Park Place Technologies

Compute and Application Hosting ( IaaS )

The Park Place Technologies Compute and Application Hosting ( Iaas ) Service provides a resilient, secure, scalable and fully redundant environment for physical and virtual based workloads. Your fully managed infrastructure is supported 24x7 with options of a single UK-based location or multiple to provide additional redundancy.

Features

  • On Demand VMs and storage
  • Dedicated or multi-tenanted environments
  • High availability
  • Guaranteed Service Level Agreement
  • ITIL based service delivery management
  • 24x7x365 service, support and monitoring
  • Delivered from UK Data Centres
  • Platform architected from industry leading hardware and software components
  • Persistent storage
  • Simple, flexible billing model

Benefits

  • Scalable as required
  • Reduce local infrastructure requirements
  • Easy to control costs with a predictable cost model
  • Eliminate administrative overheads
  • No single point of failure
  • Cloud platform architecture delivers greater resiliency
  • Flexibility to create private or hybrid cloud configurations
  • Automatic failover protection to another hardware node

Pricing

£92 per virtual machine per month

  • Education pricing available

Service documents

G-Cloud 11

468873806984251

Park Place Technologies

Simon Bitton

0208 885 9656

sbitton@parkplacetech.com

Service scope

Service scope
Service constraints Planned maintenance with a minimum of 1 weeks notice may be required
System requirements Requires secure connectivity

User support

User support
Email or online ticketing support Email or online ticketing
Support response times N/A
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels Park Place Technical support is available 24x7x365 via our global service desk. All support is delivered by UK based engineers, who monitor the service availability and provide proactive support via email or phone.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Park Place will provide customers with full on-boarding documentation as part of take on process. New customers are asked to provide us with a list of authorised contacts and their associated permission levels that may make requests for service invocation or service change. Park Place don't charge customers for on-boarding however, should a customer require additional or tailored support outside of the standard process, such as project management, technical design, etc, then Park Place may charge for this based on a detailed SOW.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Park Place Technologies will provide the customer with the latest server images in an industry standard format. Any data on dedicated physical servers will be provided in a agreed format. Requests for data extraction are submitted and managed via the service desk.
End-of-contract process Park Place Technologies do not charge customers as standard for off-boarding a client. We will provide reasonable support to the customer as part of the off-boarding process however, should additional assistance or project management be required, Park Place reserves the right to charge the customer. Charges will be calculated and agreed in advance.

Using the service

Using the service
Web browser interface No
API No
Command line interface No

Scaling

Scaling
Scaling available Yes
Scaling type
  • Automatic
  • Manual
Independence of resources Park Place adopt two approaches to mitigate these risks. The first is that we can provide a dedicated infrastructure to ensure absolute isolation from all other workloads. The second approach involved the deployment of resource reservation technologies to protect and isolate workloads from each other when they are deployed on a shared infrastructure.
Usage notifications Yes
Usage reporting
  • Email
  • Other

Analytics

Analytics
Infrastructure or application metrics Yes
Metrics types
  • CPU
  • Disk
  • Memory
  • Network
  • Other
Other metrics
  • Incident history
  • Quarterly service review
Reporting types
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Hardware containing data is completely destroyed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Backup and recovery Yes
What’s backed up
  • Files
  • Virtual Machines
  • Application data
  • Databases
  • Any other data set
Backup controls Backups are configured to each customers unique requirement.
Datacentre setup
  • Multiple datacentres with disaster recovery
  • Multiple datacentres
  • Single datacentre with multiple copies
  • Single datacentre
Scheduling backups Users contact the support team to schedule backups
Backup recovery Users contact the support team

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • IPsec or TLS VPN gateway
Data protection within supplier network IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability The Park Place SLA offers 99.99% availability up to the operating system. Scheduled maintenance windows will be agreed with the customer as necessary.
Approach to resilience All deployed infrastructure is designed with no single point of failure and our significant experience as a managed service provider ensures the appropriate management of this infrastructure is optimized to achieved maximum availability.
Outage reporting Park Place have co-developed a proactive monitoring platform, ParkView. This platform monitors the entire technology stack and uses artificial intelligence technologies to take a proactive approach to fault detection and alerting.
The Managed Service team will alert the customer of any outages according to the agreed communication policy.

Identity and authentication

Identity and authentication
User authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels As part of the on-boarding process, we will request a list of authorised users with roles and permissions. The service desk and Managed Service team will only accept requests from authorised contacts. any changes to the authorised user list will be subject to the agreed change control mechanism.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
Devices users manage the service through Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for Between 1 month and 6 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for Between 1 month and 6 months
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 QCSI Ltd, accredited by ASCB(E) ltd
ISO/IEC 27001 accreditation date 28/04/17
What the ISO/IEC 27001 doesn’t cover Outsourced Development is excluded from the Statement of Applicability
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Cyber Essentials

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes PPT operate an Information Security Management System (ISMS) that is certified to ISO27001:2013. This includes:
• An Information Security Policy
• A Statement of Applicability
• A Data Destruction policy
• An Acceptable Use of Assets Policy
• A Use of Cryptographic controls policy
• An Information Exchange Policy
• A Policy for handling Classified Information
• An Access Control Policy
• A Destruction and Disposal Policy
An Information security risk assessment has been completed which is reviewed annually, whenever there is a major change that could impact information security or following a major security incident.
Each employee is responsible for reporting any system weakness, information security incident, or event that could lead to an incident. These are to be reported to the IT systems engineer as soon as possible by phone, email or in person in accordance with Incident Management & Reporting procedures.
Employees are given an overview of the ISMS during induction, including data protection and cyber security training. All system documents are readily available via the company SharePoint.
All elements of the ISMS are included in the Internal Audit Plan and the system is subject to annual 3rd party audit.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach The Park Place internal change control processes are strictly ITIL aligned. Where customers are involved in the submission or approval of change requests, these processes are defined during the contract take on period and can be aligned with the customers existing change control processes.
Vulnerability management type Supplier-defined controls
Vulnerability management approach The Park Place vulnerability management approach is based on ensuring all platforms are patched and maintained according to vendor best practice. All configuration changes are subject to strict change control and are reviewed, logged and audited on a regular basis.
Protective monitoring type Supplier-defined controls
Protective monitoring approach All logs are centralised and are reviewed on a regular basis. Any detected high risk activity is given a severity 1 prioritisation for response by operations and security teams.
Incident management type Supplier-defined controls
Incident management approach Park Place operate an ITIL aligned incident management process. Call logging guides and escalation procedures are issued as part of the customer on-boarding process and are reviewed as part of regular service review meetings.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart Yes
Who implements virtualisation Supplier
Virtualisation technologies used VMware
How shared infrastructure is kept separate The Park Place infrastructure offers customers access to either a multi-tenant or a dedicated infrastructure. For multi-tenant environments, logical partitioning starts at the edge of the network through dedicated VPNs and internal networks through to a storage level by using dedicated datastores.

Energy efficiency

Energy efficiency
Energy-efficient datacentres Yes
Description of energy efficient datacentres The datacentres used adhere to best practices with regards to the EU Code of Conduct. They are also linked with Green Grid and have ISO14001 accreditations across all sites. Each site has Energy Efficiency certificates.

The datacentres are also attached to both the CRC and for DC’s CCA program, meaning they are governed on goals set for efficiencies. They also obtain all power via renewable resources.

Pricing

Pricing
Price £92 per virtual machine per month
Discount for educational organisations Yes
Free trial available No

Service documents

pdf document: Pricing document pdf document: Terms and conditions pdf document: Modern Slavery statement
Service documents
Return to top ↑