Rubrik (ADP) Backup / Replication / DR as a Service
Backup-as-a-Service (BaaS) simplifies backup further, giving your IT team the time to concentrate on more business critical tasks instead of spending all their time managing backups.
Our BaaS solution is powered by Rubrik technology which eliminates the need for backup and search servers, disk backup and tape archive.
Features
- Simple setup
- Easy to manage
- Database protection
- Instant recovery
- Support for enterprise systems
- Ransomware protection
- Fully managed hardware
Benefits
- Rack and go with automated discovery
- Rubrik is policy driven allowing you to assign SLA policies
- Advanced technology makes SQL and Oracle protection simple
- Immediate RTO technology
- Confidence that the system will support your environment
- Immutable storage to protect the backup data
- No need to buy or provision hardware or capacity
Pricing
£100 a terabyte a month
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 0 5 2 7 5 6 7 5 9 9 9 9 6 2
Contact
ITHQ LTD
Dale Nursten
Telephone: 02039977979
Email: bidteam@ithq.pro
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- No
- System requirements
- Customer must need a backup solution
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- 8x5xNBD, 24x7x4
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Support is provided directly from ADP on a 24x7 basis.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
ITHQ will support the on-boarding of the solution with an agreed Scope of Works document customised to meet the customers' requirements.
From there, the system will be built and configured to meet the customer needs and shipped to site for installation and commissioning. Customers will be supported at every step until the service is fully operational. - Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
- Video
- End-of-contract data extraction
- At the end of the contracted term the system will be decommissioned and all data purged. Backups performed by Rubrik would not be available after the cessation of the service.
- End-of-contract process
- At the end of the contracted term the system will be decommissioned and all data purged. Backups performed by Rubrik would not be available after the cessation of the service.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
-
The API is a web based API and is shipped as part of the web frontend.
The API consists of a set of separate methods; Requests and responses between the clients and the API are encoded using the JSON format. - API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- Dashboards, queries and even custom reports can be requested.
Scaling
- Independence of resources
- Hardware is dedicated to each customer.
Analytics
- Service usage metrics
- Yes
- Metrics types
- There are numerous built in reports covering systems functions such as backup status, device status, SLA compliance and capacity runway.
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Rubrik and Assured Data Protection
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Data can be exported using the web frontend or API.
- Data export formats
-
- CSV
- Other
- Other data export formats
- JSON - Via the API
- Data import formats
- Other
- Other data import formats
- N/A
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- During the term of Customer’s subscription, the Service will perform in accordance with and subject to this Service Level Agreement (“SLA”). ITHQ's target is 100% System Availability. If the System Availability during a given month is less than 99.95%, Customer may be eligible for a credit (“Service Credit”), which is the sole and exclusive remedy for any failure to meet the SLA.
- Approach to resilience
- ITHO maintains a Business Continuity Plan for the platform. The primary goal of this plan is to ensure organisational stability, as well as coordinate recovery of critical business functions in managing and supporting business recovery in the event of disruption or disaster. Thus, the plan accomplishes the following: • Ensures critical functions can continue during and after a disaster with minimal interruption; • Identifies and decreases potential threats and exposures; and • Promotes awareness of critical inter-dependencies. We can share a high-level overview of our Business Continuity Plan for the platform upon request.
- Outage reporting
- Email Alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Only authorised users / groups will be able to access the management interface or support portals.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- QMS International Ltd
- ISO/IEC 27001 accreditation date
- 15/03/2022
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- These are available on request.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Will be provided by ITHQ upon request.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Policies will be provided by ITHQ upon request.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Policies will be provided by ITHQ upon request.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Policies will be provided by ITHQ upon request.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Tackling economic inequality
- Equal opportunity
Tackling economic inequality
ITHQ runs a corporate social responsibility programme called Life In IT in South East England. Life In IT allows us to recondition tech devices donated from businesses headed for disposal and pass them on to local non- profit organisations that put them to great use. Schools in particular are now benefitting from free technology that creates fresh learning opportunities through increased access to education platforms for more students.Equal opportunity
ITHQ runs a corporate social responsibility programme called Life In IT in South East England. Life In IT allows us to recondition tech devices donated from businesses headed for disposal and pass them on to local non- profit organisations that put them to great use. Schools in particular are now benefitting from free technology that creates fresh learning opportunities through increased access to education platforms for more students.
Pricing
- Price
- £100 a terabyte a month
- Discount for educational organisations
- No
- Free trial available
- No