Qubic Group plc
Archiving, Backup & Disaster Recovery
Think Nexus Continuity provides multi-layered approach to try to avoid potential disaster and a series of measures designed to get you up and running as quickly as possible in the event of an incident such as Fire, Ransomware or virus attack. For more information go to www.qubicgroup.com
Features
- Data Backup
- Replication Server
- Archive Server
- Backup Circuit
- Resilient SIP Trunks
- Email security, archiving, and continuity
- Resilient Cloud telephony
Benefits
- Organisation not impacted by loss of data
- Avoid considerable downtime when a server needs to be re-built
- Data available in archive servers if required for regulatory proposes
- To avoid loss of data and/or voice communications to site
- Ensure SIP Trunks do not fail within the Network.
- Avoid loss of email to Virus, Ransomware or server failure
- Gives five 99999's uptime
Pricing
£30 a licence a month
- Education pricing available
- Free trial available
Service documents
Framework
G-Cloud 12
Service ID
8 7 2 6 2 6 3 9 6 4 3 9 1 6 9
Contact
Qubic Group plc
Charlie Riddle
Telephone: 02086017000
Email: Charlie.Riddle@qubicgroup.com
Service scope
- Service constraints
- Planned Maintenance with Prior Notice
- System requirements
-
- Windows operating system
- Linux operating system
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
-
Ticket response times depend on the severity of the incident being reported.
Priority 0 - Major issues relating to severe system outages are responded to within 1 hour and resolved within 2 hours.
Priority 1 - Critical issues relating to severe system degradation responded to within 2 hours and resolved within 4 hours.
Priority 2 - Medium issues impacting an individual or single user preventing base functionality responded to within 3 hours and resolved within 6 hours
Priority 3 - Low issues impacting a single user responded to within 4 hours and resolved within 8 hours.
Further available at www.qubicgroup.com - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 A
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Round the Clock (24/7) includes:-
NOC Monitoring (24/7)
NOC fix, helpdesk support, remote server support, On-site server support
Available at additional costs:-
Monthly patches and updates, Antivirus, anti-spam monitoring and fix, system changes, user modifications, admin tasks
Hardware warranties and software license management
Prices start £200 per on prem or physical server/£150 per virtual machine
Working Hours (9 - 5) includes:-
NOC Monitoring (24/7)
NOC fix, helpdesk support, remote server support, On-site server support
Available at additional costs:-
Monthly patches and updates, Antivirus, anti-spam monitoring and fix, system changes, user modifications, admin tasks
Hardware warranties and software license management
Prices start £125 per on prem or physical server/£75 per virtual machine
Extended Hours Support (8 - 8) includes:-
NOC Monitoring (24/7)
NOC fix, helpdesk support, remote server support, On-site server support
Available at additional costs:-
Monthly patches and updates, Antivirus, anti-spam monitoring and fix, system changes, user modifications, admin tasks
Hardware warranties and software license management
Prices start £125 per on prem or physical server/£75 per virtual machine
Desktop support available from
24/7 Full support £30 per user
Extended Hours (8 - 8) support £25 per user
Working Hours (9 - 5) support £18 per user - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
As part of the migration to Qubic Group a dedicated Project Manager is assigned who will work closely with the customer to design the migration plan.
This plan will include:-
Installation of new hardware Provisioning of new hardware/virtual machines.
Any onsite training requirements for users rollout of support services including information on how to contact Qubic's support teams Decommissioning of old hardware including removal from site Cancellation and closing down of any legacy contracts with former suppliers
As well as a project manager each customer will be assigned an Account Manager to hand hold their relationship with Qubic during the lifespan of the relationship - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
-
As part of the exit of a customer from Qubic Group our Cancellation team will validate and confirm the process of the data migration away from Qubic Group.
Data can be extracted and sent to a customer as per customers requirements and will always be encrypted for security.
