AWS Hosting - Reseller
YASH is an AWS channel reseller, Partner and Certified by AWS for SAP & NON-SAP Competency.
YASH leverages its strong partnership with AWS to maximize customer benefits from the AWS architecture
Improved business agility
Better control and compliance
Reduced time-to-market
Optimized cost savings
Features
- Advisory - vision, assessment and Roadmap
- cloud security services
- migration
- Application development
- Re-platforming
- Cloud managed services
- Dev-ops
- Advanced networking cloud
- Cloud landing zone foundation framework
- Cloud optimization
Benefits
- Reduced operational costs
- Time to market
- Improved and consistent resilience
- security and performance
- Reduced manual effort
- improved quality
- faster service delivery
Pricing
£0.01 a unit a second
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
9 6 6 9 5 4 8 5 4 4 4 3 0 9 3
Contact
Yash Technologies Europe Limited
Daniel Bell
Telephone: 07365223336
Email: daniel.bell@yash.com
Service scope
- Service constraints
- Any constraints will be identified and discussed during discovery and assessment phase.
- System requirements
- Assessed on a case by case during due diligence phase
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- As per defined SLA on case to case basis
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- N/A
- Web chat accessibility testing
- N/A
- Onsite support
- Yes, at extra cost
- Support levels
- We provide L1, L2, L3 and architects/ desgin support. Should you have requirements for other service levels, please contact YASH Technologies directly to discuss.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- YASH helps customers in creating cloud blueprints through landing zones and cloud readiness appraoch.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- The user is responsible for the extraction of their data at the end of the contract using defined tools/procedures.
- End-of-contract process
- The user is responsible for the extraction of their data at the end of the contract. YASH will decommission the environment as per the agreement made by the buyer.
Using the service
- Web browser interface
- Yes
- Using the web interface
-
The management portal includes, Service Management, Monitoring & Automation, High Availability/Disaster Recovery, OS Image/Patch Management, Backup Management, Compute/Storage/Network Management, Security Management and Compliance, Governance
Service Catalogue Management, Automated Provisioning ,Cloud Management Portal, Financial, and Operational Performance Dashboards. - Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- Users interact with our Cloud Support Portal as per defined web URL.
- Web interface accessibility testing
- N/A
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- Customers are logically separated in public cloud; private cloud customers environments can be dedicated /shared as per agreement with potential buyers.
- Usage notifications
- Yes
- Usage reporting
-
- API
- SMS
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- AWS
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Hardware containing data is completely destroyed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Files
- Virtual machines
- Database
- Application back-up
- Storage
- Backup controls
- Schedule agreed at the start of the contract and can be varied during the term of the contract.
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- Availability levels as per industry standards and agreed contract by the buyers
- Approach to resilience
- Please contact YASH Technologies directly for detailed information
- Outage reporting
- Email alerts and API
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- 2-factor authentication access via a management network.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- 2-factor authentication
- Devices users manage the service through
- Dedicated device on a segregated network (providers own provision)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- DNV GL
- ISO/IEC 27001 accreditation date
- Issued on 26th Aug 2019 and valid till 25th Aug 2022
- What the ISO/IEC 27001 doesn’t cover
- No Exclusions
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- SSAE 18
- SOC 1 Type 2
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- YASH follows its own information security policy, which is referenced against ISO27001:2013 - Information Technology - Security Techniques - Information Security Management Systems - Requirements, ISO 27002:2013 - Information Technology - Security Techniques - Code of Practice for Information Security Controls
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Contact YASH Technologies directly for this information
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Security updates received from the vendors are reviewed and where appropriate applied to the system (subject to change control) as part of a subsequent update or earlier for high priority issues.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
We can identify potential compromises through a variety of means including SIEM, user reports and vulnerability scanning.
Potential compromises and events of interest are identified by our Security Operations team and investigated to eliminate false positives. Confirmed events are then treated as security incidents according to their assessed severity.
Timescales depend on the detection route and complexity following Prioritization analysis. If further information required, please contact YASH Technologies directly. - Incident management type
- Supplier-defined controls
- Incident management approach
- Contact YASH technologies directly for more information
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Third-party
- Third-party virtualisation provider
- Microsoft Azure/Amazon Web Services/Google Cloud
- How shared infrastructure is kept separate
- Please contact YASH Technologies directly for detailed information
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- Contact YASH Technologies for more information
Social Value
- Fighting climate change
-
Fighting climate change
As a part of fighting the climate change, YASH Technology has a special focus on being environmental sustainability and is committed to incorporating environmental and waste management practices into its business strategy & operations, promoting environmental awareness and responsibility among our people, clients, suppliers, and other interested parties within the context of our business.
Following Set of actions have put it place to fulfil our commitments and minimize environment impact
1. Regulatory Compliance & Beyond, as a part of our Environmental Sustainability Policy
2. Built competencies around EHS, which organizes a suite of training programs for our employees, contractors, customers, partners, and visitors to focus on prevention, early intervention & safety culture
3. Efforts towards reducing Carbon Footpring and Greenhouse gases by following practices such as
a. Energy Efficiency Measures
b. Use of Renewable Energy
c. Implementing Carbon Offset projects in the community
d. Preservation of Water through
e. 3R Model (Reduce, Reuse & Recycle) for Waste Management - Equal opportunity
-
Equal opportunity
As a progressive organization, YASH Technologies understands the need to drive an inclusive culture within the organization where everyone has an equal opportunity to get hired, grow and advance in their careers. In this process, we have launched several initiatives to promote inclusion like –
vConverge- with Diversity - This initiative with a mission to improve gender ratios to 1:3 (Female:Male).
Ref-Her Initiative – A special bonus for referring female candidates ranging from 33% to 50 %
Setting Accountability By Linking Diversity Goals With Leaders’ Performance Score Card
Quarterly Gender Diversity Dashboards for leaders:
Cultural Diversity- Inclusion Of All Religions & Regions
Paternity Leave to Create Work Life Balance And Inclusion Of Male Employees - Wellbeing
-
Wellbeing
As a part of our Policy on Labour Practice & Human Rights, YASH adheres to the highest ethical practices as outlined in the Code of Conduct in all aspects of business functions including inclusion and diversity, anti-discrimination and harassment, workplace safety, privacy and protect the rights of Associates as well as the business interests of Company.
YASH is committed to conduct business activities based in respecting the following labour and human rights
• Health, Workplace Safety & Environment
• Employee Awareness
• Harassment at Workplace
• Working Hours
• Forced Labour
Pricing
- Price
- £0.01 a unit a second
- Discount for educational organisations
- No
- Free trial available
- No