Skip to main content

Help us improve the Digital Marketplace - send your feedback

AXIA COMPUTER SYSTEMS LIMITED

Cloud Backup

Clound Backup Services for Office365 and On premis infrastructure

Features

  • Cloud Backup
  • Cloud Replication
  • Dedicated Service
  • Fast Performance
  • Tailored Service

Benefits

  • Tailored Service
  • Cost effective

Pricing

£100.00 a terabyte a month

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at a.ali@axia.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

9 0 8 7 0 8 5 5 2 7 7 2 4 7 5

Contact

AXIA COMPUTER SYSTEMS LIMITED Asgher Ali
Telephone: 01923333111
Email: a.ali@axia.co.uk

Service scope

Service constraints
Upto 1 Peta Byte per Server
System requirements
  • Virtual Environment
  • Physical Environment
  • Legacy Systems
  • SMB Transfers
  • FTP
  • RSYNC
  • VPN Tunnel

User support

Email or online ticketing support
Email or online ticketing
Support response times
4hour response between 9am to 6pm Monday to Friday
8 hours response over Weekends
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Through our website
Web chat accessibility testing
Uses 3cx Backend technology
Onsite support
Yes, at extra cost
Support levels
We are able to provide various support levels from remote to onsite service. Each service is tailored to the customers needs
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Remote support and onboarding
Service documentation
No
End-of-contract data extraction
If required but may cost
End-of-contract process
Data extration may cost.

Using the service

Web browser interface
No
API
No
Command line interface
No

Scaling

Scaling available
Yes
Scaling type
  • Automatic
  • Manual
Independence of resources
Restricted resource so it cannot impend on other services
Usage notifications
Yes
Usage reporting
  • Email
  • SMS

Analytics

Infrastructure or application metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least every 6 months
Penetration testing approach
In-house
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
No
Equipment disposal approach
In-house destruction process

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • Virtual Machines
  • SMB
  • Files
  • FTP
  • Rsync
  • VPN Tinnel
Backup controls
Schedule
Datacentre setup
Single datacentre with multiple copies
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
SLA Service Level 99.9%
Service Credits given
Approach to resilience
Replicated to another Datacenter
Outage reporting
Email alerts

Identity and authentication

User authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Only key users with security clearance may access this
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
Dedicated device on a segregated network (providers own provision)

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Meet current standards
Information security policies and processes
Cyber Essentials Plus
ITL level Standard

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Internal Change management process which is overseen by a security engineer
Vulnerability management type
Undisclosed
Vulnerability management approach
Patches are deployed immediatelyif they are critical
threat management firewall and IDS
Protective monitoring type
Undisclosed
Protective monitoring approach
IDS firwall destection
Incident management type
Undisclosed
Incident management approach
Incident are reported tohelpdesk systems
reports are also provided by are helpdesk systems

Secure development

Approach to secure software development best practice
Supplier-defined process

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Supplier
Virtualisation technologies used
VMware
How shared infrastructure is kept separate
Seperate VPN Tunnels

Energy efficiency

Energy-efficient datacentres
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Recycle waste and packaging
Reduced Energy Usage
100% Carbon Neutral Energy
Commitment to be net zero by 2030
Installation of Solar Panels within 12 months

Covid-19 recovery

Tackling economic inequality is a critical endeavor that requires multifaceted approaches. Let’s explore some perspectives on addressing this issue:

Government Policies and Social Value Models:
The Social Value Model, specifically Theme 2, focuses on two key government policy outcomes:
Creating new businesses, new jobs, and new skills.
Increasing supply chain resilience and capacity.
In contracts, these outcomes may manifest through opportunities for business growth, recruitment and training of contract workforces, and addressing unemployment and skills gaps in sectors like construction.
Examples of activities that demonstrate an approach to achieving these outcomes include:
Supplier Diversity: Identifying opportunities to grow supplier diversity within the contract supply chain or local community.
Engagement Activities: Pre-award engagement with potential new suppliers, such as advertising upcoming opportunities and organizing “meet the buyer” events.
Supply Chain Environment: Creating an inclusive supply chain environment that encourages participation by new and growing businesses1.
Global Perspectives:
Sustainable Development Goals (SDGs) emphasize the importance of tackling inequalities (both of opportunity and outcome).
Systemic discrimination, whether direct or indirect, perpetuates disparities. Addressing these disparities is essential for realizing human rights for all.
The 2030 Agenda explicitly aims to achieve sustainable development while ensuring equity and justice2.
Policy Recommendations:
Policymakers can focus on:
Progressive Income Taxation: Reducing incomes at the top.
Cash Grants: Lifting incomes of the poor through targeted grants.
These policies should be expanded, especially in countries where existing efforts fall short3.
In summary, tackling economic inequality requires a combination of policy measures, social value models, and global commitment to ensure a fairer and more equitable society.

