Tisski Limited

Microsoft Hybrid Cloud Adoption, Consultancy & Implementation Services

Microsoft Azure is a growing and evolving collection of integrated cloud services that developers and IT professionals use to build, deploy and manage modern highly available applications and end services. Microsoft Azure gives the freedom to build and deploy wherever you want, using the tools, applications, frameworks of your choice.


  • Solution Flexibility
  • High Availability
  • High Resilience
  • Global Scalability
  • Real Time Reporting
  • Site Recovery
  • Remote Access
  • Acredited Security Standards and Processes
  • Consumption Based Pricing Model


  • Driving Down Cost
  • Expanding the Enterprise to the Cloud
  • Managed Services from Multiple Devices
  • Consume Service from Anywhere
  • Pay for Only What You Use
  • Improve Business Agility
  • Secure High Volumes of Data
  • Gain Insights to Business Efficiencies
  • Improve Multi Channel Service Delivery


£1 per unit

Service documents

G-Cloud 9


Tisski Limited

Anna Assassa

02477 712050


Service scope

Service scope
Service constraints Individual constraints discussed on application
System requirements
  • Licences for all software to be installed on virtual machines
  • Dedicated commuication lines must be supported by ISP

User support

User support
Email or online ticketing support Yes, at extra cost
Support response times Operates Monday-Friday, 08.30-17.30, excluding UK public holidays & weekends.

Priority 1: System down situation severely impacting customer production and/or productivity. Response: 30 Minutes then hourly updates. Resolution: 4 hours (working hours)

Priority 2: Time sensitive issue important to long-term productivity, not causing an immediate stoppage. Response: 1 hourly updates. Resolution: 10 hours (working hours)

Priority 3: Issue which does not have significant current productivity impact for the customer. Incidents will be grouped and resolved at mutually convenient times. Response: 4 Hours then mutually agreed updates. Resolution: 3 days

Priority 4: General advice. Response: Next Business Day. Resolution: 7 days
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Essential Support provides the following: • Technical and user query support. • Problems arising from the usage . • Manage escalations for code defect problems as appropriate. • Provide technical advice and guidance, limited to the support and resolution of issues identified • Provide action plans and schedules regarding the diagnosis, containment and resolution of problems. Essential Support starts from £12 per user per month. Bespoke support is also available. POA. Premium Support includes all of the above along with the following activities: • Service Management • Access and License Management • Enhanced service level agreements and service window • Database Support (On Premise only) • Customizations and Configuration • Knowledge Transfer Program • Upgrade & Patch Management Premium Support starts from £18 per user per month. Bespoke support is also available. POA.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We tailor on-boarding services usually in line with client requirements but typically aligned to ITIL v3 transition guidelines. This can be either tailored or provided using our standard, predefined service. Further information on request.
Service documentation Yes
Documentation formats
  • HTML
  • ODF
  • PDF
  • Other
Other documentation formats Word
End-of-contract data extraction We agree exit terms and processes at the time of contracting. The exact format turnaround and processes related to data extraction is determined at this point. Further details on demand.
End-of-contract process End of contract scenarios are agreed in advance and either tailored to client requirements or we can provide a standard, predefined solution, based on ITIL v3 processes and guidelines. Additional costs are determined on a case by case basis, dependent on size and complexities of activities.

Using the service

Using the service
Web browser interface Yes
Using the web interface Given the right role based access control permissions, all service functionality can be achieved by the web interface.
Web interface accessibility standard WCAG 2.0 AA or EN 301 549
Web interface accessibility testing None
What users can and can't do using the API The Cloud Platform is continuously evolving with the aim of 100% parity between control via the web interface and API.
API automation tools
  • Ansible
  • Chef
  • SaltStack
  • Terraform
  • Puppet
API documentation Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • PDF
Command line interface Yes
Command line interface compatibility
  • Linux or Unix
  • Windows
  • MacOS
Using the command line interface The Cloud Platform is continuously evolving with the aim of 100% parity between control via the web interface and command line.


Scaling available Yes
Scaling type Manual
Independence of resources We leverage Microsoft Online Services which in turn utilises various Cloud Scale techniques and technologies, to ensure multi-tenant services are not affected in terms of peak usage. More information on request.
Usage notifications No


Infrastructure or application metrics Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Reseller providing extra features and support
Organisation whose services are being resold Microsoft

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency Never
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Backup and recovery Yes
What’s backed up
  • Files
  • Databases
  • Virtual Machines
  • Load Balancers
  • Blob Storage
Backup controls Users have full control over the frequency and restoration of back ups and automation related to them.
Datacentre setup Multiple datacentres with disaster recovery
Scheduling backups Users schedule backups through a web interface
Backup recovery Users can recover backups themselves, for example through a web interface

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability Monthly Service Level 1. The Service Level is 99.9%. 2. The Monthly Uptime Percentage is calculated for a given calendar month using the following formula: Monthly Uptime Percentage = Total number of minutes in a given calendar month minus Total number of minutes of Downtime in a given calendar month Total number of minutes in a given calendar month Service Credits 1. Should the Service Level fall below 99.9% for a given month, Microsoft will provide a Service Credit as noted in the chart below: Monthly Uptime Percentage Service Credit* < 99.9% 25% < 99% 50% < 95% 100% More information available on request.
Approach to resilience This information is available on request.
Outage reporting Outages can be communicated by multiple methods including Dashboards, accessible via APIs, email alerts and via phone.

Identity and authentication

Identity and authentication
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Our solutions implement role based access control, determined by the customer on a case by case basis.
Access restriction testing frequency Never
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Audit information for users
Access to user activity audit information You control when users can access audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information You control when users can access audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation No
Security governance approach We work to industry and specifically Microsoft standards for all security related standards. Our solutions leverage Microsoft Cloud Services which in term comply to ISO/IEC 27001 and CSA CCM v3.0
Information security policies and processes We have a Information Security Policy which is available on request. We have rigorous induction and training methods which ensure policies are followed. Reporting Structure is also available on request.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach We strictly align our configuration and change management processes, including component life cycle tracking and security impact assessments, according to the ITIL v3 Framework Guidelines.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Potential threats are monitored through multiple sources, including external repositories and vendor feeds proactively according to internally defined processes. Assessment of patches, hot fixes updates and associated deployment guidelines are dictated by severity, client requirements and/ or vendor recommendations.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach We use various tools, technologies and techniques in order to identify potential compromises and respond on a case by case basis, based on the nature, complexity and severity. We offer various levels of response times, depending on Service Level Agreements. Further information is available upon request.
Incident management type Supplier-defined controls
Incident management approach Incident reporting frequency and format is agreed with the customer on a case by case basis. Users can report incidents via multiple channels including telephony, dashboards and email. We have predefined processes for common events and leverage the guidelines defined by the ITIL v3 Framework.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart Yes
Who implements virtualisation Third-party
Third-party virtualisation provider Microsoft
How shared infrastructure is kept separate Various technologies are in use in order to isolate service consumers in the multi-tenant environment. These include, but are not limited to, various levels and standards of encryption of data at rest and in transit, along side strict role based access control mechanisms.

Energy efficiency

Energy efficiency
Energy-efficient datacentres Yes


Price £1 per unit
Discount for educational organisations Yes
Free trial available Yes
Description of free trial Go to https://azure.microsoft.com/en-gb/offers/ms-azr-0044p/ for full details of the offer.

The trial is limited to one month.
Link to free trial https://azure.microsoft.com/en-gb/offers/ms-azr-0044p/


Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