AXIA COMPUTER SYSTEMS LIMITED
Cloud Backup
Clound Backup Services for Office365 and On premis infrastructure
Features
- Cloud Backup
- Cloud Replication
- Dedicated Service
- Fast Performance
- Tailored Service
Benefits
- Tailored Service
- Cost effective
Pricing
£100.00 a terabyte a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at a.ali@axia.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
9 0 8 7 0 8 5 5 2 7 7 2 4 7 5
Contact
AXIA COMPUTER SYSTEMS LIMITED
Asgher Ali
Telephone: 01923333111
Email: a.ali@axia.co.uk
Service scope
- Service constraints
- Upto 1 Peta Byte per Server
- System requirements
-
- Virtual Environment
- Physical Environment
- Legacy Systems
- SMB Transfers
- FTP
- RSYNC
- VPN Tunnel
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
4hour response between 9am to 6pm Monday to Friday
8 hours response over Weekends - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Through our website
- Web chat accessibility testing
- Uses 3cx Backend technology
- Onsite support
- Yes, at extra cost
- Support levels
- We are able to provide various support levels from remote to onsite service. Each service is tailored to the customers needs
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Remote support and onboarding
- Service documentation
- No
- End-of-contract data extraction
- If required but may cost
- End-of-contract process
- Data extration may cost.
Using the service
- Web browser interface
- No
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
-
- Automatic
- Manual
- Independence of resources
- Restricted resource so it cannot impend on other services
- Usage notifications
- Yes
- Usage reporting
-
- SMS
Analytics
- Infrastructure or application metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Virtual Machines
- SMB
- Files
- FTP
- Rsync
- VPN Tinnel
- Backup controls
- Schedule
- Datacentre setup
- Single datacentre with multiple copies
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
SLA Service Level 99.9%
Service Credits given - Approach to resilience
- Replicated to another Datacenter
- Outage reporting
- Email alerts
Identity and authentication
- User authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Only key users with security clearance may access this
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
- Dedicated device on a segregated network (providers own provision)
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Meet current standards
- Information security policies and processes
-
Cyber Essentials Plus
ITL level Standard
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Internal Change management process which is overseen by a security engineer
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
-
Patches are deployed immediatelyif they are critical
threat management firewall and IDS - Protective monitoring type
- Undisclosed
- Protective monitoring approach
- IDS firwall destection
- Incident management type
- Undisclosed
- Incident management approach
-
Incident are reported tohelpdesk systems
reports are also provided by are helpdesk systems
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- VMware
- How shared infrastructure is kept separate
- Seperate VPN Tunnels
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Recycle waste and packaging
Reduced Energy Usage
100% Carbon Neutral Energy
Commitment to be net zero by 2030
Installation of Solar Panels within 12 monthsCovid-19 recovery
Tackling economic inequality is a critical endeavor that requires multifaceted approaches. Let’s explore some perspectives on addressing this issue:
Government Policies and Social Value Models:
The Social Value Model, specifically Theme 2, focuses on two key government policy outcomes:
Creating new businesses, new jobs, and new skills.
Increasing supply chain resilience and capacity.
In contracts, these outcomes may manifest through opportunities for business growth, recruitment and training of contract workforces, and addressing unemployment and skills gaps in sectors like construction.
Examples of activities that demonstrate an approach to achieving these outcomes include:
Supplier Diversity: Identifying opportunities to grow supplier diversity within the contract supply chain or local community.
Engagement Activities: Pre-award engagement with potential new suppliers, such as advertising upcoming opportunities and organizing “meet the buyer” events.
Supply Chain Environment: Creating an inclusive supply chain environment that encourages participation by new and growing businesses1.
Global Perspectives:
Sustainable Development Goals (SDGs) emphasize the importance of tackling inequalities (both of opportunity and outcome).
Systemic discrimination, whether direct or indirect, perpetuates disparities. Addressing these disparities is essential for realizing human rights for all.
The 2030 Agenda explicitly aims to achieve sustainable development while ensuring equity and justice2.
