Bytes Software Services

Druva Cloud Ranger

Enhanced backup, recovery, and DR for core AWS services like EC2, RDS and more. Reliable protection of migrated Oracle, and SQL databases on AWS. Streamline backups of containerized AWS apps running on Kubernetes. VPC level protection, and simplified policy-based management at scale.
bss13

Features

  • Cloud based dashboard & reporting platform
  • Global deduplication of data across multiple sources
  • Tiering of data for Long term retention within cloud
  • Backup and Recovery of diverse data sources
  • VMware File level recovery
  • Saas Consumption pricing model

Benefits

  • Provides in cloud backups for Cloud Native Apps
  • Protects from Ransomware

Pricing

£5.18 an instance a month

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@bytes.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

9 4 6 0 4 4 7 3 6 1 4 6 0 2 8

Contact

Bytes Software Services Chris Swani
Telephone: +44 (0) 7951 326815
Email: tenders@bytes.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
The Serice is cloud based and constraints are likely to be end user specific. The only key restraint is this service only holds backup data in AWS clouds
System requirements
Viable internet connection

User support

Email or online ticketing support
Email or online ticketing
Support response times
Business critical offered as standard with priority of response set by customer. Critical having 1 hour initial, high 2 hours, medium 4 hours and low 8 hours. We offer premium support (at a cost) with critical being 30 mins, high 1 hour, medium 2 hours, and low 4 hours
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AAA
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
None
Onsite support
No
Support levels
Business critical offered as standard with priority of response set by customer. Critical having 1 hour initial, high 2 hours, medium 4 hours and low 8 hours. We offer premium support (at a cost) with critical being 30 mins, high 1 hour, medium 2 hours, and low 4 hours
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Once the service is activated, we have a Sales engineer, customer success and customer support team all available to assist with successful onboarding. Druva operates a knowledge base portal for help and configuration documentation as well as free online learning videos to assist with service training
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
Users can extract data manually from within the system at any time. An bulk export service is available at an additonal cost
End-of-contract process
All customer data is deleted

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Mobile and tablet devices have a dedicated app available from the appropiate app store whereas the endpoint devices have an appropiate agent available from the management console
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
There is a GUI Portal that allows users to access all aspects of the backup service
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
None
API
Yes
What users can and can't do using the API
We are able to provide APIs for Audit trail, file server, NAS, CloudCache, Organization, Storage, VMware and Alerts.

Please see following link to see documentation outlining all requirements:
https://developer.druva.com/reference
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
Customer can add their own co-branding to the service

Scaling

Independence of resources
The service is cloud provisioned and right sized for each individual organisations workload demands. The right sizing of the cloud environment ensure performance demands are comfortably meet. The service is scalable using Amazon AWS Compute and Storage for all Servers, allowing it to use further resources as and when necessary. No further customer investment in additional technologies is necessary to ensure scalability of the service- this is included in the service per user cost

Analytics

Service usage metrics
Yes
Metrics types
"Service availability,
deduplication rates,
successful backups,
successful restores,
Active users,
license allocation,
growth rates.
Not limited to the above and many more available"
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Druva

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users can extract data manually from within the system at any time. An bulk export service is available at an additonal cost
Data export formats
Other
Other data export formats
The native file that was originally backed up only
Data import formats
Other
Other data import formats
The native file format only

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
We provide an SLA of 99.5% uptime and 99.99999% Customer Data durability
Approach to resilience
The cloud instance for the customer is alwalys replicated between 3 physically different data centres as part of the Amazon AWS availability zone feature. In the case of access being not availabile from 1 datacentre, the customers instance will be instantly available from 1 of the 2 further datacentres.
Outage reporting
Outages of the system availability or the storage component are communicated to all assigned administrators within a cloud instance via email as well as via the Support Portal. An online dashboard also reports instance of global outages

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Users and management are separated and controlled with separate authentication portals. RBAC is also used to determine a users level of system access
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password
  • Other
Description of management access authentication
Users and management are seperated and controlled with separate authentication portals. RBAC is also used to determine a users level of system access

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
SOC 2 Type II
Information security policies and processes
Druva has a dedicated Security team that is responsible for security governance. This team includes dedicated personnel that oversee security operations, certifications, and internal audit. Druva's CISO reports to the company CFO.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Any changes are controlled under project management and done with validated testing to ensure changes are stable
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Druva defines its own policies and maintains a high level awareness of industry approaches and fixes to defined issues and ensures adoption of these fixes as soon as is possible. We use our own defined processes for this.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Druva's Cloud Operations team monitors the services on a 24x7x365 basis. Systems are monitored with host based intrusion detection and AWS activity logging that is centralized in Druva's logging infrastructure.

Customers will be notified of identified security incidents within 48 hours of discovery.
Incident management type
Supplier-defined controls
Incident management approach
Druva has a documented Incident Response Plan that includes steps to respond to security incidents including identification, investigation, response, mitigation, customer notification, and root cause analysis.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Fighting climate change

Fighting climate change

We take our environmental management and the impact we have on the environment very seriously. We have environmental policies in place and hold the ISO14001 accreditation. Our environmental assessments are conducted annually by an external Lead ESOS Assessor; they are signed-off by the board and compliance reported to the regulator (the Environment Agency). Our environmental policy is published on our website at https://www.bytes.co.uk/company/sustainability/environmental.
Bytes achieved carbon net zero in March 2022 through approved carbon offsetting schemes. We are always seeking to reduce our impact on the environment. We aim to minimise waste, reduce pollutants and use renewable materials. Our offices have recycling facilities for cans, plastic and paper. We aim to reduce our office printing to zero within the next 10 years.
To drastically reduce our emissions, we have switched to renewable energy. Our Head Office has reached our first milestone of using a specialist 100% renewable electricity provider.
Our goal is to achieve carbon neutrality for our business and help our customers achieve this for their own organisations. We pledge to offset carbon emissions through the planting of green space.
We produce a SECR (Streamlined Energy and Carbon Reporting) report that details the companies energy consumption and carbon emissions. This report is produced annually by an independent assessor, Eshcon Ltd.
This report provides details of our emissions in Scope 1, 2 and 3 categories. It details the activities previously taken to reduce emissions and also recommendations for further improvements.
The improvement recommendations highlighted in our latest ESOS assessment have been reviewed and a number have been implemented or are in the process of being implemented. These include more efficient IT equipment, office lighting and efficient climate control systems.
Our plan is to achieve net zero operational emissions by 2025/26

Pricing

Price
£5.18 an instance a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Free trial available with all functionality available for up to 1 month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@bytes.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.