Infrastructure as a Service
Lot 1: Cloud hosting
Services that are cloud platform or infrastructure help buyers to:
deploy, manage and run software
provide and use processing, storage or network resources
They used to be known as ‘Platform as a Service’ and ‘Infrastructure as a Service’
Features
- real time reporting and information assurance dashboard
- Infrastructure as a code
- Protective monitoring
- Network Intrusion detection
- AI enabled preventive control
- Generative AI enabled Detective control
- Container based microservices architecture
- Cost optimization and scaling in the cloud
- Logging and monitoring
- Deploying products and services to cloud
Benefits
- Help debugging issues
- Scale infrastructure and build on demand
- Helps in monitoring control
- Detecting anomalies in company's network
- Helps to automate any threats in organization
- Helps to automate to prevant any threats
- State of art architecture using microservices
- Helps companies to reduce cost and improve performance
- Improvement of information assurance and due diligence
- Publish apps and services to cloud
Pricing
£600 to £800 a unit a day
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 2 3 4 5 4 4 8 7 3 8 2 0 3 2
Contact
MICROPULSE LTD
Palak Sharma
Telephone: 07740085303
Email: palak.tech.ai@gmail.com
Service scope
- Service constraints
- N/A
- System requirements
-
- Apps deployed to cloud
- Container based apps
- Infrastructure as a code
- Using terraform
- AWS and Azure and Google cloud
- Hybrid cloud - Multi CLoud
- Security controls
- Linux and Windows Operating system
- Java, Python, Rust etc languages
- Logging framework
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- As per agreed with Client
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- Web based Chatbot
- Onsite support
- Onsite support
- Support levels
- Technical account manager or cloud support engineer
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Onsite training
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Depends on the agreement
- End-of-contract process
- Handover
Using the service
- Web browser interface
- No
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- No
- Independence of resources
- Yes
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- No
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- As per agreement with Client
- Approach to resilience
- As per client agreement
- Outage reporting
-
A public dashboard
an API
email alerts
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Access restrictions in management interfaces and support channels
- As per client agreement
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Devices users manage the service through
- Dedicated device on a segregated network (providers own provision)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- As per client agreement
- Information security policies and processes
- As per client agreement
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- As per client agreement
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- As per client agreement
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- As per client agreement
- Incident management type
- Supplier-defined controls
- Incident management approach
- As per client agreement
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- Focus on sustainable digital IT Systems
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
As per client agreement and terms defined by the supplier and common standardsCovid-19 recovery
As per client agreement and terms defined by the supplier and common standardsTackling economic inequality
As per client agreement and terms defined by the supplier and common standardsEqual opportunity
As per client agreement and terms defined by the supplier and common standardsWellbeing
As per client agreement and terms defined by the supplier and common standards
Pricing
- Price
- £600 to £800 a unit a day
- Discount for educational organisations
- Yes
- Free trial available
- No