Policy Recommendations:
Policymakers can focus on:
Progressive Income Taxation: Reducing incomes at the top.
Cash Grants: Lifting incomes of the poor through targeted grants.
These policies should be expanded, especially in countries where existing efforts fall short3.
In summary, tackling economic inequality requires a combination of policy measures, social value models, and global commitment to ensure a fairer and more equitable society.Tackling economic inequality
Businesses play a crucial role in reducing economic inequality. Here are some ways they can contribute:
Systemic Focus on Inclusion:
Businesses should embed serving the needs of low-income and marginalized communities across all aspects of purpose, strategy, and operations.
By adopting a more systemic focus on inclusion, businesses can uncover unseen opportunities to generate long-term value for both themselves and society.
Learning from impact enterprises pioneering market-based approaches is essential11.
UN Sustainable Development Goal (SDG) 10:
All businesses must:
Contribute their due taxes.
Promote non-discrimination.
Adhere to social and environmental regulations.
Uphold human rights.
Eliminating these issues fosters a more consistent and reliable corporate culture.
Employee Well-Being and Pay Equity:
Prioritize the human capital of employees:
Pay them fairly.
Provide training and support.
Reducing pay disparities within organizations contributes to overall societal equality.
Social Value Models:
Businesses can:
Transfer profits to charitable causes.
Reduce prices to make products and services accessible.
Employ more staff, creating job opportunities.
Engage in supplier diversity to support local communitiesEqual opportunity
Axia is committed to encouraging equality, diversity, and inclusion among our workforce, and eliminating unlawful discrimination. Our aim is for our workforce to be truly representative of all sections of society and our customers, and for each employee to feel respected and able to give their best.
Our policy’s purpose is to:
Provide equality, fairness, and respect for all in our employment, whether temporary, part-time, or full-time.
Not unlawfully discriminate because of the Equality Act 2010 protected characteristics, including:
Age
Disability
Gender reassignment
Marriage and civil partnership
Pregnancy and maternity
Race (including color, nationality, and ethnic or national origin)
Religion or belief
Sex
Sexual orientation
Oppose and avoid all forms of unlawful discrimination. This includes in:
Pay and benefits
Terms and conditions of employment
Dealing with grievances and discipline
Dismissal
Redundancy
Leave for parents
Requests for flexible working
Selection for employment, promotion, training, or other development opportunities
Our commitments include:
Encouraging equality, diversity, and inclusion in the workplace as they are good practice and make business sense.
Creating a working environment free of bullying, harassment, victimization, and unlawful discrimination, promoting dignity and respect for all. We train managers and all other employees about their rights and responsibilities under the equality, diversity, and inclusion policy.
Taking complaints of bullying, harassment, victimization, and unlawful discrimination seriously and addressing them promptly.
All staff should understand that they, as well as their employer, can be held liable for acts of bullying, harassment, victimization, and unlawful discrimination against fellow employees, customers, suppliers, and the public.Wellbeing
Why Wellbeing Matters:
Good health and wellbeing serve as core enablers for employee engagement and organizational performance.
Promoting wellbeing helps prevent stress and fosters positive working environments where everyone can thrive.
Domains of Wellbeing:
A holistic approach to wellbeing involves several interconnected domains:
Physical Health: Encouraging exercise, nutrition, and regular health check-ups.
Mental and Emotional Wellbeing: Supporting mental health, managing stress, and promoting work-life balance.
Social Connections: Building positive relationships and a sense of community.
Financial Wellness: Providing resources for financial planning and stability.
Career Development: Offering growth opportunities and meaningful work.
Environmental Factors: Creating a safe and supportive workplace.
Stakeholder Roles:
Employers and Managers:
Foster a culture of wellbeing.
Provide resources for physical and mental health.
Encourage work-life balance.
Employees:
Take responsibility for their own wellbeing.
Seek support when needed.
Government and Policy Makers:
Advocate for policies that promote employee health and wellbeing.
Pricing
- Price
- £100.00 a terabyte a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- 30day trial
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at a.ali@axia.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.