Design, deploy & host IaaS & PaaS
Our service provides Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) solutions for archiving, backup, and disaster recovery needs. This includes compute hosting, container services, database management, networking, security features, storage options, and more, ensuring robust and reliable IT infrastructure.
Features
- Automated deployment: Streamlined setup process for efficiency.
- Scalable infrastructure: Easily adjust resources to match demand.
- Load balancing: Distribute traffic evenly for optimal performance.
- Continuous monitoring: Real-time performance and security oversight.
- Auto-scaling: Automatically adjust resources based on workload.
- Data encryption: Secure data transmission and storage.
- Disaster recovery: Rapid recovery from system failures or outages.
- API integration: Seamless integration with third-party services for flexibility.
- High availability: Ensure uninterrupted service with redundant architecture.
Benefits
- Rapid deployment: Accelerate time-to-market for applications and services.
- Scalability: Easily scale resources to meet growing demands.
- High availability: Ensure continuous service availability for improved reliability
- Enhanced security: Implement robust security measures for data protection.
- Simplified management: Streamline operations with centralized control and automation.
- Flexibility: Adapt to changing requirements and technology trends seamlessly.
- Improved performance: Enhance application speed and responsiveness.
- Disaster recovery: Minimize downtime and data loss with resilient architecture.
Pricing
£400 to £800 a unit a day
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 7 2 6 4 5 0 8 4 7 9 6 8 1 7
Contact
Avensys Consulting (UK) limited
Vinod Patil
Telephone: 07879995773
Email: Vinod@aven-sys.com
Service scope
- Service constraints
- NA
- System requirements
-
- Internet connectivity: Reliable internet access for accessing cloud services.
- Supported web browser: Compatibility with modern web browsers for interface.
- Anti-virus software: Ensures security for virtual machines and data.
- Network bandwidth: Sufficient bandwidth for data transfer and communication.
- Security protocols: Compliance with security standards for data protection.
- Storage capacity: Adequate storage space for data and applications.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We prioritize prompt responses to questions, typically aiming for within 24 hours on weekdays. Response times may vary during weekends, with inquiries addressed within 48 hours. Urgent queries receive expedited attention regardless of the day. Our commitment is to provide timely assistance and support to ensure clients' needs are met promptly and effectively. Customised SLAs are available at clients request.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- We offer three support levels tailored to meet diverse client needs: Basic Support: This level provides access to standard support resources, including documentation and community forums, at no additional cost. Standard Support: Clients receive timely responses to inquiries during business hours, prioritized ticket handling, and access to phone support for critical issues. Pricing varies based on usage and service level agreements. Premium Support: This comprehensive level offers 24/7 access to technical experts, proactive monitoring, and dedicated account management. Costs are based on a subscription model, with pricing tiers determined by the level of support required. Clients opting for Premium Support gain access to a dedicated Technical Account Manager or Cloud Support Engineer, providing personalized assistance, proactive guidance, and ongoing optimization recommendations tailored to their specific environment and objectives.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We facilitate seamless cloud onboarding through a variety of channels tailored to user preferences and needs. Our comprehensive approach includes onsite and online training sessions, user documentation, and personalized support.
Onsite training sessions offer hands-on guidance and demonstrations, allowing users to familiarize themselves with the cloud environment in their own workspace. Online training resources, including video tutorials and interactive modules, provide flexibility for users to learn at their own pace from anywhere.
In addition, detailed user documentation serves as a comprehensive reference guide, covering setup procedures, best practices, and troubleshooting tips. Our dedicated support team is also available to provide personalized assistance and address any questions or concerns that users may have during the onboarding process.
Overall, our multi-faceted approach ensures that users receive the support and resources they need to confidently start using cloud services, empowering them to harness the full potential of the platform for their business needs. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
When the contract ends, users can extract their data from our platform through a straightforward process designed for convenience and security. They can initiate the data extraction request through their account dashboard or by contacting our support team directly.
Upon receiving the request, our team will assist users in accessing and exporting their data in a suitable format, such as CSV, JSON, or XML, depending on their preferences and the nature of the data.
Users have the option to download their data directly from the platform or request a secure transfer method, such as encrypted file transfer or physical storage device shipment, to ensure the confidentiality and integrity of their data during transit.
Our priority is to facilitate a seamless and transparent data extraction process, enabling users to transition smoothly from our platform while maintaining control and ownership of their data. We also provide guidance and support throughout the process to address any questions or concerns users may have. - End-of-contract process
-
At the end of the contract, several key steps ensure a smooth transition for users. First, users receive notifications well in advance of the contract expiration date, allowing them ample time to make decisions regarding renewal or termination. If users choose not to renew, they can initiate the end-of-contract process through their account dashboard or by contacting our support team.
During the end-of-contract process, users have the opportunity to extract their data from our platform, ensuring that they maintain control and ownership of their information. Our team assists users in exporting data in a suitable format, providing guidance and support throughout the process.
Included in the price of the contract are core services such as access to the platform, customer support, regular updates and maintenance, and basic data storage. Additional costs may apply for premium features or services, such as advanced security features, additional storage or bandwidth, customization or integration services, and dedicated support or consulting services. These additional costs are typically outlined in the contract agreement or can be requested on an as-needed basis. Our transparent pricing model ensures that users are aware of any additional costs upfront, allowing them to budget effectively informed decisions about their service usage.
Using the service
- Web browser interface
- Yes
- Using the web interface
-
Our web interface provides users with a user-friendly platform to set up and manage their cloud services efficiently. Through the interface, users can easily configure and deploy virtual machines, set up networking components, manage storage resources, and configure security settings. Users can also monitor performance metrics, view logs, and receive alerts to ensure smooth operations.
