BIOS IT

HPC OpenStack Private Cloud Hosting

High-Performance Compute (HPC) Cloud hosting: deploy and run compute-intensive software on CPU, GPU and FPGA. Storage services and private network connectivity also available. Using optimised-OpenStack environment with configurable cluster management. Ideally suited for research computation and spinning up Virtual Machines (VM's) quickly.

Features

  • OpenStack powered IaaS platform with full API access and support
  • Deploy VM's or dedicated bare metal servers
  • Centralised application repository: install any applications network-wide
  • CPU, GPU and FPGA compute processing.
  • Integrate leading storage technologies.
  • Automated provisioning, loading and removal of cloud servers.
  • UK-based Managed Service team for rapid response.
  • Global data centre reach or cross-site integration.
  • Optional: on-premise cloud appliance integration
  • Optional: low-latency, secure, fibre private network

Benefits

  • Easy administration: management portal for all admin tasks.
  • Save time: quick provisioning and automation tools.
  • Performance-optimised: achieving 98% RAW performance on Virtual Machines (VM)
  • Multi-disciplinary research: use VM's for team workflows.
  • Lab-quality environment: create and save containerised environments.
  • Tailoring: solution designed around your unique requirements.
  • Resilient design: solution designed for High Availability (HA).
  • Secure access: from any authorised user device.
  • Strong support: from hardware to tool containerisaiton and migration.
  • Cost effective: short-term, leasing, OpEx and CapEx.

Pricing

£0.03 a unit

Service documents

Framework

G-Cloud 12

Service ID

6 5 1 1 4 5 0 0 2 2 8 7 9 0 0

Contact

BIOS IT Joseph Ball
Telephone: 0203 178 6467
Email: tenders@bios-it.com

Service scope

Service constraints
HPC Cloud Hosting includes an optimised OpenStack cloud platform, CentOS 7, Slurm cluster management, and Ceph storage as standard. All hosted on private, dedicated hardware. All applications, tools, backup storage, and user permissions system are outside of standard scope of work, but can be included for additional cost.
System requirements
  • Operating System (OS) includes Linux CentOS 7.
  • Other open source OS available on request (Ubuntu).
  • Cluster Manangement Software (CMS) includes Slurm or others available.
  • CMS commercial licences additional cost or customer-supplied.
  • Application and tool licences not included, to be customer-supplied.
  • Application and tool migration and containerisation support for additional cost.
  • Dedicated, private, 'dark fibre' network connection for additional cost.
  • User and group permissions configuration (Active Directory) for additional cost.
  • Firewall services and hardware for additional cost.
  • Backup services for additional cost.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Response times dependant on Service Level chosen: Gold – 24x7 Support, with a 4-Hour Fix; Silver – 9-to-5 (Weekday) Support, with a Next Business Day Fix; Bronze – 9-to-5 (Weekday) Support, with a 10-day Fix.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Onsite support
Support levels
BIOS IT offers three core support levels - Gold, Silver and Bronze. Depending on level chosen, services include:

Technicians on-site for diagnostics, support, and as needed hardware repair and/or replacement assistance.

24x7 online support portal with access to tracking tool for bug reporting and issue resolution, knowledge base materials and troubleshooting information.

24x5 (Monday – Friday) call centre telephone assistance for service requests (English only).

9 AM – 5.30 PM normal business hours (UK) telephone technical assistance where technicians assist with Product troubleshooting (English only).

Support requests: all support requests are categorised according to priority, with highest priority demanding a quicker resolution. Priority 1 (critical) is any major failure impacting full site or full service. Priority 2 (high) for when the service is degraded, but remains operational. Priority 3 (normal) for when service is fully operational but the customer requires enhancement, bugfix or modification. Priority 4 (low) is for non-production requirements.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide a community portal where videos and tutorials are provided to assist users with service on-boarding. In addition to this we also provide a full professional on-boarding service where vScaler cloud engineers and account managers will work with end users to setup, con- figure and deploy their cloud based infrastructure. Our service includes:
• A dedicated implementation manager to help the transition of your IT infrastructure into the new site. • A dedicated client service manager working with you on a day-to-day basis.
• Proactive service reporting and account management on a monthly basis.
• Bespoke customer interface providing ‘single pane of glass’ view to site and services.
• Provision of a Customer Welcome pack which details all processes.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Prior to terminating the contract, the customer is able to transfer all their data out of the solution. When the customer terminates their agreement with vScaler, vScaler ensures all of the organisation’s data is deleted.
We provide a number of tools to assist with service off-boarding including but not limited to: • Data migration tools
• Image migration tools
• VM conversion tools
• Secure erase
End-of-contract process
When the customer terminates their agreement with vScaler, vScaler ensures all of the organisation’s data is deleted.
We provide a number of tools to assist with service off-boarding including but not limited to: • Data migration tools
• Image migration tools
• VM conversion tools
• Secure erase

Using the service

Web browser interface
Yes
Using the web interface
The web interface for vScaler provides comprehensive capabilities for setting up the service and making changes. The interface provides the user with the full functionality of our cloud solution within an intuitive, easy-to-use layout. vScaler's web interface is powered by OpenStack APIs, so any users with existing interfaces or programs that plug into OpenStack APIs will also be able to fully utilise our platform.

