Skip to main content

Help us improve the Digital Marketplace - send your feedback

MERCURIUS IT LIMITED

Microsoft Azure Consulting & Dynamics 365 Business Central, D365 F&SCM (F&O), Hosting Services

We provide Microsoft Cloud CSP (Customer Service Program) services for hosting Microsoft Azure. Our services include provision of end-to-end implementation, migration, hosting adhering to industry best practice & security standards. We also enable hosting of D365 Business Central, D365 F&O (F&SCM), and legacy applications on the Azure Cloud.

Features

  • Manage D365 Business Central, D365 F&SCM (F&O) instances on Azure
  • Microsoft Azure cloud resources procured and managed on your behalf
  • 4X Microsoft Solution (Gold) partner for ERP, CRM & Azure
  • Experienced Prince2 Agile and Microsoft Sure-Step implementation methodology
  • Deliver Azure integration, Azure backup, Azure monitoring, disaster recovery
  • Managed Azure support with a single point of contact
  • Database development and integration (SQL Server and Azure SQL)
  • Web Services including REST API, OAuth authentication, JSON, XML
  • Azure App Service, Azure Functions, Azure Search, Azure Cognitive services
  • Deployed Anywhere

Benefits

  • Build, deploy, and manage the apps easily
  • You can pay as you consume
  • Fast in terms of deployment, operation, and scalability
  • Data stored is in compliance with relevant regulations
  • Faster content delivery
  • Azure is protected by the spy-movie environment
  • Azure has built-in support to analyze data and derive insights
  • Built in Disaster Recovery
  • It allows hybrid model
  • Automatic Updates

Pricing

£184.73 to £2,592.91 a virtual machine a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at atush.r@mercuriusit.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

5 7 7 5 9 8 2 3 1 3 5 5 3 9 4

Contact

MERCURIUS IT LIMITED Atush Rohan
Telephone: +441908508080
Email: atush.r@mercuriusit.com

Service scope

Service constraints
NA
System requirements
NA

User support

Email or online ticketing support
Email or online ticketing
Support response times
Case Acknowledgement < 1HR

Case Resolution
1. Critical - System Failure < 4 Hr
2. Serious - Major Problem < 12 Hr
3. Medium – Minor Problem < 24 Hr
4. Low - Query < 72 Hr

Charges are calculated at 1.5 times normal rate for weekend support.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
MaxCare – Industry Best Practice Support made simple
• Developed based on industry best practice
• IT Infrastructure Library (ITIL) standardised processes with stringent Testing & Quality Assurance processes
• Periodic reviews and clear escalation customer meetings

Guaranteed Service Level Agreements (SLA)
• Off the shelf with standardised industry scope and service levels
• Bespoke to unique services or service requirements

Onshore Helpdesk & 1st Line
• Ensures high level of customer service and customer contact
• Onshore team of consultants for quick response and onsite work

Offshore Delivery & Support centre for 2nd & 3rd Line
• A proven low risk & cost effective with the ability to deliver ‘follow the sun’ resolution times
• Complete Flexibility in support & pricing models to suit customer budgets
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide online training via Microsoft Teams meetings to start using the services, along with our own documention and supporting material.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
Users will have access to the Azure cloud and they can move to another provider without loss of data, or they can download any information to an on-premise installation if they wish.

We can also help customers take backups of Virtual Machines and other code if they would like to move from online to on-premise machines.
End-of-contract process
Customers can move to another Azure service provider without incuring any costs or loss of data.

