WM Promus provides an inexpensive, opensource-based, private cloud solution to ensure your organisation can manage large pools of systems, storage and networking resources via an easy-to-use dashboard, CLI, or API. The underpinning technology is Openstack which is the defacto standard for an Amazon Web Services compatible and feature-complete private cloud.
- Cloud Computing
- Object Storage
- Containers Management
- As a Service Offering
- Department or Project based Billing
- Network Security and Data Sovereignty
- A public cloud-like experience on your own hardware
- Securely store files and media in your own cloud
- Spin-up and manage your containers in your own server-less environment
- Database-as-a-Service, Message-Bus-as-a-Service and more
- Always know how much each department or project is spending
- Your data is encrypted and does not leave the country
£41900 per unit per year
- Education pricing available
- Free trial available
+44 (0) 203 946 6218
|System requirements||Linux required for hypervisor and controller systems|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
Severity 1 (Urgent): First technical response within 30 minutes.
Severity 2 (High): First technical response within 12 hours.
Severity 3 (Normal): First technical response within 24 hours.
Weekend response times depend on contract and is provided by an on-call service. This facility is only available for Severity 1 tickets.
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||Yes, at an extra cost|
|Web chat support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support accessibility standard||WCAG 2.0 A|
|Web chat accessibility testing||As an IT service provider, we've been using web chat support for years with our users.|
|Onsite support||Yes, at extra cost|
|Support levels||We provide Level 3 engineer/consultant on-site or remote. We also provide a technical account manager. Level 3 is charged at standard consultancy rate. Technical account management is included as part of the service.|
|Support available to third parties||Yes|
Onboarding and offboarding
|Getting started||During the installation phase, our clients are mostly hands-off as our consultants do all the work. The systems are installed automatically using our Openstack DevOps tool. After thorough testing, both automatic and by the consultant, implementation, administration, and user training begins. Training is delivered by one of the consultants who built your system and is always tailored to your specific needs. Because the consultant who built your Openstack system is providing the training, the training is focused specifically on your implementation needs and your questions never go unanswered. Once training is complete, the last and final phase is handover. Your IT team receives hands-on training on how to deal with issues as they arise. If they need help after handover, your teams will have access to our dedicated support team of experienced professionals. WM Promus’ deployment method makes Openstack a straightforward yet highly customised experience that meets your organisation’s specific needs and demands. WM Promus can provide onsite training, online training as well as user documentation.|
|End-of-contract data extraction||At the end of the contract per customer request, the data will be downloaded to a data pod and shipped or couriered to the customer. The data will be kept in an open format standard to be imported into any standard cloud.|
|End-of-contract process||There are no exit fees except the cost of the data pod charged at market rate.|
Using the service
|Web browser interface||Yes|
|Using the web interface||
Users can access, manage, and maintain their systems through an easy to use web dashboard. Users setup the service through a series of wizards and configuration screens. The same wizards and screens are used to make changes later on with no limitations to the service.
Users can manage:
Virtual Machines/Cloud Instances
Virtual Disk Volumes
Database as a Service
|Web interface accessibility standard||WCAG 2.0 A|
|Web interface accessibility testing||The OpenStack user base has done extensive testing and maintains a Wiki that outlines the testing and any issues found.|
|What users can and can't do using the API||Users can make all the same changes through our API. These API endpoints are clearly defined and documented. There are absolutely no limitations to our Openstack API.|
|API automation tools||
|Other API automation tools||
|API documentation formats||
|Command line interface||Yes|
|Command line interface compatibility||
|Using the command line interface||Users can access our service through our CLI tools which use our Backend API. Users can make any change through Web or API through our CLI. Our CLI tools can be used on any modern operating system as it requires Python to run.|
|Independence of resources||The Consul Auto Discovery Service detects down instances and routes around them. However it is dependent on the Users applications.|
|Infrastructure or application metrics||Yes|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Baseline Personnel Security Standard (BPSS)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Managed by a third party|
|Penetration testing frequency||At least every 6 months|
|Penetration testing approach||In-house|
|Protecting data at rest||Encryption of all physical media|
|Data sanitisation process||Yes|
|Data sanitisation type||Hardware containing data is completely destroyed|
|Equipment disposal approach||A third-party destruction service|
Backup and recovery
|Backup and recovery||Yes|
|What’s backed up||
|Backup controls||These are done automatically on the users behalf no configuration is required.|
|Scheduling backups||Supplier controls the whole backup schedule|
|Backup recovery||Users contact the support team|
|Data protection between buyer and supplier networks||
|Data protection within supplier network||IPsec or TLS VPN gateway|
Availability and resilience
|Guaranteed availability||Availability is dependent on customer needs. This varies between contracts.|
|Approach to resilience||Available upon request.|
|Outage reporting||Any outages will be reported by email.|
Identity and authentication
|Access restrictions in management interfaces and support channels||Built into Dashboard which gives RBAC controls.|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||
|Devices users manage the service through||Dedicated device on a segregated network (providers own provision)|
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||Between 6 months and 12 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||Between 6 months and 12 months|
|How long system logs are stored for||At least 12 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security accreditations||No|
|Named board-level person responsible for service security||Yes|
|Security governance accreditation||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||
SANS Top 20 and ISO 27001.
On identification of an issue that cannot be resolved by the customer they should contact WM Promus Service Desk to log an incident. This can be via telephone or email depending on the priority of the incident.
Should the client experience problems with any of the services provided they should escalate using the following contacts:
Stage 1 Escalation – Technical Account Manager.
Stage 2 Escalation – Service Delivery Manager.
Stage 3 Escalation – General Manager.
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||
Systems and Configurations management are tracked through our Openstack Dashboard and HPE tools. All software aspects are tracked through Puppet Configuration Management software.
During the life of the solution the team may identify changes required to improve security or resolve known errors. Some changes may be minor and may be easily accommodated within the current service with no discernible impact. Other changes may take the form of significant modifications to the service, requiring that a formal change process be followed.
The formal change process will be initiated by the completion of a Change Request Confirmation form describing the requested change.
|Vulnerability management type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Vulnerability management approach||We conduct routine penetration scans and service version discovery scans. Upon finding a vulnerability WM Promus will deploy patches and/or workaround to address said vulnerability. Vulnerabilities are published in Openstack communication channels.|
|Protective monitoring type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Protective monitoring approach||We use various Firewall and IPS devices at our BGP Gateways. We will respond to incidents in accordance with the agreed service level.|
|Incident management type||Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402|
|Incident management approach||
Contact WM Promus Service Desk to log an incident, via telephone or email.
The WM Promus Service Desk will register incoming calls with a unique incident reference number and assign a support engineer.
Ensure customer communication in accordance with the service level definitions
If the incident cannot be resolved WM Promus will propose a workaround.
If the fault cannot be resolved remotely, the WM Promus support engineer will escalate to the WM Promus Operations Management team that will liaise with the user to propose a plan of action, with appropriate timescales, to perform a permanent resolution to the issue.
|Approach to secure software development best practice||Conforms to a recognised standard, but self-assessed|
Separation between users
|Virtualisation technology used to keep applications and users sharing the same infrastructure apart||Yes|
|Who implements virtualisation||Supplier|
|Virtualisation technologies used||KVM hypervisor|
|How shared infrastructure is kept separate||Each organisation has its own set of Hypervisors.|
|Price||£41900 per unit per year|
|Discount for educational organisations||Yes|
|Free trial available||Yes|
|Description of free trial||Full access trial for 30 days.|
|Pricing document||View uploaded document|
|Service definition document||View uploaded document|
|Terms and conditions document||View uploaded document|