HPC OpenStack Private Cloud Hosting

High-Performance Compute (HPC) Cloud hosting: deploy and run compute-intensive software on CPU, GPU and FPGA. Storage services and private network connectivity also available. Using optimised-OpenStack environment with configurable cluster management. Ideally suited for research computation and spinning up Virtual Machines (VM's) quickly.


  • OpenStack powered IaaS platform with full API access and support
  • Deploy VM's or dedicated bare metal servers
  • Centralised application repository: install any applications network-wide
  • CPU, GPU and FPGA compute processing.
  • Integrate leading storage technologies.
  • Automated provisioning, loading and removal of cloud servers.
  • UK-based Managed Service team for rapid response.
  • Global data centre reach or cross-site integration.
  • Optional: on-premise cloud appliance integration
  • Optional: low-latency, secure, fibre private network


  • Easy administration: management portal for all admin tasks.
  • Save time: quick provisioning and automation tools.
  • Performance-optimised: achieving 98% RAW performance on Virtual Machines (VM)
  • Multi-disciplinary research: use VM's for team workflows.
  • Lab-quality environment: create and save containerised environments.
  • Tailoring: solution designed around your unique requirements.
  • Resilient design: solution designed for High Availability (HA).
  • Secure access: from any authorised user device.
  • Strong support: from hardware to tool containerisaiton and migration.
  • Cost effective: short-term, leasing, OpEx and CapEx.


£0.03 a unit

Service documents


G-Cloud 12

Service ID

6 5 1 1 4 5 0 0 2 2 8 7 9 0 0


BIOS IT Joseph Ball
Telephone: 0203 178 6467

Service scope

Service constraints
HPC Cloud Hosting includes an optimised OpenStack cloud platform, CentOS 7, Slurm cluster management, and Ceph storage as standard. All hosted on private, dedicated hardware. All applications, tools, backup storage, and user permissions system are outside of standard scope of work, but can be included for additional cost.
System requirements
  • Operating System (OS) includes Linux CentOS 7.
  • Other open source OS available on request (Ubuntu).
  • Cluster Manangement Software (CMS) includes Slurm or others available.
  • CMS commercial licences additional cost or customer-supplied.
  • Application and tool licences not included, to be customer-supplied.
  • Application and tool migration and containerisation support for additional cost.
  • Dedicated, private, 'dark fibre' network connection for additional cost.
  • User and group permissions configuration (Active Directory) for additional cost.
  • Firewall services and hardware for additional cost.
  • Backup services for additional cost.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Response times dependant on Service Level chosen: Gold – 24x7 Support, with a 4-Hour Fix; Silver – 9-to-5 (Weekday) Support, with a Next Business Day Fix; Bronze – 9-to-5 (Weekday) Support, with a 10-day Fix.
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Onsite support
Support levels
BIOS IT offers three core support levels - Gold, Silver and Bronze. Depending on level chosen, services include:

Technicians on-site for diagnostics, support, and as needed hardware repair and/or replacement assistance.

24x7 online support portal with access to tracking tool for bug reporting and issue resolution, knowledge base materials and troubleshooting information.

24x5 (Monday – Friday) call centre telephone assistance for service requests (English only).

9 AM – 5.30 PM normal business hours (UK) telephone technical assistance where technicians assist with Product troubleshooting (English only).

Support requests: all support requests are categorised according to priority, with highest priority demanding a quicker resolution. Priority 1 (critical) is any major failure impacting full site or full service. Priority 2 (high) for when the service is degraded, but remains operational. Priority 3 (normal) for when service is fully operational but the customer requires enhancement, bugfix or modification. Priority 4 (low) is for non-production requirements.
Support available to third parties

Onboarding and offboarding

Getting started
We provide a community portal where videos and tutorials are provided to assist users with service on-boarding. In addition to this we also provide a full professional on-boarding service where vScaler cloud engineers and account managers will work with end users to setup, con- figure and deploy their cloud based infrastructure. Our service includes:
• A dedicated implementation manager to help the transition of your IT infrastructure into the new site. • A dedicated client service manager working with you on a day-to-day basis.
• Proactive service reporting and account management on a monthly basis.
• Bespoke customer interface providing ‘single pane of glass’ view to site and services.
• Provision of a Customer Welcome pack which details all processes.
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Prior to terminating the contract, the customer is able to transfer all their data out of the solution. When the customer terminates their agreement with vScaler, vScaler ensures all of the organisation’s data is deleted.
We provide a number of tools to assist with service off-boarding including but not limited to: • Data migration tools
• Image migration tools
• VM conversion tools
• Secure erase
End-of-contract process
When the customer terminates their agreement with vScaler, vScaler ensures all of the organisation’s data is deleted.
We provide a number of tools to assist with service off-boarding including but not limited to: • Data migration tools
• Image migration tools
• VM conversion tools
• Secure erase

Using the service

Web browser interface
Using the web interface
The web interface for vScaler provides comprehensive capabilities for setting up the service and making changes. The interface provides the user with the full functionality of our cloud solution within an intuitive, easy-to-use layout. vScaler's web interface is powered by OpenStack APIs, so any users with existing interfaces or programs that plug into OpenStack APIs will also be able to fully utilise our platform.

