AIM Computing Ltd

Cloud Web Hosting

Hosting of web sites and services on the Microsoft Azure cloud platform.

Features

  • Remote access
  • Real-time reporting

Benefits

  • Publish content and manage services from any device
  • Scalable services and cost effective

Pricing

£100 to £1,200 a licence

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at eranstern@aimcomputing.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

3 0 7 9 9 6 7 5 5 6 5 3 2 9 5

Contact

AIM Computing Ltd Eran Stern
Telephone: 07930534522
Email: eranstern@aimcomputing.co.uk

Service scope

Service constraints
Service constraints are limited by the service package purchased for storage, memory and scalability. Services can be scaled and descaled as required by the customer.
System requirements
Additional licenses may need purchasing subject to the service requested.

User support

Email or online ticketing support
Yes, at extra cost
Support response times
This is flexible and is pre-agreed with the customer in advance in order to meet their business needs.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Yes, at an extra cost
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
We use third-party web chatting products to provide this service.
Onsite support
Yes, at extra cost
Support levels
Support levels are discussed with the customer so that it meets their needs and that they are only purchasing the service levels that they require for their users.
Support available to third parties
No

Onboarding and offboarding

Getting started
We provide onsite training, online training and user documentation. This is however discussed during the engagement to assess what onboarding mechanism are best suitable for the customers users.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
Upon request all data can be provided either in a backup of the device used to store data (i.e. Microsoft SQL Server backups) , JSON or CSV format for NoSQL databases. Other assets such as images, logos, pdfs, word documents, etc.. will be provided in their original format. We are flexible and will aim to provide the data in the format requested by the customer (although they may be further charges depending on the effort required).
End-of-contract process
This varies from customer to customer and is depended on the types and levels of services subscribed by the customer. All contracts will be drafted to meet the user needs of the customer and therefore the price and any additional costs will be clearly explained whilst drafting the contractual service level agreements that meets the customers requirements.

Using the service

Web browser interface
No
API
No
Command line interface
No

Scaling

Scaling available
Yes
Scaling type
  • Automatic
  • Manual
Independence of resources
Each service is allocated the agreed CPU, disk space and memory that the customer has requested and is paying for. This is then allocated to the customer on the cloud platform.
Usage notifications
Yes
Usage reporting
Email

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Number of active instances
Reporting types
  • Real-time dashboards
  • Regular reports

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Microsoft

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
Never
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • Files
  • Databases
  • Containers
Backup controls
Backups are a managed service and will be setup based on the customer needs and requirements which will be specified at the outset of the contract.
Datacentre setup
  • Multiple datacentres with disaster recovery
  • Multiple datacentres
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
This will vary from customer to customer and is customised to met their user needs. Any SLAs are pre-agreed in advance with the customer during the discovery phase.
Approach to resilience
Available on request.
Outage reporting
Email alerts.

Identity and authentication

User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google apps)
  • Username or password
Access restrictions in management interfaces and support channels
We use username and passwords and encrypt the channels using SSL.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device on a government network (for example PSN)
  • Dedicated device over multiple services or networks
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
  • Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
Between 6 months and 12 months
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
All activities on the platform are audited and controlled by RBAC. Processes are in place to only authorise those with the correct permissions to access their relevant services and new access to a service needs a Director level authorisation before it is granted.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All components of the service are audited and various reports can be extracted to view activities on the cloud based services.
All changes are assessed for potential security impact through a Change Management Board who is responsible for approving or rejecting any changes on the platform.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Any security threats that are identified are immediately assigned a high priority and are dealt with promptly. If a patch is required than as soon as it has been tested it is deployed to LIVE. Any deployments to LIVE that may affect the customers services are discussed with the customer first and patched at a mutually convenient time so not to interrupt the customers business (except for critical vulnerability patches that require immediate patching due to the potential damaging risk associated to the platform).
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Various are alerts are triggered on the system in case of potential compromises and they are dealt with promptly depending on the nature of the compromise, the risk and associated service level for the identified risk.
Incident management type
Supplier-defined controls
Incident management approach
There is a pre-defined process for incident management that is also adaptable to the needs for the customer. The best approach will be discussed during the discovery phase, prior to setting up the service, with the customer so that the approach meets their needs for their users and business.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Third-party
Third-party virtualisation provider
Microsoft
How shared infrastructure is kept separate
Through RBAC (role-based access control).

Energy efficiency

Energy-efficient datacentres
No

Pricing

Price
£100 to £1,200 a licence
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at eranstern@aimcomputing.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.