NobleProg

DaDesktop

It is a cloud-based (public, private or on-premise cloud) training delivery platform providing a collaborative and fully intereactive working environment using a browser based virtual machine desktop. It supports Multiple Hypervisor (eg KVM, LXC) and nested virtualisation (eg DaDesktop inside DaDesktop).

Additional Information:

https://dadesktop.com/
https://www.youtube.com/channel/UCcLYOEbFHsB8-PTZLSH0n_Q
https://coursem.com/categories/645

Features

  • training environment management
  • desktop sharing
  • chat
  • learning management system
  • course management system
  • on premise cloud
  • public or private cloud
  • session recording
  • automatic course transcript (subtitles)
  • training session recording

Benefits

  • super fast training environment preparation
  • low cost training cloud
  • interactive lab environment
  • simple to use
  • simple software testing and development environment
  • easy to use as an 'on premise cloud'
  • lightweight environment - can run on another cloud
  • does not need to rely on the internet
  • 100% privacy assured (take back control)
  • Infinitely scaleable

Pricing

£5 a unit

  • Education pricing available
  • Free trial available

Service documents

Framework

G-Cloud 12

Service ID

3 0 3 5 8 5 4 0 4 2 3 6 3 3 8

Contact

NobleProg Edward Jenkins
Telephone: +442080890990
Email: edward@nobleprog.co.uk

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
It can be used as an extension of any computing Cloud.
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
None
System requirements
  • Can be run on any cloud environment
  • Can be run on any hardware

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 1 hour during weekdays
Within 4 hours during weekends
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Public Cloud access to webchat icon from any part of the application.
Web chat accessibility testing
None
Onsite support
Yes, at extra cost
Support levels
All levels of support are available; cost is determined for each client.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Online documentation (https://coursem.com/categories/645)
Training (https://www.nobleprog.co.uk/dadesktop-training)
Service documentation
Yes
Documentation formats
  • HTML
  • ODF
  • PDF
  • Other
Other documentation formats
  • Ppt
  • Wiki
End-of-contract data extraction
Downloadable in open standards.
For 'on premise' installation the client owns the data (no extraction necessary)
End-of-contract process
For 'on premise' cloud the client owns the environment but loses support.
For public cloud the machine will stop after which the data will be deleted.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
No
Designed for use on mobile devices
No
Service interface
Yes
Description of service interface
Web service interface
Accessibility standards
None or don’t know
Description of accessibility
Via a web browser
Accessibility testing
None
API
Yes
What users can and can't do using the API
No limitations
API documentation
Yes
API documentation formats
PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
* everything is customisable
* write extensions on top of API's
* "on premise" installation can be custiomised by anyone

Scaling

Independence of resources
Resource utilisation forecast algorithm for public or private cloud.

Analytics

Service usage metrics
Yes
Metrics types
Number of users, duration of sessions.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least every 6 months
Penetration testing approach
In-house
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Via open standard
Data export formats
Other
Other data export formats
  • KVM
  • LXC
Data import formats
Other
Other data import formats
  • LXC
  • KVM

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection between networks
Onsite installation
Other point to point encryption methods available
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection within supplier network
Onsite installation
Other point to point encryption methods available

Availability and resilience

Guaranteed availability
Availability:
Public Cloud: 0800 - 2000hrs - 99.8% available
Private Cloud: negotiable according to agreement
On Premise: client dependant.
Any Outage: no charge for the service
Approach to resilience
Public Cloud:
- 2 independant network connections (automatic switching)
- UPS
Private Cloud:
- Client contract dependant
On Premise:
- Software support, redundant storage, remote geographic backup (redundant nodes).
Outage reporting
Integrated with Zabbix monitoring
Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Other user authentication
Platform supports all types of authentication based on opensource software
Access restrictions in management interfaces and support channels
Authorisation and role based system
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
If necessary any examination can be undertaken
Information security policies and processes
CEO is directly responsible for security policy creation
Chief Security Officer is directly responsible for policy execution

Majority of security processes have been automated via automated testing.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Standardised DevOps procedures
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
* Automated & manual vulnerability tests
* Patches deployed within a coupe of hours
* Manual monitoring, CSV store, Automated penetraion testing
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
* automated monitoring of security vulnerabilities and resources
* investigation
* in a matter of hours
Incident management type
Supplier-defined controls
Incident management approach
* 'trac' system for incidents
* via the 'trac' system
* reports produced as required

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Pricing

Price
£5 a unit
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Everything is included but it is time limited

Service documents