Skip to main content

Help us improve the Digital Marketplace - send your feedback

Avensys Consulting (UK) limited

Design, deploy & host IaaS & PaaS

Our service provides Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) solutions for archiving, backup, and disaster recovery needs. This includes compute hosting, container services, database management, networking, security features, storage options, and more, ensuring robust and reliable IT infrastructure.

Features

  • Automated deployment: Streamlined setup process for efficiency.
  • Scalable infrastructure: Easily adjust resources to match demand.
  • Load balancing: Distribute traffic evenly for optimal performance.
  • Continuous monitoring: Real-time performance and security oversight.
  • Auto-scaling: Automatically adjust resources based on workload.
  • Data encryption: Secure data transmission and storage.
  • Disaster recovery: Rapid recovery from system failures or outages.
  • API integration: Seamless integration with third-party services for flexibility.
  • High availability: Ensure uninterrupted service with redundant architecture.

Benefits

  • Rapid deployment: Accelerate time-to-market for applications and services.
  • Scalability: Easily scale resources to meet growing demands.
  • High availability: Ensure continuous service availability for improved reliability
  • Enhanced security: Implement robust security measures for data protection.
  • Simplified management: Streamline operations with centralized control and automation.
  • Flexibility: Adapt to changing requirements and technology trends seamlessly.
  • Improved performance: Enhance application speed and responsiveness.
  • Disaster recovery: Minimize downtime and data loss with resilient architecture.

Pricing

£400 to £800 a unit a day

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Vinod@aven-sys.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

9 7 2 6 4 5 0 8 4 7 9 6 8 1 7

Contact

Avensys Consulting (UK) limited Vinod Patil
Telephone: 07879995773
Email: Vinod@aven-sys.com

Service scope

Service constraints
NA
System requirements
  • Internet connectivity: Reliable internet access for accessing cloud services.
  • Supported web browser: Compatibility with modern web browsers for interface.
  • Anti-virus software: Ensures security for virtual machines and data.
  • Network bandwidth: Sufficient bandwidth for data transfer and communication.
  • Security protocols: Compliance with security standards for data protection.
  • Storage capacity: Adequate storage space for data and applications.

User support

Email or online ticketing support
Email or online ticketing
Support response times
We prioritize prompt responses to questions, typically aiming for within 24 hours on weekdays. Response times may vary during weekends, with inquiries addressed within 48 hours. Urgent queries receive expedited attention regardless of the day. Our commitment is to provide timely assistance and support to ensure clients' needs are met promptly and effectively. Customised SLAs are available at clients request.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
We offer three support levels tailored to meet diverse client needs: Basic Support: This level provides access to standard support resources, including documentation and community forums, at no additional cost. Standard Support: Clients receive timely responses to inquiries during business hours, prioritized ticket handling, and access to phone support for critical issues. Pricing varies based on usage and service level agreements. Premium Support: This comprehensive level offers 24/7 access to technical experts, proactive monitoring, and dedicated account management. Costs are based on a subscription model, with pricing tiers determined by the level of support required. Clients opting for Premium Support gain access to a dedicated Technical Account Manager or Cloud Support Engineer, providing personalized assistance, proactive guidance, and ongoing optimization recommendations tailored to their specific environment and objectives.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We facilitate seamless cloud onboarding through a variety of channels tailored to user preferences and needs. Our comprehensive approach includes onsite and online training sessions, user documentation, and personalized support.

Onsite training sessions offer hands-on guidance and demonstrations, allowing users to familiarize themselves with the cloud environment in their own workspace. Online training resources, including video tutorials and interactive modules, provide flexibility for users to learn at their own pace from anywhere.

In addition, detailed user documentation serves as a comprehensive reference guide, covering setup procedures, best practices, and troubleshooting tips. Our dedicated support team is also available to provide personalized assistance and address any questions or concerns that users may have during the onboarding process.

Overall, our multi-faceted approach ensures that users receive the support and resources they need to confidently start using cloud services, empowering them to harness the full potential of the platform for their business needs.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
When the contract ends, users can extract their data from our platform through a straightforward process designed for convenience and security. They can initiate the data extraction request through their account dashboard or by contacting our support team directly.

