Jisc Services Ltd
Janet Cloud Connect
The Janet Network offers high-availability, high-capacity, resilient peerings alongside direct provider connectivity to the major Cloud Service Providers. This service looks to match bandwidth needs and budget to a suitable solution that can scale as your strategy evolves.
Features
- Multiple connection option and configurations available
- Benefits from the Janet Network’s high-capacity resilient cloud peerings
- Flexible to meet your requirements throughout the strategy's lifespan
- High-availability and resilience available on all services
- Access to multiple Cloud solution platforms from one supplier
- DDoS and CSIRT services included as standard
- Managed provisioning by our experienced Connection Management Team
Benefits
- Solutions keep step with changing needs in budget and performance.
- Multiple options to inform flexible solution planning
- Benefits from high availability access to CSPs
- Single supplier for both internet and cloud connectivity
- Cyber mitigation included in internet connectivity
- Managed provisioning helps ensure smooth and timely project delivery
- Flexible to meet your requirements throughout the strateg's lifespan
Pricing
£1,000 to £100,000,000 a unit
- Education pricing available
Service documents
Framework
G-Cloud 12
Service ID
6 6 2 9 0 6 5 4 3 6 7 4 0 0 2
Contact
Jisc Services Ltd
Jisc helpdesk
Telephone: 03003002212
Email: help@jisc.ac.uk
Service scope
- Service constraints
- No
- System requirements
- None
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Phone calls are responded to within six rings. For email/ticket requests, we respond within an hour, Mon-Fri 07:00-23:59. Outside of those times, email is only responded to when part of ongoing incident response.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Help desk staffed 07:00-23:59 M-F on business days 09:00-19:00 at weekends and 09:00-17:00 on public holidays. Engineering response available 07:00-18:00 on weekdays and on call 24*365.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide the customer with a target service date which is the earliest date that the service will be first available. Once the service is available a customer acceptance email is sent to the management contacts and copied to the technical and installation contacts in our Operational Support System. The email states that the service has been delivered in accordance with the order placed and asks the customer to confirm acceptance by email reply. Should two weeks pass and sign off has not been received a follow-up email will be sent and also a follow-up by a telephone call, ensuring that the customer is happy with their order fulfilment. Connectivity services require additional tasks, at the customer’s site, to transition to service. Our Network Operating Centre staff can offer advice and guidance and additional chargeable services to support the customer in transitioning to service.
- Service documentation
- No
- End-of-contract data extraction
- We will delete the data when services are cancelled.
- End-of-contract process
- Once the initial term has passed the contractual arrangements become a rolling contract until such time a change is requested by either a Jisc Account Manager or the customer directly. After the initial term services can be ceased without penalty.
Using the service
- Web browser interface
- No
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- No
- Independence of resources
- Provisioned according to requirements without rate limiting.
- Usage notifications
- Yes
- Usage reporting
- Other
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Other
- Other metrics
- Availability and usage monitoring via Netsight
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2012
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- Never
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- No
Data-in-transit protection
- Data protection between buyer and supplier networks
- Private network or public sector network
- Data protection within supplier network
- Other
- Other protection within supplier network
- Optional full optical separation from end site to cloud provider is available at additional cost.
Availability and resilience
- Guaranteed availability
- Detailed through a 12 month rolling measure avaiable on the service pages of our web site
- Approach to resilience
- There are various levels of resilience available from basic logical resilience to full geographical redundancy. Bespoke design is done for each customer resilience requirement.
- Outage reporting
- In real time through the Netsight platform, monthly service report to show uptime for each service
Identity and authentication
- User authentication
- Other
- Other user authentication
- Depending on the application requirement all of the mentioned techniques can be applied. By default at least two employed.
- Access restrictions in management interfaces and support channels
- Access is only provided to authorised users and to the functionality they are authorised to use.
- Access restriction testing frequency
- Never
- Management access authentication
- 2-factor authentication
- Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Jisc has an ISMS which conforms to ISO 27001, and holds certification for a number of different services (but not this one).
- Information security policies and processes
- Jisc's information security policy is available at https://www.jisc.ac.uk/sites/default/files/jisc-information-security-policy-ism-pol-001.pdf
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Configuration and change management processes aligned with ITIL and enshrined in ISO9001 QMS.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Vulnerability notifications received for manufacturers are evaluated based on the risk to our systems and our ability to mitigate without upgrading software, since new software inevitably increases the risks of bugs and new vulnerabilities. Many vulnerabilities are mitigated via router access controls to prevent access to the service exploited via the vulnerability. Where this is not possible, software upgrades will be performed to install fixes.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Jisc has a dedicated SOC that monitors the Janet network for security threats
- Incident management type
- Supplier-defined controls
- Incident management approach
- Incident triggers include; our monitoring systems, engineers or customer calls. New incidents are logged by the service desk and passed to engineers for investigation. Problems will be resolved by engineers in collaboration with our technology partners. Jisc will own and manage the incident throughout, updating the customer with regularly progress reports. Incidents affecting multiple organisations will trigger a tiered Major Incident response, based on the number of organisations affected and the severity of the disruption. Our dedicated incident response team manage Major Incidents, ensuring that appropriate technical resources are mobilised, while keeping customers and Jisc senior management regularly briefed.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- Other
- Other virtualisation technology used
- Multiple levels of separation used.
- How shared infrastructure is kept separate
- Depends on the service type, can be fully physically or logically separated.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- We are a tenant in multiple DCs with differing policies. The procurement process required each DC to adhere to the EU Code of Conduct for Datacentres, ensuring they adopt best-practice for the reduction of energy consumption in a cost-effective manner.
Pricing
- Price
- £1,000 to £100,000,000 a unit
- Discount for educational organisations
- Yes
- Free trial available
- No