A cloud based container hosting model suitable for any Drupal project. Features enable flexible development and CI.
This Platform as a Service (PaaS) offering provides an accelerated and highly automated environment within which Drupal-centric projects are developed, tested and delivered into production.
- 99.9% uptime SLA on PaaS
- 24/7 Support and Monitoring via UK Service Desk
- Multiple environments for each domain (stage, qa, user story etc.)
- Git version control repository provided
- Fully managed backup with minimum 1 month retention
- Enhanced integrated agile development workflow
- Control for developers to spin up environments on demand
£1000 to £2000 per instance per month
Ixis IT Limited
No high availability (HA) option available.
No load balanced option.
Linux only environment for hosting web applications.
|Email or online ticketing support||Email or online ticketing|
|Support response times||
General support is provided Monday - Friday except bank holidays
Out of hours is break-fix incident response only.
P1 incident 30 minute response with a 2 hour resolution.
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Support levels||Infrastructure support is included with per project pricing.|
|Support available to third parties||Yes|
Onboarding and offboarding
User accounts generated.
Access level defined.
Tutorial videos for using the web UI available on YouTube.
|End-of-contract data extraction||
Data (database, file assets) are available for extraction at any point using the standard Drupal Drush tool.
All source code is stored in Git and available at all times.
|End-of-contract process||There are no additional costs for off-boarding other than settling the final invoice for the service used.|
Using the service
|Web browser interface||No|
|What users can and can't do using the API||
A RESTful API is available over HTTP.
Examples of API integrations are available on GitHub.
|API automation tools||
|API documentation formats||HTML|
|Command line interface||Yes|
|Command line interface compatibility||
|Using the command line interface||
Cannot add new projects.
Can execute backups.
|Independence of resources||
Expected increases in demand are discussed at monthly service reviews, or notified to supplier by raising a ticket so that adequate configuration changes can be made in advance.
A CDN is recommended to protection against unplanned spikes in anonymous visitor traffic.
|Infrastructure or application metrics||Yes|
|Metrics types||HTTP request and response status|
|Reporting types||Reports on request|
|Supplier type||Reseller providing extra features and support|
|Organisation whose services are being resold||Platform|
|Staff security clearance||Staff screening not performed|
|Government security clearance||Up to Security Clearance (SC)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||European Economic Area (EEA)|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Supplier-defined controls|
|Penetration testing frequency||Never|
|Protecting data at rest||Encryption of all physical media|
|Data sanitisation process||Yes|
|Data sanitisation type||Deleted data can’t be directly accessed|
|Equipment disposal approach||A third-party destruction service|
Backup and recovery
|Backup and recovery||Yes|
|What’s backed up||
The service is fully managed and automated on a daily schedule.
Ad-hoc data backups can be performed using the Drush tool.
|Datacentre setup||Multiple datacentres with disaster recovery|
|Scheduling backups||Supplier controls the whole backup schedule|
|Backup recovery||Users contact the support team|
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
99.5% uptime SLA on Standard Dedicated Server
24/7 Support and Monitoring via our UK Service Desk
Dedicated isolated environments not shared with any other clients
Production and Staging environments for each domain being hosted
Linux operating system management including security patching
Fully hosted and managed GIT version control
Fully hosted and managed GIT version control
Fully managed backup with minimum 2 week retention
Support beyond the LAMP stack: reverse proxy Varnish, MySQL replication
Amazon Web Services (AWS) Consulting Partner
On a case by case basis we can offer service credits which are discussed as part of the contract process
|Approach to resilience||Available on request as this depends on the buyers set up and requirements.|
|Outage reporting||Email alerts are triggered from outages detected within 3 minutes from multiple locations around the globe.|
Identity and authentication
|Access restrictions in management interfaces and support channels||
All users require a username and password pair, along with being assigned to a specified role.
2 factor auth can be added to the individuals account to further strengthen access.
|Access restriction testing frequency||At least once a year|
|Management access authentication||
|Devices users manage the service through||Directly from any device which may also be used for normal business (for example web browsing or viewing external email)|
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||You control when users can access audit information|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security accreditations||No|
|Named board-level person responsible for service security||Yes|
|Security governance accreditation||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||.|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||We practice an ITIL V3 process for all changes requests.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
Automated updates to server software ensures that high-priority fixes are deployed as soon as they are available.
Security is always considered first when designing consumer architecture or providing services.
Software is chosen based on its security features, history of security exploits, and ease of maintenance and monitoring.
Configuration management processes are used throughout the development and support of all services.
|Protective monitoring type||Undisclosed|
|Protective monitoring approach||We have established practices for managing and recovering from incidents, and restoring a secure service.|
|Incident management type||Undisclosed|
|Incident management approach||
We have established practices for managing and recovering from incidents, and restoring a secure service.
Users report by phone / email or raising a ticket.
Incident reports are provided by ticket - with root cause analysis where needed.
|Approach to secure software development best practice||Supplier-defined process|
Separation between users
|Virtualisation technology used to keep applications and users sharing the same infrastructure apart||Yes|
|Who implements virtualisation||Third-party|
|Third-party virtualisation provider||Amazon Web Services|
|How shared infrastructure is kept separate||LX Containers hosted on AWS VM hosts.|
|Price||£1000 to £2000 per instance per month|
|Discount for educational organisations||No|
|Free trial available||No|
|Pricing document||View uploaded document|
|Terms and conditions document||View uploaded document|