This G-Cloud 10 service is no longer available to buy.

The G-Cloud 10 framework expired on Tuesday 2 July 2019. Any existing contracts with Intergence Systems Limited are still valid.
Intergence Systems Limited

Stratiam Cloud Hosting

Our service Stratiam provides a fully managed infrastructure and security monitoring suite. Our SD-WAN connects your new and existing infrastructure as an MPLS alternative with Cloud Cross-Connect Services, Application acceleration, full end-to-end service visibility through single pane of glass dashboards.

Features

  • Infrastructure & Security Monitoring & Performance Service.
  • Single Pane of Glass: Multi-Source Data Blending & Visualisation
  • SD-WAN: Cloud Cross-Connect, Application Acceleration, Insight Visibility.
  • Scaleable: Fully flexible, No physical hardware constraints.
  • 24x7x365 SLA/KPI Management with Correlated Service Event/Alarm Management.
  • Cloud CCaaS: Contact-Centre-as-a-Service.
  • ITSM Full Feature Capability.
  • Application Performance Management
  • End-Point Security Management
  • Business Intelligence: Stratiam Analytics

Benefits

  • Full Blended Service End-to-End Infrastructure Performance Analytics.
  • Application Experience Analytics.
  • SD-WAN: Driving Agile Delivery, Cost Efficiency, Greater Delivery Insight.
  • Advanced AI Driven Security Analytics.
  • Full Integrated ITSM Service.
  • Fully Managed Infrastructure & Security Management Service.
  • SDWAN: Cloud Hosting Cross-Connect Services.
  • ITIL v3 Compliant.
  • Full Omnichannel Cloud Call Centre as a Service - CCaaS.
  • Fully Managed end-to-end service.

Pricing

£1,250 to £11,500 a unit a month

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at mwarren@intergence.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 10

Service ID

6 1 9 3 8 2 7 6 6 5 0 0 6 9 4

Contact

Intergence Systems Limited Mike Warren
Telephone: 0845 2264167
Email: mwarren@intergence.com

Service scope

Service constraints
Customers will require their own internet access. A terminating device for (SD-WAN) connectivity is also required.
System requirements
Any IP device type.

User support

Email or online ticketing support
Email or online ticketing
Support response times
30 min Response Times.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.0 AA or EN 301 549
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.0 AA or EN 301 549 9: Web
Web chat accessibility testing
MS Bot framework testing.
Onsite support
Yes, at extra cost
Support levels
We provide tier 1 to tier 3 support levels which encompass the service as a whole and is included within the monthly service fee. There are a number of Technical Consultants, infrastructure, application and cloud support engineers that can be provided on request. Account Management is provided as standard for each client. This is a fully managed service and all changes to the platform are made via a support ticket request.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Onsite training, or user documentation.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
All customer specific data can be copied to a repository of the customer’s choice at which point the source data will then be deleted upon confirmation of successful copy / transmission.
End-of-contract process
The customer has the opportunity to renew the service or cease the contract. A notification period of 3 months is required for both renewal and cessation of services.

Using the service

Web browser interface
Yes
Using the web interface
Services can be accessed directly from a web browser once you have obtained your access credentials. Certain changes can be made via the web interface. Limitation to specific areas of the service is determined by role/authorisation.
Web interface accessibility standard
WCAG 2.0 AAA
Web interface accessibility testing
All testing has been in house to date.
API
Yes
What users can and can't do using the API
Simply request the API integration documentation or request us to build it for you.
API automation tools
  • Ansible
  • Chef
  • OpenStack
  • Puppet
API documentation
Yes
API documentation formats
PDF
Command line interface
No

Scaling

Scaling available
Yes
Scaling type
Automatic
Independence of resources
We provide dedicated tenancies.
Usage notifications
Yes
Usage reporting
Email

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Aryaka SDWAN Services, Five9s Cloud Call Centre as a Service.

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least every 6 months
Penetration testing approach
In-house
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • System Configuration Files Daily.
  • Log Files Daily
Backup controls
Control of backups is solely performed by our service support teams.
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
IPsec or TLS VPN gateway
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
99.95% service availability. Service credits requirements requires further discussion.
Approach to resilience
Multi-region high resiliency and redundancy is designed into our service. Our service is built using overlays inside a resilient cloud architecture. Consequently, each component, each set of components, each stack and each full tenancy is designed to be resilient at multiple points.
Outage reporting
Through Dashboard visibility, SMS alerting, email, or via a customer specific API.

Identity and authentication

User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
Access restrictions in management interfaces and support channels
Access control policies are employed in conjunction with authentication services for example; RADIUS, TACACS, LDAP.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device over multiple services or networks
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
We are currently working towards ISO 27001 certification.
Information security policies and processes
We adhere to the National Cyber Security Centre (NCSC) cloud security principles and the Center for Internet Security (CIS) critical security controls.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We follow ITIL v3 ITSM Change and configuration change control standards and processes.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We scan vendor vulnerability announcements daily, verify if an announcement is relevant and apply recommended patch within the agreed SLA KPI (Typically 5 working Days depending on severity).
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We identify potential compromises through Live monitoring and alerting of our platform. Severity of the incident dictates whether the response is immediate or scheduled based upon risk assessment.
Incident management type
Supplier-defined controls
Incident management approach
We operate under the ITIL V3 framework. Incidents can be reported/viewed and updated immediately via our customer portal.

Secure development

Approach to secure software development best practice
Supplier-defined process

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Supplier
Virtualisation technologies used
VMware
How shared infrastructure is kept separate
Our service is built on a variety of Cloud platforms. It is separated by customer and each customer has their own dedicated hosting environment, Customers will never share the same service components.

Energy efficiency

Energy-efficient datacentres
Yes

Pricing

Price
£1,250 to £11,500 a unit a month
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at mwarren@intergence.com. Tell them what format you need. It will help if you say what assistive technology you use.