JLG Trading Ltd

Virtual Servers and Cloud Backup

VmWare virtualisation software featuring fault tolerance and high availability the maximize system availability utilising reliable HP and Dell based server and Storage hardware.


  • VmWare virtualisation software.
  • fault tolerance and high availability of service.
  • secure datacentre environment.
  • fully redundant network infrastructure.


  • Accessible workspace when mobile
  • User defined workspace


£4.95 to £50.00 per person

Service documents

G-Cloud 10


JLG Trading Ltd

John Grocock



Service scope

Service scope
Service constraints Standard data service availability of 99.9%

If the client requires a higher level of availability that can be discussed and costed according to the end users needs.
System requirements
  • VmWare
  • Cisco IPS

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Response time dependant on severity level with urgent ticket response time 1hr
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Onsite support
Support levels Level 4 support engineer on call of specific customer needs
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started New users and customers will receive specific documentation that has been created to suit their requirements.

Each Customer has a different set of requirements and we tailor out onboaring to suit their requirements.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction End users remove all applicable information and backups, either by download or secure download on suppliers site to a secure portable storage.
Once Complete End user confirms all applicable data has been recovered and the supplier then securely wipes all the end users data storage areas.
End-of-contract process The End user confirms the contract is finishing and 30 days prior to contract end informs the supplier how they wish to recover their data. If the customer wishes to visit the suppliers site to recover the data there is an additional charge for this service. The cost of this depends upon the time the client needs to spend at the suppliers site.

Using the service

Using the service
Web browser interface No
Command line interface No


Scaling available No
Independence of resources Each customer has an allocated CPU, storage and Bandwidth allocation. Our overall allocation is below the overall thresholds of our systems and bandwidths. Hardware resources are never over committed so virtual machines can always operate at full performance.
Storage hardware operating out cloud backup soluton never operates at over 60% available capacity.
Usage notifications Yes
Usage reporting Email


Infrastructure or application metrics No


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach A third-party destruction service

Backup and recovery

Backup and recovery
Backup and recovery Yes
What’s backed up
  • Files
  • Virtual Machines
  • Databases
  • Exhange services and Mailboxes
Backup controls Dependant upon the service purchased the backup solution can be tailored to meet the end users requirements
Datacentre setup Single datacentre with multiple copies
Scheduling backups Users schedule backups through a web interface
Backup recovery Users can recover backups themselves, for example through a web interface

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability In line with Tier 4 level Datacentre requirements we provide 99.5% availability.
Approach to resilience All service provider links are redndant as is Cisco Router, Firewall and Switching infrastructure. Virtual Machine operates on a redundant VMware cluster environemnt with redundant VM host and datastore environmemts.
Outage reporting Email alerts

Identity and authentication

Identity and authentication
User authentication Username or password
Access restrictions in management interfaces and support channels Management channels and access are tunnelled from end user location.
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications CESG IA Architect

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards Other
Other security governance standards CESG IA Standards
Information security policies and processes CESG IA principles and practices

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Current server builds are validated against Microsoft Agreed and advised build state.

Change Management is conducted internally through a change control board. This reviews the change and the Impact and Risk to the system.
Vulnerability management type Undisclosed
Vulnerability management approach '
Protective monitoring type Undisclosed
Protective monitoring approach '
Incident management type Undisclosed
Incident management approach '

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart Yes
Who implements virtualisation Supplier
Virtualisation technologies used VMware
How shared infrastructure is kept separate Logical Machines assigned to

Energy efficiency

Energy efficiency
Energy-efficient datacentres Yes


Price £4.95 to £50.00 per person
Discount for educational organisations No
Free trial available No


Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