igroup Ltd

Azure Hosting

Managed hosting for applications, databases, and websites using the Microsoft Azure cloud platform.
We offer end to end support for organisations planning to move to Azure including solutions architecture, machine deployment, service management, OS level updates, firewall, identity management and ongoing support.

Features

  • Remote access
  • Telephone support from a qualified team
  • Resource scaling based on demand to manage costs
  • Fully accredited planning service to support migration
  • Itemised cloud billing
  • Automated back up of data

Benefits

  • Resource scaling to help reduce overall spend
  • Simplifed management system with patches and security included
  • Fully backed up across multiple data centres
  • Support from a Microsoft Gold Partner

Pricing

£10.22 to £1340.28 per virtual machine per month

  • Free trial available

Service documents

G-Cloud 9

113874462571550

igroup Ltd

Steve Rastall

01925 320164

hello@igroupltd.co.uk

Service scope

Service scope
Service constraints Our cloud hosting service exclusively uses the Microsoft Azure cloud.
System requirements
  • Licenses for hosted applications will be required
  • Identity Management uses Active Directory Federated Services (ADFS)

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Response times vary dependent on priority of support question:
Emergency Response within 1 business hour
High Priority within 4 business hours
Standard priority within 8 business hours
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.0 A
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard None or don’t know
How the web chat support is accessible Online chat service is accessible via a portal where clients can contact support team and manage credits.
Web chat accessibility testing Not carried out at this point
Onsite support Yes, at extra cost
Support levels Standard support levels are based on a pre-paid credits system. Standard rate is 1 credit / hour for remote work. Rate rises to 1.5 credits/hour for on site: on site emergency support work out of hours is 8 credits / hour. Price for individual credits is dependent on volume purchased. Minimum rate is £120 per credit for 10 credits; this discounts to £69 per credit on bulk purchases of 160 credits.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We provide initial consultancy to establish requirements and provide a migration and integration service for any applications that need to be hosted. Training for key staff can be arranged through a walk through of functionality. Full documentation of the solution is provided to the client. Ongoing support and training is provided by our consultants.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction We provide a data extraction service at the end of the contract if required. This can be provided either as physical media or as a transfer to a new provider.
End-of-contract process At the end of the contract we provide all data to the client in the form required. If migration to a new provider is required, this would be an extra-contract service charged at our standard flexible credits rate.

Using the service

Using the service
Web browser interface Yes
Using the web interface Users can deploy and scale virtual machines, view usage and current spend levels and install applications within their environment.
Web interface accessibility standard None or don’t know
How the web interface is accessible Web interface is fully responsive across different device types. Access levels can be agreed dependent on requirements for different users within client organisation.
Web interface accessibility testing Not carried out. Our interface is built on the standard Microsoft Azure dashboard and has been fully tested by Microsoft.
API Yes
What users can and can't do using the API Users are able to connect their own management dashboard to the Azure cloud service using a standard Microsoft Azure API. This allows for the control of virtual machines including starting and stopping services. Current status can be viewed and changes made to current levels. Some customisation of the API functionality may be required to ensure that all features are available.
API automation tools Other
API documentation Yes
API documentation formats HTML
Command line interface No

Scaling

Scaling
Scaling available Yes
Scaling type
  • Automatic
  • Manual
Independence of resources Infrastructure is virtualised in the Microsoft Public Cloud which provides sufficient capacity to ensure that demand is spread across multiple data centres.
Usage notifications Yes
Usage reporting
  • Email
  • SMS

Analytics

Analytics
Infrastructure or application metrics Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
Reporting types Regular reports

Resellers

Resellers
Supplier type Reseller providing extra features and support
Organisation whose services are being resold Microsoft

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency Less than once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Physical access control, complying with CSA CCM v3.0
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Backup and recovery

Backup and recovery
Backup and recovery Yes
What’s backed up
  • Databases
  • Virtual Machines
  • Files
  • Application Data
  • User Data
Backup controls Backups are scheduled on a regular basis with data stored across multiple data centres for resilience.
Datacentre setup Multiple datacentres with disaster recovery
Scheduling backups Supplier controls the whole backup schedule
Backup recovery Users contact the support team

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Our SLAs specify 99.999% up time guarantee with downtime above this refunded or discounted from the following bill. Our uptime is based on using the Azure cloud which backs up data across multiple data centres to minimise interruptions to service.
Approach to resilience Available on request
Outage reporting We report outages direct to nominated email accounts. Information is also available via the client's dashboard within our portal as part of our reporting suite.

Identity and authentication

Identity and authentication
User authentication Identity federation with existing provider (for example Google apps)
Access restrictions in management interfaces and support channels Access to services including support channels and interfaces is controlled using identity federation - we use Active Directory Federated Services which enables single sign on across all services and allows users to access support using their standard log in - if permissions to do so have been enabled within their user profile.
Access restriction testing frequency Less than once a year
Management access authentication Identity federation with existing provider (for example Google Apps)
Devices users manage the service through Dedicated device over multiple services or networks

Audit information for users

Audit information for users
Access to user activity audit information You control when users can access audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation Yes
Security governance standards Other
Other security governance standards ISO 27001 is applicable as a Microsoft Gold Partner using an accredited service.
Information security policies and processes We have policies in place for data security, network security and user access control. These are in line with SANS best practice recommendations. Logs of access are maintained and available on request. Internal management of information security is handled by our technical director in collaboration with Microsoft.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach We use the ITIL (Information Technology Infrastructure Library) guidelines for managing configuration and change based on end user business requirements.
At all stages of the process, security and user management through federated identity controls are maintained across services.
Our policy for security includes regular reviews of anti-malware and firewall software deployed for clients to ensure reliability and compliance with end user requirements.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Continual scanning of the environment is used to detect breaches, and we closely follow Microsoft recommendations for vulnerability handling.
Patches are deployed to services once tested in a separate environment to ensure compatibility.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Continual monitoring of the environment is used to identify unauthorised access or compromises. Once a potential compromise has been found, it is reported to the client immediately and if established as a true incident it is handled as a priority.
Clients are informed via email with a report available following the incident.
Incident management type Supplier-defined controls
Incident management approach For issues identified during our monitoring, we have specific processes in place to review the issue and provide an appropriate solution.
Users can use either email, telephone or web chat to report incidents to the support team for resolution. Regular updates are provided throughout incident resolution direct to the relevant party, and a full report outlining the issue and steps taken to resolve is provided via email afterwards.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart Yes
Who implements virtualisation Supplier
Virtualisation technologies used Other
Other virtualisation technology used Proprietary Microsoft Azure virtualisation software to manage environment and protect data.
How shared infrastructure is kept separate Microsoft Azure includes a data isolation service to keep virtual machines operated by different organisations separated.

Energy efficiency

Energy efficiency
Energy-efficient datacentres Yes

Pricing

Pricing
Price £10.22 to £1340.28 per virtual machine per month
Discount for educational organisations No
Free trial available Yes
Description of free trial We offer a standard Microsoft Azure trial using a lower spec A0 Virtual machine. This is limited to 30 days from start. The purpose of the trial is to allow clients to gain familiarity with our environment and dashboards rather than being able to host complex applications.

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