IT and HPC Infrastructure copy
Utilising modern software deployment tools we can scale out the usage of software
Features
- Remote Access
- High Performance Computing
- Automation of Deployment
- Elastic Scaling
- Multitenancy
- Digital Capability
- Simulation
- Modelling
- Systems Engineering
Benefits
- Utilisation of High Performance Computing
- Efficiency of Scale
- Increasing Productivity
- Model Based Systems Engineering
- Validation and Verification
Pricing
£0.06 to £0.09 a unit an hour
- Education pricing available
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at <removed>@764d3d78-92f8-44fb-b7dd-7b76de654af9.com.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 10
Service ID
5 8 3 1 6 5 9 2 7 9 6 5 6 2 0
Contact
CFMS Services Ltd
<removed>
Telephone: <removed>
Email: <removed>@764d3d78-92f8-44fb-b7dd-7b76de654af9.com
Service scope
- Service constraints
- Maintenance is planned 6 weeks in advance
- System requirements
- Simulation software licenses provided by vendor
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Response normally within 60 mins within office hours
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- We provide an account manager contact and a technical contact. The SLA depends on the value of the contract
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We can provide onsite/offsite training at an additional cost
- Service documentation
- No
- End-of-contract data extraction
- The users can download their data at anytime. 500GB of data storage is provided, this can be extended at an additional cost
- End-of-contract process
- The user account can either be closed or left open for further use.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Users can access the software user interface or users can batch simulations or automation through command line access
- Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- VPN software must be installed through administrator rights on each users machine.
- Web interface accessibility testing
- CFMS have conducted their own testing for preferred software
- API
- Yes
- What users can and can't do using the API
- These are provided by the simulation software providers or discussed further over the phone
- API automation tools
-
- Ansible
- OpenStack
- API documentation
- No
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- MacOS
- Using the command line interface
- This does not provide the user interface access
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- Depends on the SLA agreed
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- Memory
- Network
- Number of active instances
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Virtual machines
- Files
- Databases
- Backup controls
- Back-ups happen every 24 hours
- Datacentre setup
- Single datacentre
- Scheduling backups
- Users contact the support team to schedule backups
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
-
A queuing system is accessible and an estimated availability provided.
SLA depends on contract agreed - Approach to resilience
- This is available on request
- Outage reporting
- Any planned/unplanned outage is notified by email.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google apps)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- This can be provided on request
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Dedicated device over multiple services or networks
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- No
- Security governance certified
- No
- Security governance approach
- This is available on request
- Information security policies and processes
- This is available on request
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- The process is documented and distributed onto a online database. This can be discussed on request
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- CFMS actively applies patches as and when required
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- These can be discussed on request
- Incident management type
- Supplier-defined controls
- Incident management approach
- These are documented and are available on request
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- VMware
- How shared infrastructure is kept separate
- Multitenancy is used to segregate users and encryption of users data
Energy efficiency
- Energy-efficient datacentres
- Yes
Pricing
- Price
- £0.06 to £0.09 a unit an hour
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Limited core-hours can be provided to test access
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at <removed>@764d3d78-92f8-44fb-b7dd-7b76de654af9.com.
Tell them what format you need. It will help if you say what assistive technology you use.