Verne Global

HPC for Geophysics Research

Verne Global’s HPC as a Service for Geophysics is ideal for research in earth sciences, astrophysics, particle and nuclear physics, advanced oil and gas research, meteorology and weather forecasting. hpcDIRECT offers HPC clusters, storage and interconnects able to handle demanding deployments including atmospheric, climatic, seismic, reservoir basin and oceanic modelling.

Features

  • Bare metal, HPCaaS (reserved and on-demand) High Performance Computing solution
  • Engineered for geophysics, weather forecasting, atmospheric/oceanic/climatic, oil/gas modelling
  • Augments your existing, on-premise HPC architecture
  • Latest specification CPU hardware, storage and Infiniband interconnects
  • Dedicated infrastructure offering highest levels of security
  • Large choice of node sizes, configurations and GPUs
  • Built using Open Source technologies providing maximum accessibility
  • Operating from an industrial scale, HPC-optimised data centre campus
  • Deployments supported by an experienced and specialist HPC team
  • hpcDIRECT operates from a secure, 100% renewably-powered data centre campus

Benefits

  • True HPC solution – full HPC processing power and speed
  • Optimise your applications and dramatically reduce total cost of operations
  • HPC-optimised data centre enabling free-cooling efficiencies and lowest cost possible
  • Industry leading uptime - providing 99.9% guarantees within the MSA
  • Industry leading sustainability and lowest carbon footprint
  • Consultative onboarding process to integrate workflows and deploy HPC clusters
  • Online ticketing system for constant support
  • Customer validation platform – ability to try before you buy
  • Account and technical teams based in UK for continuous support
  • Hosted in a secure, ISO27001-certified data centre built for HPC

Pricing

£0.019 per instance per hour

Service documents

G-Cloud 10

551963666147029

Verne Global

Spencer Lamb

020 3695 0310

gcloud@verneglobal.com

Service scope

Service scope
Service constraints Maintenance upgrades will be handled in a non-disruptive manner and follow standard ITIL release management principles. Where necessary, maintenance windows will be arranged in advance with the customers to minimise disruption to jobs.
System requirements Customers responsible for licence compliance for self deployed software

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Responses time are dependent on ticket severity 24 x 7
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard None or don’t know
How the web chat support is accessible Webchat is accessible through our secure portal and via a third party authenticated application.
Web chat accessibility testing Our commercial third party web chat application has been tested prior to release, with scheduled updates.
Onsite support Yes, at extra cost
Support levels Verne Global provide all levels of remote support up to and including "level three" support within the existing pricing. This is for all incident and task related events. Should a customer require additional consultancy or training when considering consuming the service we offer a "High Performance as a Service Support. Verne Global's Customer Success team are the customer advocate within the organisation ensuring the customer gets the maximum return on their business investment. Matching customer goals against our deliverables. As of May 2018 our Net Promoter Score (NPS) was 80, and our Customer Service satisfaction rating stands at 98% (based on 365 days rolling service).
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Full service documentation is provided. Telephone support and web chat is available and if required onsite training is available.
Service documentation Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction Data transfer using standard protocols available to download any customer data. Physical media can be made available for an additional cost.
End-of-contract process Support will be available to assist customers with the off boarding process.
All customer job data available to download over existing network links. All customer's data is securely wiped when the contract terminates, unless instructed otherwise by the authorised customer user. Should the customer require physical copies of their data this can be provided for an additional charge.

Using the service

Using the service
Web browser interface Yes
Using the web interface Our secure management portal for hpcDIRECT, designed to allow organisations to interact with hpcDIRECT. Features include:
- Provision, decommission and highlight resources for maintenance
- Access cluster usage reports and analytics
- Securely manage hpcDIRECT user access
- Access and generate clear and detailed billing
- Manage BIOS settings (such as power management and hyper threading)
- Manage storage quotas, back-up and secure decommissioning of storage
- Deploy and manage applications, os-patches and services, including version control
- Access dedicated customer support for rapid help and assistance.
Web interface accessibility standard None or don’t know
How the web interface is accessible Full compliance with accessibility standards scheduled on roadmap for future deployment.
Web interface accessibility testing Full compliance with accessibility standards scheduled on roadmap for future deployment.
API Yes
What users can and can't do using the API Using a simple scripting language users are able to securely create, manage and tear down their HPC clusters. Users will be able to do tasks such as create clusters, manage clusters configurations, monitor clusters, transfer data in and out of their clusters and terminate and tear down clusters.
API automation tools
  • Ansible
  • Chef
  • OpenStack
  • Terraform
  • Puppet
API documentation Yes
API documentation formats
  • HTML
  • ODF
  • PDF
Command line interface Yes
Command line interface compatibility
  • Linux or Unix
  • Windows
  • MacOS
Using the command line interface Execute and monitor tasks through the command line.

