Kiwi IT Solutions Ltd

365v Hosted Desktop Service

The 365v Hosted Desktop will provide the experience of a full desktop including core business applications in an internet connected, highly secure environment without the significant capital expenditure that would be required to develop suitable in-house solutions.


  • Customizable Hosted Desktop Solutions
  • Application Delivery
  • Secure Multi-Factor Authentication
  • 24/7/365 Support
  • Fully Scalable
  • ISO27001 and ISO9001 accredited provider
  • Citrix XenApp Technology


  • Reduces your IT operating and capital expenditure costs
  • Reduces your IT Support and Adminstration requirements
  • Users can work from any location using different devices
  • Fully managed, secure platform with full scalabity
  • 24/7/365 support available


£24.99 a person

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

8 4 3 0 6 4 0 5 3 3 7 3 9 4 7


Kiwi IT Solutions Ltd Tom May
Telephone: 0843 224 9301

Service scope

Service constraints
Kiwi IT continually improves its core infrastructure in order to provide the highest levels of service, therefore it is necessary to carry out essential works every so often.

This is planned and scheduled carefully with our clients to ensure that any disruption for customers and their services are kept to a minimum.
System requirements
  • Almost any software can be run within the hosted desktops
  • Third Party vendor licensing requirements need to be met

User support

Email or online ticketing support
Email or online ticketing
Support response times
1 hour response
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
All 365v customers have the same level of support from our dedicated support team including 24/7 support for the hosted platform, on-site support available on request.
Support available to third parties

Onboarding and offboarding

Getting started
An onsite audit and initial project discovery is conducted which includes a client survey. This is then followed by Project Initiation Documentation to be signed off by the client prior to the start date of the project which defines the scope and timescales involved. Onsite assistance for the 'Go live' is included together with the relevant user training.
Service documentation
Documentation formats
End-of-contract data extraction
Data will be extracted via the Cloud Department and provided to the client using encrypted external media.
End-of-contract process
At the end of the contract we will assist with the process of extracting the data for handover, any other costs incurred will be agreed with the client in advance.

Using the service

Web browser interface
Using the web interface
The 365v Hosted Desktop platform is accessible to any supported device from any location at any time. Users connect via a supported web browser which facilitates access to their hosted desktop. This service is strictly configured and administered via Kiwi's internal Cloud department. All user and administration requests must come via the Service desk.
Web interface accessibility standard
None or don’t know
How the web interface is accessible
The Web interface is support by but not limited to the following Web browsers:

Internet Explorer 10
Microsoft Edge
Mozilla Firefox
Google Chrome
Web interface accessibility testing
Testing has been completed by the software vendors.
Command line interface


Scaling available
Independence of resources
The platform is continually monitored for performance. The underlying hardware providing the service always has more resources available to reduce the risks associated with reduced performance due to other users demands.
Usage notifications


Infrastructure or application metrics
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
Reporting types
Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
What’s backed up
  • Files
  • Virtual Machines
  • Databases
Backup controls
Backups are taken three times a day as standard, 6am, 12am and 6pm. Additional backups can be performed as required which is discussed within the initial project discovery process.
Datacentre setup
Single datacentre with multiple copies
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
Standard SLA of 99.999% for service availability.

Credits are retrospectively issued on monthly basis for any loss of service outside of the agreed SLA.
Approach to resilience
The hosted desktop platform is housed at a secure UK based Tier -IV datacentre providing redundant power, cooling and internet connections. The server and network infrastructure in place includes High Availability and failover including both SAN and Hypervisor based replication.
Outage reporting
Email alerts

Identity and authentication

User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Access restrictions are in place based on seniority of staff, different accounts are used for traceability.
Access restriction testing frequency
At least once a year
Management access authentication
Dedicated link (for example VPN)
Devices users manage the service through
Dedicated device over multiple services or networks

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
Lloyds Register
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
Nothing excluded
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Kiwi IT operate to industry-recognised best practice information security processes, within the framework of ISO 27001, to preserve the confidentiality, integrity and availability of information.

We plan and engineer our delivery processes around the industry-recognised ISO9001 and ISO 27000 standards ensuring that we deliver to the highest standards of IT Service Management.

We have an IMS management team with clear accountability that support the continuous review and improvement of the company IMS.

We apply quality, local and industry standards that apply to Kiwi IT operations. The continual improvement of Kiwi’s IT Service Management and supporting processes is a key discipline promoted across the business.

We operate to our documented policies, procedures and processes where applicable.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We follow our internal change management process prior to any changes being implemented. All stages are have two be authorised and documented within our change management documentation and the relevant staff notified.

Patch testing is completed and security implications assessed prior to changes to the platform.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Secuirty audits are performed regularly with and treats such as Viruses, malware, etc. are constantly assessed. We have enrolled for information alerts from the relevant vendors and patches are applied as soon as possible (usually within 24 hours) following our change control process.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Regular security audits are performed regularly and discussed internally. We have enrolled for information alerts from the multiple vendors. All relevant patches are applied as soon as possible (usually within 24 hours) following our change control process.
Incident management type
Supplier-defined controls
Incident management approach
Incidents are logged via phone calls, email, or the client web portal. They are automatically classified based on the criteria and severity prior to being assigned by a manager to the appropriate team. Incident reports are generated automatically and sent to clients either weekly or monthly based on their preference.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Who implements virtualisation
Virtualisation technologies used
How shared infrastructure is kept separate
VLAN's together with restricted permissions are used to separate services between clients.

Energy efficiency

Energy-efficient datacentres
Description of energy efficient datacentres
Kiwi IT Solution use Six Degrees Datacentre in Warickshire, Six Degrees worked with IT sustainability consultancy Carbon3IT to review all of their UK data centres for energy efficiency best practices and their alignment with the EU Code of Conduct.


£24.99 a person
Discount for educational organisations
Free trial available
Description of free trial
30 days free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.