Quantum 186

Quantum Connect

Quantum Connect provides multiple connectivity and hosting solutions to connect you to your cloud services.


  • Private Point to Point connections from 1Gbps to 10Gbps
  • Multiple 10Gbps channels on a single fibre connection
  • All services burstable to line speed, either 1Gbps or 10Gbps
  • Direct Connectivity to Azure, AWS, Google, Oracle, IBM and Alibaba
  • Consume multiple services on a single circuit using Global Gateway
  • Private Mobile APN for securing mobile devices or IOT scenarios
  • In depth monitoring and management
  • Exclusive use of dedicated physical hardware
  • Directly connect to SIP providers


  • Access cloud services reliably and quickly
  • Secure mobile devices or IOT devices
  • Retain control of your data with dedicated hardware
  • Reduce number of physical circuits required using the Global Gateway
  • Directly connect to cloud services, gain predictable speed and latency
  • Reduce the number of hops to internet resources


£450 per unit per month

  • Education pricing available

Service documents


G-Cloud 11

Service ID

9 9 9 6 5 0 6 5 4 7 3 0 3 3 7


Quantum 186

Public Sector Team



Service scope

Service constraints
Connectivity services are typically constrained to distance. A full site survey will be performed to make you aware of any constraints.
System requirements
Support Ethernet or Fibre

User support

Email or online ticketing support
Email or online ticketing
Support response times
24/7/365 support, within an hour
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Onsite support
Support levels
All customers benefit from the same level of our 24/7/365 support. All cases are treated with the upmost urgency and are looked into immediately.
Support available to third parties

Onboarding and offboarding

Getting started
We customise this based on the service options taken. Site surveys are common, and full documentation is always provided.
Service documentation
Documentation formats
End-of-contract data extraction
Clients have full access to their environments
End-of-contract process
Depends on the service options taken, in most cases contracts will auto renew to 30 day rolling or 1 year rolling

Using the service

Web browser interface
Using the web interface
Web Interface provided via the Quantum portal for all Quantum Connect services where user input is available.
Web interface accessibility standard
WCAG 2.1 A
Web interface accessibility testing
None conducted
What users can and can't do using the API
Our portal exposes an API to view and update tickets
API automation tools
Other API automation tools
  • .NET
  • PHP
  • Python
  • Powershell
API documentation
API documentation formats
Command line interface
Command line interface compatibility
  • Linux or Unix
  • Windows
  • MacOS
Using the command line interface
Command line interface provided where the client selects the self manage option.


Scaling available
Scaling type
Independence of resources
Services are provisioned with 1/1 contention ratio. resources are dedicated to customers with no over commitment.
Usage notifications


Infrastructure or application metrics
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
  • Other
Other metrics
  • Temperature
  • Peers
Reporting types
  • API access
  • Real-time dashboards
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Data sanitisation type
Hardware containing data is completely destroyed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Backup controls
Backup definition is part of the managed service provided and is based on product sets selected.
Datacentre setup
Multiple datacentres
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • Bonded fibre optic connections
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
SLAs are defined based on service components selected. Minimum SLA is 99.95% with our services usually achieving 100%. Service credits are an option that can be selected which are defined based on customer requirements.
Approach to resilience
Our datacentre is built to Tier 4 standards and has an up time record of 100% over its 11 years of operation.
All core services are at a minimum dual diverse, and in most cases quad diverse. We operate a true 2+N design.
Outage reporting
We inform customers of planned and unplanned work that could impact service via email.
Status is also on our public status dashboard which has an API interface.

Identity and authentication

User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Multiple levels of security. no external access to management interfaces is permitted.
internally IP restrictions and multi factor authentication
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device on a government network (for example PSN)
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
Cyber Essentials

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
We are working towards achieving ISO27001 before the gCloud award
Information security policies and processes
We are working towards ISO27001 accreditation

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We operate a quality control process whereby an engineer seeks a quality control check from another engineer (typically more senior) on their proposed configuration before it is implemented.
Vulnerability management type
Vulnerability management approach
Information available on request
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Information available on request
Incident management type
Supplier-defined controls
Incident management approach
Information available on request.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Who implements virtualisation
Virtualisation technologies used
Other virtualisation technology used
We use a number of virtualization technologies depending on the service in question. information available on request.
How shared infrastructure is kept separate
Depending on the product selected. We offer a bare metal cloud where the hardware is exclusive to the customer.

Energy efficiency

Energy-efficient datacentres
Description of energy efficient datacentres
Our datacentre is proud to have been awarded the green datacentre award and is one of the most efficient datacentres in Europe, with a PUE of 1.2


£450 per unit per month
Discount for educational organisations
Free trial available

Service documents

Return to top ↑