Automation Consultants

Hosting Services by Automation Consultants

Automation Consultants provides a service to host any application in its UK-based data centre. The hosting service is aimed at customers who require a high degree of customisation and control over the infrastructure used, its configuration and the level of access by the customer to the application and hosting platform.

Features

  • Choice of all major operating systems
  • Choice of all major databases
  • Any lawful software compatible with the infrastructure may be hosted
  • Customisable physical and remote access rights
  • Customisable support package
  • UK-based data centre
  • Secure physical environment

Benefits

  • Permits applications which must be UK hosted
  • Ownership not subject to foreign jurisdiction
  • Customisable physical and data access arrangements
  • UK-based support and helpline

Pricing

£10 per virtual machine

Service documents

G-Cloud 9

307393630949833

Automation Consultants

Jeff Cunliffe

1189323001

info@automation-consultants.com

Service scope

Service scope
Service constraints None
System requirements None, AC can be flexible on this

User support

User support
Email or online ticketing support Yes, at extra cost
Support response times We aim for a sub-1-hour response time during the working week and at weekends.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels Gold, Silver and Bronze levels of support
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Automation Consultants can provide onsite training, online training and user documentation.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction AC will provide a CSV file containing all customer data.
End-of-contract process A CSV file containing all customer data will be provided on request at the end of the service. Any additional activities required of Automation Consultants may be charged for.

Using the service

Using the service
Web browser interface No
API No
Command line interface No

Scaling

Scaling
Scaling available No
Independence of resources Automation Consultants monitors resource utilisation on its servers. If resources are close to maximum utilisation, the resources are increased. Slow performance due to unmet resource requirements stemming from volume of utilisation has not been a problem to date.
Usage notifications Yes
Usage reporting Email

Analytics

Analytics
Infrastructure or application metrics Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
Reporting types
  • Real-time dashboards
  • Regular reports

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Supplier-defined controls
Penetration testing frequency Less than once a year
Penetration testing approach In-house
Protecting data at rest Scale, obfuscating techniques, or data storage sharding
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Backup and recovery

Backup and recovery
Backup and recovery Yes
What’s backed up
  • Files
  • Virtual machines
  • Databases
Backup controls By arrange with service provider
Datacentre setup Single datacentre with multiple copies
Scheduling backups Users contact the support team to schedule backups
Backup recovery Users contact the support team

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network Controlled access to data network.

Availability and resilience

Availability and resilience
Guaranteed availability Typical uptime is 99.9%. There are no set compensation arrangements for outages.
Approach to resilience Twin application and database layer nodes. Offsite backup in case of disaster.
Outage reporting Alerts are passed automatically by mobile app to AC staff.

Identity and authentication

Identity and authentication
User authentication
  • Username or password
  • Other
Other user authentication VPN or IP filtering available
Access restrictions in management interfaces and support channels At an application level, privileged access is allowed to users who are designated as managers on particular projects. For access to infrastructure level settings, access is restricted to a small number of named individuals. Two-factor authentication is required to access these resources.
Access restriction testing frequency At least every 6 months
Management access authentication 2-factor authentication
Devices users manage the service through Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations Yes
Any other security accreditations Credit card transactions are performed via Stripe

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation No
Security governance approach The Chief Technology Officer, reporting to the board, co-ordinates security. Security decisions are taken by the CTO in consultation with the board.
Information security policies and processes A set of security policies documented internally is followed, based on industry best practice. The policy is administered day to day by the CTO. Major decisions are taken by the CTO in consultation with the board.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Major changes must be approved by the board and documented. All changes are reviewed for security among other factors. The application documentation is used to track components through their lifetime.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Threats are assessed by internal analysis and by monitoring user feedback. So far no vulnerabilities have been reported by users. Patches are deployed overnight if it is considered by the board that there is a security vulnerability to be fixed.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Monitoring for potential compromises is performed through logs and alerts. On finding a potential compromise, the evidence is assessed by the CTO and other relevant staff to determine whether a compromise really occurred or not. If a potential security compromise is identified, A patch is normally put in place within 24 hours.
Incident management type Supplier-defined controls
Incident management approach A common process is followed for most events. Users may report incidents by email, telephone or the company's JIRA-based service desk. Incident reports are provided ad hoc and on demand.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart Yes
Who implements virtualisation Supplier
Virtualisation technologies used Hyper-V
How shared infrastructure is kept separate Separate VM, dedicated VLAN preventing traffic flow between organisations and control to network resources using Active Directory security

Energy efficiency

Energy efficiency
Energy-efficient datacentres No

Pricing

Pricing
Price £10 per virtual machine
Discount for educational organisations No
Free trial available No

Documents

Documents
Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