Cloud Software Web Hosting
Rocktime provides a hosting infrastructure for the public sector for cloud hosting, managed server hosting, dedicated hosting. Each solution is tailored specifically to the client and the project(s) in question and can include Secure Encryption (SSL), Failover, Load Balancing with 24/7 support 365 days a year.
Features
- Cloud Hosting
- Managed Web Server Hosting
- Dedicated Web Server Hosting
- Failover Web Server Hosting
- Load Balancing Web Server Hosting
- Secure Encryption SSL
- Data Backup
- 24/7 365 days a year support
- Email/ DNS Hosting
- PCI Complaint Hosting
Benefits
- Extremely cost effective and scalable
- Fast and reliable connectivity
- Custom and flexible tailored solutions
- Effective monitoring and reporting
- Backup and Disaster Recovery
- Business Continuity Planning
- Building Resilience by Design
- Big Data and Data Management
- Adapting technology processes for agility
- Reshaping technology for digital business
Pricing
£4,000 a server
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 6 5 7 6 7 3 8 4 7 4 4 8 0 4
Contact
Rocktime Ltd
Alex McCreath
Telephone: 01202 678777
Email: rtsales@rocktime.co.uk
Service scope
- Service constraints
- All planned maintenance (infrastructure or software) is planned with a minimum of seven days’ notice for the client. Maintenance is undertaken in such a way to minimise impact to a client – e.g. performed out of hours, patch one load balanced server and then the other to prevent down time.
- System requirements
-
- IP Addresses
- Email Hosting (on a per domain basis)
- DNS Hosting
- SPF and DKIM records
- Domain Name
- SSL Certificate
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Rocktime is committed to providing effective and timely support to the Buyer through our 24/7 online support platform, telephone and email support services during standard working hours for staff and stakeholder support. To enable the Supplier to react appropriately to incoming support issues the Supplier prioritises support work and assign resources to investigate issues within a defined timeframe (based on critical nature of issue/ support request; within the hour; same day; working week).
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- No
- Support levels
-
Priority levels
The support types are prioritised according to potential business impact and are identified as follows:
Priority Level 1
• Critical bug fixes (errors that prevent the site from functioning)
• Payment platform (errors that prevent the site from functioning)
• Server Diagnosis
Priority Level 2
• Minor Bug fixes
• Validation issues
• JavaScript issues
Priority Level 3
• Simple text changes (for static content)
• Graphical amendments (for static content)
• Minor usability changes
• Simple programming changes
• Browser compatibility issues (for static content) for past and/or future browsers
• Minor layup alterations (for static content)
Priority Level 4
• Core updates Module updates (core and control panel)
• Security updates Each support issue will have a ‘ticket’ raised and the appropriate resolution/work will be scheduled within our standard work schedule and communicated to the client.
These are response times for incident notification - they are not times for incident resolution. During the process of investigation and completion of any fixes or restorations, Rocktime will keep the Buyer informed of progress and provide an estimated timeframe for the completion of the work.
Critical updates are applied at short notice, but in full consultation with the Buyer - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
Rocktime's hosting service is delivered as a 'managed service' therefore we take on all responsibility for the setup and ongoing management of the hosted environment.
Typically, a hosted environment services a Rocktime developed platform(s) therefore ongoing support is provided as part of the overall buyer Contract.
A discovery session will outline such areas as; Domain Management, DNS Management, Email Hosting with Rocktime either determining the level of Buyer capability to provide and manage such areas or a requirement for Rocktime to do so. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
As part of the Offboarding Service, Rocktime will discuss requirements for data extraction and costs associated with doing so.
Such a services forms part of the Buyer Contract for the provision of a Rocktime Web Platform and as such doesn't feature within the service provision of a Cloud Hosting Agreement. - End-of-contract process
-
The Rocktime hosting environment forming part of a Buyer Contract will be remain active up until the end of the Contract term. Up to a month in advance of the termination date, Rocktime will confirm with the client the requirements for data extraction and a date and cost for undertaking the service. Additionally, Rocktime will guide (if necessary) any changes required to domain, DNS, other external service.
Upon termination and in accordance with the Web Platform Contract, Rocktime will remove from Rocktime web servers and back up servers held data within an agreed timescale.
Using the service
- Web browser interface
- No
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- No
- Independence of resources
- Dedicated web server hosting utilising independent server resources.
