Microsoft Azure Cloud Software
Microsoft Azure, formerly known as Windows Azure, is Microsoft's public cloud computing platform. It provides a range of cloud services, including those for compute, analytics, storage and networking. Users can pick and choose from these services to develop and scale new applications, or run existing applications, in the public cloud.
Features
- Build
- Deploy
- Manage Different Applications
- Scalability
- Reliability
- Supports Programming Language
Benefits
- Convenient
- Data Management
- Better Security
- Command and full power for database management
Pricing
£30 a person a month
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 11
Service ID
4 8 6 4 0 9 0 2 5 9 4 8 5 1 6
Contact
GENISYS SOFTWARE LIMITED
Raj Shanker
Telephone: +91 9886040764
Email: raj.s@genisys-group.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
-
The most significant challenges enterprises perceive in adopting cloud IaaS services include data privacy and security, vendor lock-in concerns and ecosystem maturity.
Technical challenges
Identity and risk management.
Compliance and audit.
Application level security.
Data backup and recovery.
Legal. - System requirements
-
- VSA proxy and MediaAgent on virtual machines
- Windows Server 2016
- Minimum of 100 GB disk space.
- Min of 4 GB RAM/10 GB if on same machine.
- Download Azure Stack tools
- Azure Stack must have a public IP address
- For multiple proxies, two-way firewall configuration
- 16 CPU cores, 128 GB RAM (Depends on requirement)
- FET 90 TB to 120 TB (Depends on requirement)
- Dedicated I/O to datastores and backup disk.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 24x7 access to Support Engineers via email and phone 24x7 access to billing and subscription support, online self-help, documentation, whitepapers and support forums Minimal business impact (Sev C): <8 business hours1 Moderate business impact (Sev B): <4 hours Critical business impact (Sev A): <1 hour
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Level depends on Support Package taken. Basic, Standard, Professional Direct, Premier are the packages.
For Premier package-
Minimal business impact (Sev C):
<4 business hours1
Moderate business impact (Sev B):
<2 hours
Critical business impact (Sev A):
<1 hour
<15 minutes (with Azure Rapid Response or Azure Event Management)
Customer specific architectural support such as design reviews, performance tuning, configuration and implementation assistance delivered by technical specialists.
Designated Technical Account Manager for the support is assigned.
Cost depends on the package and services taken. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Following approach is followed, 1.Establish strategy and goals 2.Define criteria for moving to or starting applications in the cloud 3.Architect core infrastructure components for cloud integration: Identity, Networking,Security 4.Acquire cloud development skills 5. Retool for adoption and change management. 6.Take a systematic and disciplined approach to security and compliance. In order for IT staff to function as change agents supporting current and emerging cloud technologies, their buy-in for the use and integration of these technologies is needed. For this staff is provided following: 1.An understanding of their roles and of any changes to their current position. 2.Time and resources to explore the technologies. 3.An understanding of the business case for the technologies. Microsoft Virtual Academy is used for training From the basic overview to deep technical training, IT staff will learn how to leverage Microsoft Azure for their business. A subscription is also a logical limit of scale by which resources can be allocated resources. These limits include hard and soft caps of various resource types for users
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
We engage with clients before and during an offboarding process to facilitate seamless data extraction through the packaging of source code, hosting configurations, and database dumps.
All data is password protected and sent over secure channels. - End-of-contract process
-
Price depends on the following,
1.INSTANCE
2.CORES
3.RAM
4.TEMPORARY STORAGE
Monthly price estimates are based on 730 hours of usage.
Sample price will look like this,
INSTANCE CORES RAM TEMPORARY STORAGE PRICE
A7 8 56.00 GB 2,040 GB ~£843.8613/month –
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 7
- Internet Explorer 8
- Internet Explorer 9
- Internet Explorer 10
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari 9+
- Application to install
- Yes
- Compatible operating systems
-
- Linux or Unix
- MacOS
- Windows
- Other
- Designed for use on mobile devices
- No
- Service interface
- No
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- Pay only for the resources you use and cancel anytime.
Analytics
- Service usage metrics
- Yes
- Metrics types
- In the Overview page of your Azure Search service, one can view system data about resource usage, query metrics, and how much quota is available to create more indexes, indexers, and data sources. One can also use the portal to configure log analytics or another resource used for persistent data collection.Setting up logs is useful for self-diagnostics and preserving operational history. Internally, logs exist on the backend for a short period of time, sufficient for investigation and analysis if you file a support ticket.Usage &Monitoring sections built into the Overview page report out on resource consumption and query execution metrics
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- Other locations
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Azure Import/Export service is used to securely import large amounts of data to Azure Blob storage and Azure Files by shipping disk drives to an Azure data center. This service can also be used to transfer data from Azure Blob storage to disk drives and ship to your on-premises sites. Data from one or more disk drives can be imported either to Azure Blob storage or Azure Files
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
We guarantee at least 99.9% availability of the Azure Basic and Premium services. The services are considered available in the following scenarios:
•Users are able to login to the service, login to the Access Panel, access applications on the Access Panel and reset passwords.
