Skip to main content

Help us improve the Digital Marketplace - send your feedback

INVICTUS DATA LTD

SCIDA and CIS Infrastructure

Design, Installation and assurance of passive IT Infrastructure. Including Fibre Optic cabling, Data Ethernet cabling, Data cabinet housing and cabling to deliver IT systems network cabling.

Features

  • Network cabling for IT systems
  • SCIDA assurance of network design and installation
  • Fibre Optic Cabling to the user location
  • Network room installation for IT hosting
  • Secure IT and CIS provision

Benefits

  • Fast network capability
  • Assured to meet standards
  • Different mediums to cater for high classifications
  • Ability to remedy faults quickly
  • Capability for multiple classifications

Pricing

£500.00 a unit

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at rob@invictusdata.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

8 6 8 3 0 9 2 7 6 6 7 1 8 7 5

Contact

INVICTUS DATA LTD Rob Shubert
Telephone: 07857574180
Email: rob@invictusdata.co.uk

Service scope

Service constraints
Installation of network cabling and data services can mean some outages to existing networks may be required. Planning for this comes as standard to deconflict with users to minimise disruption.
System requirements
  • Fibre cabling may require media conversion
  • Cabling classifications may require additional separation
  • Network rooms may require power and cooling

User support

Email or online ticketing support
Email or online ticketing
Support response times
Email support is addressed at point of receipt. responses are normally delivered within 12-24 hours.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Break fix support is available should network infrastructure fail. Full network testing available for existing network cabling. Costings will vary on the complexity of the network and estimated time to repair.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Full user documentation including test results are provided at installation.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
Full test results and drawing packs are given to users on completion.
End-of-contract process
The contract involves site pre meetings, user requirements capture, scope of works and bill of materials. Once installed all relevant SCIDA documents such as drawings and cabling test results are handed over to the user.

Using the service

Web browser interface
No
API
No
Command line interface
No

Scaling

Scaling available
No
Independence of resources
Each user has a bespoke project pack assigned to them. All scope items are ringfenced for that user only.
Usage notifications
Yes
Usage reporting
Email

Analytics

Infrastructure or application metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
Never
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery
No

Data-in-transit protection

Data protection between buyer and supplier networks
Private network or public sector network
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Installations of network cabling are supplied with manufacturers guarantee and initial repair scoping will be undertaken within 7 days.
Approach to resilience
Our data is cloud hosted and can be securely access from multiple sites.
Outage reporting
Email alerts in conjunction with the users own processes.

Identity and authentication

User authentication
2-factor authentication
Access restrictions in management interfaces and support channels
Only the director has access to secure level documents regarding site specific CIS network infrastructure.
Access restriction testing frequency
At least once a year
Management access authentication
2-factor authentication
Devices users manage the service through
Dedicated device on a government network (for example PSN)

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
COMP TIA S+

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
We have MOD SCIDA accreditation for network cabling assurance standards.
Information security policies and processes
We hold IT security policies which are mandated by the director. All issues and risks are identified and briefed to the director for investigation and remediation.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All services are documented throughout the installation life cycle. Changes or variations to the scope of works are documented and agreed with users.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Network cabling is assessed for the classification of service it is being used for. Additional protective measures such as secure containment can be applied if required by the user.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Compromises in data network cabling are identified upon testing and commissioning or by existing cabling developing unknown faults. These can be tested and repaired to provide secure network capability.
Incident management type
Undisclosed
Incident management approach
Users can report incidents with network cabling direct to us. Testing can determine where incident within a network lay and a report on what the fault is and how to rectify the fault can be issued.

Secure development

Approach to secure software development best practice
Supplier-defined process

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
No

Energy efficiency

Energy-efficient datacentres
No

Social Value

Social Value

Social Value

Equal opportunity

Equal opportunity

We provide an equal opportunities working environment. The best qualified personnel are sought on their skills alone.

Pricing

Price
£500.00 a unit
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at rob@invictusdata.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.