GENISYS SOFTWARE LIMITED

Microsoft Azure Cloud Software

Microsoft Azure, formerly known as Windows Azure, is Microsoft's public cloud computing platform. It provides a range of cloud services, including those for compute, analytics, storage and networking. Users can pick and choose from these services to develop and scale new applications, or run existing applications, in the public cloud.

Features

  • Build
  • Deploy
  • Manage Different Applications
  • Scalability
  • Reliability
  • Supports Programming Language

Benefits

  • Convenient
  • Data Management
  • Better Security
  • Command and full power for database management

Pricing

£30 per person per month

  • Education pricing available

Service documents

G-Cloud 11

486409025948516

GENISYS SOFTWARE LIMITED

Andy Vickers

07973808183

andy.vickers@genisys-group.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints The most significant challenges enterprises perceive in adopting cloud IaaS services include data privacy and security, vendor lock-in concerns and ecosystem maturity.
Technical challenges
Identity and risk management.
Compliance and audit.
Application level security.
Data backup and recovery.
Legal.
System requirements
  • VSA proxy and MediaAgent on virtual machines
  • Windows Server 2016
  • Minimum of 100 GB disk space.
  • Min of 4 GB RAM/10 GB if on same machine.
  • Download Azure Stack tools
  • Azure Stack must have a public IP address
  • For multiple proxies, two-way firewall configuration
  • 16 CPU cores, 128 GB RAM (Depends on requirement)
  • FET 90 TB to 120 TB (Depends on requirement)
  • Dedicated I/O to datastores and backup disk.

User support

User support
Email or online ticketing support Email or online ticketing
Support response times 24x7 access to Support Engineers via email and phone 24x7 access to billing and subscription support, online self-help, documentation, whitepapers and support forums Minimal business impact (Sev C): <8 business hours1 Moderate business impact (Sev B): <4 hours Critical business impact (Sev A): <1 hour
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels Level depends on Support Package taken. Basic, Standard, Professional Direct, Premier are the packages.
For Premier package-
Minimal business impact (Sev C):
<4 business hours1
Moderate business impact (Sev B):
<2 hours
Critical business impact (Sev A):
<1 hour
<15 minutes (with Azure Rapid Response or Azure Event Management)
Customer specific architectural support such as design reviews, performance tuning, configuration and implementation assistance delivered by technical specialists.
Designated Technical Account Manager for the support is assigned.
Cost depends on the package and services taken.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started Following approach is followed, 1.Establish strategy and goals 2.Define criteria for moving to or starting applications in the cloud 3.Architect core infrastructure components for cloud integration: Identity, Networking,Security 4.Acquire cloud development skills 5. Retool for adoption and change management. 6.Take a systematic and disciplined approach to security and compliance. In order for IT staff to function as change agents supporting current and emerging cloud technologies, their buy-in for the use and integration of these technologies is needed. For this staff is provided following: 1.An understanding of their roles and of any changes to their current position. 2.Time and resources to explore the technologies. 3.An understanding of the business case for the technologies. Microsoft Virtual Academy is used for training From the basic overview to deep technical training, IT staff will learn how to leverage Microsoft Azure for their business. A subscription is also a logical limit of scale by which resources can be allocated resources. These limits include hard and soft caps of various resource types for users
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction We engage with clients before and during an offboarding process to facilitate seamless data extraction through the packaging of source code, hosting configurations, and database dumps.

All data is password protected and sent over secure channels.
End-of-contract process Price depends on the following,
1.INSTANCE
2.CORES
3.RAM
4.TEMPORARY STORAGE
Monthly price estimates are based on 730 hours of usage.

Sample price will look like this,
INSTANCE CORES RAM TEMPORARY STORAGE PRICE
A7 8 56.00 GB 2,040 GB ~£843.8613/month –

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install Yes
Compatible operating systems
  • Linux or Unix
  • MacOS
  • Windows
  • Other
Designed for use on mobile devices No
Service interface No
API No
Customisation available No

Scaling

Scaling
Independence of resources Pay only for the resources you use and cancel anytime.