Tackling economic inequality

Businesses play a crucial role in reducing economic inequality. Here are some ways they can contribute:

Systemic Focus on Inclusion:
Businesses should embed serving the needs of low-income and marginalized communities across all aspects of purpose, strategy, and operations.
By adopting a more systemic focus on inclusion, businesses can uncover unseen opportunities to generate long-term value for both themselves and society.
Learning from impact enterprises pioneering market-based approaches is essential11.
UN Sustainable Development Goal (SDG) 10:
All businesses must:
Contribute their due taxes.
Promote non-discrimination.
Adhere to social and environmental regulations.
Uphold human rights.
Eliminating these issues fosters a more consistent and reliable corporate culture.
Employee Well-Being and Pay Equity:
Prioritize the human capital of employees:
Pay them fairly.
Provide training and support.
Reducing pay disparities within organizations contributes to overall societal equality.
Social Value Models:
Businesses can:
Transfer profits to charitable causes.
Reduce prices to make products and services accessible.
Employ more staff, creating job opportunities.
Engage in supplier diversity to support local communities

Equal opportunity

Axia is committed to encouraging equality, diversity, and inclusion among our workforce, and eliminating unlawful discrimination. Our aim is for our workforce to be truly representative of all sections of society and our customers, and for each employee to feel respected and able to give their best.

Our policy’s purpose is to:

Provide equality, fairness, and respect for all in our employment, whether temporary, part-time, or full-time.
Not unlawfully discriminate because of the Equality Act 2010 protected characteristics, including:
Age
Disability
Gender reassignment
Marriage and civil partnership
Pregnancy and maternity
Race (including color, nationality, and ethnic or national origin)
Religion or belief
Sex
Sexual orientation
Oppose and avoid all forms of unlawful discrimination. This includes in:
Pay and benefits
Terms and conditions of employment
Dealing with grievances and discipline
Dismissal
Redundancy
Leave for parents
Requests for flexible working
Selection for employment, promotion, training, or other development opportunities
Our commitments include:

Encouraging equality, diversity, and inclusion in the workplace as they are good practice and make business sense.
Creating a working environment free of bullying, harassment, victimization, and unlawful discrimination, promoting dignity and respect for all. We train managers and all other employees about their rights and responsibilities under the equality, diversity, and inclusion policy.
Taking complaints of bullying, harassment, victimization, and unlawful discrimination seriously and addressing them promptly.
All staff should understand that they, as well as their employer, can be held liable for acts of bullying, harassment, victimization, and unlawful discrimination against fellow employees, customers, suppliers, and the public.

Wellbeing

Why Wellbeing Matters:
Good health and wellbeing serve as core enablers for employee engagement and organizational performance.
Promoting wellbeing helps prevent stress and fosters positive working environments where everyone can thrive.
Domains of Wellbeing:
A holistic approach to wellbeing involves several interconnected domains:
Physical Health: Encouraging exercise, nutrition, and regular health check-ups.
Mental and Emotional Wellbeing: Supporting mental health, managing stress, and promoting work-life balance.
Social Connections: Building positive relationships and a sense of community.
Financial Wellness: Providing resources for financial planning and stability.
Career Development: Offering growth opportunities and meaningful work.
Environmental Factors: Creating a safe and supportive workplace.
Stakeholder Roles:
Employers and Managers:
Foster a culture of wellbeing.
Provide resources for physical and mental health.
Encourage work-life balance.
Employees:
Take responsibility for their own wellbeing.
Seek support when needed.
Government and Policy Makers:
Advocate for policies that promote employee health and wellbeing.

Pricing

Price
£100.00 a terabyte a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
30day trial

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at a.ali@axia.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.