Daisy Corporate Services Trading Limited
Daisy e-Backup Essentials
Daisy eBackup provides a simple 3-tiered service for data backup and recovery.
eBackup simplifies business availability by protecting all of your data -archive, backups and replication, all under one integrated service
Features
- Single copy of data held off site
- Flexible data retention policies
- Templated self-service support & data recovery
- Automated email alerting and reporting
- Customer Self-Service Portal for back up management and data recovery
Benefits
- Caters to organisations of all sizes
- Remain as agile as your digital landscape
- Protects and stores your data securely but accessible and recoverable
- Minimise risk and return to clean data as required
- Can be applied to any data/device in your business
- Self Managed Service
- GDPR & MiFIDII compliant data management
Pricing
£0.02 to £0.80 a gigabyte a month
- Education pricing available
Service documents
Framework
G-Cloud 12
Service ID
6 4 6 0 7 3 3 3 8 1 5 4 0 2 7
Contact
Daisy Corporate Services Trading Limited
Andy Riley
Telephone: 07540 203 303
Email: publictenders@daisygroup.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Hybrid cloud
- Service constraints
- None
- System requirements
-
- 1 Mb (or higher) internet connection
- Microsoft Windows, Red Hat Linux or Android
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Varies with severity
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Our SLA for non-emergency support requests is as follows:
Working hours (09:00 – 17:30)
Activity Response time Resolution time
Acknowledge receipt of request 2 Hours N/A
Response from assigned resource 4 Hours N/A
Escalation to specialist 8 Hours N/A
===============================================================
This doesn’t include Invocations which are 24/7 where applicable. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Daisy is able to provide end user training and all applicable user guides and documentation for the operation of the service. Additional training is available. Should this be required, prices are available on request.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Data extraction forms part of the service. Therefore extraction is via the GUI. Data can be extracted by Daisy as an additional service but this is chargeable.
- End-of-contract process
- Customers will be able to extract any customer data from the servers and are not limited to the type of data that can be extracted. The type of data that can be extracted includes any customer generated content, metadata, structure and configuration data. There are several available tools that allow customer data to be extracted from the back up software. Daisy does not charge for data extraction where the extraction is carried out by the customer. Daisy is happy to provide assistance when a customer needs assistance with data extraction/migration to another supplier. This will be charged at our standard daily consultancy rate. Daisy will purge and destroy all customer data from any computers, storage devices and storage media at the end of the contractual period in line with ISO 27001 standards
Using the service
- Web browser interface
- No
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- Windows
- Designed for use on mobile devices
- No
- Service interface
- Yes
- Description of service interface
- Reports can be generated from the GUI, relating to success/failure and service usage
- Accessibility standards
- None or don’t know
- Description of accessibility
- Via the GUI
- Accessibility testing
- None
- API
- Yes
- What users can and can't do using the API
- Users can write their own GUI or web interfaces and retrieve data directly from the service or issue commands to the service.
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- No
- Customisation available
- No
Scaling
- Independence of resources
- Our customers are logically separated on the platforms, at compute, network and storage levels with minimum and maximum resource guarantees throughout, which ensures each customer cannot exceed their allotted allocation without prior change notifications in to our Operations & Engineering teams.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Via daily email and application GUI
- Reporting types
-
- API access
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Other
- Other data at rest protection approach
- FIPS140-2 encryption
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Via the back up software GUI
- Data export formats
- Other
- Other data export formats
-
- Same format they were uploaded
- Encrypted back up file
- Data import formats
- Other
- Other data import formats
- Format of the existing file
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
- Other
- Other protection between networks
- FIPS140-2 encryption
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
- FIPS140-2 encryption
Availability and resilience
- Guaranteed availability
- Tbc
- Approach to resilience
- Daisy operates its own 100Gb low-latency Core network and resilient MPLS network, with all data centres on-net Daisy’s Internet feeds into the data centres are delivered over our resilient core 10Gb MPLS network into peering points at Harbour Exchange and Telehouse Points Of Presence (POPs). Where applicable all customer data stored by Daisy is resilient across 3 DC sites.
- Outage reporting
- Email alerts are provided
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Where access to customer infrastructure is required, Daisy uses a secure backup and admin connection to components for monitoring, support and backups. All traffic across this connection is secure and segregated.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- Dedicated link (for example VPN)
- Username or password
- Other
- Description of management access authentication
- Customer management is usually managed on premise in accordance with the customer's own security policy.
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 13/09/2013 original certification
- What the ISO/IEC 27001 doesn’t cover
- Scope is all Daisy sites and services requiring security certification.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Through the establishment of a comprehensive security framework, Daisy shall demonstrate a commitment to protect all assets that support the delivery of business objectives and address all legal, regulatory and contractual obligations. The following ISO27001 Group clause & objectives are referenced within this document: Clause 5, & Control objectives: A6, A9, A11, A13.2, and A14 Data Protection Policy Site Security Policy CCTV Policy
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Daisy’s ITIL v3 aligned service management tool meets ISO 27001 guidelines, governing core ITIL processes including, but not limited to, incident, problem, change, release, configuration, service level management and service catalogue functions
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Vulnerability scanning is included in the Daisy security framework, to help monitor the effectiveness of existing security controls and identify any weaknesses. The IT security Manager in consultation with Head of Compliance shall coordinate vulnerability scanning activities including: • identifying the scope of testing • monitor manufacturer and vendor sites for information updates regarding vulnerabilities Should the vulnerabilities be assessed as not posing an immediate threat to operations, security patches or code fixes shall be subject to change control requirements ( testing etc.) prior to deployment. Daisy support record activities in a service management ticket for tracking and audit purposes.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Monitoring of our platforms is done from our segregated and ISO27001 compliant management platforms, we protect the platform itself and its perimeter edge with Daisy owned and operated solutions, not in any way tied to logical customer implementations within these platforms. Each customer as part of a Managed Service has our standard security and monitoring products deployed with pre-agreed alert classifications and thresholds set as part of our typical managed service. Potential compromises are identified in our centralised monitoring solution, with accompanying detailed information of the platform and customer which auto generates an incident in our ticketing systems.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Predefined processes are in place for common events Users can report incidents via the web portal or email in the event of an incident Daisy will Issue customer updates as per the agreed frequency on the progress of a resolution or workaround. This may include initiating and leading conference calls, bridges or meetings. Create MI reports where required, validating content is customer appropriate. Issue to service delivery management. Publish the MI report to the customer as defined by the customer SLA.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £0.02 to £0.80 a gigabyte a month
- Discount for educational organisations
- Yes
- Free trial available
- No