Backup Technology

Asigra Public Cloud Backup

Backup Technology's Asigra based, Public Cloud Backup Solution combines the very best in Hardware, Software and Support overlay services to provide one of the best Public Cloud Backup Solutions on the market, suitable for organisations of all sizes.

Features

  • Agentless Technology
  • Recovery and Restore Assurance
  • Secure & Compliant
  • Automated and Efficient
  • Single Comprehensive Solution
  • Wan Optimised
  • Extensive platform support
  • Complete data sovereignty control

Benefits

  • Fully Managed Backup Solution
  • Proactive monitoring
  • Bespoke web based monitoring portal
  • Centralised backup management GUI
  • Dedicated account and technical management

Pricing

£150 to £300 per terabyte per month

  • Free trial available

Service documents

G-Cloud 9

962071017044259

Backup Technology

Colin Speirs

0141 931 6400

gcloud-btl@iomart.com

Service scope

Service scope
Service constraints NA
System requirements
  • Windows OS
  • Mac OS
  • Novell OS
  • Linux

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Severity 1 (Critical Service Incident) - Within 15 mins Severity 2 (Critical Service Incident) - Within 15 mins Severity 3 (Non-Critical Service Incident) - Within 1hr Severity 4 (Minor Support Request) -
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels Our support teams are available 24/7 to respond to alerts, take calls, make decisions and act to ensure that your services are operating effectively every second of the day. The support desk is accredited to ISO20000-2011 and ISO27001-2013 standards and brings together 250 technical operations staff employed to cover everything with a guaranteed qualified engineering response within 15 minutes of notice. As part of our on-going commitment to service excellence iomart will assign a dedicated Account Manager (Service Delivery Manager) and Technical Manager to the client. Our approach to Account Management has been developed to provide a value added service to our customers. The Account Manager’s main role is to understand the core objectives of our clients’ businesses and ensure the services we are providing continually support the achievement of their goals.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Backup Technology provide a full onboarding service with onsite/online training with supporting Asigra User documentation.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Data can be extracted to an appropriate storage device defined by the client
End-of-contract process Off boarding will be priced on a time and materials basis

Using the service

Using the service
Web browser interface Yes
Using the web interface Backup Technology in conjunction with Asigra have developed an enterprise grade monitoring portal that allows individual users to report on their backup jobs. The portal completely integrates with Asigra, pulling through live data onto the portal. Because of the seamless integration of Asigra and the portal, everything is pre-configured removing any need for user intervention. When a new server is added into the DS-Client, the portal will automatically pull this data through to the front for a user to see. Reporting & auditing can also be managed within the portal as it will pull through the user interaction with the client.
Web interface accessibility standard None or don’t know
How the web interface is accessible The web interface is compatible with standard Windows accessibility options
Web interface accessibility testing No testing has been completed with assistive technology users.
API Yes
What users can and can't do using the API DS-NOC APIs, MSPs can integrate the management functionalities available on the Web Portal into any existing web site or application, allowing for the development of a custom interface to manage the DS-System. The DS-Client and DS-Mobile Client GUI can be customized according to Service Providers branding needs to offer comprehensive laptop protection services to end-users.
API automation tools OpenStack
API documentation Yes
API documentation formats Open API (also known as Swagger)
Command line interface Yes
Command line interface compatibility
  • Linux or Unix
  • Windows
  • MacOS
Using the command line interface Installation can be completed through the Command Line Interface Single-key input commands can change settings

Scaling

Scaling
Scaling available Yes
Scaling type Automatic
Independence of resources Backup Technology provision the Asigra service from our highly available data centre infrastructure. Each Data Centre is fully powered, secure, resilient and newly equipped to handle the demands of future computing trends such as high density computing, virtualisation, energy conservation, distributed storage and multi site disaster recovery. Offering a total of 7,000 m² of advanced Data Centre technology in 8 major UK cities, we are not hindered by lack of space, legacy operating systems or practices.
Usage notifications Yes
Usage reporting Email

Analytics

Analytics
Infrastructure or application metrics Yes
Metrics types
  • CPU
  • Disk
Reporting types
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
  • Hardware containing data is completely destroyed
Equipment disposal approach A third-party destruction service

