Remarkable Dynamics

Compute and Application Hosting - Google Cloud Platform (GCP)

We provide the full range of services and expertise necessary to design, build, deploy, test and support your cloud applications. We provide scalable compute clouds, delivering the resilience and value-for-money you require. We deploy using the three leading application hosting platforms, Microsoft Azure, Google Cloud Platform and Amazon AWS.

Features

  • Experts in Microsoft Azure, Amazon AWS and Google Cloud
  • We provide dynamic performance and cost analysis for real-time management
  • Easy project start-up with flexible pricing models, terms and conditions
  • We can provide Security Cleared Staff if you need them
  • Help to migrate legacy services to the cloud
  • Choose the cloud service most appropriate to your needs
  • Azure Active Directory and Office365, Compute and Storage
  • Monitoring, patching, configuration and optimisation of Cloud Solutions
  • Networking, data centre configuration and management using PaaS
  • Specialised Business Intelligence, Automation and Machine Learning services

Benefits

  • Value for money with flexible pricing, terms and conditions
  • Managed services available to every user, whatever their platform
  • Host in the cloud, consume services from anywhere, anytime
  • Start Small and Grow, pay only for what you use
  • Augment your capabilities with our expert engineers
  • Resilience, backup and DR managed invisibly without management by you
  • Interoperability with a wide range of suppliers and services
  • Low pricing maintained through a dynamic and competitive market
  • No lock-in to a single supplier, easy to re-procure

Pricing

£1 per user

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 10

621815567911628

Remarkable Dynamics

Owen Davies

01483 608 200

owen@remarkabledynamics.com

Service scope

Service scope
Service constraints Applicable constraints will be specified by the chosen cloud service provider.

These will be communicated with the client where service impacting
System requirements None

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Within 30 minutes 24/7/365
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.0 AAA
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support Web chat
Web chat support availability 24 hours, 7 days a week
Web chat support accessibility standard WCAG 2.0 AAA
Web chat accessibility testing None as yet
Onsite support Onsite support
Support levels We provide 3 levels of support depending on client need and each SLA is individually tailored to suit specific needs.

Costs are dependent on customer requirements but range from £250 per month to £10,000 per month for a dedicated support team.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started On site training, videos, WebEx and customised documentation
Service documentation Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction If specified users can download their personal data through the app. Administrators can download all data if they have the correct privileges.
End-of-contract process End of contract obligations vary dependent on customer requirements and the provisions of the individual call of contract. The standard terms specify that additional costs may be charged for handover to a new supplier.

Using the service

Using the service
Web browser interface Yes
Using the web interface Access to management systems is standard and the scope of changes that can be made are defined in the application specification.
Web interface accessibility standard WCAG 2.0 AA or EN 301 549
Web interface accessibility testing None
API Yes
What users can and can't do using the API The API is defined as part of the system specification.
API automation tools
  • Ansible
  • Chef
  • OpenStack
  • Puppet
  • Other
Other API automation tools Capistrano
API documentation Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • PDF
Command line interface Yes
Command line interface compatibility
  • Linux or Unix
  • Windows
  • MacOS
Using the command line interface Dependant on system specification

Scaling

Scaling
Scaling available Yes
Scaling type
  • Automatic
  • Manual
Independence of resources Microsoft , Google and Amazon have all made significant investment into their public cloud services to ensure optimised performance. They all additionally provide extensive support services, which help to ensure that performance issues with your tenancy are minimised. All, as standard, monitor usage, demand and activity, and automatically maintain optimal infrastructure to meet each client’s specific needs – as such, as users place demand on services, they ensure that other users are not affected. Details about performance tuning are available online, helping to ensure that your tenancy is configured to meet your organisation's specific needs.
Usage notifications Yes
Usage reporting
  • API
  • Email
  • SMS

Analytics

Analytics
Infrastructure or application metrics Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Resellers
Supplier type Reseller providing extra support
Organisation whose services are being resold Microsoft, Amazon, Google and Red Hat

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
  • Other
Other data at rest protection approach Further details regarding data at rest protection approaches are provided on the applicable service platform website and are updated regularly in line with Information Assurance best practice.
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
  • Hardware containing data is completely destroyed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Backup and recovery Yes
Backup controls Via support
Datacentre setup
  • Multiple datacentres with disaster recovery
  • Multiple datacentres
  • Single datacentre with multiple copies
  • Single datacentre
Scheduling backups Users contact the support team to schedule backups
Backup recovery Users contact the support team

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection between networks For data in transit, all platforms use industry-standard secure transport protocols, such as TLS/SSL, between user devices and the providers' datacenters. You can enable encryption for traffic between your own virtual machines (VMs) and your users. All platforms use the industry-standard IPsec protocol to encrypt traffic between your corporate VPN gateway and the providers' platforms as well as between the VMs located on your Virtual Network
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection within supplier network ACL based Network Security Groups are also used. Further details are available directly from the applicable service website.

