Skip to main content

Help us improve the Digital Marketplace - send your feedback

2ABLE LTD

WordPress Hosting

Fast, reliable and secure WordPress hosting, including maintenance and management services. Your WordPress solution is only ever hosted in ISO-certified, ultra-secure data centres managed by security cleared personnel. And as an exclusively UK-based company, WordPress hosting through 2able offers guaranteed data sovereignty.

Features

  • Direct contact with our UK Directors, WordPress specialists
  • 100% Network Uptime for your WordPress hosting environment
  • 24/7/365 UK WordPress Support available
  • Customised WordPress Backups
  • Customised Hardware and Software Firewalls
  • Always on WordPress monitoring
  • Plugin and Security updates of your WordPress site
  • SSL Certificates
  • Climate Positive WordPress hosting
  • 10+ years WordPress experience

Benefits

  • Ensures your WordPress website can be available 24/7/365
  • Helps prevent hackers bringing down your WordPress website
  • Socially responsbile WordPress hosting
  • GDPR Compliant

Pricing

£75 a unit a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ben.c@2able.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

8 0 6 1 8 6 7 0 9 8 3 0 8 3 0

Contact

2ABLE LTD Ben Crowley
Telephone: 01202 237 891
Email: ben.c@2able.co.uk

Service scope

Service constraints
No
System requirements
WordPress

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Emergency issues within 1 hour.
Standard response within 8 hours.
SLAs can be tailored to meet the needs of the client.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Yes, at an extra cost
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 A
Web chat accessibility testing
This has been extensively tested by the developers.
Onsite support
Yes, at extra cost
Support levels
Support levels are customised to the clients needs.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We initially assess the requirements of the client through questions around their website. We then recommend a solution accordingly, which can include training and documentation if required.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
We supply WordPress website files and databases at the end of the contract.
End-of-contract process
Providing WordPress site files and databases is included in the price.

Using the service

Web browser interface
No
API
No
Command line interface
No

Scaling

Scaling available
No
Independence of resources
We have monitoring in place and have low thresholds. Should these thresholds be breached, we respond accordingly.
Usage notifications
Yes
Usage reporting
Email

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • Memory
  • Network
Reporting types
Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Catalyst2, UK Fast, Clook, AWS

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • WordPress Website files
  • WordPress Media
  • WordPress Database
Backup controls
All data is backed up daily. Retention periods can be customised.
Datacentre setup
Single datacentre with multiple copies
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
100% network uptime. If this is not achieved, a refund is given for the length of time the outage occurs.
Approach to resilience
Catalyst2 10G network is designed to be completely redundant from the ground up, every element of their core network is duplicated. They don’t just deploy one switch/router/firewall, they deploy two. catalyst2 ensure that even if the hardware fails, they have a spare ready to automatically take over, or right beside it to be plugged in, with the result being minimal or no impact on your service.
Outage reporting
This can be customised to the clients needs, such as emails and SMS alerts.

Identity and authentication

User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels
We provide user levels based on requirements. WordPress admin access is restricted to 2able only.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Devices users manage the service through
Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
We only host websites that we or trusted 3rd parties have developed or vetted so that the server and your website perform effectively.

Various methods to ensure WordPress security are adhered to.
Information security policies and processes
2able follow GDPR requirements for all areas of our business.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Configuration management is managed by third parties.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
We provide these services through an approved supplier.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
This is managed by our supplier.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Our supplier has operational ISO27001-complaint processes and systems for incident response.

Secure development

Approach to secure software development best practice
Supplier-defined process

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
No

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
Catalyst2 offsets more carbon than it emits based on the analysis of data centre usage, offices and associated transportation of goods.

catalyst2 has invested in systems and processes to achieve this and to proudly add ‘carbon positive’ to their sustainability credentials.

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

2able are carbon neutral through Carbon Neutral Britain and are working towards becoming B Corp certified

Pricing

Price
£75 a unit a month
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ben.c@2able.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.