Proact IT UK Limited

NetApp Cloud Insights

NetApp Cloud Insights is an infrastructure monitoring tool that gives you visibility into the entire infrastructure. Cloud Insights advanced data collection and analytics capabilities, monitors, troubleshoots and optimises cost across all resources including public clouds and private data centers.


  • Visibility : discover your entire hybrid infrastructure in one place
  • ashboards: create relevant dashboards instantly, customised to your specific needs
  • Alerts: Less noise, more relevance. Targeted, conditional and customisable alerts.
  • Machine Learning: Anomaly detection proactively highlights issues before they arise
  • Cost Optimisation: Discover opportunities to right-size infrastructure and optimise spend.


  • Reduce mean time to resolution by as much as 90%
  • Reduce cloud infrastructure costs by an average of 33%
  • Prevent upto <80% of cloud issues from impacting end users
  • Cut months or years off of transformational projects


£4.71 to £9.99 per unit per month

Service documents


G-Cloud 11

Service ID

6 1 2 7 5 1 6 2 4 6 5 1 1 3 2


Proact IT UK Limited

Proact UK Sales

02038 926190

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Hybrid cloud
Service constraints Internet Access Required
System requirements Internet Access Required

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Initial technical response objective from time of customer contact, based on priority level and availability of local language support.
• Priority 1: 2 hours; on a 24/7 basis
• Priority 2: 4hours; on a 24/7 basis
• Priority 3: 16 hours; on a 24/7 basis
• Priority 4: 36 hours; on a 24/7 basis
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.1 AA or EN 301 549
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support Web chat
Web chat support availability 24 hours, 7 days a week
Web chat support accessibility standard WCAG 2.1 AA or EN 301 549
Web chat accessibility testing Available via help page within the application service , also available via
Onsite support Yes, at extra cost
Support levels We have a flat support structure detailed here:
Enrollment in our customer success programme is free of charge
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started User Documentation, videos, Assistance by Pre & Post Sales Technical
Service documentation Yes
Documentation formats HTML
End-of-contract data extraction Prior to contract end users can choose what data to export via the queries capability within the service
End-of-contract process At the end of the contract the service will no longer be accessible

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service None
Service interface Yes
Description of service interface The Web UI is accessible via a browser and allows customisation of the monitoring dashboards and allows interrogation of telemetry data.

We are in the process of completing our REST API
Accessibility standards WCAG 2.1 AA or EN 301 549
Accessibility testing All details around managing and setting up the service can be found here:

User actions can be restricted if the customer desires through RBAC
What users can and can't do using the API REST API is available with limited functionality as development is being finalised. Restrictions are being lifted on a bi-weekly basis for more information contact a NetApp Rep.
API documentation Yes
API documentation formats Open API (also known as Swagger)
API sandbox or test environment No
Customisation available Yes
Description of customisation Dashboards are fully customisable as are alerting and threshold policies, metadata tagging either manually or via customisable rules.


Independence of resources The Service itself is monitored extensively, it is built using cloud native technologies meaning it is deployed as microservices on elastic infrastructure with tenant level isolation. The service is designed to scale to 1000's of customers streaming billions of datapoints.


Service usage metrics Yes
Metrics types Storage Performance : IOPs Throughput Latency
Storage Capacity: Capacity Used, Orphaned, Provisioned, Available, through the stack
Compute: CPU Used, Available, Utilisation, Efficiency
Memory: Used , Available, Utilisation, Efficiency
Performance Correlation: Reflects relationships between compute network & Storage metrics
Full Stack Metrics: App to infrastructure with App dependency visualisation
Bully Victim: Measure of one object's load impacting another's experience
Reporting types
  • API access
  • Real-time dashboards
  • Reports on request


Supplier type Reseller providing extra features and support
Organisation whose services are being resold NetApp

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations EU-US Privacy Shield agreement locations
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Other
Other data at rest protection approach Physical and environmental security related controls for Cloud Insights production servers, which includes buildings, locks or keys used on doors, are managed by AWS. As per AWS “Physical access is controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, intrusion detection systems, and other electronic means. Authorized staff utilize multi-factor authentication mechanisms to access data center floors.
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Users can choose what data to export via the queries capability within the service
Data export formats CSV
Data import formats Other
Other data import formats Due in a future release - TBD

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network Only infrastructure and metric information (i.e metadata) is sent across the wire. No buyer data is processed by the service. Device credential information never leaves the buyer network

Availability and resilience

Availability and resilience
Guaranteed availability Our availability is detailed at the following location:
Approach to resilience Built on a microservices architecure leveraging elastic infrastructure which physically separate locations with load balancer providing HA. More information is available on request
Outage reporting A public dashboard:

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels Authentication is federated with an external provider (Auth0 by default) using username / password. Auth0 authenticates username and password and passes JWT token into users browser cookie space. Federation to existing IAM is supported via ADFS in Microsoft AD , for more information see:
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for Between 6 months and 12 months
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for Between 6 months and 12 months
How long system logs are stored for Between 6 months and 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Details can be found here:

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach Cloud Insights folllows S-SDLC processes and every release/updates go through Secure Code Reviews & Code Scans (Static & Dynamic) and VA exercises. Every release goes through a Security Impact assessment before rolled into production
Vulnerability management type Supplier-defined controls
Vulnerability management approach Vulnerability Assessment is a continuous exercise at performed at the Software Engineering and Service Delivery levels. The VA is performed for every release in Engineering and VA is carried out at periodic intervals at the service delivery level. WRT Patch management, Cloud Insights Leverages the software binaries from AWS with the lastest patches and address them immediately. At the Software Engineering, we carry out a risk assessment exercise and prioritize and address the vulnerabilities accordingly
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach 24/7 Monitoring of the service carried in shift by our SREs. Any activity and events are logged and goes through an incident management process and have defined SLA for incidents
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach NetApp has a pre-defined common events that are monitored and reported automatically through tools integration, which are then reviewed by the SRE and closed after taking the necessary action. A user can also report incidents based on the monitoring activity. NetApp currently does not provide incident report externally and purely consumed internally for service level and process improvements

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £4.71 to £9.99 per unit per month
Discount for educational organisations Yes
Free trial available Yes
Description of free trial NetApp currently offers a free trial - available at the following link: the trial is currently limited to 14 days with full functionality. A free version will be available in the future for existing NetApp customers.
Link to free trial

Service documents

Return to top ↑