Altiatech Ltd

Public and Hybrid Cloud Services

Altiatech’s Cloud Services supports your digital transformation, delivering a comprehensive solution to deploy, host and support your cloud environments with a mix of public or hybrid cloud solutions. Designed to maximise your cloud adoption quickly and securely, our services include Microsoft Azure, Amazon Web Services and Google Cloud Platform.


  • Strategy and roadmaps for public or hybrid cloud solutions
  • Infrastructure, application and data migrations
  • Hybrid Cloud migration
  • Microsoft Gold Partner Cloud Platforms
  • Strategic planning and guidance for organisations of all sizes
  • Infrastructure and Platform as a Service (IaaS/PaaS)
  • Eliminate capacity planning with storage and computing from variable demands
  • Deep Integration
  • Data Protection and GDPR compliance


  • Supports and enables hybrid and cloud infrastructure strategies
  • Improved data consistency across systems, processes and organisations
  • Reduce the cost of maintaining retired legacy systems
  • Cloud adoption delivered by experienced consultants
  • Highly available Infrastructure and Platform services to meet demand
  • IT Infrastructure Services that suit the needs of your organisation
  • Highly Scalable
  • Seamlessly access and manage applications, data, services and systems
  • Better data security and improved customer confidence


£0.12 a unit

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

2 9 1 6 1 6 9 3 9 7 0 5 1 6 9


Altiatech Ltd Fuad Uddin
Telephone: 03303325842

Service scope

Software add-on or extension
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
System requirements

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Normally within 1-2 hours for critical events, up to 24 hours at weekends.
User can manage status and priority of support tickets
Online ticketing support accessibility
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
Severity A - Critical Business Impact – your business has experienced a significant loss or degradation of services, requiring immediate attention.

Severity B - Moderate Business Impact – you have a loss or degradation of services, but your organization can still function.

Severity C - Minimum Business Impact – you have an issue, but it has a small impact on your business.
Support available to third parties

Onboarding and offboarding

Getting started
A comprehensive assessment of your current estate will be carried out by our fully qualified consultants. This assessment will determine the correct configuration of the service to meet both your existing infrastructure and business needs, along with the time it will take for deployment. A typical onboarding process will consist of the following activities:

• Agree scope of service, including duration, applications to be made available and any additional networking requirements
• Provision of service
• User testing
• Full deployment
• Provision of user documentation
Service documentation
Documentation formats
End-of-contract data extraction
The service is designed so that customers have the ability to extract their data from the service at any time. Upon termination or expiration of the customer’s subscription, the customer may contact Altiatech and request that:
Their accounts be disabled and all data deleted.
The customer data is retained in a limited function for a maximum of 28 days after expiration or termination of the service so that further data may be extracted.
Email can be exported as PST files, and other file data (e.g. spreadsheets, presentations) can be downloaded.
End-of-contract process
The standard minimum contract length is 30 days; with options to extend. Once the contract period ends, it can be cancelled within 7 days notice. Upon cancellation, all services will be ceased, and any equipment provided will be recovered.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
There is no difference in what users can access on their desktops with either fixed or mobile devices.
Service interface
Customisation available
Description of customisation
Users can customise their software estate and public cloud infrastructure, including compute and storage.


Independence of resources
Cloud services are supplied via Tier 1 vendors who have their own ability to scale, and therefore do not encounter performance issues from software provision. Public cloud is highly available and its data centres have in-built redundancy and capacity to meet growing usage demands.


Service usage metrics
Metrics types
The metrics provided are on software usage, and public cloud compute and storage usage.
Reporting types
Real-time dashboards


Supplier type
Reseller providing extra support
Organisation whose services are being resold
Microsoft, Google Cloud, Amazon Web Services

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Upon Request
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
Native File formats
Data import formats
  • CSV
  • Other
Other data import formats
Native File formats

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Our SLAs provide service credits to customers should the monthly uptime fall below 99.5% availability.
Approach to resilience
We ensure that the architecture does not contain single points of failure. These are duplicated to ensure that should a node fail, the system will continue to function.
Outage reporting
We will e-mail users if there is an outage to keep them informed of the progress to resolve the issue.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Altiatech's own service desk will be pre-populated with admins contacts, thereby, should ordinary users attempt to access Altiatech support, we will respond saying they are unauthorised to use our support.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
We are aligning our practices towards ISO/IEC 27001 standard and have started work on this.
Information security policies and processes
Altiatech uses an Information Security Policy and Data Protection Policy, which covers all aspects of data processing and the security of IT systems.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Our service tracks all changes made to the configuration by any administrator. These logs are kept for a minimum of 6 months. Changes are reviewed to ensure they do not compromise security.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Altiatech is protected by SentinelOne, which provides endpoint protection and remediation. SentinelOne uses multiple AI engines to protect against threats. This signature-less approach requires no daily/weekly updates, recurring scans and performs better than other AV management solutions. Altiatech uses Windows Defender, which comes natively with Windows 10 Enterprise, and is installed on all computers with definitions set to update regularly for our support engineers. Our devices have restricted access based on user access controls and functionality and elevated admin credentials. Patches are deployed to services readily through our patch management tools. We acquire information of threats from existing AV solutions.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Using proactive network monitoring tools, threat detection and containment tools, we are able to identify compromised points within our services. Our responses are immediate with threat management tools and immediately trigger notifications to support engineers for investigation within 15 minutes.
Incident management type
Supplier-defined controls
Incident management approach
We have pre-defined processes for events, reporting processes and incident reports that are aligned to ISO27001.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£0.12 a unit
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.