Skip to main content

Help us improve the Digital Marketplace - send your feedback

JUNGLE I.T. LIMITED

Azure IaaS

Details of Microsoft Azure are available from Microsoft at https://azure.microsoft.com/engb/overview/

Features

  • Public Coud
  • IaaS
  • PaaS
  • Azure Virtual desktop
  • Azure Site Recovery

Benefits

  • Scalable Public Cloud

Pricing

£1 a unit

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sales@jungleit.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

3 1 5 1 0 6 7 4 7 0 5 3 4 3 2

Contact

JUNGLE I.T. LIMITED Alex Carey
Telephone: 01132584433
Email: sales@jungleit.co.uk

Service scope

Service constraints
Details of Microsoft Azure are available from Microsoft at https://azure.microsoft.com/engb/overview/
System requirements
Access to the internet

User support

Email or online ticketing support
Email or online ticketing
Support response times
P1 - 15 mins P2 - 1 hour P3 - 4 hours P4 - 8 hours P5 - 16 hours See terms and conditions for definitions.
Working hours are Monday to Friday 8 am till 6pm
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
See rate card
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Onboarding managed by a dedicated project manager
Service documentation
No
End-of-contract data extraction
Data remains the property of customer at all times. No data to extract
End-of-contract process
Billing terminates and must be transferred to another provider.

Using the service

Web browser interface
Yes
Using the web interface
Standard Microsoft Azure portal. Documentation available here: https://docs.microsoft.com/en-us/azure/azure-portal/azure-portal-overview
Web interface accessibility standard
WCAG 2.1 AA or EN 301 549
Web interface accessibility testing
Microsoft provided portal
API
Yes
What users can and can't do using the API
Standard Microsoft Azure portal. Documentation available here: https://docs.microsoft.com/en-us/azure/azure-portal/azure-portal-overview
API automation tools
  • Ansible
  • Chef
  • Terraform
API documentation
Yes
API documentation formats
HTML
Command line interface
Yes
Command line interface compatibility
  • Linux or Unix
  • Windows
Using the command line interface
Standard Microsoft CLI.

Scaling

Scaling available
Yes
Scaling type
  • Automatic
  • Manual
Independence of resources
Public cloud infrastructure
Usage notifications
Yes
Usage reporting
Email

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Microsoft

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
  • Hardware containing data is completely destroyed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • Virtual Machines
  • Files
  • Databases
Backup controls
Standard Azure services configured by end users.
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
Other
Other protection between networks
Configuration is end user dependent and all techniques are available.
Data protection within supplier network
Other
Other protection within supplier network
Configured by end user

Availability and resilience

Guaranteed availability
https://azure.microsoft.com/en-us/support/legal/sla/
Approach to resilience
Information available on request
Outage reporting
Public dashboard, API email alerts and account manager

Identity and authentication

User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Based on customer need. Azure web portal used for management.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
Devices users manage the service through
  • Dedicated device over multiple services or networks
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
  • Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
UKAS
ISO/IEC 27001 accreditation date
13 April 2023
What the ISO/IEC 27001 doesn’t cover
8.4, 8.25, 8.28 and 8.29
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
ISO 27001 - 2022

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Based on customer need
Vulnerability management type
Undisclosed
Vulnerability management approach
Based on customer need
Protective monitoring type
Undisclosed
Protective monitoring approach
Based on customer need
Incident management type
Undisclosed
Incident management approach
ITIL based incident management process

Secure development

Approach to secure software development best practice
Supplier-defined process

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Third-party
Third-party virtualisation provider
Microsoft Azure
How shared infrastructure is kept separate
https://azure.microsoft.com/en-gb/

Energy efficiency

Energy-efficient datacentres
No

Social Value

Social Value

Social Value

  • Tackling economic inequality
  • Equal opportunity

Tackling economic inequality

We have a few initiatives centered around supporting those who are at a disadvantage. Including supporting local charities such as our recent Bake Sale. WE also recently committed to supporting three local charities for the next five years.
https://www.jungleit.co.uk/insights-and-events/news/our-commitment-to-supporting-local-charities/

Equal opportunity

We share social posts around supporting talent in the tech sector, including talent that is often underrepresented or misunderstood.

Recent news piece was created around our approach to support talent too. https://www.jungleit.co.uk/insights-and-events/news/supporting-future-talent-in-the-tech-sector/

News piece of Supporting the Armed Forces Covenant https://www.jungleit.co.uk/insights-and-events/news/supporting-the-armed-forces-covenant/

Pricing

Price
£1 a unit
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sales@jungleit.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.