Availability and resilience

Availability and resilience
Guaranteed availability All platforms have a minimum contractually guaranteed availability of 99.9% based on 24 x 7 availability (higher availability is available depending on configuration). Unless specified in contract the applicable platform provider's SLA will apply, and Remarkable Dynamics will act as the customer’s agent to liaise with the applicable provider to resolve issues. All platform providers pay service credits directly if their platforms do not meet pre-defined service levels. Credits are calculated per minute based on the whole month. Any service credits received from the platform provider are passed on without deduction to the affected customer.
Approach to resilience All providers have designed their platforms to maximise reliability and minimise negative impact on their customers. They have built significant redundancy into their services, which allows them to deliver high availability to their customers. All providers work to ensure customer data is intact and unaffected by any form of platform resilience failure. All providers have engineered resilience from the infrastructure upwards, for example, they make use of peer replication between data centres to ensure that there are always multiple copies of all data.
Outage reporting All providers use a number of channels for reporting outages within their platform. Platform status centres provide a high-level overview of any known service outage affecting the affected platform, making it simple for clients to establish a global overview of the current status of services. Each tenancy additionally provides granular information around known outages within the standard administration portal; this details the user impact of incidents and advisories affecting the specific tenancy. The result is a comprehensive overview of any service outages.

Identity and authentication

Identity and authentication
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google apps)
  • Username or password
  • Other
Other user authentication All platforms maintain a multi-tenant cloud based directory and identity management service. This provides an affordable, easy to use solution to give employees and business partners single sign-on (SSO) access to thousands of cloud SaaS Applications like Office365, Salesforce.com, DropBox, and Concur. For application developers, these services let you focus on building your application by making it fast and simple to integrate with a world class identity management solution used by millions of organizations. They also include a full suite of identity management capabilities including multi-factor authentication, device registration, self-service password management, self-service group management, privileged account management.
Access restrictions in management interfaces and support channels All platform directory services can designate separate administrators to serve different functions. These administrators will have access to features in the management portal and, depending on their role, will be able to create or edit users, assign administrative roles to others, reset user passwords, manage user-licenses, and manage domains, among other things. A user who is assigned an admin role will have the same permissions across all of the cloud services that your organization has subscribed to.
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Devices users manage the service through Dedicated device on a segregated network (providers own provision)

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for Between 6 months and 12 months
Access to supplier activity audit information Users receive audit information on a regular basis
How long supplier audit data is stored for Between 6 months and 12 months
How long system logs are stored for Between 6 months and 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Remarkable Dynamics' policies, are written to reflect Financial Services best practice and are maintained in line with ISO27001 standards preparatory to application for security accreditation. We further ensure that there is representation at board level and have an appointed information security officer for Cloud Compute and Application Hosting Services who reports to the representative on the board.
Information security policies and processes Remarkable Dynamics have put in place their own internal security policies and procedures as required by their Financial Sector clients and are working towards security accreditation. Microsoft and Amazon, the providers of the Azure and AWS platforms, are also ISO27001 and CSA CCM v3.0 accredited. Remarkable Dynamics' policies ensure that there is representation at board level and have an appointed information security officer for Cloud Compute and Application Hosting Services who reports to the representative on the board.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach All providers have developed formal standard operating procedures (SOPs) governing the change management process. These SOPs cover both software development and hardware change and release management, and are consistent with established regulatory guidelines including ISO 27001, SOC 1 / SOC 2, NIST 800-53, and others.

Details of how components of the services are tracked through their lifetime and how changes are assessed for potential security impact are provided on the relevant website for the platform service.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach When providing the Antimalware solution for Virtual Machines, all platform service providers are responsible for ensuring the service is highly available, definitions are updated regularly, that configuration through the relevant management portal is effective and that the software detects and protects against known types of malicious software. MCIO-managed hosts in the scope boundary are scanned to validate anti-virus clients are installed and current signature-definition files exist.

Vulnerability scans are performed on a quarterly basis at a minimum. All providers contract with independent assessors to perform penetration testing of the platform service boundary.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach All platforms employ sophisticated software-defined service instrumentation and monitoring that integrates at the component or server level, the datacentre edge, the network backbone, Internet exchange sites, and at the real or simulated user level, providing visibility when a service disruption is occurring and pinpointing its cause.

Proactive monitoring continuously measures the performance of key subsystems of the services platform against the established boundaries for acceptable service performance and availability. When a threshold is reached or an irregular event occurs, the monitoring system generates warnings so that operations staff can address the threshold or event.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach All providers have developed robust processes to facilitate a coordinated response to incidents.
• Identification – System and security alerts may be harvested, correlated, and analyzed.
• Containment – The escalation team evaluates the scope and impact of an incident.
• Eradication – The escalation team eradicates any damage caused by the security breach, identifies root cause for why the security issue occurred.
• Recovery – During recovery, software or configuration updates are applied to the system and services are returned to a full working capacity.
• Lessons Learned – Each security incident is analyzed to protect against future reccurrence.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart Yes
Who implements virtualisation Supplier
Virtualisation technologies used Hyper-V
How shared infrastructure is kept separate Details as to the exact measures used by the platform provider to ensure that different organisations using the same infrastructure are kept apart are specified on the relevant platform provider's website and updated as appropriate.

Energy efficiency

Energy efficiency
Energy-efficient datacentres Yes

Pricing

Pricing
Price £1 per user
Discount for educational organisations Yes
Free trial available Yes
Description of free trial The terms of the Free Trial for each platform are explained on the relevant platform page

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Terms and conditions document View uploaded document
Return to top ↑