Archive360 Digital Archiving & Records Management Solutions
We are an Archive360 Global Channel Partner offering Archive360 products through G-Cloud 12. Archive2Azure provides an elastic and efficient cloud-based archive ensuring fast, secure, and compliant access, validation and classification, retention, and disposition. Suitable for many use cases and free from any supplier or vendor lock-in.
Features
- Infinitely scalable secure data archiving, retention & disposition.
- Archive any data in its native format
- Archive from multiple applications, filestores and cloud platforms
- Cost effective use of tiered storage
- Hosted in a secure dedicated Azure subscription
- Fully configurable retention policies and Disposition
- Granular logging of all access per item.
- Ingest via API, Dropzone or direct database or filestore connection
- Granular access control.
- e-discovery and legal hold
Benefits
- Implement or simplify data retention and disposition/disposal
- Simplify responses to Freedom of Information and Subject Access Requests
- Compliant with GDPR, DPA, NCSC guidance and other applicable standards
- No vendor lock-in, native format storage in dedicated Azure subscription.
- Enable the retirement of legacy applications while retaining data
- Create an archive data resource for AI interrogation and analytics
Pricing
£500 a unit a month
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 5 0 7 0 7 6 9 4 4 0 6 5 5 6
Contact
Through Technology Limited
Peter Hanney
Telephone: +44 (0)7913334794
Email: enquiries@throughtechnology.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Hybrid cloud
- Service constraints
- The service is hosted in a dedicated Microsoft Azure Subscription and uses Azure Platform as a Service functions. Azure administration can be provided with this service or undertaken by the customer as required.
- System requirements
-
- Archive2Azure uses native Azure Services (estimates provided on quotation).
- Users require access via the internet or customer-owned ExpressRoute connection.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Support levels are best determined in response to your requirements as a customer and the nature, criticality and rate of change in the data stored. For this reason we address support requirements as part of the quotation/ordering process. Depending on your requirement, support hours and response times may vary from those shown below.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 A
- Web chat accessibility testing
- We typically utilise Microsoft Teams federation with customers or the customer's own ITSM tooling. Microsoft tools comply with the above accessibility standard.
- Onsite support
- Yes, at extra cost
- Support levels
-
Through Technology provide support and implementation for Archive360 products through our Lot 3 - Cloud Support service: "Cloud Archiving Service, Powered by Archive360".
Support levels are best determined in response to your requirements as a customer and the nature, criticality and rate of change in the data your will store. For this reason we address support requirements as part of the quotation/ordering process. Depending on your requirement, support hours and response times may vary from those shown above. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Please get in touch with us for an initial consultation regarding the data types, volumes and sources for archive. From this we can arrange a quotation, considering the optimum method for ingesting data and onboarding users to the service.
Our team will create an instance of the Archive2Azure service in a dedicated Azure subscription for you and provide training for nominated administrative points of contact in your organisation along with system documentation and user guidance. We can also setup and operate the archive for you as a managed service if required, where Through Technology will manage the Azure subscription and (if required) the full archive service. - Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- Other
- Other documentation formats
- Microsoft Document Formats
- End-of-contract data extraction
- Data is stored in its native format in Azure Blob Storage in a dedicated subscription within a customer-owned Azure enrolment. The data is encrypted with the customer's keys. This means that the data is always under the customers control and does not require extraction. At the end of the contract, the customer still owns the Azure storage and all the data within, which remains in its native format. Extraction to an alternate location can be arranged with our engineers based upon our ratecard, but this is not typically necessary where the data is always in a customer-owned storage medium and subject to customer control. This is a key difference between our service and competitor products, please contact us to discuss in further detail.
- End-of-contract process
-
Archive2Azure services will be removed from the customer Azure subscription. Leaving the data within the customer's subscription in its native format. Should customers require data to be moved to alternate locations, this can be done by the customer prior to contract end, after contract end using standard tools for Azure data transfer or by our engineers based upon our Lot3 Support Rate Card during the contract exit. Any additional customer adminsitrative users are added and our AzureAD permissions to access the Archive and underlying Azure Services are revoked.
We will discuss any specific end of contract requirements as part of our initial consultation and quotation.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- WCAG 2.1 A
- API
- Yes
- What users can and can't do using the API
- API can be used for any number of integration and archiving scenarios. Please contact us to discuss as this requires more than the 200 words available to us in this service description on Digital Marketplace.
- API documentation
- Yes
- API documentation formats
-
- HTML
- ODF
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- Retention and disposition policies and their associated workflows can be customised to meet any record retention requirements at a very granular level. Role-based access control can be configured at a granular level to control who has access to view and search different data sets or types. Archive2Azure is an immensely powerful and flexible archiving tool so we strongly recommend asking us specific clarifications or booking a demonstration, as it cannot be adequately covered in the 200-word limit for a this question in a G-Cloud Application.
