Microsoft Azure Cloud Services development and implementation. Azure solution designed to deliver a digital workplace solution. JDS365 provide well-defined methodology to ensure successful delivery of Azure components.
- Digital Workplace Solution
- Azure tenant configuration
- Ongoing support
- Supports the day-to-day operation of your Office 365 ecosystem
- Cloud First Agenda
- Discovery assessment through to service delivery
- Identification of applications and data that depend on Azure
- Migration of email to Azure from Exchange or Notes
- Assistance with Cloud Identities within Azure
- Experienced, certified Microsoft Azure consultants
- Simplification and risk reduction in moving to Microsoft Azure
- Can adhere to your own ITIL and Project Management governance
- Utilisation of out-of-the-box and existing technologies to help control costs
- Digital Transformation
- Optimisation of ICT investments
- Training and Adoption planning
- Develop a bespoke roadmap for your O365 deployment
- Accelerate the deployment and transition to Azure
- Prototyping and pilot systems
- Independent best practice advice
£350 to £1500 per unit per day
- Education pricing available
- Free trial available
- Pricing document
- Skills Framework for the Information Age rate card
- Service definition document
- Terms and conditions
|Software add-on or extension||No|
|Cloud deployment model||
|System requirements||Browser accessible device|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
P1 30 minutes, P2 2 Hours, P3 4 Hours, P4 8 Hours
Weekends its different times
P1 1 Hour, P2 4 Hours, P3 8 Hours, P4 16 Hours
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||WCAG 2.1 AA or EN 301 549|
|Phone support availability||9 to 5 (UK time), 7 days a week|
|Web chat support||Yes, at an extra cost|
|Web chat support availability||9 to 5 (UK time), 7 days a week|
|Web chat support accessibility standard||WCAG 2.1 AA or EN 301 549|
|Web chat accessibility testing||Chat services is provided via Skype or Microsoft Teams which have been tested and passed by the vendor.|
|Onsite support||Yes, at extra cost|
We provide a comprehensive Service Desk support to our clients. This service is flexible and can be tailored to suit your specific needs for example 24/7 or peak time support. We provide a service that is standalone but are also integrated with customer and 3rd party support groups to provide a uniform service to users. Our service provision workflow is comprehensive. Typically requests are received via email or telephone and logged immediately in the support log. The support log is accessible 24/7. Below are our SLAs.
Standard Support Available: Monday-Friday, 08.30-17.30, excluding UK public holidays & weekends.
Premier Support for 24/7 is available at an extra cost.
Priority 1: System down situation severely impacting customer production and/or productivity. Response: 60 Minutes then hourly updates. Resolution: 8 hours (working hours)
Priority 2: Time sensitive issue important to long-term productivity, not causing an immediate stoppage. Response: 4 Hours then daily updates. Resolution: 16 hours (working hours)
Priority 3: Issue which does not have significant current productivity impact for the customer. Incidents will be grouped and resolved at mutually convenient times. Response: 8 Hours then mutually agreed updates. Resolution: 4 days
Priority 4: General advice. Response: Next Business Day. Resolution: 7 days
|Support available to third parties||Yes|
Onboarding and offboarding
JDS365 will work closely with its clients to provide comprehensive onsite user training, online training, or user documentation. In addition we will work with internal IT Team to ensure Knowledge Transfer.
Additional Technical Information:
See https://azure.microsoft.com/en-us/resources/ plus comprehensive online documentation for various solutions available across the platform. See https://docs.microsoft.com/en-us/azure/ Office 365 Documentation https://support.office.com/en-ie/article/get-started-with-office-365-for-business-d6466f0d-5d13-464a-adcb-00906ae87029 Dynamics 365 Documentation https://docs.microsoft.com/en-gb/dynamics365/ Get started with SharePoint https://support.office.com/en-us/article/get-started-with-sharepoint-909ec2f0-05c8-4e92-8ad3-3f8b0b6cf261
|End-of-contract data extraction||Customer are able to remove their data at any time through the same means they uploaded. Either over their network (internet or express route) or via the Azure Import/Export services. Also see https://www.microsoft.com/en-us/trustcenter/privacy|
|End-of-contract process||Please see https://www.microsoft.com/en-us/trustcenter/privacy/you-own-your-data. In our Online Services Terms, Microsoft contractually commits to specific processes when a customer leaves a cloud service or the subscription expires. This includes deleting customer data from systems under our control. If you terminate a cloud subscription or it expires (except for free trials), Microsoft will store your customer data in a limited-function account for 90 days (the “retention period”) to give you time to extract the data or renew your subscription. During this period, Microsoft provides multiple notices, so you will be amply forewarned of the upcoming deletion of data. After this 90-day retention period, Microsoft will disable the account and delete the customer data, including any cached or backup copies. For in-scope services, that deletion will occur within 90 days after the end of the retention period. (In-scope services are defined in the Data Processing Terms section of our Online Services Terms.) See http://www.microsoftvolumelicensing.com/Downloader.aspx?DocumentId=11745|
Using the service
|Web browser interface||Yes|
|Application to install||Yes|
|Compatible operating systems||
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||Mobile service maybe slightly limited or scaled down. Full access and feature are always available via the desktop application.|
|What users can and can't do using the API||The Microsoft Cloud Service has several API end point and allows users to setup, make changes, and automate service provision|
|API documentation formats||
|API sandbox or test environment||No|
|Description of customisation||
Out-of-box (Non Coded Solutions) customisation can be implemented without prior review and approval.
