NECS Hybrid Cloud Additional Services
NECS is a Belgian based hybrid cloud solution delivering housing/hosting from its Belgian based datacenters with integration of main public clouds into one central portal.
We offer value added services like managed OS, managed databases, managed middleware and generic architecture/consulting services.
Features
- Georesilient datacenters
- Private cloud with integration of public clouds
- IaaS, PaaS, SaaS with or without DC resiliency
- Managed services
- Managed network services
- Oracle Exadata as a Service
- Mainframe services
Benefits
- 2 main datacenters, additional on roadmap
- One portal for access to private and public cloud services
- Managed OS, Storage, Archiving, Backup
- Oracle Exadata avoids physical servers for licensing purpose
Pricing
£1.26 a virtual machine a day
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
9 7 4 9 2 3 1 6 0 5 1 5 5 2 4
Contact
Network Research Belgium (NRB) SA
Nicolas Prevost
Telephone: +32 4 249 7211
Email: presales@nrb.be
Service scope
- Service constraints
-
Disaster recovery testing on mutualized environment can only be done together with other customers. It is possible on dedicated POD.
Maintenance windows need to be agreed upon.
Selfservice machine deployment limited to 14 vcpu, More possible through Service Request. - System requirements
-
- Internet access or dedicated connections (MPLS, Leased line, ...)
- Licensing must follow vendor rules (Microsoft, RedHat, ...)
- Oracle Exadata as a Service with Bring Your Own Licenses
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Typically we include a number of tickets in the contract, handling of additional tickets will be charged (Service Requests).
Acknowledgements of new tickets will be given within 30 minutes. Handling depends on contractual SLA and urgency. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- No
- Support levels
-
- Basic support level is Business Hours (Central European Time, Weekdays 8AM-5PM).
- Extended Business Hours (Central European Time, Weekdays 7AM-7PM, Pricing BH +10% ).
- 24x7 Support (Central European Time, 7-days 24hr/day, Pricing BH +15% ).
Service Delivery Manager can be provided - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Online training, online user documentation. Eventually on-line training through Teams meeting is schedulable.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Data can be given back to customer as ISO file, backup file or any other format that can be agreed upon .
- End-of-contract process
-
The contract is modular, the customer can decide to continue the service (if possible depending on Request for Proposal conditions) or end it.
When the customer decides to exit he can either retrieve his data through the network connection (Internet, MPLS, ...) or agree with NRB how the data needs to be handed over (to customer or eventually new service provider).
Using the service
- Web browser interface
- Yes
- Using the web interface
- For managing your Hybrid Cloud Services you use a Webinterface (Cloud Management Platform). End users access depends on application, typically we connect the customers virtual network to their internal network.
- Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- Web interface is accessible through Internet or dedicated network connection.
- Web interface accessibility testing
- None
- API
- Yes
- What users can and can't do using the API
- All visible features in the Cloud Management Portal are available as an API.
- API automation tools
- Ansible
- API documentation
- Yes
- API documentation formats
-
- Other
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- MacOS
- Using the command line interface
- As NECS is based on VMware’s vRealize solution, our NECS portal equally benefits from the VMware CloudClient Command-Line Utility. This is a command-line utility that provides verb-based access with a unified interface across vRealize/NECS Automation APIs.
Scaling
- Scaling available
- Yes
- Scaling type
- Manual
- Independence of resources
- Each customer has one or more "Tenants", these tenants have separated VRFs and can have several VNETs. All tenants are protected by a dedicated firewall.
- Usage notifications
- Yes
- Usage reporting
- Other
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- Memory
- Number of active instances
- Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with SSAE-16 / ISAE 3402
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- Backup controls
- We offer daily full backups of the complete environment.
- Datacentre setup
-
- Multiple datacentres with disaster recovery
- Multiple datacentres
- Single datacentre with multiple copies
- Single datacentre
- Scheduling backups
- Users contact the support team to schedule backups
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Bonded fibre optic connections
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
SLAs and penalties are agreed upon on contract signing.
SLOs are published and range from 99,99% to 93% depending on the level of redundancy of the service.
Penalties are typically based upon the downtime suffered against the Service Level Target and will represent a percentage of the monthly RUN fee. Depending on the contract this is typically capped to a set percentage of the monthly fee. - Approach to resilience
-
The main georesilient datacenter is build upon two geographically distant datacenters (availability zones) about 22 miles apart. These datacenters are interconnected using two double pairs of dark fibres. Each datacenter has a complete set of infrastructure that can be replicated to the secondary site. Backups are typically made in the secondary datacenter and replicated to the primary. As such even if the resource is not replicated it can be reconstructed from a restore. This even in case of loss of a complete datacenter.
A complete description can be transmitted on request. - Outage reporting
-
Outages are reported through email to notify the customer of upcoming maintenance of the portal.
