Public Cloud Services (AWS, Azure, GCP)
Public cloud services to help your organisation accelerate business transformation. Includes build, manage and deploy applications on globally using your favourite tools/frameworks. Services include advice, guidance, supply, delivery and transition services for adopting Public Cloud Technologies including Azure, AWS and GCP.
Features
- Scalability
- Flexibility
- On demand faster Business decisions
- Flexible migration to the cloud apps
- Create virtual machines with on-demand capacity in seconds.
- Architect, integrate, secure and govern solutions
- On Azure, AWS, GCP
- Regulatory compliance
Benefits
- Comprehensive software service
- Reliance on world renowned companies
- Extensive wrap around support
Pricing
£400 to £600 a user a day
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 8 8 3 2 6 6 1 8 4 5 9 3 8 6
Contact
Tech Mahindra Limited
Michael Blakemore
Telephone: +44 7432452595
Email: MB00787638@techmahindra.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- AWS, Azure, and GCP
- Cloud deployment model
- Hybrid cloud
- Service constraints
- None
- System requirements
- None
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- ASAP
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- No testing conducted.
- Onsite support
- Yes, at extra cost
- Support levels
-
Email or online ticketing.
As standard, response within 4 hours Monday to Friday and can extend this cover flexibly by contract with the client where requested
Support is provided remotely to solve issues. Cost of support is cutomised to each client and their needs. We can offer flexible support including 24 x 7 , onsite workers and on-demand - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Seamless process driven approach
Delivery: We follow agile methodology
Our team will capture functional and other non-functional, training and cultural change requirements.
We will work with your team to create a clear contractual scope and framework including agreement on key delivery milestones.
Provide comprehensive training materials
Adopt a train the trainer approach allowing - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- The Data is owned by the client and the end of project extraction of such data shall be agreed at the start of the project with the client
- End-of-contract process
- The project plan at the start of project will outline the plan for the end of project and what responsibilities and expectations are expected on both sides including additional costs if any
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The software has been designed to work on mobile devices.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- Comprehensive service interface.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- No testing conducted
- API
- Yes
- What users can and can't do using the API
- API allows collaboration and transfer of information.
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- No
- Customisation available
- No
Scaling
- Independence of resources
- Through planning and effective governance which shall be agreed with the Customer.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We can provide a range of metrics that can change upon your requests.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- This will be laid out in the projects plan we will work with the client to accommodate most requirements but can include most of the Public Cloud stack of products.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- IPsec or TLS VPN gateway
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- As per Microsoft Azure, AWS and GCP licence agreement
- Approach to resilience
- As per Microsoft Azure, AWS and GCP resilience
- Outage reporting
- As per Microsoft Azure, AWS and GCP
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Limited access network (for example PSN)
- Username or password
- Access restrictions in management interfaces and support channels
-
2-factor authentication
Limited access network (for example PSN)
Username or password - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- ?
- What the ISO/IEC 27001 doesn’t cover
- Everything is covered
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- ?
- PCI DSS accreditation date
- ?/??/????
- What the PCI DSS doesn’t cover
- Everything is covered
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Annual audits and robust reporting lines facilitates by inhouse software and training.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
TechM has formal, documented policies and procedures that provide guidance for operations and information security within the organisation.
Policies address purpose, scope, roles, responsibilities and management commitment.
Employees maintain policies in a centralised and accessible location.
TechM is responsible for familiarizing employees with the TechM security policies.
TechM has established information security functions that are aligned with defined structure, reporting lines, and responsibilities.
Leadership involvement provides clear direction and visible support for security initiatives.
Policies are approved by TechM leadership at least annually or following a significant change - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Perform vulnerability scans on the host operating system, web applications, and databases.
Approved 3rd party vendors conduct external assessments (minimum frequency: quarterly).
Identified vulnerabilities are monitored and evaluated.
Countermeasures are designed and implemented to neutralize known/newly identified vulnerabilities. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- N/A
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Devices monitor: Port scanning attacks, Usage (CPU, processes, disk utilization, swap rates, software-error generated losses)
Application metrics
Unauthorized connection attempts Near real-time alerts flag potential compromises
Requests are logged and visible via Dashboard
Logs provide requested information
Log events are visible to customers as required
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
We demonstrate an effective stewardship of the environment through activities that:
Deliver additional environmental benefits including working towards net zero greenhouse gas emissions.
Influence staff, suppliers, customers and communities to support environmental protection and improvementCovid-19 recovery
We help local communities to manage and recover from the impact of COVID-19
through activities that:
Support people and communities to manage and recover from the impacts of COVID-19, including those worst affected or who are shielding.
Support organisations and businesses to manage and recover from the impacts of COVID-19, including where new ways of working are needed to deliver services.
Create employment, re-training and other return to work opportunities for those left unemployed by COVID-19, particularly new opportunities in high growth sectors.
Support the physical and mental health of people affected by COVID-19, including reducing the demand on health and care services.
Improve workplace conditions that support the COVID-19 recovery effort including effective social distancing, remote working, and sustainable travel solutions.Tackling economic inequality
We create new businesses, new jobs and new skills through activities that:
Create opportunities for entrepreneurship and help new, small organisations to grow, supporting economic growth and business creation.
Create employment opportunities particularly for those who face barriers to employment and/or who are located in deprived areas.
Create employment and training opportunities, particularly for people in industries with known skills shortages or in high growth sectors.
Support educational attainment relevant to the contract, including training schemes that address skills gaps and result in recognised qualifications.
Influence staff, suppliers, customers and communities to support employment and skills opportunities in high growth sectors.
We increase supply chain resilience and capacity through activities that:
Create a diverse supply chain including new businesses and entrepreneurs, start-ups, SMEs, VCSEs and mutuals.
Support innovation and disruptive technologies throughout the supply chain to deliver lower cost and/or higher quality goods and services.
Support the development of scalable and future-proofed new methods to modernise delivery and increase productivity.
Demonstrate collaboration throughout the supply chain, and a fair and responsible approach to working with supply chain partners.
Demonstrate actions to identify and manage cyber security risks, including in the supply chain.
Influence staff, suppliers, customers and communities to support resilience and capacity in the supply chain.Equal opportunity
We reduce the disability employment gap through activities that:
Demonstrate action to increase the representation of disabled people in the contract workforce.
Support disabled people in developing new skills, including through training schemes that result in recognised qualifications.
Influence staff, suppliers, customers and communities to support disabled people.
We tackle workforce inequality through activities that:
Demonstrate action to identify and tackle inequality in employment, skills and pay in the contract workforce.
Support in-work progression to help people, including those from disadvantaged or minority groups, to move into higher paid work by developing new skills.
Demonstrate action to identify and manage the risks of modern slavery, including in the supply chain.Wellbeing
We improve health and wellbeing through activities that:
Demonstrate action to support the health and wellbeing, including physical and mental health, in the workforce.
Influence staff, suppliers, customers and communities to support health and wellbeing, including physical and mental health.
We improve community integration through activities that:
Demonstrate collaboration with users and communities in the co-design and delivery of the contract to support strong integrated communities.
Influence staff, suppliers, customers and communities to support strong, integrated communities.
Pricing
- Price
- £400 to £600 a user a day
- Discount for educational organisations
- No
- Free trial available
- No