Analytics

Analytics
Service usage metrics Yes
Metrics types In the Overview page of your Azure Search service, one can view system data about resource usage, query metrics, and how much quota is available to create more indexes, indexers, and data sources. One can also use the portal to configure log analytics or another resource used for persistent data collection.Setting up logs is useful for self-diagnostics and preserving operational history. Internally, logs exist on the backend for a short period of time, sufficient for investigation and analysis if you file a support ticket.Usage &Monitoring sections built into the Overview page report out on resource consumption and query execution metrics
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations Other locations
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach In-house
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Azure Import/Export service is used to securely import large amounts of data to Azure Blob storage and Azure Files by shipping disk drives to an Azure data center. This service can also be used to transfer data from Azure Blob storage to disk drives and ship to your on-premises sites. Data from one or more disk drives can be imported either to Azure Blob storage or Azure Files
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability We guarantee at least 99.9% availability of the Azure Basic and Premium services. The services are considered available in the following scenarios:
•Users are able to login to the service, login to the Access Panel, access applications on the Access Panel and reset passwords.
•IT administrators are able to create, read, write and delete entries in the directory or provision or de-provision users to applications in the directory
No SLA is provided for the Free tier of Azure services.
Approach to resilience This particular information is available on request.
Outage reporting Azure Service Health provides personalized alerts and guidance when Azure service issues affects client. It can notify, help understand the impact of issues, and keeps updated as the issue resolves. It can also help to prepare for planned maintenance and changes that could affect the availability of client's resources.
Personalised dashboard - Access personalized dashboard, setup targeted notifications, receive guidance and support, share details and updates easily.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Access restriction rule to your application can be created.
Rules are enforced in priority order starting from the lowest number and going up. There is an implicit deny all that is in effect once you add even a single rule.
When creating a rule, you must select allow/deny and also the type of rule. Provide priority value and what you are restricting access to. You can optionally add a name, and description to the rule.
IP restrictions are available for both Function Apps with the same functionality as App Service plans.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for Between 6 months and 12 months
Access to supplier activity audit information Users receive audit information on a regular basis
How long supplier audit data is stored for Between 6 months and 12 months
How long system logs are stored for Between 6 months and 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 International Organization for Standardization - TUV RHEINLAND
ISO/IEC 27001 accreditation date 10/10/2018
What the ISO/IEC 27001 doesn’t cover ISO/IEC 27001 certification

Yes

Who accredited the ISO/IEC 27001

TUV RHEINLAND

ISO/IEC 27001 accreditation date
10/10/2018

What the ISO/IEC 27001 doesn’t cover
The scope for Genisys Group ISO27001 accreditation is Support, Enhancements and Projects. What is currently out of scope and therefore not included are the following areas Key management – we do not have a policy on the protection of cryptographic keys as we currently do not use these. Working in Secure areas – We currently have no procedures for working in secure areas as Genisys Group do not have any secure area working currently. Secure development policy – Rules for the development of software are not in place as Genisys Group does not currently develop software. Restrictions on changes to software packages. Currently no procedures in place as we do not develop software. All of the above would be reviewed and policies created should they come into scope for Genisys Group
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications ISO 9001:2005

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Genisys Group has a well-defined information security policy that is based on industry best practices ISO/IEC 27001 standard.
Genisys is an ISO 27001 certified company. As per the certification and retention process, ISO audits are conducted every year that includes Privacy, Information Security, Business Continuity, Disaster Recovery, Operations and Technology . The key role of CISO has been established and is headed by the CFO of the organization, the organization has a stated budget to continuously implement policies, procedures and technology to achieve our goal to endeavour to protect our assets and ensure the confidentiality, integrity and availability of our assets by implementing adequate security control measures to safeguard the interests of all our stakeholders. The organization has formed an information security executive council chaired by the CISO and the President of the organization. The council understands the unique set of areas that can be off risk and threats to our technology landscape and is committed to build an organization with necessary resilience. Security Policies, Standards and Procedures emanate from the Information Security Policy which has been approved by the Cyber Security Governance Council.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach With Change tracking and Inventory Solution following components can be tracked,
Linux files
Linux Software
Linux Daemons
Linux Packages
Windows files
Windows Registry
Windows Services
Ability to alert on the configuration state and any changes to the configuration state of your hybrid environment.
Microsoft uses a wide variety of physical, infrastructure, and operational controls to help secure Azure—but there are additional actions you need to take to help safeguard your workloads.
Threats:
1.Failure to deploy system updates on virtual machines (VMs).
2.Unnecessary exposure to the Internet through public-facing endpoints.
3.Unencrypted data in transit or storage.
Vulnerability management type Supplier-defined controls
Vulnerability management approach When Security Center identifies one or more supported VMs that are missing a vulnerability assessment solution, it triggers a VM recommendation.
Create a new vulnerability assessment solution for each VM.
Adaptive Threat Protection(ASC) also offers adaptive threat protection which can block malware and other unwanted code by applying application controls. Built and powered by machine learning, this malware protection service uses heuristic-based analysis techniques to defend against sophisticated modern malware attacks.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach Azure offers built in advanced threat detection functionality through services such as Azure Active Directory (Azure AD), Azure Monitor logs, and Azure Security Center.This collection of security services and capabilities provides a simple and fast way to understand what is happening within your Azure deployments. It provides a wide array of options to configure and customize security to meet the requirements of app deployments. AzureAD Identity Protection is more than a monitoring and reporting tool. Identity Protection calculates a user risk level for each user, so that one can configure risk-based policies to automatically protect the identities of its organization
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach While dealing with Azure applications, incident management can be a critical process. Organizations managing Azure applications need to opt for an effective incident management strategy. We at Genisys Group help in handling all aspects of incident management life cycle stages which consist of detection, assessment, diagnose, stabilize and response. We have 24/7 Azure help desk for monitoring and identifying incidents at your Azure infrastructure. We have agentless tool provides alerts and notifications at every stage desired by the organization. It also has a detailed dashboard for usage, performance, billing, monitoring and incident management

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £30 per person per month
Discount for educational organisations Yes
Free trial available No

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Terms and conditions
Service documents
Return to top ↑