Qualligence Ltd

AWS Cloud Solution

We review and evaluate your current environment.
AWS-certified and Government security cleared Solutions Architects and DevOps Engineers design solutions for your unique needs.
Strategic Roadmap - We will collaboratively work with your to build a strategic agenda to guide your ongoing infrastructure development and deployment.

Features

  • Data Science, Analytics, Reporting
  • Archiving, backup and disaster recovery
  • Data warehousing
  • Business Intelligence
  • Container service
  • Remote Access
  • Infrastructure and platform security
  • Database Services
  • Load Balancing
  • Compute and application hosting

Benefits

  • We will train and support knowledge-share
  • Flexible support model offering guidance, support and account/service management
  • Operational support from managing OS to alerting, monitoring and remediation
  • Reporting in many different formats and media
  • Suits OFFICIAL
  • 99.9% up time
  • Operational support from managing OS to alerting, monitoring and remediation
  • DevOps as a Service
  • Development as a Service
  • Support Real-time reporting, alerting and monitoring

Pricing

£0.01 a unit

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at fahadktk@gmail.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

6 8 6 7 6 0 6 2 7 7 1 7 8 7 1

Contact

Qualligence Ltd Fahad Shah
Telephone: 07875957488
Email: fahadktk@gmail.com

Service scope

Software add-on or extension
Yes
What software services is the service an extension to
AWS, Microsoft, Oracles offerings
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
Certain cloud services requires sufficient internet bandwidth in order to function correctly.
System requirements
  • N/A
  • N/A

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 4 hours on weekdays and 6 hours on weekend.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
Web chat accessibility testing

JAWS, VoiceOver
Onsite support
Onsite support
Support levels
Basic 9-5 (Mon to Fri) customer service, support forums, 4 Core “Trusted Adviser” checks, personal health dashboard. No TAM. Free Developer: As above + business hours access to technical/architural Cloud Support Associates via email (one primary contact). No TAM. 3%x monthly AWS usage. Business: As above + 24/7 access to Cloud Support Engineers via email, chat and phone for unlimited contacts; architecture, 3rd party software and programmatic case management support. TAM. Greater of $100 or spend-dependent percentage (pm). Enterprise As above, plus architectural review, operations support, training, assigned concierge, proactive guidance, TAM. Greater of $15,000 or spend-dependent percentage (pm)
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We will provide both on and off-site training supported by online documentation available for users throughout the journey.
Service documentation
Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction
Reverse engineering process to be employed where applicable, otherwise users will be given full and controlled access to the same systems they uploaded data using the same secure channels.
End-of-contract process
Buyer may terminate the relationship with Supplier for any reason by (i) providing Supplier with notice and (ii) closing Buyers account for all services for which Supplier provide an account closing mechanism.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Chrome
Application to install
No
Designed for use on mobile devices
No
Service interface
No
API
No
Customisation available
No

Scaling

Independence of resources
Each client receives a dedicated resource and agreed commitment depending on requirements and prior approval from the supplier.

Analytics

Service usage metrics
Yes
Metrics types
Number of active instances
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Microsoft, Amazon Web Services, Oracle, IBM

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
Never
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
NCSC
safe data-export pattern
Data export formats
  • CSV
  • ODF
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Bonded fibre optic connections
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
9 - 5 Mon to Fri on weekdays
Approach to resilience
Available on request
Outage reporting
Email and Dashboard alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Using management console, role based access and visibility of content
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Acceptable Use Policy Access Control Policy Change Management Policy Information Security Policy Incident Response (IR) Policy Remote Access Policy Email/Communication Policy Disaster Recovery Policy Business Continuity Plan (BCP)

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Standard APM PM BOK approaches along with industry standard best practices
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
ISO/IEC 27002 code of practice
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
NCSC Guidance and advcice
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
ITIL Incident Management approach

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Pricing

Price
£0.01 a unit
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at fahadktk@gmail.com. Tell them what format you need. It will help if you say what assistive technology you use.