Microsoft Azure Cloud Software

Microsoft Azure, formerly known as Windows Azure, is Microsoft's public cloud computing platform. It provides a range of cloud services, including those for compute, analytics, storage and networking. Users can pick and choose from these services to develop and scale new applications, or run existing applications, in the public cloud.


  • Build
  • Deploy
  • Manage Different Applications
  • Scalability
  • Reliability
  • Supports Programming Language


  • Convenient
  • Data Management
  • Better Security
  • Command and full power for database management


£30 per person per month

  • Education pricing available

Service documents


G-Cloud 11

Service ID

4 8 6 4 0 9 0 2 5 9 4 8 5 1 6



Chan Vyas


Service scope

Software add-on or extension
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
The most significant challenges enterprises perceive in adopting cloud IaaS services include data privacy and security, vendor lock-in concerns and ecosystem maturity.
Technical challenges
Identity and risk management.
Compliance and audit.
Application level security.
Data backup and recovery.
System requirements
  • VSA proxy and MediaAgent on virtual machines
  • Windows Server 2016
  • Minimum of 100 GB disk space.
  • Min of 4 GB RAM/10 GB if on same machine.
  • Download Azure Stack tools
  • Azure Stack must have a public IP address
  • For multiple proxies, two-way firewall configuration
  • 16 CPU cores, 128 GB RAM (Depends on requirement)
  • FET 90 TB to 120 TB (Depends on requirement)
  • Dedicated I/O to datastores and backup disk.

User support

Email or online ticketing support
Email or online ticketing
Support response times
24x7 access to Support Engineers via email and phone 24x7 access to billing and subscription support, online self-help, documentation, whitepapers and support forums Minimal business impact (Sev C): <8 business hours1 Moderate business impact (Sev B): <4 hours Critical business impact (Sev A): <1 hour
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
Level depends on Support Package taken. Basic, Standard, Professional Direct, Premier are the packages.
For Premier package-
Minimal business impact (Sev C):
<4 business hours1
Moderate business impact (Sev B):
<2 hours
Critical business impact (Sev A):
<1 hour
<15 minutes (with Azure Rapid Response or Azure Event Management)
Customer specific architectural support such as design reviews, performance tuning, configuration and implementation assistance delivered by technical specialists.
Designated Technical Account Manager for the support is assigned.
Cost depends on the package and services taken.
Support available to third parties

Onboarding and offboarding

Getting started
Following approach is followed, 1.Establish strategy and goals 2.Define criteria for moving to or starting applications in the cloud 3.Architect core infrastructure components for cloud integration: Identity, Networking,Security 4.Acquire cloud development skills 5. Retool for adoption and change management. 6.Take a systematic and disciplined approach to security and compliance. In order for IT staff to function as change agents supporting current and emerging cloud technologies, their buy-in for the use and integration of these technologies is needed. For this staff is provided following: 1.An understanding of their roles and of any changes to their current position. 2.Time and resources to explore the technologies. 3.An understanding of the business case for the technologies. Microsoft Virtual Academy is used for training From the basic overview to deep technical training, IT staff will learn how to leverage Microsoft Azure for their business. A subscription is also a logical limit of scale by which resources can be allocated resources. These limits include hard and soft caps of various resource types for users
Service documentation
Documentation formats
End-of-contract data extraction
We engage with clients before and during an offboarding process to facilitate seamless data extraction through the packaging of source code, hosting configurations, and database dumps.

All data is password protected and sent over secure channels.
End-of-contract process
Price depends on the following,
Monthly price estimates are based on 730 hours of usage.

Sample price will look like this,
A7 8 56.00 GB 2,040 GB ~£843.8613/month –

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Compatible operating systems
  • Linux or Unix
  • MacOS
  • Windows
  • Other
Designed for use on mobile devices
Service interface
Customisation available


Independence of resources
Pay only for the resources you use and cancel anytime.


