Flint Studios Ltd

Kentico hosting through Microsoft Azure

An Kentico Site hosted Azure Webapps which is highly available and scalable to your business needs.

Features

  • High Availability
  • Auto-scaling during high traffic

Benefits

  • Recognised and trusted platform
  • Flexible costs

Pricing

£0.071 per unit per hour

Service documents

G-Cloud 10

949759550782361

Flint Studios Ltd

Jeremy Biggerstaff

+44 (0) 2890455554

jeremy@flintstudios.co.uk

Service scope

Service scope
Service constraints N/A
System requirements N/A

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Email and ticketing system for support

Monday to Friday 9-5 support with discretionary weekend support when planned or in extreme circumstances.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support No
Support levels Support with all aspects of hosting and managing/developing Umbraco Webapps/Sites
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Flint Studios provides comprehensive training services that encompass both planning and delivery. Our approach is designed to support both new implementations, updates and ad hoc training needs and drive overall adoption, sustainability and satisfaction with systems. We use both face to face and online training services with user documentation provided.
Service documentation Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction Flint Studios engages with clients before and during an offboarding process to facilitate seamless data extraction through the packaging of source code, hosting configurations, and database dumps. All data is password protected and sent over secure channels.
End-of-contract process Our approach to off-boarding clients and projects is a highly professional and well structured process. We strongly believe that all client relationships should be closed appropriately, in a timely manner and with integrity. We employ an exit strategy that is agreed specifically between ourselves and the client, taking into consideration the pertinent requirements of their particular project.

When off-boarding a project we always adhere to the following: hand over of all documentation, data, licenses and source code pertinent to the project, and we provide an opportunity for face-to-face or telephone communication during the exit period as liaison with in-house or third party staff to facilitate the close down of a project.

Using the service

Using the service
Web browser interface Yes
Using the web interface Users are able to log in to the admin panels of their sites where they can update prices/products/shipping costs etc.
Web interface accessibility standard None or don’t know
How the web interface is accessible Website admin panels are by default restricted to only be accessible from certain IP's.
Web interface accessibility testing N/A
API No
Command line interface No

Scaling

Scaling
Scaling available Yes
Scaling type Automatic
Independence of resources All services are isolated from each-other and no service is capable of consuming all of any shared resources
Usage notifications Yes
Usage reporting Email

Analytics

Analytics
Infrastructure or application metrics Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
Reporting types Reports on request

Resellers

Resellers
Supplier type Reseller providing extra support
Organisation whose services are being resold Hosting, Migration and Support

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Backup and recovery

Backup and recovery
Backup and recovery Yes
What’s backed up
  • Webapps
  • Databases
Backup controls Backup is a fully managed service
Datacentre setup
  • Multiple datacentres with disaster recovery
  • Multiple datacentres
  • Single datacentre with multiple copies
  • Single datacentre
Scheduling backups Supplier controls the whole backup schedule
Backup recovery Users contact the support team

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Where customers pay for the feature - multi region high availability infrastructure is used to reduce risk on downtime.
Approach to resilience Multi region replication and load balancing across different data centres
Outage reporting Multiple Monitoring Services that notify through email or push notifications

Identity and authentication

Identity and authentication
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Management interfaces are locked down to IP addresses and protected by obfuscated admin page names and where possible 2FA and public/private key authentication
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Cyber Essentials

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Flint Studios works in partnership with Microsoft to ensure our approach to security governance is in line with best practices. Microsoft adheres to ISO 27001 and ISO27018.
Information security policies and processes Flint Studios works in partnership with Microsoft to ensure we offer a robust approach to security governance. The Company is governed by an integrated suite of information security policies. Under the top level Information Security Policy are second-level documents with specific focus on Acceptable Use, Antivirus Protection, Asset Management, Business Continuity Management, Data Protection, Password Management, Personnel Management, Supply Chain Management and many others.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Security policies are regularly reviewed. changes to any such policy are assessed and passed by our board before implementation
Vulnerability management type Supplier-defined controls
Vulnerability management approach Patches are deployed on a fortnightly basis unless released as critical by vendor. Keep up with news across various i.t. forums about new security products or potential threats that have been identified in the services we provide.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Monitoring is carried out on all infrastructure and usually probes within minutes. During business hours issues are picked up within minutes and usually resolved within the hour.
Incident management type Supplier-defined controls
Incident management approach Incidents are picked up from monitoring and dealt with swiftly - in extreme cases a report will be provided about the cause of the issue and the steps taken to resolve and prevent further incidents

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart No

Energy efficiency

Energy efficiency
Energy-efficient datacentres No

Pricing

Pricing
Price £0.071 per unit per hour
Discount for educational organisations No
Free trial available No

Documents

Documents
Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