Upon receiving the request, our team will assist users in accessing and exporting their data in a suitable format, such as CSV, JSON, or XML, depending on their preferences and the nature of the data.

Users have the option to download their data directly from the platform or request a secure transfer method, such as encrypted file transfer or physical storage device shipment, to ensure the confidentiality and integrity of their data during transit.

Our priority is to facilitate a seamless and transparent data extraction process, enabling users to transition smoothly from our platform while maintaining control and ownership of their data. We also provide guidance and support throughout the process to address any questions or concerns users may have.
End-of-contract process
At the end of the contract, several key steps ensure a smooth transition for users. First, users receive notifications well in advance of the contract expiration date, allowing them ample time to make decisions regarding renewal or termination. If users choose not to renew, they can initiate the end-of-contract process through their account dashboard or by contacting our support team.

During the end-of-contract process, users have the opportunity to extract their data from our platform, ensuring that they maintain control and ownership of their information. Our team assists users in exporting data in a suitable format, providing guidance and support throughout the process.

Included in the price of the contract are core services such as access to the platform, customer support, regular updates and maintenance, and basic data storage. Additional costs may apply for premium features or services, such as advanced security features, additional storage or bandwidth, customization or integration services, and dedicated support or consulting services. These additional costs are typically outlined in the contract agreement or can be requested on an as-needed basis. Our transparent pricing model ensures that users are aware of any additional costs upfront, allowing them to budget effectively informed decisions about their service usage.

Using the service

Web browser interface
Yes
Using the web interface
Our web interface provides users with a user-friendly platform to set up and manage their cloud services efficiently. Through the interface, users can easily configure and deploy virtual machines, set up networking components, manage storage resources, and configure security settings. Users can also monitor performance metrics, view logs, and receive alerts to ensure smooth operations.

Users have the flexibility to make changes to their configurations, such as adjusting resource allocations, updating security policies, and scaling their infrastructure up or down as needed. They can also perform routine maintenance tasks, such as software updates and backups, directly from the interface.

However, there are some limitations to what users can do through the web interface. Certain advanced configurations may require access to the command-line interface or API for more granular control. Additionally, some features may be restricted based on the user's permissions and role within the organization. Users should be aware of these limitations and consult with administrators or support personnel for assistance when needed.
Web interface accessibility standard
None or don’t know
How the web interface is accessible
Our web interface adheres to EN 301 549 accessibility standards to ensure inclusivity for all users. Users can navigate the interface using assistive technologies such as screen readers and keyboard shortcuts. Features include proper semantic markup, descriptive alt text for images, and resizable text for readability. Users can perform essential tasks such as managing resources, configuring settings, and monitoring performance.

However, certain interactive elements, such as complex data visualizations, may pose challenges for screen reader users. Additionally, users with mobility impairments may encounter difficulties with fine-grained control using keyboard navigation alone. We continuously strive to enhance accessibility by soliciting feedback from users and incorporating best practices to address identified barriers, ensuring that our web interface remains accessible to all.
Web interface accessibility testing
We have conducted extensive web interface testing with assistive technology users, including screen reader users and individuals with motor impairments. Testing involved ensuring compatibility with popular screen readers like JAWS and NVDA, as well as assessing keyboard navigation and alternative input methods. Feedback from users was incorporated to improve accessibility features, such as ensuring proper labeling, focus management, and ARIA support, to ensure an inclusive user experience for all.
API
Yes
What users can and can't do using the API
Through Azure, GCP, and AWS API, users can programmatically set up and configure cloud services, deploy resources, and manage their infrastructure. They can automate tasks such as provisioning virtual machines, configuring networking components, and implementing security policies. Users can also make changes to their configurations, update settings, and scale resources up or down dynamically.

