Cloud Hosting Services
Linzjay Technologies can help you design and implement the best cloud integration platform for your needs. With cloud services hosted by us, you’ll never have to worry about management, maintenance, or equipment to help keep your systems running smoothly.
Features
- Cloud Infrastructure as a service (IaaS)
- Hosted Email Solutions
- Cloud Hosted Desktops
- Cloud Backup as a Service (BaaS)
- Data Center Hosting
- Cloud Platform as a Service (PaaS)
- Cloud Software as a Service (SaaS)
- Cloud Desktop as a Service (DaaS)
- Cloud Disaster Recovery as a Service (DRaaS)
Benefits
- Effective Management and Maintenance
- Cost Efficient
- Scalability and Reliability
- Design according to clients specification
- Effective Backup Restore Solution
Pricing
£5,000 to £250,000 a transaction a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
9 5 2 3 3 0 5 3 2 5 9 2 5 3 8
Contact
Linzjay Technologies Ltd
Akande Babatunde
Telephone: 07930359698
Email: info@linzjaytechnologies.com
Service scope
- Service constraints
- N/A - we work round our clients requirement
- System requirements
-
- What the goal is
- We can supply all infrastructure including desktops, laptops and mobiles
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Weekend support is on request or on-demand.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Clients can submit enquiries and support request directly from the web chat link on our website
- Web chat accessibility testing
- Twark
- Onsite support
- Onsite support
- Support levels
-
Every business whether small or big needs to keep their IT infrastructure in place so the business can run smoothly. We provide IT support and consultation across a wide range of services. Linzjay Technologies is an end to end technology solutions provider company that combines expertise, creativity and versatility for your success. Our solutions help businesses migrate to the cloud, improve operations on-premise through managed IT services and nationwide 24/7 onsite IT support.
Our affordably and seamlessly IT Support Solutions provides the following:
• Unlimited IT Support
• 24/7 Monitoring
• Remote IT Support
• Deskside IT Support
• 1st ,2nd ,3rd and 4th line Technical Support
• Consultancies - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
At Linzjay Technologies Ltd, on signing an agreement with a client we always assign an Architect to work along with the customer to gather informations and requirements. Then we assign a PM to coordinate the setup, depending on the customer's preference, we offer onsite training, remote training and online training.
We documents all processes and provide some Knowledge based document to the customer before and after handover. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- At End-of-Contract, out Architects and PMs works with the clients to decide on data migration and retentions etc.
- End-of-contract process
- All these are customer specific and varies from one customer to the other.
Using the service
- Web browser interface
- No
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- We use various Auto-Scalling tools and Load Balancers
- Usage notifications
- Yes
- Usage reporting
-
- Other
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- Memory
- Network
- Number of active instances
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- All major Cloud providers i.e AWS, Azure, GCP, IBM etc
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Email Solution
- Files and Data
- Virtual Machines
- Databases
- Hosted Datacentre.
- Backup controls
- Yes, Customers have control on what they backup.
- Datacentre setup
-
- Multiple datacentres with disaster recovery
- Multiple datacentres
- Scheduling backups
- Users contact the support team to schedule backups
- Backup recovery
-
- Users can recover backups themselves, for example through a web interface
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Bonded fibre optic connections
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- We offer 24/7 availability but support arrangements varies with individual customers requirement.
- Approach to resilience
- Information available on request
- Outage reporting
- Telephone Reports and email alerts
Identity and authentication
- User authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Details available on request
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Dedicated device on a government network (for example PSN)
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- UKAS
- ISO/IEC 27001 accreditation date
- 30/09/2020
- What the ISO/IEC 27001 doesn’t cover
- Currently undergoing assessment for certification
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Details available on request
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Currently been developed
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Details available on request
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- Details available on request
- Incident management type
- Undisclosed
- Incident management approach
- Details available on request
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- VMware
- How shared infrastructure is kept separate
- Each organisation are kept apart with dedicated firewall and clustering
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- Details available on request
Social Value
- Fighting climate change
-
Fighting climate change
n/a - Covid-19 recovery
-
Covid-19 recovery
n/a - Tackling economic inequality
-
Tackling economic inequality
n/a - Equal opportunity
-
Equal opportunity
yes - Wellbeing
-
Wellbeing
yes
Pricing
- Price
- £5,000 to £250,000 a transaction a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Details available on request