•IT administrators are able to create, read, write and delete entries in the directory or provision or de-provision users to applications in the directory
No SLA is provided for the Free tier of Azure services. - Approach to resilience
- This particular information is available on request.
- Outage reporting
-
Azure Service Health provides personalized alerts and guidance when Azure service issues affects client. It can notify, help understand the impact of issues, and keeps updated as the issue resolves. It can also help to prepare for planned maintenance and changes that could affect the availability of client's resources.
Personalised dashboard - Access personalized dashboard, setup targeted notifications, receive guidance and support, share details and updates easily.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
-
Access restriction rule to your application can be created.
Rules are enforced in priority order starting from the lowest number and going up. There is an implicit deny all that is in effect once you add even a single rule.
When creating a rule, you must select allow/deny and also the type of rule. Provide priority value and what you are restricting access to. You can optionally add a name, and description to the rule.
IP restrictions are available for both Function Apps with the same functionality as App Service plans. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- Users receive audit information on a regular basis
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- International Organization for Standardization - TUV RHEINLAND
- ISO/IEC 27001 accreditation date
- 10/10/2018
- What the ISO/IEC 27001 doesn’t cover
-
ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
TUV RHEINLAND
ISO/IEC 27001 accreditation date
10/10/2018
What the ISO/IEC 27001 doesn’t cover
The scope for Genisys Group ISO27001 accreditation is Support, Enhancements and Projects. What is currently out of scope and therefore not included are the following areas Key management – we do not have a policy on the protection of cryptographic keys as we currently do not use these. Working in Secure areas – We currently have no procedures for working in secure areas as Genisys Group do not have any secure area working currently. Secure development policy – Rules for the development of software are not in place as Genisys Group does not currently develop software. Restrictions on changes to software packages. Currently no procedures in place as we do not develop software. All of the above would be reviewed and policies created should they come into scope for Genisys Group - ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- Yes
- Any other security certifications
- ISO 9001:2005
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Genisys Group has a well-defined information security policy that is based on industry best practices ISO/IEC 27001 standard.
Genisys is an ISO 27001 certified company. As per the certification and retention process, ISO audits are conducted every year that includes Privacy, Information Security, Business Continuity, Disaster Recovery, Operations and Technology . The key role of CISO has been established and is headed by the CFO of the organization, the organization has a stated budget to continuously implement policies, procedures and technology to achieve our goal to endeavour to protect our assets and ensure the confidentiality, integrity and availability of our assets by implementing adequate security control measures to safeguard the interests of all our stakeholders. The organization has formed an information security executive council chaired by the CISO and the President of the organization. The council understands the unique set of areas that can be off risk and threats to our technology landscape and is committed to build an organization with necessary resilience. Security Policies, Standards and Procedures emanate from the Information Security Policy which has been approved by the Cyber Security Governance Council.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
With Change tracking and Inventory Solution following components can be tracked,
Linux files
Linux Software
Linux Daemons
Linux Packages
Windows files
Windows Registry
Windows Services
Ability to alert on the configuration state and any changes to the configuration state of your hybrid environment.
Microsoft uses a wide variety of physical, infrastructure, and operational controls to help secure Azure—but there are additional actions you need to take to help safeguard your workloads.
Threats:
1.Failure to deploy system updates on virtual machines (VMs).
2.Unnecessary exposure to the Internet through public-facing endpoints.
3.Unencrypted data in transit or storage. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
When Security Center identifies one or more supported VMs that are missing a vulnerability assessment solution, it triggers a VM recommendation.
Create a new vulnerability assessment solution for each VM.
Adaptive Threat Protection(ASC) also offers adaptive threat protection which can block malware and other unwanted code by applying application controls. Built and powered by machine learning, this malware protection service uses heuristic-based analysis techniques to defend against sophisticated modern malware attacks. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Azure offers built in advanced threat detection functionality through services such as Azure Active Directory (Azure AD), Azure Monitor logs, and Azure Security Center.This collection of security services and capabilities provides a simple and fast way to understand what is happening within your Azure deployments. It provides a wide array of options to configure and customize security to meet the requirements of app deployments. AzureAD Identity Protection is more than a monitoring and reporting tool. Identity Protection calculates a user risk level for each user, so that one can configure risk-based policies to automatically protect the identities of its organization
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- While dealing with Azure applications, incident management can be a critical process. Organizations managing Azure applications need to opt for an effective incident management strategy. We at Genisys Group help in handling all aspects of incident management life cycle stages which consist of detection, assessment, diagnose, stabilize and response. We have 24/7 Azure help desk for monitoring and identifying incidents at your Azure infrastructure. We have agentless tool provides alerts and notifications at every stage desired by the organization. It also has a detailed dashboard for usage, performance, billing, monitoring and incident management
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £30 a person a month
- Discount for educational organisations
- Yes
- Free trial available
- No