However, there are some limitations to what users can achieve through the API. Certain advanced configurations may require manual intervention or access to the web interface for more granular control. Additionally, some features may be restricted based on the user's permissions and role within the organization. Users should be aware of these limitations and plan their workflows accordingly. We provide comprehensive documentation and support to assist users in leveraging the API effectively while ensuring security and compliance.
API automation tools
  • Ansible
  • Chef
  • OpenStack
  • SaltStack
  • Terraform
  • Puppet
API documentation
No
Command line interface
Yes
Command line interface compatibility
  • Linux or Unix
  • Windows
  • MacOS
Using the command line interface
We provide native CLI services provided by Azure, AWS, GCP. However, there are some limitations to what users can achieve through the CLI. Certain complex configurations or administrative tasks may be better suited for the web interface or API. Additionally, users may need to have appropriate permissions and credentials to execute certain commands, ensuring security and compliance. We provide comprehensive documentation and support to assist users in leveraging the CLI effectively while addressing any limitations.

Scaling

Scaling available
No
Independence of resources
We ensure the independence of resources by employing robust isolation mechanisms, including resource allocation, load balancing, and performance monitoring. Each user's resources are dynamically allocated and isolated from others, preventing resource contention and ensuring consistent performance regardless of demand fluctuations from other users. Additionally, we implement proactive capacity planning and scaling strategies to anticipate and mitigate potential bottlenecks, maintaining optimal performance and reliability for all users.
Usage notifications
Yes
Usage reporting
Email

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
Reporting types
Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
Less than once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Encryption of all physical media
Data sanitisation process
No
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • Files
  • Databases
  • Applications
Backup controls
Backup are provided at scheduled intervals.
Datacentre setup
  • Multiple datacentres with disaster recovery
  • Multiple datacentres
  • Single datacentre with multiple copies
  • Single datacentre
Scheduling backups
Users contact the support team to schedule backups
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
NA
Approach to resilience
Multi region cloud hosting
Outage reporting
Through Email alerts

Identity and authentication

User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Support channels is restricted through role-based access control (RBAC) and multi-factor authentication (MFA) and just in time access
Access restriction testing frequency
Less than once a year
Management access authentication
  • 2-factor authentication
  • Username or password
Devices users manage the service through
Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
No
Security governance certified
No
Security governance approach
Through Cloud security forum in the company
Information security policies and processes
By using the existing bench marks available with Azure, AWS, GCP and reporting against these bench marks

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
ITSM tool
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We employ a proactive vulnerability management approach, continuously assessing potential threats through threat intelligence sources, security audits, and penetration testing. Patches are deployed swiftly through automated processes, prioritizing critical vulnerabilities. Information about potential threats is gathered from trusted sources such as security advisories, vendor notifications, and industry-specific threat intelligence feeds, ensuring timely response and mitigation measures to safeguard our services and users.
Protective monitoring type
Undisclosed
Protective monitoring approach
Our protective monitoring involves continuous monitoring of system logs, network traffic, and user activity for signs of potential compromises. We utilize intrusion detection systems and anomaly detection algorithms to identify suspicious behavior. Upon detecting a potential compromise, our incident response team initiates immediate investigation and containment procedures, isolating affected systems and gathering evidence for analysis. We respond promptly to incidents, following predefined escalation procedures and collaborating with relevant stakeholders to mitigate impact and restore normal operations swiftly, typically within minutes to hours.
Incident management type
Undisclosed
Incident management approach
We have pre-defined incident management processes for common events, documented in our incident response playbook. Users can report incidents through our dedicated support channels, including email and phone. Upon receipt of an incident report, our team assesses the severity and initiates appropriate response actions. We provide incident reports to affected users through email notifications and updates on our service status page, detailing the nature of the incident, impact, resolution steps, and preventive measures taken to mitigate future occurrences.

Secure development

Approach to secure software development best practice
Supplier-defined process

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
No

Energy efficiency

Energy-efficient datacentres
No

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

Energy Efficiency: Our cloud infrastructure is designed for maximum energy efficiency, optimizing resource usage and minimizing energy consumption compared to on-premises solutions, thereby reducing overall carbon footprint.

Pricing

Price
£400 to £800 a unit a day
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Vinod@aven-sys.com. Tell them what format you need. It will help if you say what assistive technology you use.