Green Cloud Hosting Limited

Virtual Desktop Infrastructure

Virtual Desktop infrastructure is an incredible solution that enables users to work faster and smarter. Your data and applications are stored in our secure UK ISO accredited data centres. Virtual Desktop Infrastructure gives users access from anywhere, at any time and on any device. Our service is UK supported.


  • Rock Solid Citrix Technology to Remote access
  • Free Unlimited Application Server Resource
  • Active Directory Management
  • AES 256 Bit Security Encryption
  • Anti Spam and Anti Virus Software Included
  • UK 24/7 Telephone Support
  • 99.9% Uptime Guarantee
  • Free Migration and Set Up
  • Hosted in 3 UK ISO27001 Datacentres


  • Access Your Entire network securely from anywhere
  • Simplified and Secure BYOD
  • Access Secure Email on the Go
  • Fully Managed Environment
  • Fully Encrypted and Compliant Solution
  • Removes the Need for In House Servers
  • Scalable: Cost Effective, Ability to Add and Remove Users
  • Control Panel Access Via Secure Portal to Directly Manage Users
  • Reduce high upfront CAP ex


£10 per user per month

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 10


Green Cloud Hosting Limited

Kamran Maqbool

0800 019 3878

Service scope

Service scope
Service constraints No
System requirements Internet Connected Device

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Guaranteed SLA 2 Hours 7 days a week.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels 24/7 Telephone Support
24/7 Email Support
Guaranteed 2 Hour Response Time
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Our Technical team provide a free onboarding service.
Full training on the web based control panel is also included free of charge.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction All data is available to download.
End-of-contract process Towards the end of the contact, 30 day notification is sent to the organisation detailing the expiry date of the service. Within the following 30 days, customer email data is available to download.
After the 30 day period, all hard data is deleted with no option for the recovery of such data.

Using the service

Using the service
Web browser interface Yes
Using the web interface Users have access to a web based control panel. Administrators can manage exchange users from the control panel.
Examples of changes can include:
Adding and removing users
Password resets
Web interface accessibility standard None or don’t know
How the web interface is accessible User are able to make changes to all aspects of the service.
Web interface accessibility testing None
Command line interface No


Scaling available Yes
Scaling type Manual
Independence of resources The cloud environment is built specifically for each organisation.
Not a shared or multi tenant platform.
Usage notifications Yes
Usage reporting Email


Infrastructure or application metrics No


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach In-house
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Backup and recovery Yes
What’s backed up Everything installed onto the Virtual Desktop Infrastructure
Backup controls Fully managed by the Technical Team.
Datacentre setup Multiple datacentres with disaster recovery
Scheduling backups Supplier controls the whole backup schedule
Backup recovery
  • Users can recover backups themselves, for example through a web interface
  • Users contact the support team

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability 99.95% service availability
Credits for below 99.5% availability
99.94% - 99.50% - 5% Credit
99.49% - 99.00% - 15% Credit
89.99% - 60.00% - 25% Credit
60% and under - 50% Credit
Downtime in any given calendar month
Approach to resilience Available on Request
Outage reporting Public Dashboard
Email Alert System
SMS Alert System

Identity and authentication

Identity and authentication
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels We implement permission/role based access.
Security Classification Level Access
Access restriction testing frequency At least once a year
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Devices users manage the service through Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 Alcumus
ISO/IEC 27001 accreditation date 24/06/2016
What the ISO/IEC 27001 doesn’t cover N/A
The data centre's comply to ISO20001 Standards.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Information Governance Policy
Data Security Policy
Information Asset Policy
Reporting Structure:
All staff receive Information Governance training upon induction which outlines responsibilities for individuals, together with escalation procedures to Managing Director level for all data security issues.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Each ticket is tracked end to end
Regarding potential security impact, change requests are processed only when authorised by the assigned administrator on the customer side
Any change requests are documented using a Quality Change Control Record
All changes are recorded and the customer administrator is updated in real time as changes happen
The above forms part of the documented process issued to the customer on commencement of the contract
Vulnerability management type Supplier-defined controls
Vulnerability management approach Monitoring software is used to monitor activity across all infrastructure
High end ASA's are in place to provide the best level of firewall protections which are also monitored
Patch management is completed as per each customers requirements where provided
As a standard we patch manage all our Windows OS's every Saturday via our systems management solution
Potential threats are constantly monitored using anti virus software solution, together with Microsoft patch Tuesday updates
Protective monitoring type Supplier-defined controls
Protective monitoring approach Monitoring software
Anti Virus Software
Immediately a potential compromise is found, and engineer is assigned to investigate and resolve the issue
Following the resolve, an investigation is carried out to understand the vulnerability, and prevent future compromises occurring
All compromise and threats are treated as an emergency, and an engineer is immediately assigned; all possible compromise and threats have an SLA of 15 minutes
Incident management type Supplier-defined controls
Incident management approach We have predefined incident management policies and procedures which all staff must adhere to.
Conformance is monitored using line management supervision.
Incident management policy and procedure is included in staff inductions
Refresher training/information is relayed at team meetings.
All of our infrastructure and systems are fault tolerant, with built in redundancy and automatic failover in place.
Incidents reported 24/7 x 365 days are to be raised via email or telephone call to our support team where a ticket and case is raised and resolved within our SLA.
We issue an RFO (Reason for Outage)
Online service status page for customers

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart Yes
Who implements virtualisation Supplier
Virtualisation technologies used Citrix XenServer
How shared infrastructure is kept separate Utilising Citrix Xenapp, Xendesktop and Xenserver software.
Microsoft Address List Segregation
A Hosted Desktop environment is built purely for the specific customer. Resource isnt shared. We use VLANs to segment networks which in turn ensures organisations are kept completely separate.

Energy efficiency

Energy efficiency
Energy-efficient datacentres Yes


Price £10 per user per month
Discount for educational organisations Yes
Free trial available Yes
Description of free trial The free version is exactly the same as the customer would experience if purchased. The free trial is for 14 days.


Pricing document View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