- Usage notifications
- Yes
- Usage reporting
-
- Other
- Other usage reporting
- Dependent on necessity, Rocktime may choose to open up a dialogue with the Buyer to offer suggestions for expansion of the hosting environment based on the need for the short, medium and long-term continuity and performance of the service.
Analytics
- Infrastructure or application metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Virtual Machines
- Databases
- Files
- Backup controls
-
Rocktime offers a 'managed service' for backup and recovery forming part of the Buyer Hosting Agreement.
Data Restoration / Service Migration
Verso™ is hosted using UK Cloud CoCo Data centre. Resilience within the data centre is provided using VMWare HA (High Availability). In addition, regular incremental backups of data (every 2 hours) and a VM snapshot of the servers (every 6 hours) will provide a robust DR capability.
RPO (Recovery Point Objective):
• Data failure: 2 hours
• Server failure of 12 hours.
RTO (Recovery Time Objective):
• 4 hours - Datacentre setup
-
- Multiple datacentres with disaster recovery
- Single datacentre with multiple copies
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
The Supplier warrants that supply of access to the system shall be available at a level not less than 99.9% per month - (Standard Service Level Guarantee). This excludes -
Failures of network/equipment/circuits not operated by the Company, its sub-contractors or suppliers;
Failures of circuits that are outside of the Supplier or their sub-contractors or their suppliers reasonable control;
In the event of Service suspension due to technical fault in the network or act of God or otherwise, the Supplier will use best endeavours to resume the Service with minimum delay but will not be responsible for loss suffered by the Buyer other than in accordance with this agreement or law.
The Supplier may suspend the Service from time-to-time for necessary technical reasons and network upgrades without invalidating its Service Level Guarantee provided that 1 days’ notice via email or phone call has been given to the Buyer and the period of suspension is not more than one hour. The Supplier shall at all times minimise the disruption to the Buyer and act reasonably.
Service Credits are used to calculate the number of Service Credits due during any calendar month period as a result of non-achievement of target service levels. - Approach to resilience
- Available on Request due to sensitivity
- Outage reporting
-
Rocktime will communicate to the Buyer of an outage of the hosting service within the hour (of a working day) and will continue to update the client until such time as the service has been restored.
Such updates will take the form of email alerts to designated Buyer stakeholders.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google apps)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Control panel utilises role based permissions, so staff and admin user functionality is defined by the users individual login permissions. Support functions are limited to named persons within the organisations who will either email or provide authentication when using telephone support
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Dedicated device over multiple services or networks
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- British Assessment Bureau
- ISO/IEC 27001 accreditation date
- 01/02/2024
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- Self Assessment - SAQ-D
- PCI DSS accreditation date
- 25/04/2023
- What the PCI DSS doesn’t cover
- N/A
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Rocktime conforms to ISO 27001 & 9001 standards which require the continual monitoring and management of services provided by the company and specifically its members of staff.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Rocktime performs according to its Access Control Policy.
Availability, confidentiality and integrity are fundamental aspects of the protection of systems and information and are achieved through physical, logical and procedural controls. It is vital for the protection of systems and information authorised users who have access to Company systems and information are aware of and understand how their actions may affect security.
Availability – systems and information are physically secure and will be accessible to authorised persons when required.
Confidentiality - systems and information will only be accessible to authorised persons. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Rocktime's ISO:27001 policies and procedures support risk management to mitigate threats to its services that are continually followed as part of delivering both strategic and operational objectives.
Deployment of security patches conforms to Rocktime's Patch Management Policy available upon request.
Rocktime is supported by various 3rd party organisations (suppliers of software used by the company and industry security bodies) which are continuously monitored to identify potential threats which are then accessed to determine if they impact Rocktime and/ or Client systems managed by the company. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Rocktime approach to protective monitoring includes (but is not limited to) inspection of firewall logs, the investigation of security alerts, and monitoring of intrusion detection systems.
Any potential compromise identified is logged in accordance with ISO 27001 and referred to ICT Management whilst the compromise is investigation with appropriate action to mitigate or resolve undertaken.
Rocktime response times are in according to the level of severity of an incident. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Rocktime performs according to ISO 27001 certification and therefore has pre-defined processes as part of logging non-conformities.
An incident record is created with a structured process of investigating, resolving and auditing the results by the ICT Management.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- VMware
- How shared infrastructure is kept separate
- Resilience within the data centre is provided using VMWare HA (High Availability).