The service status and eventual outage is published from a tile on the Cloud Management Portal .
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- At service onboarding a list of authorised persons is agreed upon that will have the right to open tickets or request incident priority changes.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 30/3/2016 renewed 25/2/2022
- What the ISO/IEC 27001 doesn’t cover
- None
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- ISO/IEC 9001
- ISO/IEC 20000-1:2018
- SAP-certified provider of Hosting Operations
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
-
ISO/IEC 9001
ISO/IEC 20000-1:2018
SAP-certified provider of Hosting Operations - Information security policies and processes
-
NRB is fully ISO 27K compliant and as such has a well-structured and documented ISMS (Information Security Management System) in place.
The overall approach of the Information Security management System is to ensure the continued security of all the processes included in the scope via a PDCA approach.
This approach takes the following restrictions into account:
• The legal requirements in effect in Belgium
• Regulatory requirements
• Contractual requirements
• The information security management system covers:
The design and analysis of, and consultancy and support for IT projects,
The design and development of the maintenance and hosting of IT solutions,
The management of system,
The telecommunication network, and mass-printing infrastructure,
The delivery and configuration of hardware and software,
IT consulting.
NRB’s Information System, which enables the performance of the tasks involved.
The scope of our security management includes all of the services provided to its customers by NRB via the aforementioned processes, and therefore the infrastructure hardware owned by NRB, which enables NRB to carry out its business activities, namely:
• The server and storage bays
• The computer servers
• The hosting facilities
• The telecommunications connections
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
NRB’s Change Management Process aims at authorizing all Requests for Changes (RFCs), controlling change management flows through standard framework and discipline, lessening risks of disruption to business services and determining costs and benefits associated with a Change;
The quality of the Change Management Process put in place at NRB is very high as great attention is given to assessment and approval activities i.e. Change Advisory Board (CAB) but also pre-CAB meetings are reviewing and deciding upon the execution of Changes. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
There are three versions of the “Vulnerability Management Service” (Basic / Standard / Full).
In summary,
“Basic” supports the scanning and classsifcation of vulnerabilities ;
“Standard” adds project management for the remediation of vulnerabilities to the Standard version ;
“Full” adds patch deployment to Full version (Only if the assets are managed by NRB and with new projects). - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
NRB’s Event Monitoring Services consists of tracking key indicators within the infrastructure and related services. To provide such services, NRB has a state of the art monitoring and event management system that is able to correlate events.
This results in a much faster and easier incident and problem resolution as well as reporting and trending, and allows NRB to measure the agreed service levels and proactively manage the service in terms of availability, capacity and performance.
The alerting is triggered by the monitoring platform and enriched by CMDB information (criticality and service windows of the impacted configuration items). - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Our Service Desk ensures proper registration of user information received, high level monitoring of the subsequent activities and user feedback. As such, it is our prime operational body that ensures that the IT Service Management processes (ITIL v3 driven) are properly applied.
A standard report showing SLA performances is provided once a month. It presents key data about the Service. The Service Delivery Manager, as contact person for Customer during delivery period, uses the report as a support for further discussion about service improvement.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- VMware
- How shared infrastructure is kept separate
-
Each organization is implemented on a separate VFR that can contain multiple VLANs. Each tenant has a dedicated firewall.
Connection to local network uses Natting technology .
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
-
Using free chilling on the cooling plant, optimizing the hours/year of activation;
Using modular UPS with maximum efficiency curve per load, activating modules as needed;
Using cold corridors and blanking panels to avoid cold/hot air mixture;
Replacing water pumps with IE3 versions
Recovering energy through the use of air exchangers to reheat sanitary air;
Maximizing the insulation (K 26) of the building in order to avoid external heating;
Maximizing the insulation of cold and hot pipes
Using economical/ecological lighting, with motion based activation, centralized lights out, and time-delay lighting;
Social Value
- Fighting climate change
-
Fighting climate change
NRB has developed, since 2010, a substantial set of ecological initiatives grouped in NRB’s GreeNRB program, supported by their EcoTeam.
NRB have recently signed an agreement with the Wallonia region, with a commitment to improve the energy efficiency of the Herstal plant by 2020. Amongst the agreed action plan, one will find specifically for the Data Centers:
Using free chilling on the cooling plant, optimizing the hours/year of activation;
Using modular UPS with maximum efficiency curve per load, activating modules as needed;
Using cold corridors and blanking panels to avoid cold/hot air mixture;
Replacing water pumps with IE3 versions
Recovering energy through the use of air exchangers to reheat sanitary air;
Maximizing the insulation (K 26) of the building in order to avoid external heating;
Maximizing the insulation of cold and hot pipes
Using economical/ecological lighting, with motion based activation, centralized lights out, and time-delay lighting;
Selecting IT equipment with optimized power consumption, by the use of efficient power modules, environmental control drivers (fan speed adjustment), CPU speed adaptation to the load of servers and stopping idle hard drives spindles.