Users have the flexibility to make changes to their configurations, such as adjusting resource allocations, updating security policies, and scaling their infrastructure up or down as needed. They can also perform routine maintenance tasks, such as software updates and backups, directly from the interface.
However, there are some limitations to what users can do through the web interface. Certain advanced configurations may require access to the command-line interface or API for more granular control. Additionally, some features may be restricted based on the user's permissions and role within the organization. Users should be aware of these limitations and consult with administrators or support personnel for assistance when needed. - Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
-
Our web interface adheres to EN 301 549 accessibility standards to ensure inclusivity for all users. Users can navigate the interface using assistive technologies such as screen readers and keyboard shortcuts. Features include proper semantic markup, descriptive alt text for images, and resizable text for readability. Users can perform essential tasks such as managing resources, configuring settings, and monitoring performance.
However, certain interactive elements, such as complex data visualizations, may pose challenges for screen reader users. Additionally, users with mobility impairments may encounter difficulties with fine-grained control using keyboard navigation alone. We continuously strive to enhance accessibility by soliciting feedback from users and incorporating best practices to address identified barriers, ensuring that our web interface remains accessible to all. - Web interface accessibility testing
- We have conducted extensive web interface testing with assistive technology users, including screen reader users and individuals with motor impairments. Testing involved ensuring compatibility with popular screen readers like JAWS and NVDA, as well as assessing keyboard navigation and alternative input methods. Feedback from users was incorporated to improve accessibility features, such as ensuring proper labeling, focus management, and ARIA support, to ensure an inclusive user experience for all.
- API
- Yes
- What users can and can't do using the API
-
Through Azure, GCP, and AWS API, users can programmatically set up and configure cloud services, deploy resources, and manage their infrastructure. They can automate tasks such as provisioning virtual machines, configuring networking components, and implementing security policies. Users can also make changes to their configurations, update settings, and scale resources up or down dynamically.
However, there are some limitations to what users can achieve through the API. Certain advanced configurations may require manual intervention or access to the web interface for more granular control. Additionally, some features may be restricted based on the user's permissions and role within the organization. Users should be aware of these limitations and plan their workflows accordingly. We provide comprehensive documentation and support to assist users in leveraging the API effectively while ensuring security and compliance. - API automation tools
-
- Ansible
- Chef
- OpenStack
- SaltStack
- Terraform
- Puppet
- API documentation
- No
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- MacOS
- Using the command line interface
- We provide native CLI services provided by Azure, AWS, GCP. However, there are some limitations to what users can achieve through the CLI. Certain complex configurations or administrative tasks may be better suited for the web interface or API. Additionally, users may need to have appropriate permissions and credentials to execute certain commands, ensuring security and compliance. We provide comprehensive documentation and support to assist users in leveraging the CLI effectively while addressing any limitations.
Scaling
- Scaling available
- No
- Independence of resources
- We ensure the independence of resources by employing robust isolation mechanisms, including resource allocation, load balancing, and performance monitoring. Each user's resources are dynamically allocated and isolated from others, preventing resource contention and ensuring consistent performance regardless of demand fluctuations from other users. Additionally, we implement proactive capacity planning and scaling strategies to anticipate and mitigate potential bottlenecks, maintaining optimal performance and reliability for all users.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Files
- Databases
- Applications
- Backup controls
- Backup are provided at scheduled intervals.
- Datacentre setup
-
- Multiple datacentres with disaster recovery
- Multiple datacentres
- Single datacentre with multiple copies
- Single datacentre
- Scheduling backups
- Users contact the support team to schedule backups
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- NA
- Approach to resilience
- Multi region cloud hosting
- Outage reporting
- Through Email alerts
Identity and authentication
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Support channels is restricted through role-based access control (RBAC) and multi-factor authentication (MFA) and just in time access
- Access restriction testing frequency
- Less than once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
- Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- No
- Security governance certified
- No
- Security governance approach
- Through Cloud security forum in the company
- Information security policies and processes
- By using the existing bench marks available with Azure, AWS, GCP and reporting against these bench marks
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- ITSM tool
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We employ a proactive vulnerability management approach, continuously assessing potential threats through threat intelligence sources, security audits, and penetration testing. Patches are deployed swiftly through automated processes, prioritizing critical vulnerabilities. Information about potential threats is gathered from trusted sources such as security advisories, vendor notifications, and industry-specific threat intelligence feeds, ensuring timely response and mitigation measures to safeguard our services and users.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- Our protective monitoring involves continuous monitoring of system logs, network traffic, and user activity for signs of potential compromises. We utilize intrusion detection systems and anomaly detection algorithms to identify suspicious behavior. Upon detecting a potential compromise, our incident response team initiates immediate investigation and containment procedures, isolating affected systems and gathering evidence for analysis. We respond promptly to incidents, following predefined escalation procedures and collaborating with relevant stakeholders to mitigate impact and restore normal operations swiftly, typically within minutes to hours.
- Incident management type
- Undisclosed
- Incident management approach
- We have pre-defined incident management processes for common events, documented in our incident response playbook. Users can report incidents through our dedicated support channels, including email and phone. Upon receipt of an incident report, our team assesses the severity and initiates appropriate response actions. We provide incident reports to affected users through email notifications and updates on our service status page, detailing the nature of the incident, impact, resolution steps, and preventive measures taken to mitigate future occurrences.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Energy Efficiency: Our cloud infrastructure is designed for maximum energy efficiency, optimizing resource usage and minimizing energy consumption compared to on-premises solutions, thereby reducing overall carbon footprint.
Pricing
- Price
- £400 to £800 a unit a day
- Discount for educational organisations
- Yes
- Free trial available
- No