Blue Sky Systems Ltd

Hosted Servers

Providing private cloud with a managed service. The service is designed around your needs, delivering a virtual datacentre providing compute resources for your applications. Located on ListX site security is at the heart of what we do delivery her performance systems to our clients need.


  • Easy to use control panel
  • Enterprise anti-virus
  • Firewalls NGFW and security gateways
  • Software licensing for all Microsoft services included
  • Resilient provision minimum N+1 resilience with automatic failover
  • All services are monitored and faults resolved
  • Service can be stand-alone or hybrid
  • Virtual Datacentre
  • Fully Managed Solution


  • Virtual Datacentre
  • Enterprise-grade Anti-virus
  • Direct contact with assigned support engineer(s) by email
  • Services monitored and supported 24x7
  • Import/Export the VMs and data via management console
  • Seeding services available if required
  • Initial setup assistance available
  • Monitoring and logging available
  • 99.9% financially-backed service uptime guarantee
  • No Hardware investment required


£53.13 per virtual machine per month

  • Education pricing available

Service documents

G-Cloud 11


Blue Sky Systems Ltd

Sara Hammett

03300 101 550

Service scope

Service scope
Service constraints The extensive list of OSes supported by VMware is the only significant limit on this service.
System requirements
  • Likely that a VPN will be required to secure traffic.
  • Software needs to be x86/x86_64

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Full support Weekdays 8am to 6pm.
Service affecting issues support provided 24/7.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels We operate on the principle of technical staff working directly with customers.
A dedicated support engineer will be assigned to the end customer and they will be the primary point of contact for any support queries (cover is provided for absences and busy periods).
An on-call out of hours line operates 24x7 for any significant service issues.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We provide initial service setup and an initial introduction to the management systems for each customer.
System administrator documentation is also available.
Onboarding migration services are available to assist with all aspects of onboarding, and for additional activities our SFIA rate card is applicable.
Assistance for users on-boarding to the services is also available as required.
Service documentation No
End-of-contract data extraction The customer will have administrative access to collect all of their data at any time.
We can also provide data seeding/copy services as required.
End-of-contract process Service cancellation and decommissioning of systems is included in our service fees.
If seeding or other engineering to assist with migrations are required then these will be additional and either included in our pricing schedule or can be called off as per our SFIA rate card.

Using the service

Using the service
Web browser interface Yes
Using the web interface Web Interface is provided to allow self-management of VMs within Allocated Virtual Data Centre. This includes provisioning, management and removal at the end of service.
Web interface accessibility standard None or don’t know
How the web interface is accessible No restrictions known, and as an industry standard solution it should operate OK.
Web interface accessibility testing None completed, although an industry standard solution so should operate OK.
Command line interface No


Scaling available Yes
Scaling type Manual
Independence of resources Capacity management ensures capacity on storage and compute systems supporting this service, allowing the customer to grow without disruption to their service.
Usage notifications Yes
Usage reporting Email


Infrastructure or application metrics Yes
Metrics types
  • CPU
  • Disk
  • Memory
  • Network
  • Number of active instances
Reporting types
  • Real-time dashboards
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach In-house
Protecting data at rest
  • Physical access control, complying with another standard
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
  • Hardware containing data is completely destroyed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Backup and recovery Yes
What’s backed up
  • Virtual Machine Configuration files
  • Virtual Machine Hard Drive Contents
  • Individual Files within the Virtual Machine
  • Database Individual Items within the Virtual Machine
  • Active Directory Individual Objects within the Virtual Machine.
Backup controls Backups are configured and managed as part of the backup service, according to the agreed backup plans.
Backup alerting/reporting can be made available to the customer through email reporting as required.
Datacentre setup Multiple datacentres
Scheduling backups Supplier controls the whole backup schedule
Backup recovery
  • Users can recover backups themselves, for example through a web interface
  • Users contact the support team

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network Other
Other protection within supplier network Internal networks are protected by physical security of the datacentre space, coupled with VLAN and Storage LUN segregation between every customer.

Availability and resilience

Availability and resilience
Guaranteed availability 99.9% Uptime Guarantee with Service Credits if service level not met.
Approach to resilience All key hosting equipment is resilient (Routing, Switching, Hosts). Storage systems are dual controller and a minimum of dual disk resilient.
Outage reporting Email alerts.

Identity and authentication

Identity and authentication
User authentication
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels All management networks are isolated from user and customer networks, with specific access rules and user-traceable accounts used throughout.
Access restriction testing frequency At least once a year
Management access authentication
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 British Assessment Bureau
ISO/IEC 27001 accreditation date 01/07/2018
What the ISO/IEC 27001 doesn’t cover Customer on-site systems (as cannot control those within our ISMS).
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes We have a full ISMS in place which is internally audited and externally assessed on an annual basis to ISO 27001.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Changes are managed through ISMS ISO 27001 and Account Management processes.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach This forms part of our ISO 27001 ISMS.
CVE and vendor bulletins are monitored and applied following a risk-based approach with high risk items resolved as a high priority.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach Protective monitoring is achieved as part of our ISO 27001 ISMS processes.
Incident responses and investigation policies and processes are specifically defined and followed and monitored.
Where notifications are required to clients and regulators these are also built into these processes.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach Integrated into ISO 27001 compliant ISMS policies and processes.
Users report incidents to their normal support contacts, and customer technical contact will receive incident reports from us.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart Yes
Who implements virtualisation Supplier
Virtualisation technologies used VMware
How shared infrastructure is kept separate Services are isolated using Virtualisation (VMware), Network (VLAN and Firewall interface) and Storage (LUN) isolation methods.

Energy efficiency

Energy efficiency
Energy-efficient datacentres Yes
Description of energy efficient datacentres Supported by the following accreditations:
- ISO 14001:2015 for Environmental Management,
- ISO 50001 accreditation for Energy Management.
- EU Code of Conduct for Data Centres.


Price £53.13 per virtual machine per month
Discount for educational organisations Yes
Free trial available No

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