Through Technology Limited

Archive360 Archive2Azure (per user)

We are an Archive360 Global Channel Partner offering Archive2Azure through G-Cloud 11.

Archive2Azure provides an elastic and efficient cloud-based archive for unstructured low-touch / inactive data ensuring fast, secure and compliant access, retention, and disposition. Suitable for extending on premise file shares, application retirement, eliminating 3rd party archives.


  • Infinitely scalable archive storage with no limitations
  • Archiving of data in native format
  • Customisable data indexing for performance and efficiency
  • Retain control of your archive data in your Azure tenancy
  • Choice of Azure blob storage; Hot, Cold, Archival
  • Choice of Microsoft datacenter location
  • Choice of resilience and redundancy
  • Export and re-import Office 365 user data


  • Compliance archive storage using Azure Blob Storage
  • Accommodates all data types
  • Definable indexing providing efficient data processing
  • Search and discovery using Azure Search
  • Definable archive retention and disposition policies
  • Azure AD integration for user/role based access
  • API / SDK available for archive search and retrieval integration
  • Save licensing costs for dormant Office 365 accounts.


£1.50 to £10 per user per month

Service documents


G-Cloud 11

Service ID

4 7 4 7 8 8 6 1 0 4 5 0 8 2 3


Through Technology Limited

John Waddington

+44 (0)7913334794

Service scope

Software add-on or extension
Cloud deployment model
  • Public cloud
  • Hybrid cloud
Service constraints
System requirements

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 4 hours, excluding weekends and bank holidays in England.
User can manage status and priority of support tickets
Phone support
Web chat support
Onsite support
Yes, at extra cost
Support levels
Through Technology provide support and implementation for Archive360 products through our Lot 3 - Cloud Support service: "Cloud Data Archiving Service, Powered by Archive360"
Support available to third parties

Onboarding and offboarding

Getting started
Individual customer requirements will be assessed during our initial engagement and defined within the contract. Product demonstrations can be arranged.
Service documentation
Documentation formats
  • HTML
  • ODF
  • PDF
  • Other
Other documentation formats
Microsoft Document Formats
End-of-contract data extraction
Exit and data extraction plans are agreed as part of the contracting process. Further information available upon request.
End-of-contract process
End of contract processes are agreed in advance and typically included within the scope and price of the contract. Different options are available to meet the customer's requirements. Further information available upon request.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Service interface
What users can and can't do using the API
The API can provide integration with your IT Service Management Toolset, further details are available upon request.
API documentation
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • ODF
  • PDF
API sandbox or test environment
Customisation available


Independence of resources
The solution is implemented in a dedicated subscription within the customer's Azure environment. This maintains customer control over the data whilst providing total segregation between Archive360 customers and from the customer's other services.


Service usage metrics
Metrics types
Standard Azure Monitoring and Metrics
Archive360 usage and consumption details.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Reseller providing extra features and support
Organisation whose services are being resold

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Data can be exported in its original format to its source location or a range of other storage platforms directly from the software console.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
Data is exported in its native format
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
Data is stored and imported in its native format

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
See Microsoft Azure service descriptions. Archive360 support SLAs and service hours will be agreed on an individual customer basis.
Approach to resilience
Our service utilises Microsoft Azure resilience features and capabilities to provide a robust service to customers. Further details upon request.
Outage reporting
Service outage reporting is available via dashboards and alerting.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Role-based access and separation of duties are used to provide access management for administrative functions. This is defined on a per customer basis. More information available upon request.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
Archive360 leverages Microsoft Cloud Services which are fully compliant with ISO/IEC 27001 and CSA CCM v3.0. Our services are delivered in accordance with our company security policy and Cyber Essentials certification. Further information available upon request.
Information security policies and processes
Through Technology operates using its own security policies and procedures which are compliant with Cyber Essentials programme certification.

Security processes are directly monitored and overseen by one of our managing partners but the responsibility of all our staff.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Archive360 follow Agile CI/CD development, QA, and deployment methodology -- all Features are tracked Epic, User Story, Task and are correlated to Github and Jenkins automation for QA, functional QA tests and random pathological corner QA tests are also linked before deployment by Services, all code supports rollback. Defects are tracked via Zendesk and link to Jira. We follow "4 eye" review of commit approvals and final deployment releases.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Archvie360 provides Software as a Service based upon Microsoft Azure, we inherit Azure's updating of both our Microsoft Azure Application and Azure Services: such as CosmosDB. For on-premise Fast Collect Migration Server, this is the Customer's OS to patch. Archive360 supplies patches as it relates to the relative code. Archive2Azure relies on Azure Application, CosmosDB, Search -- respective SLAs, in particular updates, are at .

For managed services, subscriptions are managed with Microsoft Security Center and the 3rd party tools from Qualys. As part of that managed service, Archive360 leverages Qualys Application Vulnerability
Protective monitoring type
Protective monitoring approach
Protective Monitoring requirements, integration and options will be discussed as part of our initial engagement.
Incident management type
Supplier-defined controls
Incident management approach
All defects are tracked via Zendesk, auto-generate Jira tickets, Tickets are auto-assigned to respective Section Manager, updated with notifications to Zendesk. We have assigned Scrum Master for monitoring Dev, and assigned Service Manager for monitoring Customer tickets all the way from defect resolution, QA test, documentation and release notes, and arrangement with Customer for deployment.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£1.50 to £10 per user per month
Discount for educational organisations
Free trial available

Service documents

Return to top ↑