Qualligence Ltd

AWS Cloud Solutions

To develop, deploy and manage your digital capabilities in AWS world.

Features

  • 99.9% up time
  • Flexible support model offering guidance, support and account/service management
  • Operational support from managing OS to alerting, monitoring and remediation
  • One place for server provisioning, patching, configuration, backups, or recovery
  • Suits OFFICIAL
  • Development as a Service
  • DevOps as a Service
  • Support Real-time reporting, alerting and monitoring
  • BEAM Analysis
  • Agile Data Modeling

Benefits

  • A full range of solutions for Government entities
  • Comprehensive AWS capabilities under one umbrella
  • We deliver powerful combination of certified experts and management tools
  • We will train and support knowledge-share

Pricing

£0.01 a unit

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at fahadktk@gmail.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

3 8 7 4 5 0 8 6 6 2 9 0 5 9 1

Contact

Qualligence Ltd Fahad Shah
Telephone: 07875957488
Email: fahadktk@gmail.com

Service scope

Service constraints
Certain cloud services requires sufficient internet bandwidth in order to function correctly.
System requirements
  • N/A
  • N/A

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 4 hours on weekdays and 6 hours on weekend.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
No
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
JAWS, VoiceOver
Onsite support
Onsite support
Support levels
Basic
24/7 customer service, support forums, 4 Core “Trusted Adviser” checks, personal health dashboard. No TAM. Free

Developer:
As above + business hours access to technical/architural Cloud Support Associates via email (one primary contact). No TAM. 3%x monthly AWS usage.

Business:
As above + 24/7 access to Cloud Support Engineers via email, chat and phone for unlimited contacts; architecture, 3rd party software and programmatic case management support. TAM. Greater of $100 or spend-dependent percentage (pm).

Enterprise
As above, plus architectural review, operations support, training, assigned concierge, proactive guidance, TAM. Greater of $15,000 or spend-dependent percentage (pm)
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We will provide both on and off-site training supported by online documentation available for users throughout the journey.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
  • DOCX
  • XLS
End-of-contract data extraction
Reverse engineering process to be employed where applicable, otherwise users will be given full and controlled access to the same systems they uploaded data using the same secure channels.
End-of-contract process
Buyer may terminate the relationship with Supplier for any reason by (i) providing Supplier with notice and (ii) closing Buyers account for all services for which Supplier provide an account closing mechanism.

Using the service

Web browser interface
Yes
Using the web interface
User can access, develop, deploy and manage services in AWS Cloud.
Web interface accessibility standard
WCAG 2.1 AA or EN 301 549
Web interface accessibility testing
Dragon , JAWS
API
No
Command line interface
No

Scaling

Scaling available
Yes
Scaling type
Automatic
Independence of resources
Each client receives a dedicated resource and agreed commitment depending on requirements and prior approval from the supplier.
Usage notifications
Yes
Usage reporting
  • Email
  • SMS

Analytics

Infrastructure or application metrics
Yes
Metrics types
Number of active instances
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Microsoft, Amazon Web Services, Oracle, IBM

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
Less than once a year
Penetration testing approach
In-house
Protecting data at rest
Other
Other data at rest protection approach
Managed by third-party (AWS)
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
  • Hardware containing data is completely destroyed
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery
No

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Bonded fibre optic connections
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
9 - 5 Mon to Fri on weekdays
Approach to resilience
Available on request
Outage reporting
Email and Dashboard alerts

Identity and authentication

User authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Using management console, role based access and visibility of content
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Username or password
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device over multiple services or networks
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
  • Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
In-progress
Information security policies and processes
Acceptable Use Policy
Access Control Policy
Change Management Policy
Information Security Policy
Incident Response (IR) Policy
Remote Access Policy
Email/Communication Policy
Disaster Recovery Policy
Business Continuity Plan (BCP)

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Standard APM PM BOK approaches along with industry standard best practices
Vulnerability management type
Undisclosed
Vulnerability management approach
ISO/IEC 27002 code of practice
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
NCSC Guidance and advcice
Incident management type
Supplier-defined controls
Incident management approach
ITIL Incident Management approach

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Third-party
Third-party virtualisation provider
AWS, VM
How shared infrastructure is kept separate
Using IaaS, Compute Separation, Network Separation, Storage, PaaS and SaaS technologies each individual system will have a dedicated strategy and layer of protection and separation.

Energy efficiency

Energy-efficient datacentres
No

Pricing

Price
£0.01 a unit
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at fahadktk@gmail.com. Tell them what format you need. It will help if you say what assistive technology you use.