Enterprise File Fabric
The Storage Made Easy File Fabric enables organisations to safely and securely embrace cloud storage for data. Data on premises or cloud can be viewed on a single screen, securely shared, accessed from desktop, web or mobile additional features include GDPR compliance and high speed file transfer.
- Secure File Sharing with encryption password protection, stored in UK
- Protocol Gateway supporting SFTP, FTP, WebDav, S3 , REST API
- Single Sign On AD, SAML, LDAP integrating with existing systems
- M-Stream high speed file transfer
- Deep Content Search Across All Platforms Including Unstructured Data
- Multi Cloud Support 60+ Storage Platforms supported
- Audit trail see who accessed data and what they did
- Governance Set IT controls on data access and sharing
- GEO location Tracking see where data is or from
- Multi Device Support Access data securely from any device
- Safely and Securely Share Data
- Collaboration tools help teams work together
- Workflow Approval across data silos speeds up processing
- Multi Cloud Support saves money and protects from Ransomware
- Integration with Outlook and O365 improves effeciency
- Multi Cloud Support enables lowest cost storage to be used
- Protocol gateways prolong life of legacy systems
- Governance, Audit, PII Search,Encryption delivers GDPR compliance
- High speed file transfer saves time and money
- Works well with Object Storage good for unstructured data
£10 per user per month
- Education pricing available
- Free trial available
Storage Made Easy
0208 643 2885
|Software add-on or extension||No|
|Cloud deployment model||
|Service constraints||Planned maintenance does occur but a service windows is agreed in advance with customers.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||4 hour response Monday to Friday 9 - 5|
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
Standard Support 09:00 - 17:00 (UK) - Support Portal and Email Telephone,
24/7, SLA's by request for Dedicated Service
|Support available to third parties||Yes|
Onboarding and offboarding
New customers are assigned a Technical Account Manager who will provide advise and be the first point of contact for the first 60 days.
The Storage Made Easy technical team sets up the product, liaising with the TAM who in turn liaises directly with the customer .
Online training and user documentation are available both prior and post installation.
|End-of-contract data extraction||Typically we do not store client data simply meta data about the files stored this will be deleted when the appliance is deleted. The File Fabric supports multi cloud and facilitates easy data migration so users are easily able to migrate their data to the platform of their choice this would pertain even if we had provided the storage platform. Standard protocols are provided (FTP, SFTP, WebDav) to export data as required.|
Storage Made Easy enable a service instance, with described software clients, for the number of users procured in combination with on-demand data storage.
Prior to the end of the contract a user may choose to export their data using the Storage Made Easy protocol adaptors that support FTP/SFTP/WebDav. At the end of the contract the licence key would expire and the appliance would cease to function there is no charge. Our solution maintains the integrity of data so users are not locked in.
Using the service
|Web browser interface||Yes|
|Application to install||Yes|
|Compatible operating systems||
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||None|
|What users can and can't do using the API||Users can use the Storage Made Easy secure REST API to interact with the service. The REST API is documented and users can interact with the API based on the permissions they have been given or inherited. Certain API calls require Admin permissions.|
|API documentation formats||HTML|
|API sandbox or test environment||Yes|
|Description of customisation||
The look and feel of browser, desktop and mobile interfaces can be customised to match users branding. This can be performed to a high level of sophistication. The File Fabric support style sheets and different languages.
Storage Made Easy is required to submit applications to vendor App Stores and an additional charge may be required.
|Independence of resources||
At an infrastructure level, In order to guarantee that users are not affected by the demands from other users, resource reservations and shares such as internet bandwidth shaping are used. In addition, the capacity planning team ensure that usage in terms of all resources are constantly monitored and increased accordingly relating to user demand.
|Service usage metrics||Yes|
Audit event Logs
GEO Location data
File location data
|Supplier type||Reseller providing extra features and support|
|Organisation whose services are being resold||UK Cloud|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Supplier-defined controls|
|Penetration testing frequency||At least every 6 months|
|Penetration testing approach||In-house|
|Protecting data at rest||Other|
|Other data at rest protection approach||
Physical access control, complies with SSAE-16 / ISAE 3402
Storage Made Easy can also be configured to implement strong encryption over and above what is encrypted at rest by the underlying storage.