Using the service

Web browser interface
No
API
No
Command line interface
No

Scaling

Scaling available
Yes
Scaling type
  • Automatic
  • Manual
Independence of resources
Service levels are guaranteed by Microsoft for Azure.
Usage notifications
Yes
Usage reporting
Email

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
  • Other
Other metrics
Overall summary of entire landscape
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Microsoft

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • Full Virtual Machines
  • Databases
  • Application specific data
  • Documents and document libraries
Backup controls
Yes, users can back up different things on a different schedule. They can set a schedule for taking backups, as part of an agreed backup plan.
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
  • Users can recover backups themselves, for example through a web interface
  • Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • IPsec or TLS VPN gateway
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
SLA's and data availability are guaranteed by Microsoft for Azure.
Approach to resilience
Microsoft Azure is available 24X7 and the availablity levels are guaranteed.
Outage reporting
Email alerts are sent to customers by Microsoft in advance for outages relating to maintenance.

Identity and authentication

User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Access is based on security rules in Azure.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password
Devices users manage the service through
Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
DBS Certifications Pvt. Ltd.
ISO/IEC 27001 accreditation date
30/07/2022
What the ISO/IEC 27001 doesn’t cover
NA
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
We follow a defined process for information security which includes regular reviews and IT risks assessments.
Information security policies and processes
Following structure is followed.
Consultant --> Practice Head of O365 and Azure --> IT head --> Director

Information security is a standing agenda item for monthly service review meetings.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Changes are tracked and approved via documented meeting between our customers and ourselves.

Any changes are tracked and approved using our ticket management system.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We do this by reviewing application and OS logs and applying the latest patches as appropriate based on published availability and threat assessement.

We also ensure that all services are protected by managed firewall and antivirus software.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We do this by reviewing application and OS logs and applying the latest patches as appropriate based on published availability and threat assessement. We also ensure that all services are protected by managed firewall and antivirus software.
Incident management type
Supplier-defined controls
Incident management approach
Users can approach us on our ticket management portal and escalate the ticket to allocated account manager.
The issues are addressed as per the SLA contract with the customer.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Third-party
Third-party virtualisation provider
Microsoft
How shared infrastructure is kept separate
Microsoft have well documented methods to keep data apart which have been certified by many global organizations.

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
Microsoft's Datacentres compy with EU Code of Conduct for Energy Efficient datacentres

Social Value

Social Value

Social Value

Equal opportunity

Equal opportunity

Mercurius IT is conscious that creating and sustaining a welcoming, fair, and equitable workplace for all means fostering a sense of belonging, moving from awareness to empathy, and exhibiting diversity of talent that fosters confidence among both our employees and clients. Our commitment to diversity, equality, and inclusion is enshrined in the DEI policy, complying with the Equality Act, 2010, the Modern Slavery Policy along with the Disciplinary, Bullying and Harassment policy in our Employee Handbook. Additionally, we also track basic demographic information as a part of our DEI initiative to tailor specific initiatives to create a more inclusive culture.

Mercurius IT promotes Continuous Professional Development (CPD) by investing in employees’ growth. We support participation in training programs, workshops, and certifications through fee reimbursement and time-off. Through knowledge sharing sessions, we enhance problem-solving and innovation, improving client service. By providing cross-functional project exposure we broaden employees' skill sets. Mentorship programs fosters a culture of continuous learning and development, benefiting both new joiners and experienced team members.
Mercurius IT recognises the significant impact of climate change on individuals and businesses. Corporate sustainability is a key focus, with efforts aimed at reducing the company's carbon footprint. Every year, we publish the Carbon Reduction Policy to monitor and report the approximate Carbon emissions to track progress towards reduction goals. To offset its carbon footprint (based on the Carbon Reduction Policy), Mercurius IT has funded two nature-based projects in Guatemala and Indonesia. Other measures include energy-efficient upgrades in the office, such as using low-energy bulbs and reducing heating and air conditioning usage. Paper waste is minimised by printing only when necessary and using double-sided printing. During the pandemic, a hybrid working model was adopted, reducing the need for public transport and personal vehicle use, thereby cutting down on air pollution.

Pricing

Price
£184.73 to £2,592.91 a virtual machine a month
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at atush.r@mercuriusit.com. Tell them what format you need. It will help if you say what assistive technology you use.