Cantium Business Solutions

Microsoft Azure Hosting Solutions

Cantium Business Solutions have Azure certified staff that work with our customers to provide a tailor-made solution that fits within the desired budget while still being able to meet the business needs.Using Microsoft Azure we provide a flexible and cost-efficient cloud strategy.

Features

  • Azure Migrate for detailed assessments prior to migration
  • Azure Site Recovery for seamless migrations between Datacentres and Azure
  • Detailed resource costing with Cloudyn
  • High Availability with Availability Sets and Availability Zones
  • Mobile Services with Intune
  • Business Analytics
  • Scale Sets to allow on the fly scaling of resources
  • Configurable Geo-replication to another Azure region

Benefits

  • Outstanding service levels from our Microsoft accredited support staff
  • Build, Deploy and Manage apps quickly
  • Unlimited use of secure online Azure Storage
  • Deployable anywhere with Azure Stack
  • Compliancy reports from built in Advisor
  • Automatic patching of hardware by Microsoft
  • Huge savings by rights sizing VMs and created Reserved Instances
  • Support moving from IaaS to PaaS and SaaS solutions
  • New features constantly being rolled out

Pricing

£0.01 per unit

  • Education pricing available

Service documents

G-Cloud 11

741981705124105

Cantium Business Solutions

Ross Miller

03000412187

ross.miller@kent.gov.uk

Service scope

Service scope
Service constraints N/A
System requirements N/A

User support

User support
Email or online ticketing support Email or online ticketing
Support response times P1 - Entire site/multiple site outage: Network, Telephony or Internet Target Response - 20 Minutes Target Resolution - 6 Hours P2 - Critical Support Incident, Service Affecting over 50% users down Target Response - 1 Hour Target Resolution - 10 Hours P3 - Urgent support incident, service affecting more than 1-50% of users Target Response - 1 Working Day Target Resolution - 3 Working Days P4 Target Response - 1 Working Day Target Resolution - 4 Days Support incident, single user down P5 - Non-service affecting fault Target Response - 2 Working Days Target Resolution - 5 Working Days
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Onsite support
Support levels We provide a standard support service delivering to the following SLA:

P1 - Entire site/multiple site outage: Network, Telephony or Internet Target Response - 20 Minutes Target Resolution - 6 Hours P2 - Critical Support Incident, Service Affecting over 50% users down Target Response - 1 Hour Target Resolution - 10 Hours P3 - Urgent support incident, service affecting more than 1-50% of users Target Response - 1 Working Day Target Resolution - 3 Working Days P4 Target Response - 1 Working Day Target Resolution - 4 Days Support incident, single user down P5 - Non-service affecting fault Target Response - 2 Working Days Target Resolution - 5 Working Days

Onsite support may be required with response times varying depending on location and priority level
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started Dedicated onboarding team who will produce a project plan highlighting the tasks and timeframes from data gathering to implementation. Onboarding Officer will arrange a project initiation meeting, completing a client checklist from which they will produce a project plan that is specific for each client and takes into consideration any anomalies which could impact the delivery timeframes, amending the project plan accordingly. The project plan will be maintained by the Onboarding Officer and will be reviewed weekly. Training and support is provided as required in order to access any systems systems. Cantium will provide you with a standard template for easy data collection and migration. We will undertake to upload this template and will then validate and check once the upload has been completed. We will work closely with you to resolve any identified discrepancies through the provision of a validation report that covers information relating to individuals and your organization. Quality assurance and testing forms part of our onboarding project plan.
Service documentation Yes
Documentation formats
  • PDF
  • Other
Other documentation formats
  • Word
  • Hard Copy
End-of-contract data extraction This is provided in an agreed format at the end of the contract through our established off boarding process. The data is usually provided in excel format (CSV) as standard although other formats may be available upon request.
End-of-contract process Following notification of cancellation we will engage with the customer to confirm the termination date and agree timeframes for supplying the customers information to them. If additional/bespoke reporting requirements are requested this would be costed on a POA basis and provided as required.

Using the service

Using the service
Web browser interface No
API No
Command line interface No

Scaling

Scaling
Scaling available Yes
Scaling type
  • Automatic
  • Manual
Independence of resources Our hosting environment automatically scales to accommodate usage and extensive workforce planning is undertaken to ensure suitable support resources are available during peak times.
Usage notifications No

Analytics

Analytics
Infrastructure or application metrics Yes
Metrics types
  • CPU
  • Disk
  • Memory
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Resellers
Supplier type Reseller providing extra features and support
Organisation whose services are being resold Microsoft Azure

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type
  • Deleted data can’t be directly accessed
  • Hardware containing data is completely destroyed
Equipment disposal approach A third-party destruction service

Backup and recovery

Backup and recovery
Backup and recovery Yes
What’s backed up Data Warehouse (upon request)
Backup controls Determined at the outset of the service with the customer
Datacentre setup Multiple datacentres
Scheduling backups Supplier controls the whole backup schedule
Backup recovery Users contact the support team

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection within supplier network Cantium Business Solutions will work with clients to determine appropriate network security and firewall settings to ensure service availability while preventing any unauthorized internal or external access to customer data.

Availability and resilience

Availability and resilience
Guaranteed availability SLAs for Azure Stack are available from Microsoft depending on the cloud service selected and the level of availability chosen during configuration
Approach to resilience Azure stack can be configured at multiple locations with backup and recovery to the cloud or second stack site
Outage reporting Website notification
direct email
telephone/account management team

Identity and authentication

Identity and authentication
User authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Access is managed through Azure RBAC controls configurable by the customer
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Audit information for users
Access to user activity audit information You control when users can access audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for Between 6 months and 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 British Assessment Bureau
ISO/IEC 27001 accreditation date 06/02/2019
What the ISO/IEC 27001 doesn’t cover N/A
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Cyber Essentials

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes We utilise ITIL based processes and adhere to all requirements needed to meet ISO27001 accreditation

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach We utilise ITIL based processes and adhere to all requirements needed to meet ISO27001 accreditation
Vulnerability management type Supplier-defined controls
Vulnerability management approach We utilise ITIL based processes and adhere to all requirements needed to meet ISO27001 accreditation
Protective monitoring type Supplier-defined controls
Protective monitoring approach We utilise ITIL based processes and adhere to all requirements needed to meet ISO27001 accreditation
Incident management type Supplier-defined controls
Incident management approach We utilise ITIL based processes and adhere to all requirements needed to meet ISO27001 accreditation

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart No

Energy efficiency

Energy efficiency
Energy-efficient datacentres Yes
Description of energy efficient datacentres By utilising Microsoft Azure infrastructure the data-centres we use follow Microsoft's best practice for energy efficiency.

Pricing

Pricing
Price £0.01 per unit
Discount for educational organisations Yes
Free trial available No

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Terms and conditions
Service documents
Return to top ↑