Solidsoft Reply Ltd
Microsoft Azure Cloud Solution Provider (CSP)
Organisations can buy Microsoft Azure services through Solidsoft Reply as a CSP, without the need for a credit card or billing in foreign currencies. We can invoice in pounds and can supply an analytical bill at no extra cost over what you’d pay to Microsoft directly.
Features
- Multiple UK-based DataCentres
- Cloud licensing with flexible usage and payment
- Microsoft Gold Partner Cloud Platform + 6 other gold certifications
- Resilient - geographic, operator and device level
- Geo-replication between data centres
- Availability - 99.999%
- Totally customisable to your particular needs
- Consultancy / Professional services
- Highly experienced award winning team delivering enterprise and government support
- ISO 9001 & ISO 27001 compliant
Benefits
- Unified Billing - one supplier, one bill, many platforms
- Industry-leading Azure architects provide guidance if required
- Dedicated Account and Service Account Managers
- UK base support 24/7/365
- Consumption/Subscription billing model
- Operational costs are minimised
- Reduced downtime on your critical systems
- Single point of support for Cloud Licensing
- Expert consultants delivering Microsoft Solutions
Pricing
£800 to £960 a person a day
Service documents
Framework
G-Cloud 12
Service ID
6 2 3 2 7 3 8 9 2 1 9 7 9 5 1
Contact
Solidsoft Reply Ltd
Mark Usher
Telephone: +44 1256 375700
Email: m.usher@reply.eu
Service scope
- Service constraints
- Only pertains to Microsoft Azure
- System requirements
- Azure Subscription
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- If required.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 A
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Solidsoft Reply provide a bespoke approach to support levels. These are described in the Support Service Offering.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Onsite training + user documentation
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Using any of the interfaces provided
- End-of-contract process
- N/A
Using the service
- Web browser interface
- Yes
- Using the web interface
- All features avaialble
- Web interface accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web interface accessibility testing
- Microsoft provided
- API
- Yes
- What users can and can't do using the API
- All features
- API automation tools
-
- Ansible
- Chef
- OpenStack
- SaltStack
- Terraform
- Puppet
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- MacOS
- Using the command line interface
- All features available
Scaling
- Scaling available
- Yes
- Scaling type
-
- Automatic
- Manual
- Independence of resources
- By design of the service
- Usage notifications
- No
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2012
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- EU-US Privacy Shield agreement locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Other
- Other data at rest protection approach
- FIPS assured encryption
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Files
- Data
- Databases
- Virtual machines
- Backup controls
- Using one of the interfaces provided
- Datacentre setup
-
- Multiple datacentres with disaster recovery
- Multiple datacentres
- Single datacentre with multiple copies
- Single datacentre
- Scheduling backups
- Users schedule backups through a web interface
- Backup recovery
- Users can recover backups themselves, for example through a web interface
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- 99.99, assured by contractual commitment
- Approach to resilience
-
Datacentre location: EU, assured by contractual commitment
Data management location: EU, assured by contractual commitment
Legal jurisdiction of service provider: EU, assured by contractual commitment
Datacentre protection: Yes, assured by independent validation of assertion
Data-at-rest protection: FIPS-assured encryption, assured by independent testing of implementation
Secure data deletion: Other secure erasure process, assured by independent validation of assertion
Storage media disposal: Other secure erasure process, assured by independent validation of assertion
Secure equipment disposal: Yes, assured by independent validation of assertion
Redundant equipment accounts revoked: Yes, assured by independent validation of assertion
Service availability: 99.99, assured by contractual commitment - Outage reporting
- Outage reporting is by a public dashboard, an API and email alerts.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google apps)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- All accounts for the Microsoft Azure Cloud subscription to be operated on a Roles based approach ensuring access I restricted to only those who require it.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
-
- Dedicated device over multiple services or networks
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- QMS
- ISO/IEC 27001 accreditation date
- 28/03/17
- What the ISO/IEC 27001 doesn’t cover
- All covered
- ISO 28000:2007 certification
- Yes
- Who accredited the ISO 28000:2007
- QMS
- ISO 28000:2007 accreditation date
- 28/03/17
- What the ISO 28000:2007 doesn’t cover
- All covered
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- Yes
- Any other security certifications
- UK PGA Accreditation
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- As per the Solidsoft Reply Information and security policy produced and audited in conjunction with ISO 27001 and ISO 9001 guidance.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
All configuration and change management is controlled by our ISO 9001 assured Quality Management System Standard Operating Policies.
For more information the Change Management and Configuration Management SOPs can be provided. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Vulnerability management is controlled by our ISO 9001 assured Quality Management System Standard Operating Policies. Microsoft Azure is protected by Microsoft accredited vulnerability processes
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Provided as part of the Microsoft Azure cloud.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Incident management is controlled by our ISO 9001 assured Quality Management System Standard Operating Policies and based on ITIL 3 approach. For more information the Incident Management SOP can be provided.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- Hyper-V
- How shared infrastructure is kept separate
-
Cloud deployment model is Public cloud assured by contractual commitment.
Services separation is assured by intendant testing.
Services management separation is assured by intendant testing.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- Microsoft is committed to driving innovation that helps people and organizations improve the environment. We achieved carbon neutrality in 2014 and have met our goal of averaging 1.125 power usage effectiveness (PUE) for any new datacenter—exceeding the industry average by more than 30 percent.
Pricing
- Price
- £800 to £960 a person a day
- Discount for educational organisations
- No
- Free trial available
- No