The original data with Qubic Group can continue to be stored until the customer confirms that the data can be deleted, subject to commercial storage considerations being clarified. - End-of-contract process
-
At the point of cancellation of a contract all services included in the contract will continue until the contract end date/point of exit.
As part of the cancellation process it will be clarified what actions are required in relation to:-
Returning of any data stored;
Returning of any hardware stored in the Qubic Group datacentres;
Cancellation of any 3rd party contracts in relation of the services provided.
Additional costs will be incurred if any (but not exclusively limited too) of the above actions require engineers or resources to perform additional tasks not included in the original contract.
Costs will also be incurred if any 3rd party agreements which are to be cancelled or terminated but have not reached the end of the contract and as such incur a cancellation fee or charge.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Service order portal currently being developed
- Web interface accessibility standard
- WCAG 2.1 A
- Web interface accessibility testing
- Service order portal currently being developed
- API
- No
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- Using the command line interface
- Command line interface can be used with Linux/shell/bash scripts and windows based servers command line and powershell. these allow you (depending on permissions) provision new servers and instances and manage server service and resources. Users can make changes by opening command prompt or powershell or access to the linux instance. Limitations are dependent on permissions.
Scaling
- Scaling available
- Yes
- Scaling type
-
- Automatic
- Manual
- Independence of resources
-
Within our shared physical IaaS/PaaS platform - Qubic segregates clients’ systems and data by assigning each client IaaS their own VLAN and segregated virtual firewall (vFirewall) technology.
If required, we can also provide dedicated PaaS platforms to clients and again these are segregated via VLANS and vFirewalls technology. All client networks are either physically or virtually segregated from each other. - Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- VEEAM, SOLARWINDS, DATTO, SHADOW PROTECT,
Staff security
- Staff security clearance
- Conforms to BS7858:2012
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Hardware containing data is completely destroyed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Data Files
- Operating Systems
- Virtual Machines
- Databases
- Physical Machines
- Configuration
- Bare Metal
- System state
- Images
- Resilient fail overs
- Backup controls
-
A backup policy and process document is established during migration which sets out all the parameters of the backups to be taken including
data to be backup
backup process ie full, incremental etc
time of backups
snapshots policy
data retention policy
restore policy
restore testing including establishing a regular backup restore test - Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Users schedule backups through a web interface
- Backup recovery
-
- Users can recover backups themselves, for example through a web interface
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection between networks
- Point to Point private WAN network extensions
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
Qubic Group SLA is that the service is available 99.999% as measured over the calendar month with the exception of:-
any planned and notified maintenance;
any period of force majeure;
any act or omission of the customer either directly or indirectly causes the service interruption.
In the event of service interruption the customer can claim from Qubic Group service credits which are calculated as per the terms of conditions available from Qubic Group.
Services credits must be claimed within 28 days of the period of outage. - Approach to resilience
-
The Qubic Group datacentres are N+1 and Tier 3 datacentres with all operations designed to be resilient.
Further information is available on request. - Outage reporting
-
In the event of outage impacting services to Qubic Groups customers the communication to customers is managed centrally from the ticket/service desk system.
All communication will be logged into the system with regular updates. Those customers impacted receive the necessary updates via email and the customer facing portal if they have access to it.
Any customer logging a service ticket in the event of an outage will also receive updates on their ticket as well as the main central ticket.
Account managers will also be on hand to call customers and discuss the outage.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
-
All users are assigned access based on users defined roles with only the relevant access for their role being provided.
A full audit trail is available of all logons and actions undertaken to provide a full history of user access and management.
Access management reviews are conducted on a regular basis to ensure correct levels of access are maintained by users per role. - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Dedicated device on a government network (for example PSN)
- Dedicated device over multiple services or networks
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- QMS International
- ISO/IEC 27001 accreditation date
- 25/11/2014
- What the ISO/IEC 27001 doesn’t cover
- N/a
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- Yes
- Any other security certifications
-
- Cyber Essentials
- IASME Goverance
- CiSP
- ISO9001:2015
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Qubic Group is ISO9001 and 27001 accredited.