Scaling

Scaling
Scaling available Yes
Scaling type Manual
Independence of resources Dedicated bare metal infrastructure for high performance computing which by design cannot share resources between customers.
Usage notifications Yes
Usage reporting
  • API
  • Email
  • Other

Analytics

Analytics
Infrastructure or application metrics Yes
Metrics types
  • CPU
  • Disk
  • Memory
  • Network
  • Number of active instances
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach A third-party destruction service

Backup and recovery

Backup and recovery
Backup and recovery Yes
What’s backed up Core client data is backed up on request
Backup controls Users raise a support ticket to make arrangements for any specific changes to the standard backup policies. Bespoke backup solutions can be provided at additional cost.
Datacentre setup Single datacentre with multiple copies
Scheduling backups Users contact the support team to schedule backups
Backup recovery Users contact the support team

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Bonded fibre optic connections
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Availability of the Management Platform and HPC Clusters is 99.9%
Should a cluster fail due to Verne Global's error the user will not be charged for the specific job running.
Approach to resilience Information available upon request.
Outage reporting Outages are reported via our online portal status page and all authorised users will receive an email communication. Customers are also able to query status of the platform and individual clusters via our API.

Identity and authentication

Identity and authentication
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Role based access control.

Each user is given a unique login to our HPCaaS platform.
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
  • Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for Between 6 months and 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Data centre operations in Iceland are certified ISO:27001

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Security Governance is a group of senior representatives from across the business responsible for setting the security policies and posture of our organisation. The group ensure our security strategy is aligned with business goals and wider regulatory requirements. This group also sets out accountability and management controls for the implementation of these policies in the wider Verne Global business.
Information security policies and processes Management controls are set by the Security Governance Group and responsibility for implementation sits with the security and operations teams. Policies exist for a number of topics including but not limited to vulnerability and patch management, protective monitoring, acceptable usage and data classification. Accountability for implementation is at board level.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach All components that are comprised within the HPCaaS platform are stored in a Configuration Management DataBase (CMDB). When changes are proposed to the infrastructure these are fully documented in advance and include a verified change back out plan. A Change Management Board comprised of technical, security and business representatives regularly meets to review and approve the proposed changes. Once a change has been approved the change is implemented and a post implementation review is completed and the CMDB updated with the outcome.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Information regarding potential threats comes from a number of different sources such as our vendors and recognised centres of security excellence. These threats are regularly assessed by the Verne Global Vulnerability Management Group and assigned a criticality. This criticality will then drive the speed at which the patches are tested and deployed to our infrastructure. In the most severe cases patches are deployed as soon as possible. Following any patching cycle the Vulnerability Management Group will review the outcome of the patching processes to ensure successful deployment.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach Activity logs from the HPCaaS platform are collated by an automated toolset that looks for suspicious activity or correlated security events. Should a potential compromise or suspicious activity be detected this is logged in the service management tool and reviewed by the security manager whereby the incident is classified and a plan of action created. The target for review by the security manager is within 2 hours, once the incident is logged.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach Follows ITILv3 based incident management principles.
Users are able to log incidents through our portal, via email or over the telephone 24x7. Incident reports are published using open standards in our portal. Common event types are automated to reduce human interaction as far as possible.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart No

Energy efficiency

Energy efficiency
Energy-efficient datacentres Yes

Pricing

Pricing
Price £0.019 per instance per hour
Discount for educational organisations Yes
Free trial available Yes
Description of free trial Time limited trials available subject to agreement on success criteria and the compute and storage resources required.
Link to free trial https://verneglobal.com/cvp

Documents

Documents
Pricing document View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