This G-Cloud 10 service is no longer available to buy.

The G-Cloud 10 framework expired on Tuesday 2 July 2019. Any existing contracts with InTechnology Plc are still valid.
InTechnology Plc

PSN Gateway / Access Service

InTechnology can provide secure and reliable connectivity to the PSN network over a range of speeds and technologies. Our PSN Gateway Services are approved and allow customers to reduce their overhead expenditures, facilitate data exchange and enhancing customers’ experience by accessing PSN services.

Features

  • Fully approved
  • Secure Remote Access
  • Two Factor Authentication plus IP Sec Tunnel
  • Fully Managed Service
  • N+1 architecture
  • Accredited to process data marked confidential
  • Central administration portal for customer managed adds, moves and changes

Benefits

  • No upgrade or maintenance charges
  • Access via PSN
  • Leading practice business process adoption
  • No capital expenditure is required
  • Flexible delivery methods
  • ISO 27001 and 9001 certified
  • Provides a complete implementation package tailored to specific needs

Pricing

£80.00 a unit a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@intechnologyplc.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 10

Service ID

2 6 8 4 4 8 2 1 1 7 9 9 0 0 3

Contact

InTechnology Plc Jamie Innes
Telephone: 01423 510 681
Email: tenders@intechnologyplc.com

Service scope

Service constraints
For the benefit of our customers we will allocate a pre-determined planned window which will be utilised to carry out any core infrastructure changes which may carry a minimal risk of disruption to service, or in some instances a period of service downtime which would be kept to an absolute minimum. In either instance, customers will be notified of the full details of the requirement with a minimum of 14 days’ notice prior to the maintenance window.
System requirements
InTechnology network services and or the internet are required

User support

Email or online ticketing support
Email or online ticketing
Support response times
The service desk is available to receive calls and open tickets 24x7/365. The on-call Support Service ensures that severity level 1 and 2 incidents can be responded to in a timely manner.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
The Customer Service operation is available 24x7x365 and can be contacted by telephone, email or via the Customer Portal. Your call is routed directly to our Service Management Centre (SMC) who will log your Service Call, agree the call priority and assign a customer interaction number which will allow your request to be identified efficiently and tracked at all times.

Customers will also have access to a customer service manager who will be their main point of contact in the event they have any escalations.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
The service is inclusive of Redcentric’s standard service delivery implementation process covering design, supply, implementation and transition into support. The delivery components are detailed as follows:

• Generate high level design
• Generate low level design
• Generate a detailed migration plan
• Install and configure the compute, storage and network infrastructure
• Migrate application/service groups in line with the customer’s change management procedures

Redcentric will assign a dedicated project manager as a single point of contact for the delivery of all services to the customer, who will engage with the relevant customer staff at the earliest possible stage, to ensure full project lifecycle management. In addition, there will be a minimum of 2 (PRINCE2 qualified) project support staff assigned to assist the project manager throughout the delivery, ensuring continuity of service. In addition, the service delivery department operates a clearly defined escalation hierarchy to ensure the prompt resolution of any concerns or queries.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
At the end of the contract with the customer and if the customer does not wish to renew their service.

Redcentric will assist the Customer in facilitating the orderly transition of the Redcentric Services (in whole or part) from Redcentric to the Customer or any replacement supplier upon the expiry or earlier termination of the agreement. This section sets out the principles regarding the service transition that form the base of an Exit Plan.
End-of-contract process
Redcentric shall produce an Exit Plan upon notification of termination of the agreement, in accordance with the principles set out in this section, as soon as practicable (but not later than 60 days) after any notice of termination of the agreement.

The Exit Plan shall, unless otherwise agreed with the Customer:
• address each of the issues set out in this Exit Plan in order to assist the Customer in facilitating the transition of the Redcentric Services from Redcentric to a replacement supplier or the Customer ensuring to the extent reasonably possible that there is no disruption in the supply of Services and that there is no deterioration in the quality of delivery of the Services during any period of transitional assistance;
• provide an estimate of the scope of transitional assistance that may be required by the Customer and suggest how such assistance might be provided (if required); and
• provide an estimate of Redcentric’s personnel that may be required to provide transitional assistance and suggest the management structure to be put in place and employed to provide such transitional assistance.

Using the service

Web browser interface
Yes
Using the web interface
Redcentric will provide professional services to assist the customer with the service activation. This will encompass, but is not limited to, project management, network design, server design, IaaS platform build.

Redcentric will enable logon to the self-service interface for specified customer contact as part of the service activation. By default this will include the identified contact on the service agreement, but can include additional contacts identified during service activation. The self-service interface provides a single interface to create, manage and remove infrastructure hosted within the service. The self-service interface for shared IaaS platforms is accessible by the Internet. The self-service interface for dedicated IaaS can be restricted to specific networks, such as the N3, Internet and private VPN.

Redcentric will setup network resources as part of the service activation. This will include identification of IP addresses, default gateways, firewall configuration, etc.

