Jisc Services Ltd

Janet Cloud Connect

The Janet Network offers high-availability, high-capacity, resilient peerings alongside direct provider connectivity to the major Cloud Service Providers. This service looks to match bandwidth needs and budget to a suitable solution that can scale as your strategy evolves.


  • Multiple connection option and configurations available
  • Benefits from the Janet Network’s high-capacity resilient cloud peerings
  • Flexible to meet your requirements throughout the strategy's lifespan
  • High-availability and resilience available on all services
  • Access to multiple Cloud solution platforms from one supplier
  • DDoS and CSIRT services included as standard
  • Managed provisioning by our experienced Connection Management Team


  • Solutions keep step with changing needs in budget and performance.
  • Multiple options to inform flexible solution planning
  • Benefits from high availability access to CSPs
  • Single supplier for both internet and cloud connectivity
  • Cyber mitigation included in internet connectivity
  • Managed provisioning helps ensure smooth and timely project delivery
  • Flexible to meet your requirements throughout the strateg's lifespan


£1,000 to £100,000,000 a unit

  • Education pricing available

Service documents


G-Cloud 12

Service ID

6 6 2 9 0 6 5 4 3 6 7 4 0 0 2


Jisc Services Ltd Jisc helpdesk
Telephone: 03003002212
Email: help@jisc.ac.uk

Service scope

Service constraints
System requirements

User support

Email or online ticketing support
Email or online ticketing
Support response times
Phone calls are responded to within six rings. For email/ticket requests, we respond  within an hour, Mon-Fri 07:00-23:59. Outside of those times, email is only responded to when part of ongoing incident response.
User can manage status and priority of support tickets
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
Help desk staffed 07:00-23:59 M-F on business days 09:00-19:00 at weekends and 09:00-17:00 on public holidays. Engineering response available 07:00-18:00 on weekdays and on call 24*365.
Support available to third parties

Onboarding and offboarding

Getting started
We provide the customer with a target service date which is the earliest date that the service will be first available. Once the service is available a customer acceptance email is sent to the management contacts and copied to the technical and installation contacts in our Operational Support System. The email states that the service has been delivered in accordance with the order placed and asks the customer to confirm acceptance by email reply. Should two weeks pass and sign off has not been received a follow-up email will be sent and also a follow-up by a telephone call, ensuring that the customer is happy with their order fulfilment. Connectivity services require additional tasks, at the customer’s site, to transition to service. Our Network Operating Centre staff can offer advice and guidance and additional chargeable services to support the customer in transitioning to service.
Service documentation
End-of-contract data extraction
We will delete the data when services are cancelled.
End-of-contract process
Once the initial term has passed the contractual arrangements become a rolling contract until such time a change is requested by either a Jisc Account Manager or the customer directly. After the initial term services can be ceased without penalty.

Using the service

Web browser interface
Command line interface


Scaling available
Independence of resources
Provisioned according to requirements without rate limiting.
Usage notifications
Usage reporting


Infrastructure or application metrics
Metrics types
  • CPU
  • Other
Other metrics
Availability and usage monitoring via Netsight
Reporting types
Real-time dashboards


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery

Data-in-transit protection

Data protection between buyer and supplier networks
Private network or public sector network
Data protection within supplier network
Other protection within supplier network
Optional full optical separation from end site to cloud provider is available at additional cost.

Availability and resilience

Guaranteed availability
Detailed through a 12 month rolling measure avaiable on the service pages of our web site
Approach to resilience
There are various levels of resilience available from basic logical resilience to full geographical redundancy. Bespoke design is done for each customer resilience requirement.
Outage reporting
In real time through the Netsight platform, monthly service report to show uptime for each service

Identity and authentication

User authentication
Other user authentication
Depending on the application requirement all of the mentioned techniques can be applied. By default at least two employed.
Access restrictions in management interfaces and support channels
Access is only provided to authorised users and to the functionality they are authorised to use.
Access restriction testing frequency
Management access authentication
2-factor authentication
Devices users manage the service through
Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
No audit information available
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
Jisc has an ISMS which conforms to ISO 27001, and holds certification for a number of different services (but not this one).
Information security policies and processes
Jisc's information security policy is available at https://www.jisc.ac.uk/sites/default/files/jisc-information-security-policy-ism-pol-001.pdf

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Configuration and change management processes aligned with ITIL and enshrined in ISO9001 QMS.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Vulnerability notifications received for manufacturers are evaluated based on the risk to our systems and our ability to mitigate without upgrading software, since new software inevitably increases the risks of bugs and new vulnerabilities. Many vulnerabilities are mitigated via router access controls to prevent access to the service exploited via the vulnerability. Where this is not possible, software upgrades will be performed to install fixes.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Jisc has a dedicated SOC that monitors the Janet network for security threats
Incident management type
Supplier-defined controls
Incident management approach
Incident triggers include; our monitoring systems, engineers or customer calls. New incidents are logged by the service desk and passed to engineers for investigation. Problems will be resolved by engineers in collaboration with our technology partners. Jisc will own and manage the incident throughout, updating the customer with regularly progress reports. Incidents affecting multiple organisations will trigger a tiered Major Incident response, based on the number of organisations affected and the severity of the disruption. Our dedicated incident response team manage Major Incidents, ensuring that appropriate technical resources are mobilised, while keeping customers and Jisc senior management regularly briefed.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Who implements virtualisation
Virtualisation technologies used
Other virtualisation technology used
Multiple levels of separation used.
How shared infrastructure is kept separate
Depends on the service type, can be fully physically or logically separated.

Energy efficiency

Energy-efficient datacentres
Description of energy efficient datacentres
We are a tenant in multiple DCs with differing policies. The procurement process required each DC to adhere to the EU Code of Conduct for Datacentres, ensuring they adopt best-practice for the reduction of energy consumption in a cost-effective manner.


£1,000 to £100,000,000 a unit
Discount for educational organisations
Free trial available

Service documents