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
-
The policy of CloudCoCo Ltd is to attain and maintain high standards of environmental performance. CloudCoCo Ltd will ensure so far as is reasonably practicable, that we:
• Understand and comply with all necessary environment legislation and operate to the best practices of industry.
• Assess the environmental impacts of our operations. For example, from the use of Work Equipment (WE)
and materials to the collection and ultimate disposal of wastes.
• Employ a consistent framework for the management of environmental issues during our operations.
• Reduce waste, conserve energy and explore opportunities to re-use and recycle.
• Endeavour to develop innovative processes that can reduce levels of environmental impact.
• Collaborate with our Suppliers and Clients to establish a greater environmental awareness.
• Remain alert and responsive to developing issues, knowledge and public concern.
• Ensure that our Employees are aware of the Environment Policy and are motivated to apply it and are given the support, information, instruction and training necessary to fulfil their duties.
• Emphasise that focus is on pollution prevention rather than abatement.
• Choose materials and resources with regard to their long-term sustainability.
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Rocktime Limited aims to achieve excellence in all areas of our company with the commitment to minimising the environmental impacts of our business operations.
Our commitment sets out to:
• Reduce our consumption of resources and improve the efficient use of those resources.
• Continuously improve our environmental performance and integrate recognised environmental management best practice into our business operations.
• Measure and take action to reduce the carbon footprint of our business activities to meet objectives and targets.
• Manage waste generated from our business operations according to the principles of reduction, re-use and recycling.
• Manage our business operations to prevent pollution.
• Give due consideration to environmental issues and energy performance in the use of our office buildings.
• Ensure environmental, including climate change, criteria are taken into account in the procurement of goods and services.
• Comply as a minimum with all relevant environmental legislation as well as other environmental requirements.
To meet our commitments, we will:
• Set and monitor key objectives and targets for managing our environmental performance at least annually.
• Communicate internally and externally our environmental policy and performance on a regular basis and encourage feedback.
• Communicate the importance of environmental issues to our people.
• Work together with our people/employees, service partners, suppliers, landlords and their agents to promote improved environmental performance.
• Promote appropriate consideration of sustainability and environmental issues in the services we provide to our clients.
• Review our environmental policy regularly.Covid-19 recovery
As a cloud technology company, Rocktime has been successful in implementing changes to processes and procedures to adapt to the new norm that features greater flexibility in the manner in which it conducts its business both with its staff as well as with clients. The company has actively promoted excellence through the use of technology that helps local businesses to connect and work more effectively, benefitting from collaborative working arrangements to foster positive business relationships in the local community and recovery as we exit Covid-19 and accept the current economic landscape. The company engages with local diverse market businesses to advise on the use of technology in the same manner as it does with its public sector clients with the aim to open up supply chain opportunities.Tackling economic inequality
The company’s values a diverse workforce and the contribution each individual makes. We are committed to promoting inclusivity, equality and diversity in our policies, practices and procedures.
This policy applies to the company's dealings with all its people as well as others engaged by or who work with the firm including, for example, clients, job applicants and other third parties.
The company believes in treating everyone equally and with the same attention, courtesy and respect regardless of their age, disability, gender reassignment, marriage/civil partnership, pregnancy/maternity, race, religion or belief, sex and sexual orientation which is referred to within its Equality, Diversity and Inclusion Policy as the "protected characteristics".Equal opportunity
The company has always believed in promoting diversity within the workplace and this forms part of its recruitment practices. Using the 5 foundational principles of quality work set out in the Good Work Plan (e.g. fair, pay, participation and progression, voice and autonomy).
Career advice with local schools offers opportunity to instil insights and confidence in potential career paths for young people whilst also providing the opportunity for a work placement.
Additionally, consideration is made for recruiting trainees and training them to perform roles whilst offering them a career path within the business or as a means to seek one elsewhere.Wellbeing
The company recognises the pressures that have arisen in recent times with Covid-19 and the effects of social distancing, remote working and travel enforcements. Through constant dialogue with its team the company has sort to provide flexible working conditions whilst maintaining regular and personal engagement to reduce the impact of loneliness and isolation.
Believing in the positive nature of ‘culture’ within a company, initiatives are in place to maintain and reinforce a team mentality that aims to support individuals and foster wellbeing.
Pricing
- Price
- £4,000 a server
- Discount for educational organisations
- No
- Free trial available
- No