Azure IaaS
Details of Microsoft Azure are available from Microsoft at https://azure.microsoft.com/engb/overview/
Features
- Public Cloud
- IaaS
- PaaS
Benefits
- Scalable public cloud
Pricing
£1 a unit
- Education pricing available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at sales@jungleit.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 13
Service ID
4 9 9 3 3 7 5 7 1 2 7 7 0 7 4
Contact
JUNGLE I.T. LIMITED
Alex Carey
Telephone: 01132584433
Email: sales@jungleit.co.uk
Service scope
- Service constraints
- Details of Microsoft Azure are available from Microsoft at https://azure.microsoft.com/engb/overview/
- System requirements
- Access to internet
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
P1 - 15 mins
P2 - 1 hour
P3 - 4 hours
P4 - 8 hours
P5 - 16 hours
See terms and conditions for definitions - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Ability to log tickets out of hours with escalation to on-call engineer for an additional fee.
- Web chat accessibility testing
- None
- Onsite support
- Yes, at extra cost
- Support levels
- See rate card
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- On boarding managed by a dedicated project manager.
- Service documentation
- No
- End-of-contract data extraction
- Data remains the property of customer at all times. No data to extract
- End-of-contract process
- Billing terminates and must be transferred to another provider.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Standard Microsoft Azure portal. Documentation available here: https://docs.microsoft.com/en-us/azure/azure-portal/azure-portal-overview
- Web interface accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web interface accessibility testing
- Microsoft provided portal
- API
- Yes
- What users can and can't do using the API
- Standard Microsoft Azure Portal. Documentation available here: https://docs.microsoft.com/en-us/azure/azure-portal/azure-portal-overview
- API automation tools
-
- Ansible
- Chef
- API documentation
- Yes
- API documentation formats
- HTML
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- Using the command line interface
- Standard Microsoft CLI.
Scaling
- Scaling available
- Yes
- Scaling type
-
- Automatic
- Manual
- Independence of resources
- Public cloud infrastructure
- Usage notifications
- Yes
- Usage reporting
-
- API
- SMS
- Other
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Microsoft
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- Never
- Protecting data at rest
- Physical access control, complying with SSAE-16 / ISAE 3402
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Virtual machines
- Files
- Databases
- Backup controls
- Standard Azure services configured by end users.
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Users schedule backups through a web interface
- Backup recovery
- Users can recover backups themselves, for example through a web interface
Data-in-transit protection
- Data protection between buyer and supplier networks
- Other
- Other protection between networks
- Configuration is end user dependent and all techniques are available.
- Data protection within supplier network
- Other
- Other protection within supplier network
- Configured by end user
Availability and resilience
- Guaranteed availability
- https://azure.microsoft.com/en-us/support/legal/sla/
- Approach to resilience
- Information available on request
- Outage reporting
-
Public dashboard
API
email alerts
account manager
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google apps)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Based on customer need. Azure web portal used for management.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Devices users manage the service through
-
- Dedicated device on a government network (for example PSN)
- Dedicated device over multiple services or networks
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- ISO 27001 in progress
- Information security policies and processes
- ISO 27001 in progress
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Based on customer need
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Based on customer need
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- Based on customer need
- Incident management type
- Undisclosed
- Incident management approach
- ITIL based incident management process
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Third-party
- Third-party virtualisation provider
- Microsoft Azure
- How shared infrastructure is kept separate
- https://azure.microsoft.com/en-gb/
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Fighting climate change
-
Fighting climate change
Jungle IT are committed to fighting climate change. From minimising energy usage in the office, planning delivers to minimise carbon footprint, to investing in electric vehicles, we take our responsibilities seriously in climate change. - Covid-19 recovery
-
Covid-19 recovery
We help businesses develop and maintain their recovery strategies, providing technology to facilitate working from anywhere, anytime, allowing flexibility of working styles and patterns for all staff. - Tackling economic inequality
-
Tackling economic inequality
We have invested heavily in our technical operations centre in West Yorkshire, creating opportunities for local people displaced from other employers in the area. We provide work experience and training for disadvantaged school children with many being offered apprenticeships afterwards. We are members of the living wage alliance. - Equal opportunity
-
Equal opportunity
We are a dedicated equal opportunities organisation, ensuring diversity and inclusion form part of everything we do. - Wellbeing
-
Wellbeing
We ensure wellbeing of our staff by supporting flexible working as well as providing a range of benefits to enable a viable work-life balance for all.
Pricing
- Price
- £1 a unit
- Discount for educational organisations
- Yes
- Free trial available
- No
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at sales@jungleit.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.