Central Networks Cloud Backup
Centrals Backup as a service (BAAS) includes:
Offsite backup using Veeam Cloud Connect:
Storage allocation based on requirements
Virtual machine quantity based on requirements
Managed offsite secure location
Suitable connectivity
Central support and monitoring
Features
- Offsite backup using Veeam Cloud Connect:
- Storage allocation based on requirements :
- Virtual machine quantity based on requirements
- Managed offsite secure location
- Suitable connectivity
- Central support and monitoring
Benefits
- Managed peace of mind backup service
- Unlimited storage
- Daily confirmation of backups
- Immediate support for any backup incidents
- Multiple cloud locations available
- Onsite repositry also available
Pricing
£882.00 a terabyte a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 2 0 1 4 2 2 2 7 6 0 5 7 2 4
Contact
Central Networks and Technologies Ltd
John Blackburn
Telephone: 01706747474
Email: sales@centralnetworks.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- The customer must have an internet connection which can be used for backup purposes. If not we can install one as part of the service.
- System requirements
-
- An internet provision with sufficient bandwidth
- A virtual infrastructure which needs to be backed up
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- The aim is to respond to questions on the first call, through an escalation 1st-3rd line classification. We respond within 30 mins.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Our operations team is broken down into two areas, Service Desk and Engineering. The Service Desk acts as the primary source of all activity, where calls are categorised, prioritised and filtered to the relevant specialist if required. Our calls are given a priority level from 1-5; whereas P1 is Disaster, business is non-operational all the way through to P5, of which could be a cosmetic incident, for example.
Our response times and levels are summarised below:
P1 - Urgent - 15mins Response Time (RT), 4 hrs Target Full Fix Time(TFFT) P2 - Critical - 30 mins RT, 8 hrs TFFT
P3 - Very Important - 4 hrs RT, 20 hrs TFFT
P4 - Important - 10 hrs RT, 30 hrs TFFT
P5 - Informational - 3 days RT, 90 days TFFT (never normally this long)
The majority of activity will be remote based working, however we will send either a senior engineer to the client site, or a cloud specialist to a cloud hosting datacentre site, as and when required, depending on the incident. All priority incidents are included in our pricing, defined by customised SLA's and can be in unlimited numbers if required, depending on the client's needs. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- If users already know Veeam then they will already be able to use the software. If not then Central will provide online training and advice,
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- The data will be deleted when the contract ends or as agreed in a separate agreement.
- End-of-contract process
- At the end of the contract the backup repositorys will no longer be available and the data will be deleted in agreement with the customer.
Using the service
- Web browser interface
- No
- Application to install
- Yes
- Compatible operating systems
- Windows
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- The service is interfaced as a backup repositry available in Veeam.
- Accessibility standards
- None or don’t know
- Description of accessibility
- Users are able to select our cloud respositry to be used for their backup jobs.
- Accessibility testing
- None
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- Bandwidth of our systems is constantly monitored and resource altered to suit conditions.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Users will be advised on the useage capacity of backups
- Reporting types
-
- Real-time dashboards
- Regular reports
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- The data is available by restoring from Veeam.
- Data export formats
- Other
- Other data export formats
- Native file format
- Data import formats
- Other
- Other data import formats
- Native file formats
Data-in-transit protection
- Data protection between buyer and supplier networks
- IPsec or TLS VPN gateway
- Data protection within supplier network
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- We offer 100% uptime through having several different repositry types available on different types of cloud. Availability on any specific repositry is 99%. We do not offer refunds against availability,.
- Approach to resilience
- Each repository is using RAID and is monitored 24/7 by systems which will report on any disk failure.
- Outage reporting
- We use opsview monitoring which alerts us to any failures
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Dedicated link (for example VPN)
- Access restrictions in management interfaces and support channels
- Authorized users are provided with usernames and passwords to the system, usually MFA is in place and is allowed across the domains through microsofts AD security in order to gain access using SSO.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- QMS International
- ISO/IEC 27001 accreditation date
- 19/05/2014
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- We follow ISO27001 standards. Policies are presented to each employee at start of their employment and any amendments have to be signed up to as they occur.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Change management is provided via our Halo Service Management System following ITIL conventions. Security impact is considered for each change which is logged on the system.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Vulnerability management is managed through Problem Management within our Halo Management system using ITIL service definitions and approaches. We also use Nable on services and devices and Opsview monitoring. All patches have to go through a change control process, or Emergency Change process. We can deploy patches immediately. We subscribe to various agencies including Barracuda and Sophos for information on potential threats.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We use a combination of Veeam one, Nable and opsview which monitor the backups and hardware and report on useage, execptions and progress. We respond immediately any variation has been discovered.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Central uses an ITIL based system management application from Halo. users report tickets via email, phone or an online system. We provide reports monthly and also reports can be pulled off at any time.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
Our Social Value Policy is Available on request more information can be found on our website
Pricing
- Price
- £882.00 a terabyte a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Use of the backup service for 2 weeks.