Coded or programmed customisation:
Yes users can customise their service as long as they have informed us of customisation and we have agreed and approved prior to implementation of the customisation.
|Independence of resources||Microsoft make significant investment into the Azure hyper-scale public cloud service to ensure optimised performance. They additionally provide extensive support services, which help to ensure that performance issues with your tenancy are minimised. Microsoft monitor usage, demand and activity, and automatically maintain optimal infrastructure to meet each client’s specific needs – as such, as user place demand on services, Microsoft ensure that other users are not affected. Detailed guidance about performance tuning are available online, which help to ensure that your tenancy is configured to meet your organisations specific needs.|
|Service usage metrics||Yes|
|Metrics types||Infrastructure or application metrics|
|Supplier type||Reseller providing extra features and support|
|Organisation whose services are being resold||Microsoft|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Security Clearance (SC)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||‘IT Health Check’ performed by a CHECK service provider|
|Protecting data at rest||Encryption of all physical media|
|Data sanitisation process||Yes|
|Data sanitisation type||
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||Users can follow guides provided via Microsoft MSDN or technet website or can contact or Service desk and we can provide instructions and information on how to perform a Data export.|
|Data export formats||
|Data import formats||
|Data protection between buyer and supplier networks||
|Data protection within supplier network||
Availability and resilience
|Guaranteed availability||See Microsoft's Online Service Terms at http://www.microsoftvolumelicensing.com/Downloader.aspx?DocumentId=11745|
|Approach to resilience||Please see https://www.microsoft.com/en-us/cloud-platform/global-datacenters and https://www.microsoft.com/en-us/TrustCenter/|
Please see https://azure.microsoft.com/en-us/status/ and https://portal.azure.com/#blade/HubsExtension/ServicesHealthBlade
Office 365 Service Status
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||VPN access. 2-factor authentication. Username and Password|
|Access restriction testing frequency||At least once a year|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||Between 1 month and 6 months|
|How long system logs are stored for||Between 1 month and 6 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||Other|
|Other security governance standards||ITIL governance standards|
|Information security policies and processes||
We have a Information Security Policy which is available on request. We have rigorous induction and training methods which ensure policies are followed. Reporting Structure is also available on request.
Also see https://www.microsoft.com/en-us/TrustCenter/Compliance/ISO-IEC-27001 and The Microsoft Cloud Security Policy is available via the Service Trust Platform aka.ms/stp"
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||Azure has developed formal standard operating procedures (SOPs) governing the change management process. These SOPs cover both software development and hardware change and release management, and are consistent with established regulatory guidelines including ISO 27001, SOC 1 / SOC 2, NIST 800-53, and others. Microsoft also uses Operational Security Assurance (OSA), a framework that incorporates the knowledge gained through a variety of capabilities that are unique to Microsoft including the Microsoft Security Development Lifecycle (SDL), the Microsoft Security Response Center program, and deep awareness of the cybersecurity threat landscape. Please see https://www.microsoft.com/en-us/SDL/OperationalSecurityAssurance and https://www.microsoft.com/en-us/sdl|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||Comply with CSA CCM v3.0 standards, supplemented by internal vulnerability management processes.|
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||
We utilise various tools and techniques in order to identify potential compromises and respond on a case by case basis, based on the nature, complexity and severity. We offer various levels of response times, depending on Service Level Agreements. Further information is available upon request.
Microsoft Azure also provides sophisticated software-defined service instrumentation and monitoring that integrates at the component or server level, the datacenter edge, our network backbone, Internet exchange sites, and at the real or simulated user level, providing visibility when a service disruption is occurring and pinpointing its cause.
|Incident management type||Supplier-defined controls|
|Incident management approach||
Internally we use ITIL framework for Incident management.
Microsoft provides robust processes incidents.
• Identification – System and security alerts may be harvested, correlated, and analyzed.
• Containment – The escalation team evaluates the scope and impact of an incident.
• Eradication – The escalation team eradicates any damage caused by the security breach, identifies root cause for why the security issue occurred.
• Recovery – During recovery, software or configuration updates are applied to the system and services are returned to a full working capacity.
• Lessons Learned – Each security incident is analyzed to protect against future reoccurrence.
|Approach to secure software development best practice||Conforms to a recognised standard, but self-assessed|
Public sector networks
|Connection to public sector networks||No|
|Price||£350 to £1500 per unit per day|
|Discount for educational organisations||Yes|
|Free trial available||Yes|
|Description of free trial||30 Day free trial for Azure, Dynamics 365, Office 365 or SharePoint|