Assured Data Protection

Rubrik as a Service

Rubrik simplifies backup and recovery for virtualized and physical environments. Eliminate backup software by integrating data orchestration, catalog management, and deduplicated storage into a single, scale-out fabric


  • Converged Backup and Recovery Platform
  • Bespoke Public, Private and Hybrid Cloud
  • API 1st Driven Architecture
  • Offsite Replication and Archive
  • Fully Managed Service
  • SLA Policy Driven Managment
  • Application Consistent Snapshots
  • Virtual and Physical server support
  • Instant Recovery from anywhere
  • Granular RPOs


  • Proactive Support
  • Fully Managed Solution
  • Consolidated multi-site monitoring
  • Simple Pricing Model


£90 to £120 per terabyte per month

  • Free trial available

Service documents


G-Cloud 11

Service ID

3 1 7 5 9 0 3 6 4 5 9 0 2 0 6


Assured Data Protection

Stew Parkin

0800 061 4298

Service scope

Service scope
Software add-on or extension No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints No
System requirements
  • Network connectivity
  • 10Gb Network prefered

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Within 4 hours during business hours (Mon - Fri / 8am - 6pm)

Weekends and out of hours is available upon request
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Onsite support
Support levels - Fully managed solution - Assured DP take care of every aspect of the organisations backup and recovery processes, from backup support to carrying out restores.

- 3rd Line Support - Assured DP will provide 3rd line support for software and hardware issues, as well as training for the end user to carry out 1st and 2nd line tasks
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Assured DP can provide on-site engineers to install and configure the solution from scratch to ensure that the installation meets the clients requirements exactly.
Service documentation No
End-of-contract data extraction Data can be downloaded or stored from the solution at anytime, and stored in any location / disk media.
End-of-contract process At the end of the contract ADP will, within reason, help the client to move to a new solution

Using the service

Using the service
Web browser interface Yes
Supported browsers Chrome
Application to install Yes
Compatible operating systems
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices No
Service interface No
What users can and can't do using the API Rubrik is an API 1st technology, with all features and functionalities accessed in this manner.
API documentation Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Almost every aspect of the service can be customised, from payment plans, through to service and support levels.


Independence of resources Rubrik is infinitely scaleable, as such ADP always ensure at least and 75% maximum utilisation on all of its services


Service usage metrics Yes
Metrics types Data Usage, locally, replicated and cloud-based
Number of objects protected
Throughput usage
Bandwidth usage
VMware statistics
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Reseller providing extra features and support
Organisation whose services are being resold Rubrik

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest
  • Encryption of all physical media
  • Other
Other data at rest protection approach AES-265 Encryption
FIPS-142-2 Level 2 certified
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Data can be downloaded at any stage through the API's or GUI
Data export formats Other
Other data export formats Original Format
Data import formats Other
Other data import formats Original Format

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Contract Dependant
Approach to resilience Masterless technology
Outage reporting Account Managers
Online Portal

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels The access to the interface is restricted by the customers.
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 QMS
ISO/IEC 27001 accreditation date 1/5/2017
What the ISO/IEC 27001 doesn’t cover All services covered
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes ISO27001 Certified

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach All Assured DP controlled elements of the service are managed through our own internal processes overseen by the Technical Operations Director
Vulnerability management type Supplier-defined controls
Vulnerability management approach Vulnerability management is dealt with on a case by case basis and fixes and patches are implemented inline their severity.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Using ADP's monitoring and reporting portal their proactive account managers inform customers of issues as the happen
Incident management type Supplier-defined controls
Incident management approach Incident management is dealt with by the Technical Operations Director and any other relevant members of staff

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £90 to £120 per terabyte per month
Discount for educational organisations No
Free trial available Yes
Description of free trial Full POC of everything

Service documents

Return to top ↑