Using variable fan speed CRAH
Selecting IT equipment with optimized power consumption, by the use of efficient power modules, environmental control drivers (fan speed adjustment), CPU speed adaptation to the load of servers and stopping idle hard drives spindles.
Using variable fan speed CRAH
Since January 2009, NRB is committed to use electricity made of green sources. This is reflected in NRB contractual agreement with NRB electricity provider, to deliver 100% green electricity. Recently a new windturbine was installed on the site of Herstal to reduce thefootprint.
NRB's recycling policy is pretty comprehensive. NRB hired specialized firms to process their main waste, paper, cardboard and wooden pallets. - Covid-19 recovery
-
Covid-19 recovery
Safe environment–NRB implements flexible workspace design to suit variable conditions, such as social distancing requirements. Design additions (transparent office table separators), C02 monitoring devices or dividing team in different time slots to minimize exposure are also used.
Safe interactions-Pandemics underscores the need for a zero to low-contamination workplace favouring safe interactions. We have reduced contact-rich activities such as meetings, brainstorming workshops, training classes and virtualised them as much as possible, using Microsoft Teams, Skype for Business, extended use of online training platforms. At the same time, we have made teleworking the default position, doubling up our VPN capacity, and reduced professional travel to what is business essential.
Prophylaxis–A string of prophylactic measures have also been adopted; use of virucide/bactericide surface cleansing product, once a day overall and twice a day for heavily frequented areas (e.g. coffee corners, toilets), hand cleaner, distribution of personal protection equipment (masks) and floor markers in crowded place respecting distancing norms. Instructions on how to protect oneself (and others) have been communicated to all collaborators and are posted in crowded (e.g. coffee room) and key places (floor entry/exit doors, open space areas). Masks and sanitizing products are also made available for visitors and collaborators alike.
A special page on the NRB intranet is maintained to inform all collaborators about:
• Teleworking: organization, ergonomic tips
• Measures to ensure safety at the office: masks, workplace partitions, hand hygiene, ventilation, CO² monitors
• Contact Persons to support the physical and mental health of people affected by COVID-19: the HR Business Partner, the Prevention Advisor, the psychosocial counsellor from Cohezio, the external occupational health service, in respect of GDPR.
Teleworking and hybrid work have become normal ways of working, favouring the return to work for collaborators who are affected or who are in confinement, and reducing the home-to-office travelling. - Equal opportunity
-
Equal opportunity
Those from disadvantaged or minority groups
Belgian legislation lays down a general principle prohibiting direct and indirect discrimination of persons on the basis of, among other things, gender, age, ethnic or national origin, religious or philosophical belief, sexual orientation, disability, etc.
At NRB, we are committed to ensure, in terms of human resources, a fair treatment of our employees in the countries where our staff is employed. Our policy is to consider only the skills and suitability of the individual for the requirements of the position, both at engagement and during the course of his·her career with NRB and at feedback meetings and People Reviews which are elements of the annual performance and development management cycle. - Wellbeing
-
Wellbeing
We address our staff’s needs through measures based on Maslow’s Hierarchy of Needs, translated in the professional context.
Addressing health concerns includes providing a safe environment, especially in pandemic times.
Stability on the job and in the mission:
• NRB offers attractive fees or salaries regularly benchmarked against market standards.
• NRB provides candidates with sufficient details related to the mission to ensure that their decision to join is correctly informed.
• Organisation guaranteeing regular meetings for feedback.
Social needs and interpersonal relations:
• Understanding Customer’s objectives and target ahead of time make consultants part of the broader context, improving commitment.
• Meet-ups and info sharing sessions to help the consultants gain insights in their fields.
• Quarterly gatherings of consultants to provide an opportunity for informal talks between consultants and their peers.
• Collaboration platform allowing consultants to interact with their peers and managers from anywhere.
Self-esteem and recognition
• Recognition and reward to acknowledge the achievements of the consultants.
• Performance appraisal to help consultants to reach their future goals and assess the willingness of the consultant to continue on the project.
• Communities of practice – Consultants can rely on communities of practice to obtain special advice when necessary.
• Career map, providing mid- and long-term vision for the consultants to make them confident to develop their career within NRB.
Realising one’s full potential:
• Personal learning and development through (a) trainings, participation to conferences and seminars, etc. (b) career opportunities offered to consultants on basis of their aspirations and of new needs expressed by the Buyer; (c) extended responsibilities.
• Certifications are important for the sustainable growth of NRB, but also for the personal accomplishment and evolution of consultants.
• Career opportunities giving consultants a chance to grow in the context of the framework contract.
Pricing
- Price
- £1.26 a virtual machine a day
- Discount for educational organisations
- No
- Free trial available
- No