Blueberry

Cloud Machine Manager

Real time on-demand scheduling and automation for Amazon EC2 Cloud Servers. Switch servers on or off by schedule or on-demand using a web application or a mobile app. By automatically reacting to server demand or responding to predetermined busy or quiet periods, CMM works to your schedule, saving you money.

Features

  • Automatically detects and turns off unused servers
  • Switching servers on and off based on a schedule
  • Restarts servers on-demand
  • Start Servers from Anywhere with App Control
  • Scales with demand as you add or remove devices
  • Powerful UI for setting schedules and thresholds
  • Multi-platform technology for potential savings
  • Utilisation monitoring and reporting capabilities

Benefits

  • Save money across cloud infrastructure
  • Control access times to servers
  • Set-up can be completed in 5 minutes
  • Save money by avoiding charges for unused server time
  • Ensure resources are available when users need them
  • Reduce wastage and save carbon footprint
  • Powerful scheduling capability ensuring servers are available when needed
  • Simple admin interface controlled from any browser on any device

Pricing

£5 to £20 per instance per month

Service documents

Framework

G-Cloud 11

Service ID

7 3 1 4 5 1 2 5 4 6 2 9 9 7 3

Contact

Blueberry

David Lee

0121 285 7500

enquiries@blueberrysystems.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
None.
System requirements
Suitable for Amazon servers

User support

Email or online ticketing support
Email or online ticketing
Support response times
8.30 - 5.30 weekdays excluding bank holidays - 30 minutes.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AAA
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
No
Support levels
Standard support Monday-Friday 8.30-5.30 excluding Bank Holidays included in cost of software service.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Intuitive sign up and use. Tutorials available online.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
It is not necessary as the system only monitors data held in Amazon.
End-of-contract process
Use of the tool can be ended with no impact.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
None.
Service interface
Yes
Description of service interface
Accessible via web site or mobile.
Accessibility standards
WCAG 2.1 AAA
Accessibility testing
Colour blindness testing
API
No
Customisation available
No

Scaling

Independence of resources
It is itself a scalable Amazon resource.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Not applicable.
Data export formats
Other
Other data export formats
Not exportable
Data import formats
Other
Other data import formats
No need to import data

Data-in-transit protection

Data protection between buyer and supplier networks
Private network or public sector network
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
As provided by Amazon SLA.
Approach to resilience
Available on request.
Outage reporting
We will provide an email alert and a notice on our Customer Portal.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
N/A
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Information provided on request.
Information security policies and processes
Our information security policy is defined to be compliant with GDPR. It restricts access to data to staff within the EU that need access to the data in order to fulfil their job role. Where necessary test data is obfuscated.

In the event of an alleged breach of security, it is the responsibility of the company's directors to investigate, report on and fix the issue.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We use GitHub for configuration management.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We use Acunetix to test for vulnerabilities.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
TBD
Incident management type
Undisclosed
Incident management approach
TBD

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Pricing

Price
£5 to £20 per instance per month
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
30 day free trial
Link to free trial
https://www.cloudmachinemanager.com/sign-up/

Service documents

Return to top ↑