Skip to main content

Help us improve the Digital Marketplace - send your feedback

AUTODATA PRODUCTS LIMITED

Cloudlake Backup for M365

Cloudlake Backup for M365 (powered by Veeam) protects organisations from undetected deletions, corruption and both internal and external threats. Our unique model allows you to protect Exchange, Teams, Sharepoint and OneDrive for Business against any event, whilst ensuring you only purchase exactly what you need with no wasted expense.

Features

  • Unique service model with users/management/storage options available
  • Deploy on your premises/in public cloud/or managed by Autodata
  • Store data on your premises/in public cloud/or managed by Autodata
  • Both “Air-Gap” and “Immutability” provided as standard, protecting from ransomware
  • Only pay user licences for active users
  • Store an unlimited amount of backups for an unlimited time
  • Always have access to latest Veeam software releases
  • Easy to use restore portal
  • Full onboarding included at no additional charge
  • UK based support, deployment and storage

Benefits

  • Simple pricing: based on your actual usage
  • No overpayments: pay only for what you require each month
  • Scale: increase or decrease your licences at any time
  • Modular: add or remove service elements at any time
  • Protection: from any threat either internal or external
  • Reduce operational costs: with support services included
  • Flexible billing: pay monthly or yearly
  • Sovereignty: storage can always be accessed and its location controlled
  • Reliable: the world's No1 backup tool for M365: Veeam

Pricing

£0.15 to £0.89 a user a month

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at cloudlake@autodata.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

7 8 4 0 2 5 4 7 1 3 2 6 3 5 9

Contact

AUTODATA PRODUCTS LIMITED Ant Bucknor
Telephone: 020 7749 7949
Email: cloudlake@autodata.co.uk

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Microsoft 365/ M365
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
N/A
System requirements
  • Microsoft 365
  • M365

User support

Email or online ticketing support
Email or online ticketing
Support response times
We have an SLA in place to respond to raised tickets within one hour, within standard business hours. Out of hours support available if required.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
No
Support levels
Autodata are able to support our clients with a range of service levels from simple "call-in" services to a fully managed platform. Delivery of support is available in both business hours and out-of-hours support and SLAs from 1-8hrs. Agreements available to suit each use case. Autodata assign a Technical Account Manager to ensure service levels are achieved and help sculpt the delivery to meet the organisational need.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide a full onboarding service free of charge, online training courses and documentation.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
Users always have direct access to the underlying storage of their data, therefore at the end of the contract, the data can simply be copied/ moved to an alternate location of the user's choosing.
End-of-contract process
Our contracts are based on a monthly rolling agreement. The client is free to cancel at any time.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
Through our portal you are able to view users' backup data, choose objects for recovery, choose the destination of recovery (original location, different location, download, etc.) and/or recover entire user accounts or groups of accounts.

Search is provided to enable the correct objects to be retrieved and complex search criteria can be used to identify information, even within extremely large data sets.
Accessibility standards
None or don’t know
Description of accessibility
N/A
Accessibility testing
N/A
API
No
Customisation available
Yes
Description of customisation
Frequency of backups (RPO) - location of processing (compute) globally - location of storage globally - complete private backup cloud with unlimited customisation possible.

Scaling

Independence of resources
We scale the service elastically, based on demand, via continual monitoring.

Analytics

Service usage metrics
Yes
Metrics types
Storage usage, protected users, protected applications
Reporting types
Real-time dashboards

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Veeam

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
  • Other
Other data at rest protection approach
All data is encrypted with AES 256 in transit and at rest
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
As our clients always have access to their data in our platform, they are free to extract their data at any time. This could be by downloading the data back to an on-premise hardware appliance or transferring to an alternative cloud service.
Data export formats
Other
Other data export formats
S3 compatible storage objects
Data import formats
Other
Other data import formats
Microsoft 365 standard storage formats

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
All data stored within our repositories is available, with 11x9s of data durability
Approach to resilience
Available on request
Outage reporting
Any outages are reported with both public dashboards and co-ordinated with email and/or telephone communication where appropriate.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Users of our service are defined by our clients. Access controls, rights controls and MFA are available and defined by groups and users.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
17/12/2021
What the ISO/IEC 27001 doesn’t cover
The Access Controls to program source code and the separation of development, testing and operational environments are excluded from the scope as Autodata does not do any development
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Autodata has a system of processes in place to control how the company operates and maintains its Quality and Information Security Management Systems. These have been independently assessed and certified against ISO 9001 and ISO 27001 by BSI, a UKAS accredited audit body. Within the Information Security Policy are specific policies focusing on Access Control, Backup Management, Business Continuity Management, Change Management, Data Protection, Encryption and Password Management amongst others. All staff are trained in these systems as part of their onboarding and on an ongoing basis.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Our change management processes are aligned with the ISO27001 requirements. Change requests must be submitted for risk assessment and testing prior to approval, including documented provisions for reversal, to prevent disruption to services.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Weekly vulnerability scans are scheduled and any non-informational 'High' and above vulnerabilities must be identified and resolved within 48 hours. Patching occurs as required and scan reports (including Remediate actions) are reviewed monthly.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Monitoring is in place via Cynet 360 XDR, Cisco Umbrella and Palo Alto NGFW IPS and IDS systems. Any potential compromises identified will trigger our Incident Management Procedure, which is in line with ISO27001 requirements.
Incident management type
Supplier-defined controls
Incident management approach
This process has been defined to meet ISO 27001 requirements. Incidents are classified on receipt as either a Security Weakness or Event, a Minor Incident or a Major Incident. Treatment processes are documented for each category, which include establishing the cause and taking preventative or corrective action; taking measures to contain the incident and logging the relevant details; liaising with the relevant authorities. External consultants are retained to identify, collect and preserve evidence in the event of a major incident and a disciplinary process will be invoked for any violation of the security rules.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

Our Cloudlake offering utilises cloud storage, which is proven to be more sustainable due to hyper-efficient architecture and higher utilisation rates. Our data centre partner is committed to using over 90% of renewable energy sources and has strong social commitments, supporting charities, diversity and inclusion.

Pricing

Price
£0.15 to £0.89 a user a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
We include a one month completely free trial of the service.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at cloudlake@autodata.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.