Silver Lining Convergence Limited

Silver Lining Cloud

A cloud platform provisioned on ultra-reliable and resilient networks based in UK data-centres with private networks.
End-to-end platform wholly owned and operated from the ISP layer through to applications and storage ensuring total security, control and resilience.
Our solution enables integration of existing systems using converged on-premise, off-premise, public/private Clouds.


  • Platform architected from industry leading hardware and software components
  • 99.9% platform availability SLA
  • UK Based Data Centres
  • UKAS accredited ISO27001 information security management system, policies and procedures
  • Highly resilient infrastructure
  • Platform includes failover between geographic locations, backup and monitoring
  • Deployed either on our multi-tenant virtual or private cloud platform
  • Customised hosted desktop solutions


  • Reduces your IT operating costs
  • 24/7/365 UK based support
  • N+2 Resiliency
  • Flexibility to create private or hybrid cloud configurations
  • Cloud platform architecture delivers greater resiliency
  • Snapshot functionality for disaster recovery, rapid deployment or clustering
  • Improved business agility
  • More uptime for your business
  • Capex or Opex Models


£20.17 per virtual machine

Service documents

G-Cloud 9


Silver Lining Convergence Limited

Matthew Rawlinson

07710 701 321

Service scope

Service scope
Service constraints Regular maintenance takes place on the hosting platform however due to our N+2 resiliency this does not impact customer or cause downtime.
System requirements
  • Internet Explorer 9 upwards
  • Chrome
  • Firefox
  • Safari

User support

User support
Email or online ticketing support Email or online ticketing
Support response times From 15 minutes but Severity and SLA dependent
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels Both technical account managers and cloud engineers can be provided to customers.
We provide three different levels of support to meet your requirements, Platinum, Gold, Silver.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Clients are on-boarded using defined migration and project scoping strategies including PRINCE2®. We can provide onsite training, online training, or user documentation tailored to the customers needs.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction We provide tailored processes to support the individual customers needs.
End-of-contract process Data will be provided to the customer upon request using our pre-defined methods. Historical data recovery may incur additional recovery costs.

Using the service

Using the service
Web browser interface No
Command line interface No


Scaling available No
Independence of resources Uses software defined network and virtualisation technology to segregate private clouds or multi tenant user instances within vApps, independent domains or virtual routing instances.
Usage notifications Yes
Usage reporting Email


Infrastructure or application metrics Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
  • Other
Other metrics
  • Bandwidth
  • Link Speed
  • CPU Threads
Reporting types Reports on request


Supplier type Reseller providing extra support
Organisation whose services are being resold TheCloud Limited

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least every 6 months
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process No
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Backup and recovery Yes
What’s backed up
  • Virtual Machines
  • Data and Databases
  • Exchange
  • Bare metal recovery
  • Files & Folders
Backup controls All backups are automated on provisioning of the service. Custom requirements can be discussed and or implemented.
Datacentre setup Multiple datacentres with disaster recovery
Scheduling backups Supplier controls the whole backup schedule
Backup recovery Users contact the support team

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability SLA Guarantees and Service Credits are available for viewing in the Master Services Agreement (MSA).
Approach to resilience Available on request
Outage reporting Email alerts

Identity and authentication

Identity and authentication
User authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Available up on request.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through Dedicated device on a segregated network (providers own provision)

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 BAB
ISO/IEC 27001 accreditation date 06/03/2017
What the ISO/IEC 27001 doesn’t cover Available upon request
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation Yes
Security governance standards ISO/IEC 27001
Information security policies and processes We are ISO27001:2013 accredited as such our policies and procedures adhere to these standards.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach ITIL Framework is used for Change Management. CAB meeting are scheduled weekly to reviewing requested changes and new vulnerabilities.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Once identified, a new vulnerability is assessed and categorised depending on potential impact, documented and a remediation sought.
Any fixes/patches are first checked in a sandbox environment before deployment to any live part of the system.
Protective monitoring type Supplier-defined controls
Protective monitoring approach The solution has been developed with alerting, analytical and reporting features built in. This allows is to proactively monitor and protect the system. Any breach or compromise is treated with a C1 issue.
Incident management type Supplier-defined controls
Incident management approach Incident Management follows the ITIL Framework.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart Yes
Who implements virtualisation Supplier
Virtualisation technologies used VMware
How shared infrastructure is kept separate Logical separation of customer networks using vLANs and virtual routing instances. Logical separation of virtual machines using vApps.

Energy efficiency

Energy efficiency
Energy-efficient datacentres Yes


Price £20.17 per virtual machine
Discount for educational organisations No
Free trial available No


Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