Blue Sky Systems Ltd

Hosted Servers

Providing private cloud with a managed service. The service is designed around your needs, delivering a virtual datacentre providing compute resources for your applications. Located on ListX site security is at the heart of what we do delivery her performance systems to our clients need.


  • Easy to use control panel
  • Enterprise anti-virus
  • Firewalls NGFW and security gateways
  • Software licensing for all Microsoft services included
  • Resilient provision minimum N+1 resilience with automatic failover
  • All services are monitored and faults resolved
  • Service can be stand-alone or hybrid
  • Virtual Datacentre
  • Fully Managed Solution


  • Virtual Datacentre
  • Enterprise-grade Anti-virus
  • Direct contact with assigned support engineer(s) by email
  • Services monitored and supported 24x7
  • Import/Export the VMs and data via management console
  • Seeding services available if required
  • Initial setup assistance available
  • Monitoring and logging available
  • 99.9% financially-backed service uptime guarantee
  • No Hardware investment required


£53.13 per virtual machine per month

  • Education pricing available

Service documents


G-Cloud 11

Service ID

9 4 1 2 2 6 9 7 3 8 1 6 1 2 4


Blue Sky Systems Ltd

Sara Hammett

03300 101 550

Service scope

Service constraints
The extensive list of OSes supported by VMware is the only significant limit on this service.
System requirements
  • Likely that a VPN will be required to secure traffic.
  • Software needs to be x86/x86_64

User support

Email or online ticketing support
Email or online ticketing
Support response times
Full support Weekdays 8am to 6pm.
Service affecting issues support provided 24/7.
User can manage status and priority of support tickets
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
We operate on the principle of technical staff working directly with customers.
A dedicated support engineer will be assigned to the end customer and they will be the primary point of contact for any support queries (cover is provided for absences and busy periods).
An on-call out of hours line operates 24x7 for any significant service issues.
Support available to third parties

Onboarding and offboarding

Getting started
We provide initial service setup and an initial introduction to the management systems for each customer.
System administrator documentation is also available.
Onboarding migration services are available to assist with all aspects of onboarding, and for additional activities our SFIA rate card is applicable.
Assistance for users on-boarding to the services is also available as required.
Service documentation
End-of-contract data extraction
The customer will have administrative access to collect all of their data at any time.
We can also provide data seeding/copy services as required.
End-of-contract process
Service cancellation and decommissioning of systems is included in our service fees.
If seeding or other engineering to assist with migrations are required then these will be additional and either included in our pricing schedule or can be called off as per our SFIA rate card.

Using the service

Web browser interface
Using the web interface
Web Interface is provided to allow self-management of VMs within Allocated Virtual Data Centre. This includes provisioning, management and removal at the end of service.
Web interface accessibility standard
None or don’t know
How the web interface is accessible
No restrictions known, and as an industry standard solution it should operate OK.
Web interface accessibility testing
None completed, although an industry standard solution so should operate OK.
Command line interface


Scaling available
Scaling type
Independence of resources
Capacity management ensures capacity on storage and compute systems supporting this service, allowing the customer to grow without disruption to their service.
Usage notifications
Usage reporting


Infrastructure or application metrics
Metrics types
  • CPU
  • Disk
  • Memory
  • Network
  • Number of active instances
Reporting types
  • Real-time dashboards
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Protecting data at rest
  • Physical access control, complying with another standard
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
  • Hardware containing data is completely destroyed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
What’s backed up
  • Virtual Machine Configuration files
  • Virtual Machine Hard Drive Contents
  • Individual Files within the Virtual Machine
  • Database Individual Items within the Virtual Machine
  • Active Directory Individual Objects within the Virtual Machine.
Backup controls
Backups are configured and managed as part of the backup service, according to the agreed backup plans.
Backup alerting/reporting can be made available to the customer through email reporting as required.
Datacentre setup
Multiple datacentres
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
  • Users can recover backups themselves, for example through a web interface
  • Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
Other protection within supplier network
Internal networks are protected by physical security of the datacentre space, coupled with VLAN and Storage LUN segregation between every customer.

Availability and resilience

Guaranteed availability
99.9% Uptime Guarantee with Service Credits if service level not met.
Approach to resilience
All key hosting equipment is resilient (Routing, Switching, Hosts). Storage systems are dual controller and a minimum of dual disk resilient.
Outage reporting
Email alerts.

Identity and authentication

User authentication
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
All management networks are isolated from user and customer networks, with specific access rules and user-traceable accounts used throughout.
Access restriction testing frequency
At least once a year
Management access authentication
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
British Assessment Bureau
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
Customer on-site systems (as cannot control those within our ISMS).
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
We have a full ISMS in place which is internally audited and externally assessed on an annual basis to ISO 27001.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Changes are managed through ISMS ISO 27001 and Account Management processes.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
This forms part of our ISO 27001 ISMS.
CVE and vendor bulletins are monitored and applied following a risk-based approach with high risk items resolved as a high priority.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Protective monitoring is achieved as part of our ISO 27001 ISMS processes.
Incident responses and investigation policies and processes are specifically defined and followed and monitored.
Where notifications are required to clients and regulators these are also built into these processes.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Integrated into ISO 27001 compliant ISMS policies and processes.
Users report incidents to their normal support contacts, and customer technical contact will receive incident reports from us.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Who implements virtualisation
Virtualisation technologies used
How shared infrastructure is kept separate
Services are isolated using Virtualisation (VMware), Network (VLAN and Firewall interface) and Storage (LUN) isolation methods.

Energy efficiency

Energy-efficient datacentres
Description of energy efficient datacentres
Supported by the following accreditations:
- ISO 14001:2015 for Environmental Management,
- ISO 50001 accreditation for Energy Management.
- EU Code of Conduct for Data Centres.


£53.13 per virtual machine per month
Discount for educational organisations
Free trial available

Service documents

Return to top ↑