The SME software implements strong AES-256 encryption using the Rijndael cipher, with Cipher Block Chaining (CBC).
|Data sanitisation process||Yes|
|Data sanitisation type||
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||
Using any of the provider protocol mechanisms, FPT/SFTP or WebDav.
Data can be simply dragged and dropped from one location to another, files can be securely moved by e-mail, we stress though the File Fabric makes no changes to data and data remains on the location of the users choice.
|Data export formats||
|Other data export formats||
|Data import formats||
|Other data import formats||All file formats are supported and displayed 'as is'|
|Data protection between buyer and supplier networks||
|Data protection within supplier network||
Availability and resilience
Storage Made Easy will make commercially reasonable efforts to make the File Fabric solution available with a Monthly Uptime Percentage (defined below) of at least 99.9%, excluding emergency and notified service windows.
Service Credits will be issued, where the fault is not within the customers control as follows:
Less than 99.95% but equal to or greater than 99.0% - 3% of monthly spend
Less than 99.0% but equal or greater than 95% - 5% of monthly spend
less than 95.0% - 10% of monthly spend
|Approach to resilience||This is available on request.|
|Outage reporting||A Public DashBoard|
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||
Customers must raise a support request vial email or the support portal. User emails must belong to the customer domain and are validated as part of the support engagement process. Where there is doubt the SME support personnel will validate with a named customer technical contact.
Management interfaces are only available on the hosted service and only to nominated personnel and can be further protected by 2 factor authentication.
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users have access to real-time audit information|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||Between 1 month and 6 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||
No single developer ‘owns’ a particular component or code, which is deliberate to ensure that code and components are peer reviewed.
We penetration test our software daily and received daily reports.
Any Security Issues, when identified, are triaged immediately and priority given is dependent on the threat level and impact assessment. If the threat level is deemed high then resolutions are prioritised immediately and where necessary customers informed.
Storage Made Easy is currently undertaking ISO-27001 accreditation.
|Information security policies and processes||
At an infrastructure level Storage Made Easy works with UKCloud which has been independently assessed and certified against ISO20000, ISO27001 and ISO27018 by LRQA, a UKAS accredited audit body.
Storage Made Easy has a number of governance frameworks in place. These control the way in which Storage Made Easy operates and how cloud software and services are delivered to its customers.
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||
SME uses a third party application to track service and component changes. The change management workflow for JIRA has been designed based on ITIL recommendations. It follows a standardized process to deal with change requests, which in turn reduces follow up incidents and minimizes negative business impact.
The change review process encompasses:
• Web vulnerabilities
• Input/data validation / sanitisation
• Authentication / Authorization data flows
• Exception management
• Variable Analysis
• Unsafe and unmanaged code check
• Configuration check
• Threading analysis
• API validation / Undocumented public interfaces
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
Potential threats are assessed through regular vulnerability testing, industry informed threat notifications, and through heuristic analysis of inbound data access patterns.
Storage Made Easy also hosts and runs a consumer service with a similar code base which is penetration tested daily, the results of which are also encompassed when understanding and dealing with threat assessments.
Patches are deployed as quickly as required, within an emergency service window if needed.
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||The Storage Made Easy software keeps track of inbound requests and if these requests breach certain heuristic rules the software can automatically block such threats and inform administrators.|
|Incident management type||Supplier-defined controls|
|Incident management approach||
Any Security Issues, when identified, are triaged immediately and priority given is dependent on the threat level and impact assessment.
If the threat level is deemed high then resolutions are prioritised immediately and where necessary customers immediately informed via an incident report.
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||No|
|Price||£10 per user per month|
|Discount for educational organisations||Yes|
|Free trial available||Yes|
|Description of free trial||Trial option available for 30 days includes testing of the functionality of the software and its features, includes support.|