Skip to main content

Help us improve the Digital Marketplace - send your feedback

MICROPULSE LTD

Infrastructure as a Service

Lot 1: Cloud hosting
Services that are cloud platform or infrastructure help buyers to:

deploy, manage and run software
provide and use processing, storage or network resources
They used to be known as ‘Platform as a Service’ and ‘Infrastructure as a Service’

Features

  • real time reporting and information assurance dashboard
  • Infrastructure as a code
  • Protective monitoring
  • Network Intrusion detection
  • AI enabled preventive control
  • Generative AI enabled Detective control
  • Container based microservices architecture
  • Cost optimization and scaling in the cloud
  • Logging and monitoring
  • Deploying products and services to cloud

Benefits

  • Help debugging issues
  • Scale infrastructure and build on demand
  • Helps in monitoring control
  • Detecting anomalies in company's network
  • Helps to automate any threats in organization
  • Helps to automate to prevant any threats
  • State of art architecture using microservices
  • Helps companies to reduce cost and improve performance
  • Improvement of information assurance and due diligence
  • Publish apps and services to cloud

Pricing

£600 to £800 a unit a day

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at palak.tech.ai@gmail.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

9 2 3 4 5 4 4 8 7 3 8 2 0 3 2

Contact

MICROPULSE LTD Palak Sharma
Telephone: 07740085303
Email: palak.tech.ai@gmail.com

Service scope

Service constraints
N/A
System requirements
  • Apps deployed to cloud
  • Container based apps
  • Infrastructure as a code
  • Using terraform
  • AWS and Azure and Google cloud
  • Hybrid cloud - Multi CLoud
  • Security controls
  • Linux and Windows Operating system
  • Java, Python, Rust etc languages
  • Logging framework

User support

Email or online ticketing support
Email or online ticketing
Support response times
As per agreed with Client
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AAA
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Yes, at an extra cost
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 AAA
Web chat accessibility testing
Web based Chatbot
Onsite support
Onsite support
Support levels
Technical account manager or cloud support engineer
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Onsite training
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
Depends on the agreement
End-of-contract process
Handover

Using the service

Web browser interface
No
API
No
Command line interface
No

Scaling

Scaling available
No
Independence of resources
Yes
Usage notifications
Yes
Usage reporting
Email

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
No

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
As per agreement with Client
Approach to resilience
As per client agreement
Outage reporting
A public dashboard
an API
email alerts

Identity and authentication

User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
Access restrictions in management interfaces and support channels
As per client agreement
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
Devices users manage the service through
Dedicated device on a segregated network (providers own provision)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
As per client agreement
Information security policies and processes
As per client agreement

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
As per client agreement
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
As per client agreement
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
As per client agreement
Incident management type
Supplier-defined controls
Incident management approach
As per client agreement

Secure development

Approach to secure software development best practice
Supplier-defined process

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
No

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
Focus on sustainable digital IT Systems

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

As per client agreement and terms defined by the supplier and common standards

Covid-19 recovery

As per client agreement and terms defined by the supplier and common standards

Tackling economic inequality

As per client agreement and terms defined by the supplier and common standards

Equal opportunity

As per client agreement and terms defined by the supplier and common standards

Wellbeing

As per client agreement and terms defined by the supplier and common standards

Pricing

Price
£600 to £800 a unit a day
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at palak.tech.ai@gmail.com. Tell them what format you need. It will help if you say what assistive technology you use.