Providing private cloud with a managed service. The service is designed around your needs, delivering a virtual datacentre providing compute resources for your applications. Located on ListX site security is at the heart of what we do delivery her performance systems to our clients need.
- Easy to use control panel
- Enterprise anti-virus
- Firewalls NGFW and security gateways
- Software licensing for all Microsoft services included
- Resilient provision minimum N+1 resilience with automatic failover
- All services are monitored and faults resolved
- Service can be stand-alone or hybrid
- Virtual Datacentre
- Fully Managed Solution
- Virtual Datacentre
- Enterprise-grade Anti-virus
- Direct contact with assigned support engineer(s) by email
- Services monitored and supported 24x7
- Import/Export the VMs and data via management console
- Seeding services available if required
- Initial setup assistance available
- Monitoring and logging available
- 99.9% financially-backed service uptime guarantee
- No Hardware investment required
£53.13 per virtual machine per month
- Education pricing available
- Pricing document
- Skills Framework for the Information Age rate card
- Service definition document
- Terms and conditions
Blue Sky Systems Ltd
03300 101 550
|Service constraints||The extensive list of OSes supported by VMware is the only significant limit on this service.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
Full support Weekdays 8am to 6pm.
Service affecting issues support provided 24/7.
|User can manage status and priority of support tickets||No|
|Phone support availability||24 hours, 7 days a week|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
We operate on the principle of technical staff working directly with customers.
A dedicated support engineer will be assigned to the end customer and they will be the primary point of contact for any support queries (cover is provided for absences and busy periods).
An on-call out of hours line operates 24x7 for any significant service issues.
|Support available to third parties||Yes|
Onboarding and offboarding
We provide initial service setup and an initial introduction to the management systems for each customer.
System administrator documentation is also available.
Onboarding migration services are available to assist with all aspects of onboarding, and for additional activities our SFIA rate card is applicable.
Assistance for users on-boarding to the services is also available as required.
|End-of-contract data extraction||
The customer will have administrative access to collect all of their data at any time.
We can also provide data seeding/copy services as required.
Service cancellation and decommissioning of systems is included in our service fees.
If seeding or other engineering to assist with migrations are required then these will be additional and either included in our pricing schedule or can be called off as per our SFIA rate card.
Using the service
|Web browser interface||Yes|
|Using the web interface||Web Interface is provided to allow self-management of VMs within Allocated Virtual Data Centre. This includes provisioning, management and removal at the end of service.|
|Web interface accessibility standard||None or don’t know|
|How the web interface is accessible||No restrictions known, and as an industry standard solution it should operate OK.|
|Web interface accessibility testing||None completed, although an industry standard solution so should operate OK.|
|Command line interface||No|
|Independence of resources||Capacity management ensures capacity on storage and compute systems supporting this service, allowing the customer to grow without disruption to their service.|
|Infrastructure or application metrics||Yes|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Baseline Personnel Security Standard (BPSS)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||No|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least every 6 months|
|Penetration testing approach||In-house|
|Protecting data at rest||
|Data sanitisation process||Yes|
|Data sanitisation type||
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Backup and recovery
|Backup and recovery||Yes|
|What’s backed up||
Backups are configured and managed as part of the backup service, according to the agreed backup plans.
Backup alerting/reporting can be made available to the customer through email reporting as required.
|Datacentre setup||Multiple datacentres|
|Scheduling backups||Supplier controls the whole backup schedule|
|Data protection between buyer and supplier networks||
|Data protection within supplier network||Other|
|Other protection within supplier network||Internal networks are protected by physical security of the datacentre space, coupled with VLAN and Storage LUN segregation between every customer.|
Availability and resilience
|Guaranteed availability||99.9% Uptime Guarantee with Service Credits if service level not met.|
|Approach to resilience||All key hosting equipment is resilient (Routing, Switching, Hosts). Storage systems are dual controller and a minimum of dual disk resilient.|
|Outage reporting||Email alerts.|
Identity and authentication
|Access restrictions in management interfaces and support channels||All management networks are isolated from user and customer networks, with specific access rules and user-traceable accounts used throughout.|
|Access restriction testing frequency||At least once a year|
|Management access authentication||
|Devices users manage the service through||
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||Between 1 month and 6 months|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||British Assessment Bureau|
|ISO/IEC 27001 accreditation date||01/07/2018|
|What the ISO/IEC 27001 doesn’t cover||Customer on-site systems (as cannot control those within our ISMS).|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||We have a full ISMS in place which is internally audited and externally assessed on an annual basis to ISO 27001.|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||Changes are managed through ISMS ISO 27001 and Account Management processes.|
|Vulnerability management type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Vulnerability management approach||
This forms part of our ISO 27001 ISMS.
CVE and vendor bulletins are monitored and applied following a risk-based approach with high risk items resolved as a high priority.
|Protective monitoring type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Protective monitoring approach||
Protective monitoring is achieved as part of our ISO 27001 ISMS processes.
Incident responses and investigation policies and processes are specifically defined and followed and monitored.
Where notifications are required to clients and regulators these are also built into these processes.
|Incident management type||Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402|
|Incident management approach||
Integrated into ISO 27001 compliant ISMS policies and processes.
Users report incidents to their normal support contacts, and customer technical contact will receive incident reports from us.
|Approach to secure software development best practice||Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)|
Separation between users
|Virtualisation technology used to keep applications and users sharing the same infrastructure apart||Yes|
|Who implements virtualisation||Supplier|
|Virtualisation technologies used||VMware|
|How shared infrastructure is kept separate||Services are isolated using Virtualisation (VMware), Network (VLAN and Firewall interface) and Storage (LUN) isolation methods.|
|Description of energy efficient datacentres||
Supported by the following accreditations:
- ISO 14001:2015 for Environmental Management,
- ISO 50001 accreditation for Energy Management.
- EU Code of Conduct for Data Centres.
|Price||£53.13 per virtual machine per month|
|Discount for educational organisations||Yes|
|Free trial available||No|