Within the Qubic Group we have a strictly adhered to Information Security Management System (ISMS) Policy and Procedure.
The ISMS Policy and Procedure is reviewed and set by the The Information Management Forum within Qubic Group. This forum is made up of:-
ISMS Manager who oversees the forum.
The remainder of the forum is made up of Qubic Managing Directors, Operations Manager, Service Manager, and Senior Data Engineer.
The forum is responsible for Policy and Procedure reviews, documentation, training awareness and induction, incident management and ISMS audits.
The Policy and Procedure is located on the company shared drive for all staff to access.
All new joiners are required to read and sign off the policy and procedure as part of their induction process.
All existing other staff sign off the policy and procedure annually.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
IT change management is a controlled process and any required internal changes to the computing environment are registered by raising a Case Record in the CRM system.
The nature of the change, rationale and any security implications are recorded. Changes to customer networks are similarly requested and logged in the CRM system.
All concerned parties are informed of the status of the request as changes progressed and implemented. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Technical vulnerabilities identified as a result of the implementation of the ISMS are reviewed and addressed as detailed in this Manual.
Patches required to address vulnerabilities in systems are white line tested by a third party provider before being authorised for deployment. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Qubic Group use proactive monitoring tools to continuously monitor the status of the environments and infrastructures that are delivered to customers.
The monitoring tool will issue an alarm if one of the set parameters is breached or the status of the service falls into a defined category. The alarm will be picked by the Qubic Group Network Operations Centre (NOC) and the issue will then be investigated and resolved.
All alarms are initially investigated as a P0 Critical incident. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Where a Incident is reported, a ticket is raised and allocated to a Qubic engineer who will ascertain the severity of the issue by contacting the customer and working with them to diagnose the incident.
All incidents will be logged within the Qubic ticketing system.
Where a workaround has been implemented and rectification works are required to fully complete the incident Qubic will engage the ‘Problem Management team’ made up of Senior Directors, Management, and Technical Staff who would jointly agree the plan of action to rectify.
A Major Incident Report (MIR) is completed and shared with the customer.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- Other
- Other virtualisation technology used
- VMWare and HyperV
- How shared infrastructure is kept separate
-
Within our shared physical IaaS/PaaS platform - Qubic segregates clients’ systems and data by assigning each client IaaS their own VLAN and segregated virtual firewall (vFirewall) technology.
If required, we can also provide dedicated PaaS platforms to clients and again these are segregated via VLANS and vFirewalls technology. All client networks are either physically or virtually segregated from each other.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
-
Our London Data Centre is a participant of the EU Code of Conduct on Data Centres’ Energy Efficiency
The Code of Conduct has an equipment and system-level scope, focusing on two primary areas – the IT load (IT capacity available for the power consumed) and facilities load (equipment and systems that support the IT load, such as cooling systems, PDUs, and UPS).
Our Kent based Data Centre operates a revolutionary evaporation cooling system, completely negating the need for mechanical cooling, providing a positive impact for both the company's efficiency and the wider environment.
For 100% of the year, the data centre utilises fresh air cooling, brought in from outside and filtered to clean room standards to eliminate contamination, passing into the data centre via a bank of multiple fans.
A reverse osmosis plant purifies water which the system then uses to produce a very fine mist. Within a large chamber, this moisture is used to raise the humidity of the slow moving air which passes through, decreasing its temperature. The evaporation system also acts as a room humidifier, and is supported by dual water mains, ensuring that it is resilient against mains failure. This approach is 2N resilient.
Pricing
- Price
- £30 a licence a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
-
Qubic Group is able to offer a Free Proof of Concept VEEAM cloud connect for a 1 month period to demonstrate the backup solution and resources available through VEEAM
Depending on requirements
Engineer resources are chargable