INVICTUS DATA LTD
SCIDA and CIS Infrastructure
Design, Installation and assurance of passive IT Infrastructure. Including Fibre Optic cabling, Data Ethernet cabling, Data cabinet housing and cabling to deliver IT systems network cabling.
Features
- Network cabling for IT systems
- SCIDA assurance of network design and installation
- Fibre Optic Cabling to the user location
- Network room installation for IT hosting
- Secure IT and CIS provision
Benefits
- Fast network capability
- Assured to meet standards
- Different mediums to cater for high classifications
- Ability to remedy faults quickly
- Capability for multiple classifications
Pricing
£500.00 a unit
- Education pricing available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at rob@invictusdata.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
8 6 8 3 0 9 2 7 6 6 7 1 8 7 5
Contact
INVICTUS DATA LTD
Rob Shubert
Telephone: 07857574180
Email: rob@invictusdata.co.uk
Service scope
- Service constraints
- Installation of network cabling and data services can mean some outages to existing networks may be required. Planning for this comes as standard to deconflict with users to minimise disruption.
- System requirements
-
- Fibre cabling may require media conversion
- Cabling classifications may require additional separation
- Network rooms may require power and cooling
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Email support is addressed at point of receipt. responses are normally delivered within 12-24 hours.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Break fix support is available should network infrastructure fail. Full network testing available for existing network cabling. Costings will vary on the complexity of the network and estimated time to repair.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Full user documentation including test results are provided at installation.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Full test results and drawing packs are given to users on completion.
- End-of-contract process
- The contract involves site pre meetings, user requirements capture, scope of works and bill of materials. Once installed all relevant SCIDA documents such as drawings and cabling test results are handed over to the user.
Using the service
- Web browser interface
- No
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- No
- Independence of resources
- Each user has a bespoke project pack assigned to them. All scope items are ringfenced for that user only.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- Never
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- No
Data-in-transit protection
- Data protection between buyer and supplier networks
- Private network or public sector network
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Installations of network cabling are supplied with manufacturers guarantee and initial repair scoping will be undertaken within 7 days.
- Approach to resilience
- Our data is cloud hosted and can be securely access from multiple sites.
- Outage reporting
- Email alerts in conjunction with the users own processes.
Identity and authentication
- User authentication
- 2-factor authentication
- Access restrictions in management interfaces and support channels
- Only the director has access to secure level documents regarding site specific CIS network infrastructure.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- 2-factor authentication
- Devices users manage the service through
- Dedicated device on a government network (for example PSN)
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- COMP TIA S+
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We have MOD SCIDA accreditation for network cabling assurance standards.
- Information security policies and processes
- We hold IT security policies which are mandated by the director. All issues and risks are identified and briefed to the director for investigation and remediation.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All services are documented throughout the installation life cycle. Changes or variations to the scope of works are documented and agreed with users.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Network cabling is assessed for the classification of service it is being used for. Additional protective measures such as secure containment can be applied if required by the user.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Compromises in data network cabling are identified upon testing and commissioning or by existing cabling developing unknown faults. These can be tested and repaired to provide secure network capability.
- Incident management type
- Undisclosed
- Incident management approach
- Users can report incidents with network cabling direct to us. Testing can determine where incident within a network lay and a report on what the fault is and how to rectify the fault can be issued.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
We provide an equal opportunities working environment. The best qualified personnel are sought on their skills alone.
Pricing
- Price
- £500.00 a unit
- Discount for educational organisations
- Yes
- Free trial available
- No
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at rob@invictusdata.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.