Backup as a Service
Hosted third party Software and Application services provided for every day business needs. Consultancy, Installation, Configuration and Support offered.
Features
- Off-site Backup
- Backup and Disaster Recovery
Benefits
- Automated Backup Solution
- Disaster Recovery Environment
Pricing
£5 a user
- Education pricing available
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at GCloud@planet-it.net.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 10
Service ID
2 2 0 6 9 6 5 0 0 3 0 5 2 3 4
Contact
Planet IT
Adrian Sweeney
Telephone: 01235433900
Email: GCloud@planet-it.net
Service scope
- Service constraints
- Product used is Veeam Cloud Connect, this can be connected to most backup software vendors. Additional software purchases may be required.
- System requirements
- Stable internet connection - Dedicated Line
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We offer a standard 8:30am-6pm service with additional 24/7 cover if required.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Web chat is provided through our website using PureChat. This connects to a member of staff in the office who chats directly with the end user. A mobile app allows this chat to be offered 24/7. A chat session will allow the end user to describe their issue and arrange for an engineer to either connect remotely to their machine or call them to discuss further.
- Web chat accessibility testing
- N/A
- Onsite support
- Onsite support
- Support levels
- We offer 24/7 Support from 1st line to 4th line support allocated on a case by case scenario.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Full consultancy and project scoping. Training provided as required with documentation and shared project plans via SharePoint.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Depending on service this can be migrated with physical data extraction or migration to another provider.
- End-of-contract process
- TBC
Using the service
- Web browser interface
- Yes
- Using the web interface
- TBC
- Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- TBC
- Web interface accessibility testing
- TBC
- API
- Yes
- What users can and can't do using the API
- TBC
- API automation tools
- Other
- API documentation
- Yes
- API documentation formats
-
- HTML
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
-
- Automatic
- Manual
- Independence of resources
- TBC
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- Memory
- Network
- Reporting types
-
- Real-time dashboards
- Regular reports
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Microsoft, Sophos, Mimecast, Cisco, HP, Dell, vSpot, Veeam, VMWare
Staff security
- Staff security clearance
- Conforms to BS7858:2012
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Hardware containing data is completely destroyed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- Backup controls
- This information is collected during the scoping of the project
- Datacentre setup
- Single datacentre with multiple copies
- Scheduling backups
- Users contact the support team to schedule backups
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
- Private network or public sector network
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- TBC
- Approach to resilience
- TBC
- Outage reporting
- TBC
Identity and authentication
- User authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- TBC
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
- Dedicated device on a segregated network (providers own provision)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Quality Services Ltd
- ISO/IEC 27001 accreditation date
- 22/01/2018
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Available on request
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- TBC
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- TBC
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- TBC
- Incident management type
- Supplier-defined controls
- Incident management approach
- TBC
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- VMware
- How shared infrastructure is kept separate
- TBC
Energy efficiency
- Energy-efficient datacentres
- Yes
Pricing
- Price
- £5 a user
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- TBC
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at GCloud@planet-it.net.
Tell them what format you need. It will help if you say what assistive technology you use.