Nurved Consulting Ltd

NurvedCloud.com

Cloud Hosting services provides flexible multi-platform hosted services, hosted in the UK. Both private and public cloud services are available, scalable resources for any type of service.

Features

  • Scalable Resources
  • High Availability
  • Bare metal servers
  • Storage
  • Private/Public Subnets
  • Hardware & Software firewalls
  • Baremetal servers available
  • Multiple OS Supported

Benefits

  • Flexible & Rapid Support response 24/7

Pricing

£50 per server per month

  • Education pricing available

Service documents

G-Cloud 10

467257947521607

Nurved Consulting Ltd

Ian Poole

07866 457440

ian.poole@nurved.com

Service scope

Service scope
Service constraints NurvedCloud doesn’t have any scheduled downtimes, the architecture is fully resilient and where maintenance needs to take place to a certain part of the infrastructure then we port/migrate VMs onto different Hypervisors/SANs to ensure no downtime to customer services.
System requirements
  • OS licensing on request or supplied by customer
  • All necessary steps to ensure secure OS
  • Antivirus/Malware where necessary
  • No Submission of SPAM

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Severity Level Response Time Resolution Time
1 30 minutes 12 hours
2 1 hours 24 hours
3 4 hours 48 hours
4 8 hours None
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support No
Support levels NurvedCloud IaaS has allowance built in for local failures with enterprise level resilience (network, power, servers, SAN/Disk, connectivity etc) and therefore operate an SLA to 99.9%.

All incidents we be logged and Support will be provided 24x7x365 via telephone & email.

Target response times will be as below
Severity Level Response Time Resolution Time
1 30 minutes 12 hours
2 1 hours 24 hours
3 4 hours 48 hours
4 8 hours None

Severity levels are the same as our Consultancy/Engineering Services which are listed below:
Severity Level Definition
1 Customer business operations have been disrupted either through a loss of data or a loss of service.
2 Customer business operations can continue in a restricted fashion. Client’s business operations are at risk.
3 Portions of the service are impaired but client can continue to use the service. Customer business operations are at minimal risk.
4 General Support/Information, requests for new features or documentation issues. Customer business operations are at zero risk.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started Full user documentation is provided.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Import/Export of data is permitted at any time.
OVF format automated import/export is currently in development and will be supported soon. We can offer this service through our professional services if required. This service will require transference of said OVF export (either via Secure Post, SSH or local pickup)
End-of-contract process Customer data available for export any time. We offer this service through our professional services if required. This service will require
transference of said OVF export (either via Secure Post, SSH or local pickup)

Using the service

Using the service
Web browser interface No
API No
Command line interface Yes
Command line interface compatibility
  • Linux or Unix
  • Windows
  • MacOS
Using the command line interface All remote system SSH Commands available

Scaling

Scaling
Scaling available No
Independence of resources Customer machines and services are scalable and run independent of other users.
Usage notifications Yes
Usage reporting Email

Analytics

Analytics
Infrastructure or application metrics Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
Reporting types Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Backup and recovery Yes
What’s backed up
  • Files/Folders
  • Machines
Backup controls Customers can deploy multiple backup servers, or use your control panel server.

Nurvedcloud enables automated/scheduled backups and ad-hoc backups of VM data. VM snapshots are stored outside of SANs, allowing true disaster recovery in case of SAN failure.

Hot migration
NurvedCloud lets you migrate virtual machines between hypervisor servers at will, or migrate all virtual machines hosted by one hypervisor to another.
Datacentre setup Multiple datacentres
Scheduling backups Supplier controls the whole backup schedule
Backup recovery Users contact the support team

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability NurvedCloud IaaS has allowance built in for local failures with enterprise level resilience (network, power, servers, SAN/Disk, connectivity etc) and therefore operate an SLA to 99.9%.
Approach to resilience Available on request
Outage reporting Email notifications sent and updated.

Identity and authentication

Identity and authentication
User authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Only senior support staff have access to management controls.
Access restriction testing frequency At least every 6 months
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Other
Devices users manage the service through Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for Between 1 month and 6 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for Between 1 month and 6 months
How long system logs are stored for Between 6 months and 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Nurved follow ISO27001 standards.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Nurved follow ISO9001 standards of work practice.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Nurved follow ISO27001 standards
Protective monitoring type Supplier-defined controls
Protective monitoring approach Systems are monitored 24/7 with alerts. Incidents are graded from 1 to 4 and are responded to within 30 mins.
Incident management type Supplier-defined controls
Incident management approach Nurved follow ISO9001 work practices

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart Yes
Who implements virtualisation Supplier
Virtualisation technologies used VMware
How shared infrastructure is kept separate VLAN. Routing between customers is not possible (unless explicitly requested). Dedicated switches/routers available on request

Energy efficiency

Energy efficiency
Energy-efficient datacentres Yes

Pricing

Pricing
Price £50 per server per month
Discount for educational organisations Yes
Free trial available No

Documents

Documents
Pricing document View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