Daisy Corporate Services Trading Limited

Daisy e-Backup Enterprise Plus

Daisy eBackup provides a simple 3-tiered service for data backup and recovery.
eBackup simplifies business availability by protecting all of your data -archive, backups and replication, all under one integrated service


  • Multiple copies of your data held off site
  • Flexible industry-compliant data retention policies
  • Fully managed backup service with recovery management support
  • Proactive data management for archiving and availability
  • Protection for 20 handheld devices included
  • Business continuity management & recovery via Shadow-Planner
  • Achievable recovery time objective (RTO) of 1hr
  • Recovery point objective (RPO) of 15 mins


  • Caters to organisations of all sizes
  • Remain as agile as your digital landscape
  • Protects and stores your data securely but accessible and recoverable
  • Minimise risk and return to clean data as required
  • Can be applied to any data/device in your business
  • GDPR & MiFIDII compliant data management


£0.25 to £0.80 a gigabyte a month

  • Education pricing available

Service documents


G-Cloud 12

Service ID

7 8 6 4 7 0 3 1 1 6 0 0 9 4 1


Daisy Corporate Services Trading Limited Andy Riley
Telephone: 07540 203 303
Email: publictenders@daisygroup.com

Service scope

Software add-on or extension
Cloud deployment model
Hybrid cloud
Service constraints
System requirements
  • 1 Mb (or higher) internet connection
  • Microsoft Windows, Red Hat Linux or Android

User support

Email or online ticketing support
Email or online ticketing
Support response times
Varies with severity
User can manage status and priority of support tickets
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
Our SLA for non-emergency support requests is as follows:

Working hours (09:00 – 17:30)
Activity Response time Resolution time
Acknowledge receipt of request 2 Hours N/A
Response from assigned resource 4 Hours N/A
Escalation to specialist 8 Hours N/A

This doesn’t include Invocations which are 24/7 where applicable.
Support available to third parties

Onboarding and offboarding

Getting started
Daisy is able to provide end user training and all applicable user guides and documentation for the operation of the service. Additional training is available. Should this be required, prices are available on request.
Service documentation
Documentation formats
End-of-contract data extraction
Data extraction forms part of the service. Therefore extraction is via the GUI. Data can be extracted by Daisy as an additional service but this is chargeable.
End-of-contract process
Customers will be able to extract any customer data from the servers and are not limited to the type of data that can be extracted. The type of data that can be extracted includes any customer generated content, metadata, structure and configuration data. There are several available tools that allow customer data to be extracted from the back up software. Daisy does not charge for data extraction where the extraction is carried out by the customer. Daisy is happy to provide assistance when a customer needs assistance with data extraction/migration to another supplier. This will be charged at our standard daily consultancy rate. Daisy will purge and destroy all customer data from any computers, storage devices and storage media at the end of the contractual period in line with ISO 27001 standards

Using the service

Web browser interface
Application to install
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • Windows
Designed for use on mobile devices
Service interface
Description of service interface
Reports can be generated from the GUI, relating to success/failure and service usage. Reports will also be produced in accordance with the ITIL provisions of the Managed Service.
Accessibility standards
None or don’t know
Description of accessibility
Through the application GUI
Accessibility testing
What users can and can't do using the API
Users can write their own GUI or web interfaces and retrieve data directly from the service or issue commands to the service.
API documentation
API documentation formats
API sandbox or test environment
Customisation available


Independence of resources
Our customers are logically separated on the platforms, at compute, network and storage levels with minimum and maximum resource guarantees throughout, which ensures each customer cannot exceed their allotted allocation without prior change notifications in to our Operations & Engineering teams.


Service usage metrics
Metrics types
Via daily email and application GUI.
Reporting types
  • API access
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
  • Other
Other data at rest protection approach
FIPS140-2 encryption
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Via the back up software GUI
Data export formats
Other data export formats
  • Same format they were uploaded
  • Encrypted back up file
Data import formats
Other data import formats
Format of the existing file

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection between networks
FIPS140-2 encryption
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network
FIPS140-2 encryption

Availability and resilience

Guaranteed availability
Approach to resilience
Daisy operates its own 100Gb low-latency Core network and resilient MPLS network, with all data centres on-net Daisy’s Internet feeds into the data centres are delivered over our resilient core 10Gb MPLS network into peering points at Harbour Exchange and Telehouse Points Of Presence (POPs). Where applicable all customer data stored by Daisy is resilient across 3 DC sites.
Outage reporting
Email alerts are provided

Identity and authentication

User authentication needed
User authentication
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Where access to customer infrastructure is required, Daisy uses a secure backup and admin connection to components for monitoring, support and backups. All traffic across this connection is secure and segregated.
Access restriction testing frequency
At least once a year
Management access authentication
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Description of management access authentication
Customer management is usually managed on premise in accordance with the customer's own security policy

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
ISO/IEC 27001 accreditation date
13/09/2013 original certification
What the ISO/IEC 27001 doesn’t cover
Scope is all Daisy sites and services requiring security certification.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Through the establishment of a comprehensive security framework, Daisy shall demonstrate a commitment to protect all assets that support the delivery of business objectives and address all legal, regulatory and contractual obligations. The following ISO27001 Group clause & objectives are referenced within this document: Clause 5, & Control objectives: A6, A9, A11, A13.2, and A14 Data Protection Policy Site Security Policy CCTV Policy

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Daisy’s ITIL v3 aligned service management tool meets ISO 27001 guidelines, governing core ITIL processes including, but not limited to, incident, problem, change, release, configuration, service level management and service catalogue functions
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Vulnerability scanning is included in the Daisy security framework, to help monitor the effectiveness of existing security controls and identify any weaknesses. The IT security Manager in consultation with Head of Compliance shall coordinate vulnerability scanning activities including: • identifying the scope of testing • monitor manufacturer and vendor sites for information updates regarding vulnerabilities Should the vulnerabilities be assessed as not posing an immediate threat to operations, security patches or code fixes shall be subject to change control requirements ( testing etc.) prior to deployment. Daisy support record activities in a service management ticket for tracking and audit purposes.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Monitoring of our platforms is done from our segregated and ISO27001 compliant management platforms, we protect the platform itself and its perimeter edge with Daisy owned and operated solutions, not in any way tied to logical customer implementations within these platforms. Each customer as part of a Managed Service has our standard security and monitoring products deployed with pre-agreed alert classifications and thresholds set as part of our typical managed service. Potential compromises are identified in our centralised monitoring solution, with accompanying detailed information of the platform and customer which auto generates an incident in our ticketing systems.
Incident management type
Supplier-defined controls
Incident management approach
Predefined processes are in place for common events Users can report incidents via the web portal or email in the event of an incident Daisy will Issue customer updates as per the agreed frequency on the progress of a resolution or workaround. This may include initiating and leading conference calls, bridges or meetings. Create MI reports where required, validating content is customer appropriate. Issue to service delivery management. Publish the MI report to the customer as defined by the customer SLA.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks


£0.25 to £0.80 a gigabyte a month
Discount for educational organisations
Free trial available

Service documents