Daisy Corporate Services Trading Limited

Daisy e-Backup Essentials

Daisy eBackup provides a simple 3-tiered service for data backup and recovery.
eBackup simplifies business availability by protecting all of your data -archive, backups and replication, all under one integrated service

Features

  • Single copy of data held off site
  • Flexible data retention policies
  • Templated self-service support & data recovery
  • Automated email alerting and reporting
  • Customer Self-Service Portal for back up management and data recovery

Benefits

  • Caters to organisations of all sizes
  • Remain as agile as your digital landscape
  • Protects and stores your data securely but accessible and recoverable
  • Minimise risk and return to clean data as required
  • Can be applied to any data/device in your business
  • Self Managed Service
  • GDPR & MiFIDII compliant data management

Pricing

£0.02 to £0.80 a gigabyte a month

  • Education pricing available

Service documents

Framework

G-Cloud 12

Service ID

6 4 6 0 7 3 3 3 8 1 5 4 0 2 7

Contact

Daisy Corporate Services Trading Limited Andy Riley
Telephone: 07540 203 303
Email: publictenders@daisygroup.com

Service scope

Software add-on or extension
No
Cloud deployment model
Hybrid cloud
Service constraints
None
System requirements
  • 1 Mb (or higher) internet connection
  • Microsoft Windows, Red Hat Linux or Android

User support

Email or online ticketing support
Email or online ticketing
Support response times
Varies with severity
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Our SLA for non-emergency support requests is as follows:

Working hours (09:00 – 17:30)
Activity Response time Resolution time
Acknowledge receipt of request 2 Hours N/A
Response from assigned resource 4 Hours N/A
Escalation to specialist 8 Hours N/A
===============================================================

This doesn’t include Invocations which are 24/7 where applicable.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Daisy is able to provide end user training and all applicable user guides and documentation for the operation of the service. Additional training is available. Should this be required, prices are available on request.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
Data extraction forms part of the service. Therefore extraction is via the GUI. Data can be extracted by Daisy as an additional service but this is chargeable.
End-of-contract process
Customers will be able to extract any customer data from the servers and are not limited to the type of data that can be extracted. The type of data that can be extracted includes any customer generated content, metadata, structure and configuration data. There are several available tools that allow customer data to be extracted from the back up software. Daisy does not charge for data extraction where the extraction is carried out by the customer. Daisy is happy to provide assistance when a customer needs assistance with data extraction/migration to another supplier. This will be charged at our standard daily consultancy rate. Daisy will purge and destroy all customer data from any computers, storage devices and storage media at the end of the contractual period in line with ISO 27001 standards

Using the service

Web browser interface
No
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • Windows
Designed for use on mobile devices
No
Service interface
Yes
Description of service interface
Reports can be generated from the GUI, relating to success/failure and service usage
Accessibility standards
None or don’t know
Description of accessibility
Via the GUI
Accessibility testing
None
API
Yes
What users can and can't do using the API
Users can write their own GUI or web interfaces and retrieve data directly from the service or issue commands to the service.
API documentation
Yes
API documentation formats
PDF
API sandbox or test environment
No
Customisation available
No

Scaling

Independence of resources
Our customers are logically separated on the platforms, at compute, network and storage levels with minimum and maximum resource guarantees throughout, which ensures each customer cannot exceed their allotted allocation without prior change notifications in to our Operations & Engineering teams.

Analytics

Service usage metrics
Yes
Metrics types
Via daily email and application GUI
Reporting types
  • API access
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
  • Other
Other data at rest protection approach
FIPS140-2 encryption
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Via the back up software GUI
Data export formats
Other
Other data export formats
  • Same format they were uploaded
  • Encrypted back up file
Data import formats
Other
Other data import formats
Format of the existing file

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection between networks
FIPS140-2 encryption
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network
FIPS140-2 encryption

Availability and resilience

Guaranteed availability
Tbc
Approach to resilience
Daisy operates its own 100Gb low-latency Core network and resilient MPLS network, with all data centres on-net Daisy’s Internet feeds into the data centres are delivered over our resilient core 10Gb MPLS network into peering points at Harbour Exchange and Telehouse Points Of Presence (POPs). Where applicable all customer data stored by Daisy is resilient across 3 DC sites.
Outage reporting
Email alerts are provided

Identity and authentication

User authentication needed
Yes
User authentication
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Where access to customer infrastructure is required, Daisy uses a secure backup and admin connection to components for monitoring, support and backups. All traffic across this connection is secure and segregated.
Access restriction testing frequency
At least once a year
Management access authentication
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Description of management access authentication
Customer management is usually managed on premise in accordance with the customer's own security policy.

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
13/09/2013 original certification
What the ISO/IEC 27001 doesn’t cover
Scope is all Daisy sites and services requiring security certification.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Through the establishment of a comprehensive security framework, Daisy shall demonstrate a commitment to protect all assets that support the delivery of business objectives and address all legal, regulatory and contractual obligations. The following ISO27001 Group clause & objectives are referenced within this document: Clause 5, & Control objectives: A6, A9, A11, A13.2, and A14 Data Protection Policy Site Security Policy CCTV Policy

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Daisy’s ITIL v3 aligned service management tool meets ISO 27001 guidelines, governing core ITIL processes including, but not limited to, incident, problem, change, release, configuration, service level management and service catalogue functions
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Vulnerability scanning is included in the Daisy security framework, to help monitor the effectiveness of existing security controls and identify any weaknesses. The IT security Manager in consultation with Head of Compliance shall coordinate vulnerability scanning activities including: • identifying the scope of testing • monitor manufacturer and vendor sites for information updates regarding vulnerabilities Should the vulnerabilities be assessed as not posing an immediate threat to operations, security patches or code fixes shall be subject to change control requirements ( testing etc.) prior to deployment. Daisy support record activities in a service management ticket for tracking and audit purposes.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Monitoring of our platforms is done from our segregated and ISO27001 compliant management platforms, we protect the platform itself and its perimeter edge with Daisy owned and operated solutions, not in any way tied to logical customer implementations within these platforms. Each customer as part of a Managed Service has our standard security and monitoring products deployed with pre-agreed alert classifications and thresholds set as part of our typical managed service. Potential compromises are identified in our centralised monitoring solution, with accompanying detailed information of the platform and customer which auto generates an incident in our ticketing systems.
Incident management type
Supplier-defined controls
Incident management approach
Predefined processes are in place for common events Users can report incidents via the web portal or email in the event of an incident Daisy will Issue customer updates as per the agreed frequency on the progress of a resolution or workaround. This may include initiating and leading conference calls, bridges or meetings. Create MI reports where required, validating content is customer appropriate. Issue to service delivery management. Publish the MI report to the customer as defined by the customer SLA.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Pricing

Price
£0.02 to £0.80 a gigabyte a month
Discount for educational organisations
Yes
Free trial available
No

Service documents