JUNGLE I.T. LIMITED
Azure IaaS
Details of Microsoft Azure are available from Microsoft at https://azure.microsoft.com/engb/overview/
Features
- Public Coud
- IaaS
- PaaS
- Azure Virtual desktop
- Azure Site Recovery
Benefits
- Scalable Public Cloud
Pricing
£1 a unit
- Education pricing available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at sales@jungleit.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
3 1 5 1 0 6 7 4 7 0 5 3 4 3 2
Contact
JUNGLE I.T. LIMITED
Alex Carey
Telephone: 01132584433
Email: sales@jungleit.co.uk
Service scope
- Service constraints
- Details of Microsoft Azure are available from Microsoft at https://azure.microsoft.com/engb/overview/
- System requirements
- Access to the internet
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
P1 - 15 mins P2 - 1 hour P3 - 4 hours P4 - 8 hours P5 - 16 hours See terms and conditions for definitions.
Working hours are Monday to Friday 8 am till 6pm - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- See rate card
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Onboarding managed by a dedicated project manager
- Service documentation
- No
- End-of-contract data extraction
- Data remains the property of customer at all times. No data to extract
- End-of-contract process
- Billing terminates and must be transferred to another provider.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Standard Microsoft Azure portal. Documentation available here: https://docs.microsoft.com/en-us/azure/azure-portal/azure-portal-overview
- Web interface accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web interface accessibility testing
- Microsoft provided portal
- API
- Yes
- What users can and can't do using the API
- Standard Microsoft Azure portal. Documentation available here: https://docs.microsoft.com/en-us/azure/azure-portal/azure-portal-overview
- API automation tools
-
- Ansible
- Chef
- Terraform
- API documentation
- Yes
- API documentation formats
- HTML
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- Using the command line interface
- Standard Microsoft CLI.
Scaling
- Scaling available
- Yes
- Scaling type
-
- Automatic
- Manual
- Independence of resources
- Public cloud infrastructure
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Microsoft
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
- Physical access control, complying with SSAE-16 / ISAE 3402
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Hardware containing data is completely destroyed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Virtual Machines
- Files
- Databases
- Backup controls
- Standard Azure services configured by end users.
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
- Other
- Other protection between networks
- Configuration is end user dependent and all techniques are available.
- Data protection within supplier network
- Other
- Other protection within supplier network
- Configured by end user
Availability and resilience
- Guaranteed availability
- https://azure.microsoft.com/en-us/support/legal/sla/
- Approach to resilience
- Information available on request
- Outage reporting
- Public dashboard, API email alerts and account manager
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google apps)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Based on customer need. Azure web portal used for management.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Devices users manage the service through
-
- Dedicated device over multiple services or networks
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- UKAS
- ISO/IEC 27001 accreditation date
- 13 April 2023
- What the ISO/IEC 27001 doesn’t cover
- 8.4, 8.25, 8.28 and 8.29
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- ISO 27001 - 2022
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Based on customer need
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Based on customer need
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- Based on customer need
- Incident management type
- Undisclosed
- Incident management approach
- ITIL based incident management process
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Third-party
- Third-party virtualisation provider
- Microsoft Azure
- How shared infrastructure is kept separate
- https://azure.microsoft.com/en-gb/
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Social Value
-
Social Value
- Tackling economic inequality
- Equal opportunity
Tackling economic inequality
We have a few initiatives centered around supporting those who are at a disadvantage. Including supporting local charities such as our recent Bake Sale. WE also recently committed to supporting three local charities for the next five years.
https://www.jungleit.co.uk/insights-and-events/news/our-commitment-to-supporting-local-charities/Equal opportunity
We share social posts around supporting talent in the tech sector, including talent that is often underrepresented or misunderstood.
Recent news piece was created around our approach to support talent too. https://www.jungleit.co.uk/insights-and-events/news/supporting-future-talent-in-the-tech-sector/
News piece of Supporting the Armed Forces Covenant https://www.jungleit.co.uk/insights-and-events/news/supporting-the-armed-forces-covenant/
Pricing
- Price
- £1 a unit
- Discount for educational organisations
- Yes
- Free trial available
- No
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at sales@jungleit.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.