CFMS Services Ltd

IT and HPC Infrastructure copy

Utilising modern software deployment tools we can scale out the usage of software


  • Remote Access
  • High Performance Computing
  • Automation of Deployment
  • Elastic Scaling
  • Multitenancy
  • Digital Capability
  • Simulation
  • Modelling
  • Systems Engineering


  • Utilisation of High Performance Computing
  • Efficiency of Scale
  • Increasing Productivity
  • Model Based Systems Engineering
  • Validation and Verification


£0.06 to £0.09 per unit per hour

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 10


CFMS Services Ltd

Steven Puetz


Service scope

Service scope
Service constraints Maintenance is planned 6 weeks in advance
System requirements Simulation software licenses provided by vendor

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Response normally within 60 mins within office hours
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels We provide an account manager contact and a technical contact. The SLA depends on the value of the contract
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We can provide onsite/offsite training at an additional cost
Service documentation No
End-of-contract data extraction The users can download their data at anytime. 500GB of data storage is provided, this can be extended at an additional cost
End-of-contract process The user account can either be closed or left open for further use.

Using the service

Using the service
Web browser interface Yes
Using the web interface Users can access the software user interface or users can batch simulations or automation through command line access
Web interface accessibility standard None or don’t know
How the web interface is accessible VPN software must be installed through administrator rights on each users machine.
Web interface accessibility testing CFMS have conducted their own testing for preferred software
What users can and can't do using the API These are provided by the simulation software providers or discussed further over the phone
API automation tools
  • Ansible
  • OpenStack
API documentation No
Command line interface Yes
Command line interface compatibility
  • Linux or Unix
  • Windows
  • MacOS
Using the command line interface This does not provide the user interface access


Scaling available Yes
Scaling type Automatic
Independence of resources Depends on the SLA agreed
Usage notifications Yes
Usage reporting Email


Infrastructure or application metrics Yes
Metrics types
  • CPU
  • Disk
  • Memory
  • Network
  • Number of active instances
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest Encryption of all physical media
Data sanitisation process No
Equipment disposal approach In-house destruction process

Backup and recovery

Backup and recovery
Backup and recovery Yes
What’s backed up
  • Virtual machines
  • Files
  • Databases
Backup controls Back-ups happen every 24 hours
Datacentre setup Single datacentre
Scheduling backups Users contact the support team to schedule backups
Backup recovery Users contact the support team

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability A queuing system is accessible and an estimated availability provided.

SLA depends on contract agreed
Approach to resilience This is available on request
Outage reporting Any planned/unplanned outage is notified by email.

Identity and authentication

Identity and authentication
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels This can be provided on request
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device over multiple services or networks
  • Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Audit information for users
Access to user activity audit information No audit information available
Access to supplier activity audit information No audit information available
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security No
Security governance certified No
Security governance approach This is available on request
Information security policies and processes This is available on request

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach The process is documented and distributed onto a online database. This can be discussed on request
Vulnerability management type Supplier-defined controls
Vulnerability management approach CFMS actively applies patches as and when required
Protective monitoring type Supplier-defined controls
Protective monitoring approach These can be discussed on request
Incident management type Supplier-defined controls
Incident management approach These are documented and are available on request

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart Yes
Who implements virtualisation Supplier
Virtualisation technologies used VMware
How shared infrastructure is kept separate Multitenancy is used to segregate users and encryption of users data

Energy efficiency

Energy efficiency
Energy-efficient datacentres Yes


Price £0.06 to £0.09 per unit per hour
Discount for educational organisations Yes
Free trial available Yes
Description of free trial Limited core-hours can be provided to test access


Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