Scaling
- Independence of resources
-
The solution is implemented in a dedicated subscription within the customer's Azure environment. This maintains customer control over the data whilst providing total segregation between Archive360 customers and from the customer's other services. The solution is therefore totally independent of any other customer's instance and massively scaleable due to use of native Azure Services. Multiple existing customers archive multiple petabytes.
Ingestion and user access operate on separate infrastructure, limiting any impact from resource intensive processing activity.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Standard Azure Monitoring and metrics.
Comprehensive data on Archive consumption, data types etc.
Any metrics possible through the powerful search and analytics available in the console (demo recommended). - Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Archive360
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- Never
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Other
- Other data at rest protection approach
- Data is stored within a dedicated customer Azure subscription which can be IT Health Check tested to validate security controls.
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
-
Data can be exported in its original format to its source location or a range of other storage platforms from the admin console. Exports can be generated from ediscovery making responses to security investigation, Freedom of Information and Subject Access Requests straightforward. Search and Export functions are subject to role-based access control.
Certain data sources (such as Office 365) include features to seamlessly re-inject data into the user's account retaining original metadata and folder structures.
For security investigation, Freedom of Information and Subject Access Requests, appropriately authorised users can restore Office365 data into separate folders in a chosen account. - Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- Data is exported in its native format
- Ie. The format in which it was originally ingested.
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
- Data is stored and imported in any file format
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- See Microsoft Azure service descriptions. Archive360 support SLAs and service hours will be agreed on an individual customer basis based upon the nature and criticality of each data type.
- Approach to resilience
-
Our service utilises Microsoft Azure resilience features and capabilities to provide a robust service to customers. There is an obvious trade-off between the level of Azure resilience and replication applied and cost.
We therefore work with our customers to determine the best fit for your data, based upon criticality and access requirements as well as a traditional RTO/RPO. Further details upon request. - Outage reporting
- Service outage reporting is available via dashboards and alerting.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Access to the service is managed through the Customer's Azure AD with entitlements used to provide access management for administrative functions. This is defined on a per customer basis following principles of least privilege. All admin permissions are assigned on a least privilege basis. All resources are appropriately security vetted and subject to regular account-specific security briefings. More information available upon request.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Other
- Description of management access authentication
- Authentication is managed through the customer's Azure AD with Two factor authentication preferred. This means the customer holds ultimate control over access to your data and the capability to view and audit admin permissions at any time. Privileged Identity Management can be used if required. Where on-premise data collection servers are required, the customer provides the OS and access as a pre-requisite for system installation and therefore defines the authentication mechanism and remote connectivity (e.g. VPN).
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- A-LIGN - Certificate Number ISMS-AR-11623
- ISO/IEC 27001 accreditation date
- 16/11/2023
- What the ISO/IEC 27001 doesn’t cover
-
Both Archive360 and Through Technology hold ISO27001 certification, The above details are for Archive360. The certification includes all elements of the service offered on G-Cloud. Please request further details in procurement.
Through Technology's certification is accredited by BSI (British Standards Institute. Certificate Number IS743920 and valid from 13/10/2021.
Additionally, - ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
- SOC2
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Archive360 is a signatory to the Cyber Tech Accord and operates their own stringent security policies and processes governing development and support activity. Details available upon request.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Archive360 follow Agile CI/CD development, QA, and deployment methodology -- all Features are tracked Epic, User Story, Task and are correlated to Github and Jenkins automation for QA, functional QA tests and random pathological corner QA tests are also linked before deployment by Services, all code supports rollback. Defects are tracked via Zendesk and link to Jira. We follow "4 eye" review of commit approvals and final deployment releases.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Archvie360 provides Software as a Service based upon Microsoft Azure, we inherit Azure's updating of both our Microsoft Azure Application and Azure Services: such as CosmosDB. For on-premise Fast Collect Migration Server, this is the Customer's OS to patch. Archive360 supplies patches as it relates to the relative code. Archive2Azure relies on Azure Application, CosmosDB, Search -- respective SLAs, in particular updates, are at https://azure.microsoft.com/en-us/support/legal/sla/ .
For managed services, subscriptions are managed with Microsoft Security Center and the 3rd party tools from Qualys. As part of that managed service, Archive360 leverages Qualys Application Vulnerability
scans. - Protective monitoring type
- Undisclosed
- Protective monitoring approach
- Protective Monitoring requirements, integration and options will be discussed as part of our initial engagement. We can provide a SIEM capability specifically for the service or integrate with the Buyer's existing SIEM solution
- Incident management type
- Supplier-defined controls
- Incident management approach
- For Archive360 software related incidents - All defects are tracked via Archive360 Zendesk, auto-generate Jira tickets, Tickets are auto-assigned to respective Section Manager, updated with notifications to Zendesk. We have assigned Scrum Master for monitoring Dev, and assigned Service Manager for monitoring Customer tickets all the way from defect resolution, QA test, documentation and release notes, and arrangement with Customer for deployment.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Digital Archiving enables the retirement of legacy business applications and the shutdown of significant amounts of legacy infrastructure. Transferring this data to Microsoft Azure tiered storage delivers a significant carbon reduction.
