Network 2 Supplies Ltd

ICT Relocation - Data Centre

Relocating Cloud IT can be complicated. We will audit the physical hardware and provide a comprehensive inventory. We will provide assurance that all items are transported following being safely packed, in one of our fleet of tracked vehicles.

Features

  • Security Cleared Engineers (SC) available
  • Fleet of satellite tracked vehicles
  • Member of Safe Contractor
  • ISO 27001:2013, 9001:2015, 14001:2015, 45001:2018 NCSC Cyber Essentials Plus
  • Project Managed relocation
  • Tailored transportation containers
  • Out of office hours to minimise disruption to workplace available
  • Mobile hard drive Shredding/crushing available
  • Data erasure using CESG Certified software
  • Staging and Configuring new equipment in secure premises

Benefits

  • Audit trail , asset tracking, ensures data security compliance NCSC
  • Reduce impact of the business activities on the environment
  • Specialists in optimising the supply chain
  • NCSC CAS-S certified sanitisation and destruction services
  • Support circular economy through resale-use of assets
  • CSR sustainability reporting
  • Bioleaching - low carbon processing of Printed Circuit Boards

Pricing

£100 an instance

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at samantha.english@n2s.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

9 4 4 5 5 2 7 3 3 6 9 7 6 6 7

Contact

Network 2 Supplies Ltd Samantha English
Telephone: 01284761111
Email: samantha.english@n2s.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
Not applicable. N2S pride themselves on providing individual solutions for customers.
System requirements
N/A

User support

Email or online ticketing support
Email or online ticketing
Support response times
N2S respond within 24 hours during normal working hours. Out of hours support can be provided if required
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Onsite support
Support levels
This service will not require on site support as it's a site activity. Support may be required prior to on-site activity but would not require a site visit, just phone or email support for any queries. Support engineers would be available if required dependent on client requirements.
Support available to third parties
No

Onboarding and offboarding

Getting started
Not applicable. Our service is site based so the customer would make contact by email/telephone and correspondence would continue from there.
Service documentation
No
End-of-contract data extraction
Not applicable to this service
End-of-contract process
All services and labour will be included in the initial pricing and proposal of work.

Using the service

Web browser interface
No
Application to install
No
Designed for use on mobile devices
No
Service interface
No
User support accessibility
None or don’t know
API
No
Customisation available
No

Scaling

Independence of resources
As our service is a physical on site service we work closely with our customers to ensure proper forward planning and allocation of appropriate resource.

Analytics

Service usage metrics
Yes
Metrics types
Supplier defined
Reporting types
Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Not applicable to this service
Data export formats
Other
Other data export formats
Not applicable
Data import formats
Other
Other data import formats
Not Applicable

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Service Level Agreements are made bespoke to an individual customers requirements following discussions with them. As a basic minimum we would always prefer 2 weeks notice for a request to visit site. This notice is not always required however. A discount would be offered on a sliding scale dependent on the failure to meet the SLA.
Approach to resilience
Not applicable. This service does not relate to a Network 2 Supplies data centre
Outage reporting
Not applicable

Identity and authentication

User authentication needed
No
Access restrictions in management interfaces and support channels
Not Applicable to this service
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
United Registrar of Systems (URS)
ISO/IEC 27001 accreditation date
23/12/2009
What the ISO/IEC 27001 doesn’t cover
Not Applicable
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
CESG Assured Service Scheme (CAS-S) 72529087SAN

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
CESG (CAS-S), AATF Approved, Safe Contractor Accreditation, Blancco Registered. All procedures are managed by our General Manager, Technical Solutions Manager and Head of Secure Services. We have in-house security policies which have been audited and assessed during our ISO audits, including ISO 27001:2013.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
N2S have rigorous processes in place in accordance with appropriate accreditations, including ISO27001:2013. More details can be provided on application.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
N2S have rigorous processes in place in accordance with appropriate accreditations, including ISO27001:2013. More details can be provided on application.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
N2S have rigorous processes in place in accordance with appropriate accreditations, including ISO27001:2013. More details can be provided on application.
Incident management type
Supplier-defined controls
Incident management approach
N2S have rigorous processes in place in accordance with appropriate accreditations, including ISO27001:2013. More details can be provided on application.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Fighting climate change

Fighting climate change

N2S is continuously investing and has a dedicated innovation team/program that is consistently delivering lower carbon emissions year on year for cloud related processes that would be used during the contract. This is supported by our in-house Scientists who have developed Science based metrics to evidence this reduction. These metrics are provided to our customers to support their own and the wider UK Gov net zero strategy.

N2S also offers, as part of any public sector contract the opportunity for a tech amnesty across its departmental facilities. This supports UK Gov strategy on reducing e-waste and zero to landfill policies and can be highly relevant during this period of digitalisation. The amnesty also delivers valuable metrics on carbon avoidance through material reuse.

Pricing

Price
£100 an instance
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at samantha.english@n2s.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.