Jigsaw24

Jigsaw24 Veeam Cloud Connect

Veeam Cloud Connect provides a fully integrated, fast and secure way to backup and replicate to a service provider's cloud repository.

Features

  • Physical and virtual backups offsite
  • Access and recover data in repositories directly from the console
  • End to end encryption at the source of the data
  • Complete visibility and control

Benefits

  • Quick and easy to get started
  • Receive reminders for hosted storage renewals
  • Track cloud repository consumption

Pricing

£5 per virtual machine per month

  • Free trial available

Service documents

Framework

G-Cloud 11

Service ID

5 4 1 5 6 7 0 7 0 5 4 6 1 0 8

Contact

Jigsaw24

Laura-Jane Turner

0115 9707765

gps@jigsaw24.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
N/A
System requirements
  • CPU: x86 or 86-64 processor
  • Disk space: 300 MB
  • Network: 1 Gbps LAN

User support

Email or online ticketing support
Email or online ticketing
Support response times
Support priority 1-4 basis with response times from 1hr to next business day.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Via our website - www.jigsaw24.com
Web chat accessibility testing
N/A
Onsite support
Onsite support
Support levels
Service availability SLA is 99.99%, support priority 1-4 basis with response times from 1hr to next business day. The customer will have the initial escalation point with their account manager. A ticket will then be raised and a cloud support engineer will be assigned.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Users are provided with an operational manual upon commencement of the service which details processes, procedures, the service deliverables and KPIs. The set-up/provision of the service is fulfilled by Jigsaw24 as part of the managed services offering as is full management and administration. Training is not a requirement for this service, however, assistances with all pre-requisites, i.e. Any security changes is provided by Jigsaw24 as part of the service.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Via termination of the contract. All customer information is removed.
End-of-contract process
At the end of the contract, customers environments are decommissioned within 30 days. No customer data is retained within the software.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Yes
Compatible operating systems
  • Linux or Unix
  • Windows
Designed for use on mobile devices
No
Service interface
No
API
No
Customisation available
No

Scaling

Independence of resources
The Veeam solution is configured utilising multiple gateways and supported by resilient infrastructure with appropriate dynamic routing and configuration to ensure there are no single points of failure, no shared services and segregated routing for individual customer instances.

Analytics

Service usage metrics
Yes
Metrics types
The customers Veeam Backup & Replication Management Console provides these metrics

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Veeam

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Encryption of all physical media
Data sanitisation process
No
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Data is exported over a secure, encrypted connection and requests processed via the Veeam management console.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
IPsec or TLS VPN gateway
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
99.999%
Approach to resilience
Available on request
Outage reporting
Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
N/a
Access restriction testing frequency
At least once a year
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
N/a
ISO/IEC 27001 accreditation date
2015
What the ISO/IEC 27001 doesn’t cover
N/a
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
No
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Compliance with ISO27001 is a written requirement of employment at our company and is regularly assessed by our in-house auditing team as well as through six monthly externally led audits

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We operate an ITIL aligned change management process, including change advisory boards, peer reviews and an authorisation process
Vulnerability management type
Undisclosed
Vulnerability management approach
A tier 3 data centre provider supplies our security management services, with the exception of deployment of patches. All critical patches are deployed within 60 minutes of notification of a threat.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
A tier 3 data centre provider supplies our security management services, with the exception of deployment of patches. All critical incidents are responded to within 15 minutes of notification.
Incident management type
Supplier-defined controls
Incident management approach
We operate an ITIL aligned incident management processes. Users can report incidents via email or telephone. A nominated major incident manager, provides management of any incidents and produces a major incident report, upon restoration of service

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Pricing

Price
£5 per virtual machine per month
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
Full version available for download. Trial is available for 30 days

Service documents

Return to top ↑