Service usage metrics
Metrics types
In the Overview page of your Azure Search service, one can view system data about resource usage, query metrics, and how much quota is available to create more indexes, indexers, and data sources. One can also use the portal to configure log analytics or another resource used for persistent data collection.Setting up logs is useful for self-diagnostics and preserving operational history. Internally, logs exist on the backend for a short period of time, sufficient for investigation and analysis if you file a support ticket.Usage &Monitoring sections built into the Overview page report out on resource consumption and query execution metrics
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
Other locations
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Azure Import/Export service is used to securely import large amounts of data to Azure Blob storage and Azure Files by shipping disk drives to an Azure data center. This service can also be used to transfer data from Azure Blob storage to disk drives and ship to your on-premises sites. Data from one or more disk drives can be imported either to Azure Blob storage or Azure Files
Data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
We guarantee at least 99.9% availability of the Azure Basic and Premium services. The services are considered available in the following scenarios:
•Users are able to login to the service, login to the Access Panel, access applications on the Access Panel and reset passwords.
•IT administrators are able to create, read, write and delete entries in the directory or provision or de-provision users to applications in the directory
No SLA is provided for the Free tier of Azure services.
Approach to resilience
This particular information is available on request.
Outage reporting
Azure Service Health provides personalized alerts and guidance when Azure service issues affects client. It can notify, help understand the impact of issues, and keeps updated as the issue resolves. It can also help to prepare for planned maintenance and changes that could affect the availability of client's resources.
Personalised dashboard - Access personalized dashboard, setup targeted notifications, receive guidance and support, share details and updates easily.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Access restriction rule to your application can be created.
Rules are enforced in priority order starting from the lowest number and going up. There is an implicit deny all that is in effect once you add even a single rule.
When creating a rule, you must select allow/deny and also the type of rule. Provide priority value and what you are restricting access to. You can optionally add a name, and description to the rule.
IP restrictions are available for both Function Apps with the same functionality as App Service plans.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
Users receive audit information on a regular basis
How long supplier audit data is stored for
Between 6 months and 12 months
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
International Organization for Standardization - TUV RHEINLAND
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
ISO/IEC 27001 certification


Who accredited the ISO/IEC 27001


ISO/IEC 27001 accreditation date

What the ISO/IEC 27001 doesn’t cover
The scope for Genisys Group ISO27001 accreditation is Support, Enhancements and Projects. What is currently out of scope and therefore not included are the following areas Key management – we do not have a policy on the protection of cryptographic keys as we currently do not use these. Working in Secure areas – We currently have no procedures for working in secure areas as Genisys Group do not have any secure area working currently. Secure development policy – Rules for the development of software are not in place as Genisys Group does not currently develop software. Restrictions on changes to software packages. Currently no procedures in place as we do not develop software. All of the above would be reviewed and policies created should they come into scope for Genisys Group
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
ISO 9001:2005

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Genisys Group has a well-defined information security policy that is based on industry best practices ISO/IEC 27001 standard.
Genisys is an ISO 27001 certified company. As per the certification and retention process, ISO audits are conducted every year that includes Privacy, Information Security, Business Continuity, Disaster Recovery, Operations and Technology . The key role of CISO has been established and is headed by the CFO of the organization, the organization has a stated budget to continuously implement policies, procedures and technology to achieve our goal to endeavour to protect our assets and ensure the confidentiality, integrity and availability of our assets by implementing adequate security control measures to safeguard the interests of all our stakeholders. The organization has formed an information security executive council chaired by the CISO and the President of the organization. The council understands the unique set of areas that can be off risk and threats to our technology landscape and is committed to build an organization with necessary resilience. Security Policies, Standards and Procedures emanate from the Information Security Policy which has been approved by the Cyber Security Governance Council.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
With Change tracking and Inventory Solution following components can be tracked,
Linux files
Linux Software
Linux Daemons
Linux Packages
Windows files
Windows Registry
Windows Services
Ability to alert on the configuration state and any changes to the configuration state of your hybrid environment.
Microsoft uses a wide variety of physical, infrastructure, and operational controls to help secure Azure—but there are additional actions you need to take to help safeguard your workloads.
1.Failure to deploy system updates on virtual machines (VMs).
2.Unnecessary exposure to the Internet through public-facing endpoints.
3.Unencrypted data in transit or storage.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
When Security Center identifies one or more supported VMs that are missing a vulnerability assessment solution, it triggers a VM recommendation.
Create a new vulnerability assessment solution for each VM.
Adaptive Threat Protection(ASC) also offers adaptive threat protection which can block malware and other unwanted code by applying application controls. Built and powered by machine learning, this malware protection service uses heuristic-based analysis techniques to defend against sophisticated modern malware attacks.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Azure offers built in advanced threat detection functionality through services such as Azure Active Directory (Azure AD), Azure Monitor logs, and Azure Security Center.This collection of security services and capabilities provides a simple and fast way to understand what is happening within your Azure deployments. It provides a wide array of options to configure and customize security to meet the requirements of app deployments. AzureAD Identity Protection is more than a monitoring and reporting tool. Identity Protection calculates a user risk level for each user, so that one can configure risk-based policies to automatically protect the identities of its organization
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
While dealing with Azure applications, incident management can be a critical process. Organizations managing Azure applications need to opt for an effective incident management strategy. We at Genisys Group help in handling all aspects of incident management life cycle stages which consist of detection, assessment, diagnose, stabilize and response. We have 24/7 Azure help desk for monitoring and identifying incidents at your Azure infrastructure. We have agentless tool provides alerts and notifications at every stage desired by the organization. It also has a detailed dashboard for usage, performance, billing, monitoring and incident management

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£30 per person per month
Discount for educational organisations
Free trial available

Service documents

Return to top ↑