Always secure, always reliable
We utilise a private VMware Cloud Based server environment hosted within a secure purpose-built data centre provided by Claranet: a leading provider in this field.
Much of the security, performance and monitoring processes are provided by Claranet as part of the contractual arrangements between our two organisations.
CommittedGiving has ISO27001 Information Security certification. That standard is expressly targeted towards the confidentiality, integrity and availability of data and systems.
A full and comprehensive suite of policy documents and associated recording and monitoring processes is in place and actively utilised.

Technical information
Maintenance/upgrade window schedule
All server or infrastructure type maintenance is always scheduled overnight between 11pm and 1am Mon-Thurs to avoid any impact on live services.
Windows server, database and operating system fixes are applied weekly every Tuesday night. Occasionally these require server restarts – the downtime for this is not counted against the 99.9% uptime target.
Bugs/fixes releases
Development planning follows an agile methodology using initial change requests to ascertain requirements and scope out risks. Low impact changes (hot fixes) can be deployed immediately but medium or high-level changes will enter the development cycle with the appropriate developer(s). The development cycle will use internal test environments with each developer initially responsible for testing their own work and then being further escalated for review by the operations team. Dependent on scale, the development will either then be rolled out to the client Sandbox environment for feedback/review or deployed to live production at a pre-agreed date/time.
The ability to rollback production is maintained as part of the version controls.
Application Availability
Following the development cycle, applications will be deployed at an agreed date/time. Typically, this will be after working hours for back office applications and before working hours for front-end public facing websites. Average downtime for deployment is 30 seconds.
In the case of major releases, additional instances can be deployed to alternative URL’s and then switched with the original instance being removed from the workgroup.
Application and infrastructure performance monitoring and fault alerting
We maintain performance monitoring and fault-finding tools across all facets of the network and server infrastructure. Pre-set indicators are established and when exceeded SMS and Email notifications are sent to relevant members of the development and operations teams. In addition, performance statistics for each 24-hour period are automatically produced and made available to the operations team for exception and trend analysis.
Internal administration web tools have been developed which allow us to monitor both server and web applications via a single dashboard accessible only via a dedicated VPN restricted by IP address. The dashboard provides both a summary and snapshot of real-time server performance and website availability. It also provides the ability to apply performance tweaking including the ability to scale the servers to meet demand and reset application pools.
Service issues recording and resolution
A support ticket application is provided via the back office to log issues, record all communications and measure against SLA objectives. Tasks are assigned to the relevant developer and monitored via the operations team and account management.
Traffic peaks
The standard bandwidth channel is already of greater capacity than required to meet highest usage as monitored over the previous rolling 12 months. ‘Burst’ capability is in place to meet unexpected demand.
Service-critical systems resilience
All live databases and application servers are real time mirrored to a separate environment using the Claranet Zerto replication product. In the event of a major disaster, the servers can be restored within 3 hours from decision to restore. A full documented Disaster Recovery Plan is in force and key elements are regularly tested.
In addition, generic scheduled overnight incremental backups of databases and live applications are run using the Attix5 product supported by Claranet. Full or part restoration can be performed on demand.
Restore tests are run every quarter and the results documented and recorded.
Repositories are used by developers for key application source code providing each developer with access to either the full library or restricted privileges based on dependencies. The repository records a full audit trail thus allowing live production versions to be rolled back if required.
Uptime of frontend and backend systems
Target for uptime is 99.99%. Three key issues apply when talking about uptime:
- Reliability of hosting provider
- Reliability of software
- Correct configuration
Regular monitoring of these three key areas and the implication of any changes that may affect these are considered as part of any major upgrade or release.
Third Party monitoring tools such as Pingdom and Uptime Robot are used to monitor availability and provide additional performance metrics.
Concurrent users/transactions
There is no limit on the number of internal users active at any one time.
Service attacks e.g. denial of service
The contracted Web Acceleration and DoS protection in use uses a host of tools to protect our applications from attacks, ranging from layer 3 (volumetric) to layer 7 (application) attacks. Intelligent DoS mitigation system monitors the network for traffic that is synonymous with attacks to prevent them before they can cause an issue.
In addition a Pulse Secure Firewall is active across all servers and is regularly checked for status, relevance and latest versions.
Virus & Malware
All servers, workstations and laptops run real-time virus check and Malware scans are run weekly. Emails are scanned and, where necessary quarantined, pre-delivery.
In addition, a Pulse Secure Firewall is active across all servers and is regularly checked for status, relevance and latest versions.
Scans & Audits
Approved third party vendors are contracted to:
- Run automated monthly vulnerability scans on relevant servers
- Carry out annual black box penetration tests
- Approve annual PCI Assessments
- Carry out annual ISO27 Information Security audits
- Carry out tri-ennial BACS audits