VmWare virtualisation software featuring fault tolerance and high availability the maximize system availability utilising reliable HP and Dell based server and Storage hardware.
- VmWare virtualisation software.
- fault tolerance and high availability of service.
- secure datacentre environment.
- fully redundant network infrastructure.
- Accessible workspace when mobile
- User defined workspace
£4.95 to £50.00 per person
JLG Trading Ltd
Standard data service availability of 99.9%
If the client requires a higher level of availability that can be discussed and costed according to the end users needs.
|Email or online ticketing support||Email or online ticketing|
|Support response times||Response time dependant on severity level with urgent ticket response time 1hr|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Onsite support|
|Support levels||Level 4 support engineer on call of specific customer needs|
|Support available to third parties||Yes|
Onboarding and offboarding
New users and customers will receive specific documentation that has been created to suit their requirements.
Each Customer has a different set of requirements and we tailor out onboaring to suit their requirements.
|End-of-contract data extraction||
End users remove all applicable information and backups, either by download or secure download on suppliers site to a secure portable storage.
Once Complete End user confirms all applicable data has been recovered and the supplier then securely wipes all the end users data storage areas.
|End-of-contract process||The End user confirms the contract is finishing and 30 days prior to contract end informs the supplier how they wish to recover their data. If the customer wishes to visit the suppliers site to recover the data there is an additional charge for this service. The cost of this depends upon the time the client needs to spend at the suppliers site.|
Using the service
|Web browser interface||No|
|Command line interface||No|
|Independence of resources||
Each customer has an allocated CPU, storage and Bandwidth allocation. Our overall allocation is below the overall thresholds of our systems and bandwidths. Hardware resources are never over committed so virtual machines can always operate at full performance.
Storage hardware operating out cloud backup soluton never operates at over 60% available capacity.
|Infrastructure or application metrics||No|
|Supplier type||Not a reseller|
|Staff security clearance||Conforms to BS7858:2012|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Managed by a third party|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider|
|Protecting data at rest||Encryption of all physical media|
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||A third-party destruction service|
Backup and recovery
|Backup and recovery||Yes|
|What’s backed up||
|Backup controls||Dependant upon the service purchased the backup solution can be tailored to meet the end users requirements|
|Datacentre setup||Single datacentre with multiple copies|
|Scheduling backups||Users schedule backups through a web interface|
|Backup recovery||Users can recover backups themselves, for example through a web interface|
|Data protection between buyer and supplier networks||
|Data protection within supplier network||
Availability and resilience
|Guaranteed availability||In line with Tier 4 level Datacentre requirements we provide 99.5% availability.|
|Approach to resilience||All service provider links are redndant as is Cisco Router, Firewall and Switching infrastructure. Virtual Machine operates on a redundant VMware cluster environemnt with redundant VM host and datastore environmemts.|
|Outage reporting||Email alerts|
Identity and authentication
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||Management channels and access are tunnelled from end user location.|
|Access restriction testing frequency||At least once a year|
|Management access authentication||
|Devices users manage the service through||Directly from any device which may also be used for normal business (for example web browsing or viewing external email)|
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||Yes|
|Any other security certifications||CESG IA Architect|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||Other|
|Other security governance standards||CESG IA Standards|
|Information security policies and processes||CESG IA principles and practices|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||
Current server builds are validated against Microsoft Agreed and advised build state.
Change Management is conducted internally through a change control board. This reviews the change and the Impact and Risk to the system.
|Vulnerability management type||Undisclosed|
|Vulnerability management approach||'|
|Protective monitoring type||Undisclosed|
|Protective monitoring approach||'|
|Incident management type||Undisclosed|
|Incident management approach||'|
|Approach to secure software development best practice||Supplier-defined process|
Separation between users
|Virtualisation technology used to keep applications and users sharing the same infrastructure apart||Yes|
|Who implements virtualisation||Supplier|
|Virtualisation technologies used||VMware|
|How shared infrastructure is kept separate||Logical Machines assigned to|
|Price||£4.95 to £50.00 per person|
|Discount for educational organisations||No|
|Free trial available||No|
|Pricing document||View uploaded document|
|Skills Framework for the Information Age rate card||View uploaded document|
|Service definition document||View uploaded document|
|Terms and conditions document||View uploaded document|