Cloud and Virtualisation
We provide a range of IT services for customers looking to leverage cloud and virtualisation technologies for positive business impact.
Features
- Application and Desktop Delivery
- Mobile Device Management
- Cloud Enablement and Migration
- Secure Remote Access
- Real-Time Monitoring and Reporting
- Managed Support Services
Benefits
- Access apps, files and desktop all in one place
- Enable collaboration and employee engagement
- Improve end user experience
- Secure distributed environments
- Integrate applications running in cloud or on premise
- Securely monitor users apps and data for context aware workspaces
- Increase flexible working
- Simplify IT management
- Increase worker productivity
Pricing
£50 a person a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at hello@coffeecupsolutions.com.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 10
Service ID
4 7 4 1 2 4 0 6 7 7 0 4 9 6 1
Contact
Coffee Cup Solutions
Hayden Trott
Telephone: 01183842175
Email: hello@coffeecupsolutions.com
Service scope
- Service constraints
- No
- System requirements
- No, we are service agnostic
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Dependent upon contract agreements.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Via the website
- Web chat accessibility testing
- N/A
- Onsite support
- Onsite support
- Support levels
-
We provide 1st, 2nd and 3rd line support.
We provide Technical Consultants.
We provide an Account Manager.
Prices depend upon type of contract/number of consultancy days booked. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- On-boarding, documentation, user manuals and handovers, onsite training.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- No data is stored.
- End-of-contract process
- Dependent upon type of contract.
Using the service
- Web browser interface
- No
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- No
- Independence of resources
- Regular monitoring.
- Usage notifications
- Yes
- Usage reporting
-
- Other
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
- Regular reports
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Citrix, Microsoft, VMware, FSLogix
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- No
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
Severity 1 = 30 mins
Severity2 = 1 Hour
Severity 3 = 4 Hours
Severity 4 = 8 Hours - Approach to resilience
- N/A
- Outage reporting
- N/A
Identity and authentication
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- 2-factor Authentication
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
- Devices users manage the service through
-
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users receive audit information on a regular basis
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users receive audit information on a regular basis
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Service and data security practises are reviewed regularly and updated to ensure integrity of service and confidentiality of data.
- Information security policies and processes
-
All information, whether electronic or otherwise, must be stored in a secure
manner, appropriate to its sensitivity.
Data sensitivity, access Control and systems are regularly reviewed to ensure the confidentiality, integrity and availability of the service.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- We have an online portal, in house developed which handles change management.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Supplier Defined.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Supplier Defined.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Supplier Defined.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- Yes
Pricing
- Price
- £50 a person a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Free Trial dependent upon use case.
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at hello@coffeecupsolutions.com.
Tell them what format you need. It will help if you say what assistive technology you use.