Backup and recovery

Backup and recovery
Backup and recovery Yes
What’s backed up
  • Physical and Virtual Servers
  • Databases
  • Operating Systems
  • File Systems
  • Applications
  • Microsoft Office 365
  • Desktops, Workstations, Laptops, Tablets & Smartphones
  • AWS
  • Microsoft Azure
Backup controls There are three defined roles in the software DS Client Administrator, DS Client Backup Operator and DS Regular User. Depending on the group the user is designated to will define the level of permissions and activity that can be achieved by that user. Regular users have the least amount of privilege and cannot make any changes within the software once it is installed and configured.
Datacentre setup Multiple datacentres with disaster recovery
Scheduling backups Users schedule backups through a web interface
Backup recovery Users can recover backups themselves, for example through a web interface

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • Bonded fibre optic connections
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability The Asigra Cloud Platform will have a target uptime of 99.9% iomart shall supply provide the client at the end of each calendar month with a full report of Service Level performance and full calculations of any associated Service Credit.
Approach to resilience Regular testing and maintenance of infrastructure and the N+1 policy applied to data centres provides the basis of continuity controls. This is enhanced by the provision of multiple communication routes and the replication of iomart’s network infrastructure across iomart sites. iomart data centres are also located outside flight paths, flood plains, have no seismic threat, and are a minimum of 3km outside sites who could pose a potential accident or hazardous threat (as governed by HSE). Therefore, in the event of any given location being lost, the primary impact to iomart would be on office facilities, but with 6 UK Offices and 10 UK Data Centres providing hosting services and support, this impact is limited and mitigated with standing arrangements to relocate staff to the nearest iomart site.
Outage reporting Email alerts

Identity and authentication

Identity and authentication
User authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Access to all service interfaces (for consumers and providers) is constrained to authenticated and authorised individuals. Remote management access is authenticated and directly associated to authorised individuals rather than group accounts All managed systems monitored and access logged and tracked for auditing purposes
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device on a government network (for example PSN)
  • Dedicated device over multiple services or networks
  • Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 ISOQAR
ISO/IEC 27001 accreditation date 18/12/2008
What the ISO/IEC 27001 doesn’t cover NA
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation Yes
Security governance standards ISO/IEC 27001
Information security policies and processes The iomart Group adheres to the Security Classification Definitions as described in the Government Security Classifications Policy (GSCP). This is outlined and defined in section 5.3 of the iomart Quality Manual and forms part of iomarts overall integrated management system, which consists of UKAS / APMG / NCSC accredited systems. Notably; ISO 27001:2013 Information Security Management; ISO 20000-1:2011 IT Service Management; ISO 9001:2015 Quality Management; ISO 14001:2015 Environmental Management and NCSC compliance for iomarts Cloudsure service. All are regularly audited for compliance by an accredited certifying body. These standards require iomart to have robust controls in place to manage data, documents and records. Showing that iomart has appropriate and measured controls in place to manage OFFICIAL information that if lost, stolen or published in the media could have more damaging consequences (for individuals, an organisation or government generally). All iomart Data Centres and have been independently assessed on a number of occasions by local authorities and UK Government Departments, Senior Information Risk Owner’s (SIRO) as suitable for holding and processing their sensitive information to OFFICIAL level.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach Our change management processes are in line with ISO27001
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Iomart vulnerability management process is aligned with ISO27001:2013 control A12.6.1 which addresses 3 key areas:

• Timely identification of vulnerabilities
• Assessment of or exposure to a vulnerability
• Defined measures to address the risk
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach Iomart Protective Monitoring is aligned with ISO27001:2013 control A.12.4

Event Logging
Protection of log information
Admin & operator logs
Clock synchronisation
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach Iomart incident management is aligned with ISO27001:2013 control A.16.1

Full incident management procedure
Responsibilities & procedures
Assessment of and decision on security events
Response process
Evidence collection
Learning from incidents

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart Yes
Who implements virtualisation Supplier
Virtualisation technologies used VMware
How shared infrastructure is kept separate Each tenant’s servers are segregated into their own VLAN iomart consult with clients to determine if servers need configured to further split server farms over separate security zones. This ensures that uncontrolled network communications do not occur through adjacent architectural tiers Storage presentation is segregated through the use of fibre-channel zoning, prohibiting any host from accessing unauthorised storage areas

Energy efficiency

Energy efficiency
Energy-efficient datacentres No

Pricing

Pricing
Price £150 to £300 per terabyte per month
Discount for educational organisations No
Free trial available Yes
Description of free trial A POC can be provided

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