Alternatively, the vScaler web interface can be stripped back to basics for those customers who opt for a complete managed service where all set up and changes are looked after by BIOS IT's support team on the customer's behalf.
Web interface accessibility standard
None or don’t know
How the web interface is accessible
Customers with existing, preferred interfaces that can plug into OpenStack APIs will be able to fully utilise our platform. At present, there is no built-in vScaler support for Assistive Technologies.
Web interface accessibility testing
What users can and can't do using the API
The APIs provides comprehensive capabilities for customers when setting up and making changes to the cloud. The APIs facilitate the full functionality of our product. vScaler's API is powered by OpenStack, so any users with existing interfaces or programs that plug in with OpenStack APIs will be able to fully utilise our platform.
API automation tools
  • Ansible
  • Chef
  • OpenStack
  • SaltStack
  • Terraform
  • Puppet
API documentation
API documentation formats
Command line interface
Command line interface compatibility
  • Linux or Unix
  • Windows
  • MacOS
Using the command line interface
The Command Line Interface (CLI) is available for customers. The CLI provides full functionality of the cloud at customer control - including during set up and creating changes . vScaler's CLI is powered by OpenStack APIs, so any users with existing interfaces or programs that plug in with these APIs will be able to fully utilise our platform.


Scaling available
Scaling type
Independence of resources
We have a tier within our offering that allows users access to dedicated resources without over-commitment. This reduces the impact of any noisy neighbours and guarantees levels of performance.
Usage notifications
Usage reporting


Infrastructure or application metrics
Metrics types
  • CPU
  • Disk
  • Memory
  • Network
  • Number of active instances
Reporting types
Real-time dashboards


Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
VScaler Limited

Staff security

Staff security clearance
Other security clearance
Government security clearance

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Backup and recovery

Backup and recovery
What’s backed up
  • Virtual Machines
  • Files
  • Databases
  • Multiple OS support
Backup controls
Backups can be automated or customised depending on user requirements
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Users schedule backups through a web interface
Backup recovery
Users can recover backups themselves, for example through a web interface

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection within supplier network

Availability and resilience

Guaranteed availability
Approach to resilience
Available on request
Outage reporting
Public dashboard and API

Identity and authentication

User authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels
Multi-tier privileged access for our different interfaces.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Description of management access authentication
Optional Biometric authentication module.
Devices users manage the service through
Dedicated device over multiple services or networks

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
Telstra Global
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
"Our datacenters are fully ISO 27001 certified:
10 layers of physical security including biometrics, man traps and 24-hour security. Secure audit trails of all personnel entering the building. 24/7 internal and external intelligent CCTV monitored in a security reception. Manned vehicle entry gate to site. All building areas are secured by an alarm system. Low kinetic risk to site from road, rail or flight path. Crash tested security bollards and discrete anti-vehicle crash barriers at all access points. Three metre high monitored perimeter fence with 4m security fence around delivery areas
Options to incorporate customer bespoke security on racks and in customer private areas. DCIM security options including 24/7 rack CCTV streaming
VESDA and inert gas fire extinguishing system throughout technical areas."
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
As per ISO/IEC 27001

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All upgrades and version changes are tracked via repositories that enable us to roll back in the event of any issues. Any new capabilities or features are tested in a development environment before being rolled out to our live environment.
Vulnerability management type
Vulnerability management approach
All of our infrastructure is patched and updated on a regular basis to ensure vulnerabilities are not exposed. In addition to this, images that are provided to customers are always the latest available releases. If customers require older Operating systems or software they have the option to do this but the responsibility lies with them to ensure it is patched appropriately.
Protective monitoring type
Protective monitoring approach
We regularly undergo penetration testing on our infrastructure to identify any potential patches or breaches. Any identified incidents are prioritised according to our incident reporting process on a scale of 1-4 and dealt with accordingly.
Incident management type
Supplier-defined controls
Incident management approach
VScaler uses a strict escalation process that incorporates a flat structure to guarantee issue resolution. Customers are able to submit a support ticket online from their account using a short and simple form that is used to collect the basic information required in order to assist the customer further. This information then becomes the basis of a forum-style thread of dialog between help desk staff and the customer. At any stage, files can be attached either to provide further information for diagnostics purposes, or to provide the customer with any files necessary to resolve the reported problem.

Secure development

Approach to secure software development best practice
Supplier-defined process

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Who implements virtualisation
Virtualisation technologies used
KVM hypervisor
How shared infrastructure is kept separate
VXLAN and Linux Namespaces

Energy efficiency

Energy-efficient datacentres
Description of energy efficient datacentres
Our data centre adheres to the Code of Conduct for Energy Efficiency in Data Centres and has a Power Usage Effectiveness (PUE) ratio of 1.4 which places us between Efficient and Very Efficient classifications.


£0.03 a unit
Discount for educational organisations
Free trial available
Description of free trial
Free trial service is subject to user application profiling.
Link to free trial

Service documents