InTechnology Plc

PSN Gateway / Access Service

InTechnology can provide secure and reliable connectivity to the PSN network over a range of speeds and technologies. Our PSN Gateway Services are approved and allow customers to reduce their overhead expenditures, facilitate data exchange and enhancing customers’ experience by accessing PSN services.


  • Fully approved
  • Secure Remote Access
  • Two Factor Authentication plus IP Sec Tunnel
  • Fully Managed Service
  • N+1 architecture
  • Accredited to process data marked confidential
  • Central administration portal for customer managed adds, moves and changes


  • No upgrade or maintenance charges
  • Access via PSN
  • Leading practice business process adoption
  • No capital expenditure is required
  • Flexible delivery methods
  • ISO 27001 and 9001 certified
  • Provides a complete implementation package tailored to specific needs


£80.00 per unit per month

Service documents

G-Cloud 10


InTechnology Plc

Jamie Innes

01423 510 681

Service scope

Service scope
Service constraints For the benefit of our customers we will allocate a pre-determined planned window which will be utilised to carry out any core infrastructure changes which may carry a minimal risk of disruption to service, or in some instances a period of service downtime which would be kept to an absolute minimum. In either instance, customers will be notified of the full details of the requirement with a minimum of 14 days’ notice prior to the maintenance window.
System requirements InTechnology network services and or the internet are required

User support

User support
Email or online ticketing support Email or online ticketing
Support response times The service desk is available to receive calls and open tickets 24x7/365. The on-call Support Service ensures that severity level 1 and 2 incidents can be responded to in a timely manner.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels The Customer Service operation is available 24x7x365 and can be contacted by telephone, email or via the Customer Portal. Your call is routed directly to our Service Management Centre (SMC) who will log your Service Call, agree the call priority and assign a customer interaction number which will allow your request to be identified efficiently and tracked at all times.

Customers will also have access to a customer service manager who will be their main point of contact in the event they have any escalations.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started The service is inclusive of Redcentric’s standard service delivery implementation process covering design, supply, implementation and transition into support. The delivery components are detailed as follows:

• Generate high level design
• Generate low level design
• Generate a detailed migration plan
• Install and configure the compute, storage and network infrastructure
• Migrate application/service groups in line with the customer’s change management procedures

Redcentric will assign a dedicated project manager as a single point of contact for the delivery of all services to the customer, who will engage with the relevant customer staff at the earliest possible stage, to ensure full project lifecycle management. In addition, there will be a minimum of 2 (PRINCE2 qualified) project support staff assigned to assist the project manager throughout the delivery, ensuring continuity of service. In addition, the service delivery department operates a clearly defined escalation hierarchy to ensure the prompt resolution of any concerns or queries.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction At the end of the contract with the customer and if the customer does not wish to renew their service.

Redcentric will assist the Customer in facilitating the orderly transition of the Redcentric Services (in whole or part) from Redcentric to the Customer or any replacement supplier upon the expiry or earlier termination of the agreement. This section sets out the principles regarding the service transition that form the base of an Exit Plan.
End-of-contract process Redcentric shall produce an Exit Plan upon notification of termination of the agreement, in accordance with the principles set out in this section, as soon as practicable (but not later than 60 days) after any notice of termination of the agreement.

The Exit Plan shall, unless otherwise agreed with the Customer:
• address each of the issues set out in this Exit Plan in order to assist the Customer in facilitating the transition of the Redcentric Services from Redcentric to a replacement supplier or the Customer ensuring to the extent reasonably possible that there is no disruption in the supply of Services and that there is no deterioration in the quality of delivery of the Services during any period of transitional assistance;
• provide an estimate of the scope of transitional assistance that may be required by the Customer and suggest how such assistance might be provided (if required); and
• provide an estimate of Redcentric’s personnel that may be required to provide transitional assistance and suggest the management structure to be put in place and employed to provide such transitional assistance.

Using the service

Using the service
Web browser interface Yes
Using the web interface Redcentric will provide professional services to assist the customer with the service activation. This will encompass, but is not limited to, project management, network design, server design, IaaS platform build.

Redcentric will enable logon to the self-service interface for specified customer contact as part of the service activation. By default this will include the identified contact on the service agreement, but can include additional contacts identified during service activation. The self-service interface provides a single interface to create, manage and remove infrastructure hosted within the service. The self-service interface for shared IaaS platforms is accessible by the Internet. The self-service interface for dedicated IaaS can be restricted to specific networks, such as the N3, Internet and private VPN.

Redcentric will setup network resources as part of the service activation. This will include identification of IP addresses, default gateways, firewall configuration, etc.

