ASA Solutions Ltd

Application & Database -Server & Storage Hosting

Providing services to build, deploy and migration of web API's, applications, relational databases and infrastructure related hardware from on premises to cloud based solution in virtualised environment.
Services include:
Server Migrations and Installations
Applications & Data bases Installations & migrations
Cloud Account & Data Storage set up.

Features

  • Planing, Analysis, Design, Migrate & Support
  • Migrate infrastructure from On premises to Cloud
  • Poviding run book through phase installation with time scales
  • Providing ongoing support for applications and web servers
  • Providing server, infrastructure and network related support

Benefits

  • Time & Cost saving
  • Less resources required
  • Easy manageble

Pricing

£470 to £800 per person

  • Education pricing available

Service documents

G-Cloud 9

184912373685228

ASA Solutions Ltd

Satwick Gutha

07702597832

satwick.gutha@outlook.com

Service scope

Service scope
Service constraints All services are provided in subject to purchasing of Cloud storage and server licensing and software licensing model by the buyer to continue with set up.
System requirements
  • Antivirus responsible by buyers
  • Softwares and Licensces cost applicable to buyer

User support

User support
Email or online ticketing support Email or online ticketing
Support response times As agreed with supplier
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Ongoing onsite support is part and parcel of daily routine. Full support ( 9 -5 ) for projects. On call or out of hours support is available on request but will incur additional costs and is subject to fully understanding requirements and testing
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Training, workshops and documentation as agreed with the client
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Data can be extracted using scripts or packages to pull from relation databases into excel or csv format to migrate to third party applications if client request. Or else the data can be provided a .bak file to customer to restore.
End-of-contract process Onsite work is included in the price. During the handover period, ( 2 weeks prior to completion ) documentation and final code are consolidated as requested. At the end of the contract pricing can be introduced for ongoing support and additonal work as agreed by the parties.

Using the service

Using the service
Web browser interface No
API No
Command line interface No

Scaling

Scaling
Scaling available Yes
Scaling type Manual
Independence of resources Tasks are separated out and assigned distinctly. Each application will have it own work space which is not impacted by other work streams. These are independent of each other so impacted is vastly reduced.
Usage notifications Yes
Usage reporting Email

Analytics

Analytics
Infrastructure or application metrics Yes
Metrics types
  • CPU
  • Disk
  • Memory
  • Number of active instances
Reporting types Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least every 6 months
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Scale, obfuscating techniques, or data storage sharding
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Backup and recovery

Backup and recovery
Backup and recovery Yes
What’s backed up
  • Databases
  • Files
  • Users can define what to back up
Backup controls Email alerts are configured to notify the users which back up are performed based on the system.
Datacentre setup Multiple datacentres
Scheduling backups Users contact the support team to schedule backups
Backup recovery Users contact the support team

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Agreement with client
Approach to resilience Available on request
Outage reporting Email alerts

Identity and authentication

Identity and authentication
User authentication Username or password
Access restrictions in management interfaces and support channels Username and password access only
Access restriction testing frequency Less than once a year
Management access authentication Username or password
Devices users manage the service through Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Audit information for users
Access to user activity audit information No audit information available
Access to supplier activity audit information No audit information available
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation No
Security governance approach In conjunction with the buyer and on mutual agreement
Information security policies and processes Based on a mutual non disclosure agreement between parties

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Comply with client agreement
Vulnerability management type Supplier-defined controls
Vulnerability management approach Threats are notified from compliance report and carefully analysed and a fix/resolution will be released to the products to meet the compliance standards.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Agreed with client
Incident management type Supplier-defined controls
Incident management approach Incidents and changes are managed by SLA based approach based on user priority. The reports are sent out monthly basis for all clients to meet the target SLA agreement.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart No

Energy efficiency

Energy efficiency
Energy-efficient datacentres No

Pricing

Pricing
Price £470 to £800 per person
Discount for educational organisations Yes
Free trial available No

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Terms and conditions document View uploaded document
Return to top ↑