Through Technology is a Carbon Negative Business and formally assessed and certified as such with the PAS2060 Carbon Neutral Plus standard. This means that our services are operated to remove more carbon dioxide from the atmosphere than our business has created or will create in future, already significantly exceeding HM Government's Net Zero targets. We annually calculate our carbon footprint using the reputable carbonfootprint.com service, identify further reductions in our environmental impact, then offset -double- the residual carbon footprint of our business through the same scheme reputable UK tree-planting scheme used to offset HM Government ministerial travel. Measuring our footprint every year, optimising it and offsetting double, scales with our business and automatically applies to every service we provide (through G-Cloud or elsewhere). Furthermore, because trees last for many years, our positive impact on carbon capture and storage will continue to grow greater and greater across the lifetime of our business. As a business, we are also focussed upon helping our customers achieve your outcomes. We consider environmental impact in the work we undertake as part of our services many of which involve carbon reduction through modernisation of systems and migration to the cloud. Fighting Climate Change is something we are passionate about. We are proud of the contribution we make as UK Small Business. It also shows our commitment to not only meet, but exceed government targets for fighting climate change and goals of Procurement Policy Notes PPN 06/20 (Social Value) and PPN 06/21 (Taking account of Carbon Reduction in major contracts). Further detail, including "Beyond Net Zero - The Through Technology Environmental Impact Plan" available at www.throughtechnology.uk/carbonreductionCovid-19 recovery
Through Technology are a UK SME Businesses, paying all our taxes in the UK and operating in full compliance with UK Tax regulations. In Through Technology, we have a very strong focus on achieving value for the tax-payers money and on supporting the UK economy. We are signatories to the UK Government Small Business Commissioner’s Prompt Payment Code. Meaning we commit to paying our supply chain within 30 days and have never yet failed to do so, even when we ourselves have faced delays in our payments. Our company principles include sharing knowledge and building capability with our customers’ internal teams. This can be seen in our “Insource Transition Support” service published on G-Cloud. Helping our customers insource and develop their internal teams will drive upskilling and job creation within our public sector customers. We have a defined standard business process to actively seek out opportunities for savings and cost avoidance for our customers in everything we do. This process has resulted in savings and cost avoidance of over £10M in the last 3 years, saving our customers more than we have cost them while we have also delivered all of our contracted scope. We have also created new jobs in our business during and after the Covid 19 pandemic and support our staff volunteering in education, to support the generation most affected by Covid Lockdown.Tackling economic inequality
Through Technology are committed to fighting economic inequality. As a modern business without strong geographic ties, our hiring policy is to prioritise recruitment from areas of high social deprivation as identified in the Department for Levelling Up, Housing and Communities' English Indices of Deprivation). At present, 40% of our staff are from these areas and as our business grows, so will this percentage, ensuring that most of the tax-payer money spent on our services ends up in the local UK communities that need it the most. We are an equal opportunities employer that recognises and actively seeks out the benefits of diverse and inclusive teams to our business, to our customers and to wider society.Equal opportunity
We are an equal opportunities employer that recognises and actively seeks out the benefits of diverse and inclusive teams to our business, to our customers and to wider society. This is built into our policies, procedures and contracts, and lived day to day. We have worked to remove any bias from our organisational processes, including subconscious bias where it may exist. An example is that the first stage of our recruitment process is anonymised, minimising the impact of any potential bias in CV and Application evaluation. We are signatories to the Armed Forces Covenant and seek proactively to recruit ex-forces personnel, overcoming some of their challenges in returning to civilian life. Our recruitment process for opportunities is intentionally designed to be accessible and open to all. Our teams working through G-Cloud are diverse and include people from different parts of the UK, age groups, ethnic origin, gender, disability and faith.Wellbeing
Through Technology’s defining characteristic is the quality of our people, so we take well-being very seriously and have a number of measures in place to support the well-being of our staff and people they work with. Despite our relative small size, we have a board member responsible for staff wellbeing and a number of policies and processes which we live every week to maintain it. Examples include: Providing private health cover for all employees, offering time out for voluntary work in our local communities (including current staff acting as school governors, sports coaches, volunteering careers guidance in schools, acting as community representatives and teaching practical philosophy/life skills), funding a qualified Mental Health First Aider within the business, fostering a culture that welcomes private or public discussion of mental health and well-being (including open discussion of our CEO’s personal experiences). We also care about the well-being of those we work with in our supply chain, our customers, and their third-party suppliers. If we identify any well-being or stress-related issues with colleagues outside our organisation, then we handle these sensitively through the appropriate process or channel.
Pricing
- Price
- £500 a unit a month
- Discount for educational organisations
- No
- Free trial available
- No