to office” activities.Tackling economic inequality
Synergi run both a graduate and apprenticeship scheme, we are fully committed to investment in both areas. All employees benefit from a minimum of one Continuous Profession Development Day per month, many employees have gained notable professional qualifications off the back of this.Equal opportunity
Synergi has a disability-friendly office, we employ a number of people from diverse economic, ethic and social backgrounds. We monitor our gender pay gap which is currently 1.3% which is below the national average of 15.5%.Wellbeing
Synergi are committed to employee well-being, we have implemented unlimited holidays within the last 12 months, we have ran anonymous staff surveys to get feedback on working conditions and proactively asked for suggestions for improvements.
Pricing
- Price
- £90 to £7,000 a server a month
- Discount for educational organisations
- No
- Free trial available
- No