Upon service activation, the customer will be able to build their infrastructure within the self-service interface. The customer will be able to build a new server using a Redcentric provided template.
Web interface accessibility standard
None or don’t know
How the web interface is accessible
The shared IaaS self-service interface is accessible via commonly available web browsers, such as Internet Explorer, Chrome and Firefox.
Web interface accessibility testing
The self-service interface is continuously updated and improved based on feedback from users.
API
No
Command line interface
No

Scaling

Scaling available
Yes
Scaling type
Manual
Independence of resources
We have monitoring and alarms in place to ensure that it has sufficient capacity and resources to ensure that users are not experiencing any degradation in service because of other users.
Usage notifications
Yes
Usage reporting
Email

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • HTTP request and response status
  • Network
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Redcentric Solutions Ltd

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Hardware containing data is completely destroyed
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery
No

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Redcentric understand the importance of the services that our Customers are looking to contract for as defined within your requirements.

Redcentric already have SLA’s and Penalties (service credits) as standard offerings for each of our managed services.

IaaS shall be deemed available when the customer is able to access and use the customer’s applications and services hosted by Redcentric. This may include periods where the customer is unable to access applications and services, where it is demonstrated by Redcentric to the customer’s satisfaction, or where any inability to access the customer’s applications and services is the result of permitted downtime.

Any reduced charges under this Service Level Agreement will be confirmed by credit note issued by Redcentric to our customers, confirming the adjustment to be made to the following monthly charge.
Approach to resilience
Where possible we operate all hardware components as minimum of N+1 – multiple network feeds, A+B power feeds, redundant PSU/memory/CPU, etc. The power to the data centre also has UPS backup and diesel generators so can withstand prolonged mains grid failure without interruption to service.
Outage reporting
As part of its ISO 27001 accreditation we have fully documented and well rehersed business continuity and major incident policies. In the unlikely event that a major incident is invoked an incident manager will be responsible for managing all external communication with customers. As part of its existing ISO 27001 and ISO 9001 accreditations we have a major incident policy which details the processes to be followed in the event of a major incident. As part of the contract with the customer we will appointment a customer account manager who will be the central point of contact between us and the customer and will ensure that both parties confirm to their respective major incident policies.

Identity and authentication

User authentication
  • 2-factor authentication
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
We ensure that as part of support and developments roles that users only have access to the systems that they require. In addition, certain access permissions are only opened for a limited time whilst activities such as upgrades or support investigations take place. This ensures that users do not have access to potentially sensitive information or make changes without access being opened up by a senior operative.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device over multiple services or networks

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
17/05/16
What the ISO/IEC 27001 doesn’t cover
All of the InTechnology Plc functions are covered by the ISO 27001 certification.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
Yes
Who accredited the PCI DSS certification
Red Island
PCI DSS accreditation date
16/02/2012
What the PCI DSS doesn’t cover
The PCI DSS Certification covers the physical hosting of PCI DSS data within its Harrogate and Reading data centres.

It does not cover the London Data Centre, City of London Data Centre and Cambridge Data Centres.
Other security certifications
Yes
Any other security certifications
Cyber Essentials Certificate

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
As part of our ISO 27001 and ISO 9001 accreditation we have wide range of supporting information security policies and processes. These are meticulously followed within the organisation and your security and compliance manager ensures that all staff go through induction and regular training to ensure compliance. Any security incidents are logged by the security and compliance manager and are reviewed at quarterly forum meetings where representatives from all over the business, including the CEO are present.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Redcentric is committed to continually improving and expanding its core network and data centre capabilities, thus striving to provide the highest levels of service to its customers. In order to facilitate these improvements, it is necessary to carry out essential work from time to time. These activities are carefully scheduled through the use of an internal change control process which is designed to present maximum visibility of that change and thereby ensure that planning and implementation are carried out to minimize the effect on customers and their network services.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We regularly perform patches to services based on the recommendations of software manufacturers. We sign up to mailing lists from software manufacturers so that we can be made aware of potential threats and then perform an internal risk analysis to determine how quickly a patch needs to be deployed.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Within its services we deploy different layers of monitoring to reduce the risk of compromises, including Firewalls with IDS / IPS and Anti-virus software. In the event a comprise was found we would invoke its major incident process to determine the extend of the compromise and from this the resulting actions which need to be undertaken.
Incident management type
Supplier-defined controls
Incident management approach
As part of its ISO 27001 and 9001 accreditation's we have a proven major incident process which ensures that all reported incidents are logged by service users from. In addition the policy ensures that incident reports are provided to users in the event of a major incident which details the root cause and the steps which have been undertaken to stop it occurring again in the future.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Third-party
Third-party virtualisation provider
VMware
How shared infrastructure is kept separate
Shared hardware platforms host multiple customers, with each customer segregated into their own management, server and network environment through logical partitioning. Dedicated hardware platforms host a single customer that can also be logically partitioned to separate different operating environments, business units or programmes within the customer.

Energy efficiency

Energy-efficient datacentres
Yes

Pricing

Price
£80.00 a unit a month
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@intechnologyplc.com. Tell them what format you need. It will help if you say what assistive technology you use.