Skip to main content

Help us improve the Digital Marketplace - send your feedback

Cantarus

Umbraco Cloud Hosting

Umbraco hosting focused on providing performance and security for your CMS

Features

  • Umbraco Experts
  • High Availability Configuration Options
  • Real Time Server and Application Monitoring
  • Umbraco Platinum Partner

Benefits

  • Fully Managed Service
  • High Availability
  • Secure environment
  • No hidden Ingress/Egress Fees

Pricing

£225 a licence a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at enquiries@cantarus.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

9 0 4 7 8 8 7 6 3 2 5 7 8 2 3

Contact

Cantarus Lee Adams
Telephone: 0161 971 3200
Email: enquiries@cantarus.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
None
System requirements
Umbraco Website

User support

Email or online ticketing support
Email or online ticketing
Support response times
Our standard support is provided between the hours of 0900 and 1730 British time, Monday to Friday excluding public holidays. We also provide dedicated 24/7 Business Critical support depending on the hosting package selected. Service level targets – specifically the time within which we aim to be actively working on a resolution – for support are as follows (excluding on-site support): Business Critical Within 1 business hour High Priority Within 4 business hours Medium Priority Within 2 business days Low Priority Within 5 business days
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Onsite support
Support levels
Our standard support is provided between the hours of 0900 and 1730 British time, Monday to Friday excluding public holidays. 24-Hour Severity 1 support is also available on some hosting packages. Standard timebank support is purchased on a per man-day basis and can be used across any of the Cantarus service offerings - any purchased time which is unused during the month can be rolled over for up to 3 months. Standard Timebank is charged at £995/day with a 1 day minimum.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
A member our Client Success team will assist where possible to ensure your website is configured in the new environment correctly and complies with best practice. Once services are migrated and tested a handover to our Client Success team will be provided, during which training on our support ticketing system and timebank reporting will be provided via an online session.
Service documentation
No
End-of-contract data extraction
Full copy of website files - Copy of any relevant files - Database Backup These can be provided via raising a ticket with our Client Success team.
End-of-contract process
At the end of the contract, all hosted services which are used to host an application included within the contract will be become inaccessible and all data will be removed after one month.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
The Umbraco Cloud dashboard allows you to manage all of your website hosting settings.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
Umbraco already provides a high level of accessibility and accessibility is thought into all things we do going forward. With an increased focus on accessibility in general, an ever-expanding test-suite for anything from color contrast to readability, and a vigilant community (and dedicated community team) keeping an eye on this, Umbraco can be confident in delivering a high standard of accessibility.
API
No
Customisation available
No

Scaling

Independence of resources
All client resource groups are allocated a resource pool and limited within the hosted infrastructure. If a client is using more resource than their allocated pool allows then in times of high demand their usage will automatically be throttled back to their allocated level.

Analytics

Service usage metrics
No

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Umbraco

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Data can be extracted by the user or by Cantarus from the file storage and via SQL database backup.
Data export formats
Other
Other data export formats
  • Website Files
  • SQL backup
Data import formats
Other
Other data import formats
  • Website Files
  • SQL backup

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
The Hosted Application shall be available to Visitors pursuant to the Services 99.99% of the time calculated on a monthly basis. Where the Hosted Application is not so available, the Customer will be credited with an amount calculated monthly as an aggregate of all Down Time in accordance with the following table: < 99.90 - 5% <99.00% - 15% <95.00% - 25% <90.00% - 50% <75.00% - 100%
Approach to resilience
All customers will benefit from the basic levels of resiliency - - Resource Monitoring - Underlying Multi-node Cluster design - High Availability network design
Outage reporting
In the case of a designated at-risk or maintenance window, all clients will be notified in advance via e-mail. In the case of an unexpected outage or emergency maintenance window then the client will the sent an e-mail notification, and where possible contacted via telephone. A dashboard feature will be added in a future development phase.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Support channels are locked to a limited number of contacts who are allowed to raise requests on their behalf. These contacts are the only people who are allowed to raise tickets either via the web-portal, e-mail, or telephone.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
Cyber Essentials Plus
Information security policies and processes
All details are available in the Cantarus Information Security Policy which is available on request. If a security issue is identified, then it should immediately be reported to the Cantarus information Security Manager, who will escalate this to the board of directors. Depending on the scope of the issue identified, a small team will be allocated to deal with the issue. The exact makeup of this team will depend on the skills required in order appropriately identify and resolve the issue, however all reports from this team will be returned to the Information Security Manager. Staff are regularly provided with updates on security trends and training on how to deal with them.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All changes should be requested via raising a support ticket with the Customer Success team. The request will then be triaged, and allocated to the relevant internal team. The change will be assessed for any potential security or availability impact, and if appropriate a quote provided to the customer. Once agreement is in place a change request is raised. Where the change is judged to have a possible affect on the security of the site, or requires a change to a global setting to be changed the CR is escalated to a senior manager for review.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Where available we subscribe to security feeds from all our suppliers. When notification of an issue is received, we immediately assess these based on the CVSS score and the use of the feature or application within our environment. Using this data we decide if the patch can be deployed as part of our regular monthly patching schedule, or if we need to directly contact customers in order to arrange an additional at-risk window.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Full monitoring is implemented for the server hardware, virtual machine OS and where available the application itself. This includes monitoring of the server exception logs, so that any spikes in application or OS errors can automatically be flagged. Our gateway firewall hardware also includes IPS systems which scan and log all traffic. IPS signatures are automatically updated to ensure new threats are covered.
Incident management type
Supplier-defined controls
Incident management approach
Full details of this process are documented in the Cantarus Incident Management Policy. Users who suspect an issue should immediately report this to the Information Security Manager. Depending on the scope of the potential incident, this may then immediately be escalated to the board of directors. Once an event has been verified as a potential issue, this will also be raised with the customer. On completion on the investigation and and remediation activity, the customer will be provided with a full incident report.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

The solution utilises the latest public cloud technologies. Public clouds combat climate change by deploying innovative solutions aimed at cutting down carbon footprints and promoting sustainability in various sectors.

Pricing

Price
£225 a licence a month
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at enquiries@cantarus.com. Tell them what format you need. It will help if you say what assistive technology you use.