Azure Migration Assessment Consultancy Services
As the first major step in any migration is to determine exactly what you have in your compute environment. An Azure Migration Assessment will help you determine whether it makes sense to migrate to Azure and which application or system dependencies to consider.
Features
- 3 day engagement carried out by Azure Cloud Consultants
- Follows Microsoft's Cloud Adoption Framework methodology
- Receive tailored Azure Migration Plan and path for your organisation
- Strategy Workshop - review expected outcomes and justification
- Readiness Assessment - Deploy assessment toolkit to review estate
- Planning - Review data, prioritise and rationalise workloads and assets
- Recommendations - HLD, expected outcomes and cost estimate
- Azure Assessment Output - Matrix of migration options/costs
Benefits
- Easily discover and assess workloads that need to be migrated
- Quickly identify workloads that can/cannot be migrated to Azure
- Remove guesswork regarding VM size and resources required
- Provide estimated monthly cost of running workloads in Azure
- Identify application and system dependencies
Pricing
£2,550 a unit a day
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 2 3 1 4 1 0 2 8 7 3 2 5 3 9
Contact
Wanstor Ltd
Wanstor
Telephone: 02075927860
Email: sales@wanstor.com
Service scope
- Service constraints
- None.
- System requirements
- N/A
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Priority 1 - 30 Minutes
Priority 2 - 2 Hours
Priority 3 - 4 Hours
Priority 4 - 8 Hours - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- Wanstor works with professional services, public sector and social enterprise organisations who need assistive technologies in place. The testing and web chat services we provide includes: Adjustable time settings All functionality is available via keyboard Users can easily see and hear content, and understand what is in the foreground vs background Users can pause, stop or hide content manually Page flashes are less than 3 times per second to prevent seizures Web and chat pages are easily navigable in a logical and intuitive manner Headings are easily readable Input modalities - For different types of users we can provide pointer gestures, label in names, motion actuation and a variety of concurrent input mechanisms All chat and web pages appear and operate in predictable ways and give clear indication of where information needs to be submitted.
- Onsite support
- Onsite support
- Support levels
-
Priority 1
All incidents categorised as security incidents are treated as a P1 with a 15 minute response SLA . Standard P1 incidents have a SLA of 30 minutes unless otherwise agreed with customer. Cloud Specific Example: critical business impact, such as all users are unable to function within a service line.
Priority 2
2 hour response SLA. Cloud Specific Example: high business impacts, such as all users at a single site are unable to function within a service line.
Priority 3
4 hour response SLA. Cloud Specific Example: medium business impact, such as single user cannot function within a service line.
Priority 4
8 hour response SLA if not security related. Cloud Specific Example: low business impact, such as setting up a new user.
Single support level included in pricing
Technical account manager included in any hosting agreement - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Wanstor is able to provide end user training and end-user documentation and support for the operation of the service. Additional training is available. Should this be required, prices are available on request.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
-
Customers will be able to extract any customer data from the servers and are not limited to the type of data that can be extracted. The type of data that can be extracted includes any customer generated content, metadata, structure and configuration data. There are several available tools that allow customer data to be extracted from VMware environments, these include free to use tools. Wanstor does not charge for data extraction, however some data extraction tools may need to be purchased if the current tools do not meet the standards required by the customer.
Wanstor is happy to provide assistance when a customer needs assistance with data extraction/migration to another supplier. This will be charged at our standard daily consultancy rate.
Individual files generated in the virtual environment can be extracted in the same format as they were created.
A VMware OVF, VMDK or ISO image file is also available to extract from the environment.
Wanstor will purge and destroy all customer data from any computers, storage devices and storage media at the end of the contractual period in line with ISO 27001 standards. - End-of-contract process
-
Off-boarding from the Wanstor infrastructure will follow the appropriately documented process. This will involve the extraction and removal of the customer data and customer-specific information from the Wanstor platforms.
Data extraction at contract termination
Customers will be able to extract any customer data from the servers and are not limited to the type of data that can be extracted. The type of data that can be extracted includes any customer generated content, metadata, structure and configuration data. There are several available tools that allow customer data to be extracted from VMware environments, these include free to use tools. Wanstor does not charge for data extraction, however some data extraction tools may need to be purchased if the current tools do not meet the standards required by the customer.
Data formats
Individual files generated in the virtual environment can be extracted in the same format as they were created. A VMware OVF, VMDK or ISO image file is also available to extract from the environment.
Purging and destroying customer data
Wanstor will purge and destroy all customer data from any computers, storage devices and storage media at the end of the contractual period in line with ISO 27001 standards.
Using the service
- Web browser interface
- Yes
- Using the web interface
-
A self-service portal of Wanstor’s service management tool will also be provided to enable the logging and resolution of new incidents, service requests, changes and tracking the status of open tickets.
Users can see the logging and resolution of new incidents, service requests, changes and tracking the status of open tickets. - Web interface accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web interface accessibility testing
- None.
- API
- Yes
- What users can and can't do using the API
- Self Service platform with API integration, API is REST.
