CFMS Services Ltd

IT and HPC Infrastructure copy

Utilising modern software deployment tools we can scale out the usage of software


  • Remote Access
  • High Performance Computing
  • Automation of Deployment
  • Elastic Scaling
  • Multitenancy
  • Digital Capability
  • Simulation
  • Modelling
  • Systems Engineering


  • Utilisation of High Performance Computing
  • Efficiency of Scale
  • Increasing Productivity
  • Model Based Systems Engineering
  • Validation and Verification


£0.06 to £0.09 a unit an hour

  • Education pricing available
  • Free trial available

Service documents


G-Cloud 12

Service ID

7 0 5 5 3 7 8 8 8 3 6 8 5 3 2


CFMS Services Ltd Steven Puetz
Telephone: 01179061100

Service scope

Service constraints
Maintenance is planned 6 weeks in advance
System requirements
Simulation software licenses provided by vendor

User support

Email or online ticketing support
Email or online ticketing
Support response times
Typically within hours, telephone assistance is available if an urgent response is required.
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
We provide an account manager contact and a technical contact. The SLA depends on the value of the contract
Support available to third parties

Onboarding and offboarding

Getting started
We can provide onsite/offsite training at an additional cost
Service documentation
End-of-contract data extraction
The users can download their data at anytime. 500GB of data storage is provided, this can be extended at an additional cost
End-of-contract process
The user account can either be closed or left open for further use.

Using the service

Web browser interface
Using the web interface
Users can access the software user interface or users can batch simulations or automation through command line access
Web interface accessibility standard
None or don’t know
How the web interface is accessible
VPN software must be installed through administrator rights on each users machine.
Web interface accessibility testing
CFMS have conducted their own testing for preferred software
What users can and can't do using the API
These are provided by the simulation software providers or discussed further over the phone
API automation tools
  • Ansible
  • OpenStack
API documentation
Command line interface
Command line interface compatibility
  • Linux or Unix
  • Windows
  • MacOS
Using the command line interface
This does not provide the user interface access


Scaling available
Scaling type
Independence of resources
Depends on the SLA agreed
Usage notifications
Usage reporting


Infrastructure or application metrics
Metrics types
  • CPU
  • Disk
  • Memory
  • Network
  • Number of active instances
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Equipment disposal approach
In-house destruction process

Backup and recovery

Backup and recovery
What’s backed up
  • Virtual machines
  • Files
  • Databases
Backup controls
Back-ups happen every 24 hours
Datacentre setup
Single datacentre
Scheduling backups
Users contact the support team to schedule backups
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
A queuing system is accessible and an estimated availability provided.

SLA depends on contract agreed
Approach to resilience
This is available on request
Outage reporting
Any planned/unplanned outage is notified by email.

Identity and authentication

User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
This can be provided on request
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device over multiple services or networks
  • Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
This is available on request
Information security policies and processes
This is available on request

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
The process is documented and distributed onto a online database. This can be discussed on request
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
CFMS actively applies patches as and when required
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
These can be discussed on request
Incident management type
Supplier-defined controls
Incident management approach
These are documented and are available on request

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Who implements virtualisation
Virtualisation technologies used
How shared infrastructure is kept separate
Multitenancy is used to segregate users and encryption of users data

Energy efficiency

Energy-efficient datacentres


£0.06 to £0.09 a unit an hour
Discount for educational organisations
Free trial available
Description of free trial
Limited core-hours can be provided to test access

Service documents