Jigsaw24

Jigsaw24 Veeam Cloud Connect

Veeam Cloud Connect provides a fully integrated, fast and secure way to backup and replicate to a service provider's cloud repository.

Features

  • Physical and virtual backups offsite
  • Access and recover data in repositories directly from the console
  • End to end encryption at the source of the data
  • Complete visibility and control

Benefits

  • Quick and easy to get started
  • Receive reminders for hosted storage renewals
  • Track cloud repository consumption

Pricing

£5 per virtual machine per month

  • Free trial available

Service documents

G-Cloud 11

541567070546108

Jigsaw24

Hannah Hally

0115 9707765

gps@jigsaw24.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints N/A
System requirements
  • CPU: x86 or 86-64 processor
  • Disk space: 300 MB
  • Network: 1 Gbps LAN

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Support priority 1-4 basis with response times from 1hr to next business day.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard None or don’t know
How the web chat support is accessible Via our website - www.jigsaw24.com
Web chat accessibility testing N/A
Onsite support Onsite support
Support levels Service availability SLA is 99.99%, support priority 1-4 basis with response times from 1hr to next business day. The customer will have the initial escalation point with their account manager. A ticket will then be raised and a cloud support engineer will be assigned.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Users are provided with an operational manual upon commencement of the service which details processes, procedures, the service deliverables and KPIs. The set-up/provision of the service is fulfilled by Jigsaw24 as part of the managed services offering as is full management and administration. Training is not a requirement for this service, however, assistances with all pre-requisites, i.e. Any security changes is provided by Jigsaw24 as part of the service.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Via termination of the contract. All customer information is removed.
End-of-contract process At the end of the contract, customers environments are decommissioned within 30 days. No customer data is retained within the software.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install Yes
Compatible operating systems
  • Linux or Unix
  • Windows
Designed for use on mobile devices No
API No
Customisation available No

Scaling

Scaling
Independence of resources The Veeam solution is configured utilising multiple gateways and supported by resilient infrastructure with appropriate dynamic routing and configuration to ensure there are no single points of failure, no shared services and segregated routing for individual customer instances.

Analytics

Analytics
Service usage metrics Yes
Metrics types The customers Veeam Backup & Replication Management Console provides these metrics

Resellers

Resellers
Supplier type Reseller providing extra support
Organisation whose services are being resold Veeam

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Encryption of all physical media
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Data is exported over a secure, encrypted connection and requests processed via the Veeam management console.
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks IPsec or TLS VPN gateway
Data protection within supplier network IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability 99.999%
Approach to resilience Available on request
Outage reporting Email alerts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels N/a
Access restriction testing frequency At least once a year
Management access authentication 2-factor authentication

Audit information for users

Audit information for users
Access to user activity audit information No audit information available
Access to supplier activity audit information No audit information available
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 N/a
ISO/IEC 27001 accreditation date 2015
What the ISO/IEC 27001 doesn’t cover N/a
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security No
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Compliance with ISO27001 is a written requirement of employment at our company and is regularly assessed by our in-house auditing team as well as through six monthly externally led audits

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach We operate an ITIL aligned change management process, including change advisory boards, peer reviews and an authorisation process
Vulnerability management type Undisclosed
Vulnerability management approach A tier 3 data centre provider supplies our security management services, with the exception of deployment of patches. All critical patches are deployed within 60 minutes of notification of a threat.
Protective monitoring type Supplier-defined controls
Protective monitoring approach A tier 3 data centre provider supplies our security management services, with the exception of deployment of patches. All critical incidents are responded to within 15 minutes of notification.
Incident management type Supplier-defined controls
Incident management approach We operate an ITIL aligned incident management processes. Users can report incidents via email or telephone. A nominated major incident manager, provides management of any incidents and produces a major incident report, upon restoration of service

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £5 per virtual machine per month
Discount for educational organisations No
Free trial available Yes
Description of free trial Full version available for download. Trial is available for 30 days

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Service definition document pdf document: Terms and conditions pdf document: Modern Slavery statement
Service documents
Return to top ↑