- API automation tools
- Other
- API documentation
- Yes
- API documentation formats
- HTML
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
-
- Automatic
- Manual
- Independence of resources
- Our customers are logically separated on the platforms, at compute, network and storage levels with minimum and maximum resource guarantees throughout, which ensures each customer cannot exceed their allotted allocation without prior change notifications in to our Operations & Engineering teams.
- Usage notifications
- Yes
- Usage reporting
-
- Other
- Other usage reporting
- Reporting analytics through Service Now delivered via Power BI, and reviewed at monthly service reviews
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Microsoft
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Files
- Virtual Machines
- Databases
- M365 data
- Backup controls
- This enterprise-class solution enables Wanstor to provide a unified backup and recovery platform spanning all our customers’ solutions today, while also ensuring that new applications, operating systems and databases will be supported on release, without the need to undertake changes to the back-end infrastructure in the future.
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Service availability achieved within any month shall be calculated monthly as follows:
(Total online hours of availability – service downtime) x 100%
Total online hours of availability
The service availability calculation above will exclude any time which occurred as a result of events outside the control of Wanstor.
In the event the service availability service level of 99.9% is not achieved when measured over a monthly period, the following service credits shall apply.
System availability achieved Applicable service credit
99.9% to 100% 0% of the monthly charge for the affected service line
99% to 99.89% 5% of the monthly charge for the affected service line
98% to 98.9% 10% of the monthly charge for the affected service line
Less than 98% 15% of the monthly charge for the affected service line - Approach to resilience
- Wanstor’s Internet feeds into the data centre's are delivered from diverse providers. The Storage Area Network (SAN) used by the IaaS platform runs on redundant hardware to ensure uptime.
- Outage reporting
- Email alerts to relevant nominated parties.
Identity and authentication
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Username or password
- Access restrictions in management interfaces and support channels
-
Where access to customer infrastructure is required, Wanstor uses a secure backup and admin connection to components for monitoring, support and backups. All traffic across this connection is secure and segregated.
For remote access requirements for support services, Wanstor can provide two-factor authenticated remote access via the internet to administer the server infrastructure using SSL-VPN access. - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Dedicated device over multiple services or networks
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 31/01/2016
- What the ISO/IEC 27001 doesn’t cover
- Scope is all Wanstor sites and services requiring security certification.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- ISO/IEC 27001
- Cyber Essentials Plus
- IASME governance
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- In line with 27001 Information Security requirements.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- A change control process in-line with our ISO27001 procedures.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- The Wanstor Security Steering Group uphold the Risk Management Policy which is aligned to ISO27001 data risk management best practices. We assess threats to services on a real time basis by using a range of network and security monitoring tools from vendors such as Trend Micro and PRTG. We work with ManageEngine and use their desktop central product. This automatically deploys patches across all major operating systems as soon as they are released. We gather information about threats from a variety of sources including vendors e.g. Symantec, Checkpoint, Cisco, Microsoft etc, and the centre for internet security.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- In line with our Audit and Monitoring Policies - The Wanstor Security Manager must be informed immediately of any unusual traffic flows or network device activity that arises from regular network monitoring or alerts. Quantitative or qualitative information on network activity may indicate either device failure or network attacks. The Security Manager need to be made aware of this activity to investigate the possibility of a network attack that requires remedial action or escalation.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Wanstor follows an ITIL based approach to incident management. We have a range of pre-defined processes and escalation paths depending on the nature of the incident being reported by the user. Users can report IT incidents through Phone, Email, Chat and via a Website. We can provide incident reports to users in the form of an email which details their IT incident, action taken to resolve and how long the end outcome will be. Additionally IT teams can access a variety of incident reports showing, volume, type, timings, actions taken and resolution rates in line with agreed SLA's.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- VMware
- How shared infrastructure is kept separate
- Virtualisation technology is used to keep applications and users sharing the same infrastructure apart.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- Group Involvement - We have established an approval board containing representatives from all disciplines across the business. Consider the environmental impact of installed devices - We carry out audits of existing equipment to maximise any unused existing capability by ensuring that all areas of optimisation, consolidation and aggregation are identified prior to new material investment. Environmental Management - We have introduced a plan for Environmental Management based on the policies outlined in ISO 14001. Energy Management - We have introduced a set of guidelines and processes for managing energy in the data centre based on ISO 50001. Asset Management - We have adopted many of guidelines in ISO 55000. We have full knowledge of the numbers, types and purposes of the assets deployed in our data centre and how they impact energy management. Sustainable energy - We record and reporting on the proportion of sustainable / renewable energy used against the overall energy consumption. The metric we use in the "Renewable Energy Factor” (in kWh) compared to overall consumption (in kWh). Monitor and manage air quality - We ensure air quality is monitored and managed. We base filter choices on the guidance set out in ISO 16890-1.
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
Fighting climate change
Improve workplace conditions that support remote working, and sustainable travel solutionsCovid-19 recovery
Improve workplace conditions that support remote working, and sustainable travel solutions
Pricing
- Price
- £2,550 a unit a day
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Free Migration Readiness workshop to review strategy and overview to define business justification and cover expected outcomes of adoption.