Flux - WordPress Hosting
Our service merges the globally acclaimed WordPress Content Management System (CMS) with cutting-edge Web3 technology to offer unmatched website performance and enhanced security features.
Ideal for organisations looking to future-proof your web infrastructure, WordPress on Flux delivers a scalable, secure, and cost-effective solution.
Features
- Uncapped Bandwidth
- Enhanced Security and Privacy
- Triple Redundancy Provided as Standard
- Helpdesk Support
Benefits
- Cost Efficiency
- Customisable Pricing Plans
- Scalable Infrastructure
Pricing
£5.99 a unit
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 2 1 1 2 0 7 8 8 2 7 3 6 8 0
Contact
INFLUX TECHNOLOGIES LIMITED
Alex Hackett
Telephone: 07946361275
Email: alexhackett@runonflux.io
Service scope
- Service constraints
- Support is Remote Only
- System requirements
- Not Applicable
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 24 hours
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- None
- Onsite support
- No
- Support levels
-
Standard Support Provide Free of Charge
Single Point of Contact for Account Management - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Help Website and User Documentation
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
-
Customers can Download and Backup as required
Customers can Clone, Backup and Redeploy via Third Party Applications such as UpDraft - End-of-contract process
- No additional costs, options to renew for Customer defined periods
Using the service
- Web browser interface
- Yes
- Using the web interface
-
All features are set up and self managed by the customer.
Customers can grant permissions to update as required. - Web interface accessibility standard
- WCAG 2.1 AAA
- Web interface accessibility testing
- None
- API
- No
- Command line interface
- Yes
- Command line interface compatibility
- Linux or Unix
- Using the command line interface
- Customers can set up SSH access and manage dockerised images
Scaling
- Scaling available
- Yes
- Scaling type
- Manual
- Independence of resources
- Uncapped Bandwidths therefore no User Constraints
- Usage notifications
- No
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
-
- API access
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Files
- Database
- Images
- Backup controls
-
Automatic Synchronisation - No Customer input is required
One Masternode and 2 Slave Nodes as Standard.
Additional Slaves Nodes can be added for a Price for Additional Redundancy - Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
-
- Users can recover backups themselves, for example through a web interface
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- 99.9%
- Approach to resilience
-
Triple Redundancy as Standard.
Additional Slave Nodes can be purchased if desired. - Outage reporting
-
Public Dashboard
Email Alerts
Identity and authentication
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google apps)
- Username or password
- Access restrictions in management interfaces and support channels
-
Customer Self Managed
Multiple Customer Logins per Account - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- ISO/IEC 27001
- Information security policies and processes
- TBC
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Changes are recorded via the CMS and FluxOS can record Change Logs
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Constant Monitoring and Bug Bounties
As standard we update the CMS to the latest version with 5 working days - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- 24 hour response window
- Incident management type
- Supplier-defined controls
- Incident management approach
- Customers can report incidents via the Helpdesk
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- Data centre operators are encourage to utilise renewable energy sources in the provision of their services.
Social Value
- Social Value
-
Social Value
- Tackling economic inequality
- Equal opportunity
Tackling economic inequality
The distributed nature of our ecosystem enables us to significantly lower the cost of our services, enabling the participation of economies that may not have been able to otherwise.Equal opportunity
Our service ensures that compute power can be directly accessed by anyone from anywhere across the Globe.
Pricing
- Price
- £5.99 a unit
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Available upon request