Park Place Technologies

Compute and Application Hosting ( IaaS )

The Park Place Technologies Compute and Application Hosting ( Iaas ) Service provides a resilient, secure, scalable and fully redundant environment for physical and virtual based workloads. Your fully managed infrastructure is supported 24x7 with options of a single UK-based location or multiple to provide additional redundancy.


  • On Demand VMs and storage
  • Dedicated or multi-tenanted environments
  • High availability
  • Guaranteed Service Level Agreement
  • ITIL based service delivery management
  • 24x7x365 service, support and monitoring
  • Delivered from UK Data Centres
  • Platform architected from industry leading hardware and software components
  • Persistent storage
  • Simple, flexible billing model


  • Scalable as required
  • Reduce local infrastructure requirements
  • Easy to control costs with a predictable cost model
  • Eliminate administrative overheads
  • No single point of failure
  • Cloud platform architecture delivers greater resiliency
  • Flexibility to create private or hybrid cloud configurations
  • Automatic failover protection to another hardware node


£92 per virtual machine per month

  • Education pricing available

Service documents


G-Cloud 11

Service ID

4 6 8 8 7 3 8 0 6 9 8 4 2 5 1


Park Place Technologies

Simon Bitton

0208 885 9656

Service scope

Service constraints
Planned maintenance with a minimum of 1 weeks notice may be required
System requirements
Requires secure connectivity

User support

Email or online ticketing support
Email or online ticketing
Support response times
User can manage status and priority of support tickets
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
Park Place Technical support is available 24x7x365 via our global service desk. All support is delivered by UK based engineers, who monitor the service availability and provide proactive support via email or phone.
Support available to third parties

Onboarding and offboarding

Getting started
Park Place will provide customers with full on-boarding documentation as part of take on process. New customers are asked to provide us with a list of authorised contacts and their associated permission levels that may make requests for service invocation or service change. Park Place don't charge customers for on-boarding however, should a customer require additional or tailored support outside of the standard process, such as project management, technical design, etc, then Park Place may charge for this based on a detailed SOW.
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Park Place Technologies will provide the customer with the latest server images in an industry standard format. Any data on dedicated physical servers will be provided in a agreed format. Requests for data extraction are submitted and managed via the service desk.
End-of-contract process
Park Place Technologies do not charge customers as standard for off-boarding a client. We will provide reasonable support to the customer as part of the off-boarding process however, should additional assistance or project management be required, Park Place reserves the right to charge the customer. Charges will be calculated and agreed in advance.

Using the service

Web browser interface
Command line interface


Scaling available
Scaling type
  • Automatic
  • Manual
Independence of resources
Park Place adopt two approaches to mitigate these risks. The first is that we can provide a dedicated infrastructure to ensure absolute isolation from all other workloads. The second approach involved the deployment of resource reservation technologies to protect and isolate workloads from each other when they are deployed on a shared infrastructure.
Usage notifications
Usage reporting
  • Email
  • Other


Infrastructure or application metrics
Metrics types
  • CPU
  • Disk
  • Memory
  • Network
  • Other
Other metrics
  • Incident history
  • Quarterly service review
Reporting types
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Hardware containing data is completely destroyed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
What’s backed up
  • Files
  • Virtual Machines
  • Application data
  • Databases
  • Any other data set
Backup controls
Backups are configured to each customers unique requirement.
Datacentre setup
  • Multiple datacentres with disaster recovery
  • Multiple datacentres
  • Single datacentre with multiple copies
  • Single datacentre
Scheduling backups
Users contact the support team to schedule backups
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • IPsec or TLS VPN gateway
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
The Park Place SLA offers 99.99% availability up to the operating system. Scheduled maintenance windows will be agreed with the customer as necessary.
Approach to resilience
All deployed infrastructure is designed with no single point of failure and our significant experience as a managed service provider ensures the appropriate management of this infrastructure is optimized to achieved maximum availability.
Outage reporting
Park Place have co-developed a proactive monitoring platform, ParkView. This platform monitors the entire technology stack and uses artificial intelligence technologies to take a proactive approach to fault detection and alerting.
The Managed Service team will alert the customer of any outages according to the agreed communication policy.

Identity and authentication

User authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
As part of the on-boarding process, we will request a list of authorised users with roles and permissions. The service desk and Managed Service team will only accept requests from authorised contacts. any changes to the authorised user list will be subject to the agreed change control mechanism.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
Devices users manage the service through
Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
QCSI Ltd, accredited by ASCB(E) ltd
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
Outsourced Development is excluded from the Statement of Applicability
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
Cyber Essentials

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
PPT operate an Information Security Management System (ISMS) that is certified to ISO27001:2013. This includes:
• An Information Security Policy
• A Statement of Applicability
• A Data Destruction policy
• An Acceptable Use of Assets Policy
• A Use of Cryptographic controls policy
• An Information Exchange Policy
• A Policy for handling Classified Information
• An Access Control Policy
• A Destruction and Disposal Policy
An Information security risk assessment has been completed which is reviewed annually, whenever there is a major change that could impact information security or following a major security incident.
Each employee is responsible for reporting any system weakness, information security incident, or event that could lead to an incident. These are to be reported to the IT systems engineer as soon as possible by phone, email or in person in accordance with Incident Management & Reporting procedures.
Employees are given an overview of the ISMS during induction, including data protection and cyber security training. All system documents are readily available via the company SharePoint.
All elements of the ISMS are included in the Internal Audit Plan and the system is subject to annual 3rd party audit.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
The Park Place internal change control processes are strictly ITIL aligned. Where customers are involved in the submission or approval of change requests, these processes are defined during the contract take on period and can be aligned with the customers existing change control processes.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
The Park Place vulnerability management approach is based on ensuring all platforms are patched and maintained according to vendor best practice. All configuration changes are subject to strict change control and are reviewed, logged and audited on a regular basis.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
All logs are centralised and are reviewed on a regular basis. Any detected high risk activity is given a severity 1 prioritisation for response by operations and security teams.
Incident management type
Supplier-defined controls
Incident management approach
Park Place operate an ITIL aligned incident management process. Call logging guides and escalation procedures are issued as part of the customer on-boarding process and are reviewed as part of regular service review meetings.

Secure development

Approach to secure software development best practice
Supplier-defined process

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Who implements virtualisation
Virtualisation technologies used
How shared infrastructure is kept separate
The Park Place infrastructure offers customers access to either a multi-tenant or a dedicated infrastructure. For multi-tenant environments, logical partitioning starts at the edge of the network through dedicated VPNs and internal networks through to a storage level by using dedicated datastores.

Energy efficiency

Energy-efficient datacentres
Description of energy efficient datacentres
The datacentres used adhere to best practices with regards to the EU Code of Conduct. They are also linked with Green Grid and have ISO14001 accreditations across all sites. Each site has Energy Efficiency certificates.

The datacentres are also attached to both the CRC and for DC’s CCA program, meaning they are governed on goals set for efficiencies. They also obtain all power via renewable resources.


£92 per virtual machine per month
Discount for educational organisations
Free trial available

Service documents

Return to top ↑