Alternatively, the vScaler web interface can be stripped back to basics for those customers who opt for a complete managed service where all set up and changes are looked after by BIOS IT's support team on the customer's behalf.
Web interface accessibility standard
None or don’t know
How the web interface is accessible
Customers with existing, preferred interfaces that can plug into OpenStack APIs will be able to fully utilise our platform. At present, there is no built-in vScaler support for Assistive Technologies.
Web interface accessibility testing
None.
API
Yes
What users can and can't do using the API
The APIs provides comprehensive capabilities for customers when setting up and making changes to the cloud. The APIs facilitate the full functionality of our product. vScaler's API is powered by OpenStack, so any users with existing interfaces or programs that plug in with OpenStack APIs will be able to fully utilise our platform.
API automation tools
  • Ansible
  • Chef
  • OpenStack
  • SaltStack
  • Terraform
  • Puppet
API documentation
Yes
API documentation formats
HTML
Command line interface
Yes
Command line interface compatibility
  • Linux or Unix
  • Windows
  • MacOS
Using the command line interface
The Command Line Interface (CLI) is available for customers. The CLI provides full functionality of the cloud at customer control - including during set up and creating changes . vScaler's CLI is powered by OpenStack APIs, so any users with existing interfaces or programs that plug in with these APIs will be able to fully utilise our platform.

Scaling

Scaling available
Yes
Scaling type
Automatic
Independence of resources
We have a tier within our offering that allows users access to dedicated resources without over-commitment. This reduces the impact of any noisy neighbours and guarantees levels of performance.
Usage notifications
Yes
Usage reporting
Email

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • Memory
  • Network
  • Number of active instances
Reporting types
Real-time dashboards

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
VScaler Limited

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
In-house
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • Virtual Machines
  • Files
  • Databases
  • Multiple OS support
Backup controls
Backups can be automated or customised depending on user requirements
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Users schedule backups through a web interface
Backup recovery
Users can recover backups themselves, for example through a web interface

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection within supplier network
VLAN

Availability and resilience

Guaranteed availability
99.99%
Approach to resilience
Available on request
Outage reporting
Public dashboard and API

Identity and authentication

User authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels
Multi-tier privileged access for our different interfaces.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Description of management access authentication
Optional Biometric authentication module.
Devices users manage the service through
Dedicated device over multiple services or networks

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Telstra Global
ISO/IEC 27001 accreditation date
2013
What the ISO/IEC 27001 doesn’t cover
"Our datacenters are fully ISO 27001 certified:
10 layers of physical security including biometrics, man traps and 24-hour security. Secure audit trails of all personnel entering the building. 24/7 internal and external intelligent CCTV monitored in a security reception. Manned vehicle entry gate to site. All building areas are secured by an alarm system. Low kinetic risk to site from road, rail or flight path. Crash tested security bollards and discrete anti-vehicle crash barriers at all access points. Three metre high monitored perimeter fence with 4m security fence around delivery areas
Options to incorporate customer bespoke security on racks and in customer private areas. DCIM security options including 24/7 rack CCTV streaming
VESDA and inert gas fire extinguishing system throughout technical areas."
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
As per ISO/IEC 27001

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All upgrades and version changes are tracked via repositories that enable us to roll back in the event of any issues. Any new capabilities or features are tested in a development environment before being rolled out to our live environment.
Vulnerability management type
Undisclosed
Vulnerability management approach
All of our infrastructure is patched and updated on a regular basis to ensure vulnerabilities are not exposed. In addition to this, images that are provided to customers are always the latest available releases. If customers require older Operating systems or software they have the option to do this but the responsibility lies with them to ensure it is patched appropriately.
Protective monitoring type
Undisclosed
Protective monitoring approach
We regularly undergo penetration testing on our infrastructure to identify any potential patches or breaches. Any identified incidents are prioritised according to our incident reporting process on a scale of 1-4 and dealt with accordingly.
Incident management type
Supplier-defined controls
Incident management approach
VScaler uses a strict escalation process that incorporates a flat structure to guarantee issue resolution. Customers are able to submit a support ticket online from their account using a short and simple form that is used to collect the basic information required in order to assist the customer further. This information then becomes the basis of a forum-style thread of dialog between help desk staff and the customer. At any stage, files can be attached either to provide further information for diagnostics purposes, or to provide the customer with any files necessary to resolve the reported problem.

Secure development

Approach to secure software development best practice
Supplier-defined process

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Supplier
Virtualisation technologies used
KVM hypervisor
How shared infrastructure is kept separate
VXLAN and Linux Namespaces

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
Our data centre adheres to the Code of Conduct for Energy Efficiency in Data Centres and has a Power Usage Effectiveness (PUE) ratio of 1.4 which places us between Efficient and Very Efficient classifications.

Pricing

Price
£0.03 a unit
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Free trial service is subject to user application profiling.
Link to free trial
http://www.vscaler.com/requestdemo

Service documents