Upon service activation, the customer will be able to build their infrastructure within the self-service interface. The customer will be able to build a new server using a Redcentric provided template.
Web interface accessibility standard None or don’t know
How the web interface is accessible The shared IaaS self-service interface is accessible via commonly available web browsers, such as Internet Explorer, Chrome and Firefox.
Web interface accessibility testing The self-service interface is continuously updated and improved based on feedback from users.
Command line interface No


Scaling available Yes
Scaling type Manual
Independence of resources We have monitoring and alarms in place to ensure that it has sufficient capacity and resources to ensure that users are not experiencing any degradation in service because of other users.
Usage notifications Yes
Usage reporting Email


Infrastructure or application metrics Yes
Metrics types
  • HTTP request and response status
  • Network
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Reseller providing extra features and support
Organisation whose services are being resold Redcentric Solutions Ltd

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Hardware containing data is completely destroyed
Equipment disposal approach A third-party destruction service

Backup and recovery

Backup and recovery
Backup and recovery No

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Redcentric understand the importance of the services that our Customers are looking to contract for as defined within your requirements.

Redcentric already have SLA’s and Penalties (service credits) as standard offerings for each of our managed services.

IaaS shall be deemed available when the customer is able to access and use the customer’s applications and services hosted by Redcentric. This may include periods where the customer is unable to access applications and services, where it is demonstrated by Redcentric to the customer’s satisfaction, or where any inability to access the customer’s applications and services is the result of permitted downtime.

Any reduced charges under this Service Level Agreement will be confirmed by credit note issued by Redcentric to our customers, confirming the adjustment to be made to the following monthly charge.
Approach to resilience Where possible we operate all hardware components as minimum of N+1 – multiple network feeds, A+B power feeds, redundant PSU/memory/CPU, etc. The power to the data centre also has UPS backup and diesel generators so can withstand prolonged mains grid failure without interruption to service.
Outage reporting As part of its ISO 27001 accreditation we have fully documented and well rehersed business continuity and major incident policies. In the unlikely event that a major incident is invoked an incident manager will be responsible for managing all external communication with customers. As part of its existing ISO 27001 and ISO 9001 accreditations we have a major incident policy which details the processes to be followed in the event of a major incident. As part of the contract with the customer we will appointment a customer account manager who will be the central point of contact between us and the customer and will ensure that both parties confirm to their respective major incident policies.

Identity and authentication

Identity and authentication
User authentication
  • 2-factor authentication
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels We ensure that as part of support and developments roles that users only have access to the systems that they require. In addition, certain access permissions are only opened for a limited time whilst activities such as upgrades or support investigations take place. This ensures that users do not have access to potentially sensitive information or make changes without access being opened up by a senior operative.
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device over multiple services or networks

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 BSI
ISO/IEC 27001 accreditation date 17/05/16
What the ISO/IEC 27001 doesn’t cover All of the InTechnology Plc functions are covered by the ISO 27001 certification.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification Yes
Who accredited the PCI DSS certification Red Island
PCI DSS accreditation date 16/02/2012
What the PCI DSS doesn’t cover The PCI DSS Certification covers the physical hosting of PCI DSS data within its Harrogate and Reading data centres.

It does not cover the London Data Centre, City of London Data Centre and Cambridge Data Centres.
Other security certifications Yes
Any other security certifications Cyber Essentials Certificate

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes As part of our ISO 27001 and ISO 9001 accreditation we have wide range of supporting information security policies and processes. These are meticulously followed within the organisation and your security and compliance manager ensures that all staff go through induction and regular training to ensure compliance. Any security incidents are logged by the security and compliance manager and are reviewed at quarterly forum meetings where representatives from all over the business, including the CEO are present.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Redcentric is committed to continually improving and expanding its core network and data centre capabilities, thus striving to provide the highest levels of service to its customers. In order to facilitate these improvements, it is necessary to carry out essential work from time to time. These activities are carefully scheduled through the use of an internal change control process which is designed to present maximum visibility of that change and thereby ensure that planning and implementation are carried out to minimize the effect on customers and their network services.
Vulnerability management type Supplier-defined controls
Vulnerability management approach We regularly perform patches to services based on the recommendations of software manufacturers. We sign up to mailing lists from software manufacturers so that we can be made aware of potential threats and then perform an internal risk analysis to determine how quickly a patch needs to be deployed.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Within its services we deploy different layers of monitoring to reduce the risk of compromises, including Firewalls with IDS / IPS and Anti-virus software. In the event a comprise was found we would invoke its major incident process to determine the extend of the compromise and from this the resulting actions which need to be undertaken.
Incident management type Supplier-defined controls
Incident management approach As part of its ISO 27001 and 9001 accreditation's we have a proven major incident process which ensures that all reported incidents are logged by service users from. In addition the policy ensures that incident reports are provided to users in the event of a major incident which details the root cause and the steps which have been undertaken to stop it occurring again in the future.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart Yes
Who implements virtualisation Third-party
Third-party virtualisation provider VMware
How shared infrastructure is kept separate Shared hardware platforms host multiple customers, with each customer segregated into their own management, server and network environment through logical partitioning. Dedicated hardware platforms host a single customer that can also be logically partitioned to separate different operating environments, business units or programmes within the customer.

Energy efficiency

Energy efficiency
Energy-efficient datacentres Yes


Price £80.00 per unit per month
Discount for educational organisations No
Free trial available No


Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