Skip to main content

Help us improve the Digital Marketplace - send your feedback

Wanstor Ltd

Azure Migration Assessment Consultancy Services

As the first major step in any migration is to determine exactly what you have in your compute environment. An Azure Migration Assessment will help you determine whether it makes sense to migrate to Azure and which application or system dependencies to consider.

Features

  • 3 day engagement carried out by Azure Cloud Consultants
  • Follows Microsoft's Cloud Adoption Framework methodology
  • Receive tailored Azure Migration Plan and path for your organisation
  • Strategy Workshop - review expected outcomes and justification
  • Readiness Assessment - Deploy assessment toolkit to review estate
  • Planning - Review data, prioritise and rationalise workloads and assets
  • Recommendations - HLD, expected outcomes and cost estimate
  • Azure Assessment Output - Matrix of migration options/costs

Benefits

  • Easily discover and assess workloads that need to be migrated
  • Quickly identify workloads that can/cannot be migrated to Azure
  • Remove guesswork regarding VM size and resources required
  • Provide estimated monthly cost of running workloads in Azure
  • Identify application and system dependencies

Pricing

£2,550 a unit a day

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sales@wanstor.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

6 2 3 1 4 1 0 2 8 7 3 2 5 3 9

Contact

Wanstor Ltd Wanstor
Telephone: 02075927860
Email: sales@wanstor.com

Service scope

Service constraints
None.
System requirements
N/A

User support

Email or online ticketing support
Email or online ticketing
Support response times
Priority 1 - 30 Minutes
Priority 2 - 2 Hours
Priority 3 - 4 Hours
Priority 4 - 8 Hours
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AAA
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 AAA
Web chat accessibility testing
Wanstor works with professional services, public sector and social enterprise organisations who need assistive technologies in place. The testing and web chat services we provide includes: Adjustable time settings All functionality is available via keyboard Users can easily see and hear content, and understand what is in the foreground vs background Users can pause, stop or hide content manually Page flashes are less than 3 times per second to prevent seizures Web and chat pages are easily navigable in a logical and intuitive manner Headings are easily readable Input modalities - For different types of users we can provide pointer gestures, label in names, motion actuation and a variety of concurrent input mechanisms All chat and web pages appear and operate in predictable ways and give clear indication of where information needs to be submitted.
Onsite support
Onsite support
Support levels
Priority 1

All incidents categorised as security incidents are treated as a P1 with a 15 minute response SLA . Standard P1 incidents have a SLA of 30 minutes unless otherwise agreed with customer. Cloud Specific Example: critical business impact, such as all users are unable to function within a service line.

Priority 2

2 hour response SLA. Cloud Specific Example: high business impacts, such as all users at a single site are unable to function within a service line.

Priority 3

4 hour response SLA. Cloud Specific Example: medium business impact, such as single user cannot function within a service line.

Priority 4

8 hour response SLA if not security related. Cloud Specific Example: low business impact, such as setting up a new user.

Single support level included in pricing

Technical account manager included in any hosting agreement
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Wanstor is able to provide end user training and end-user documentation and support for the operation of the service. Additional training is available. Should this be required, prices are available on request.
Service documentation
Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction
Customers will be able to extract any customer data from the servers and are not limited to the type of data that can be extracted. The type of data that can be extracted includes any customer generated content, metadata, structure and configuration data. There are several available tools that allow customer data to be extracted from VMware environments, these include free to use tools. Wanstor does not charge for data extraction, however some data extraction tools may need to be purchased if the current tools do not meet the standards required by the customer.
Wanstor is happy to provide assistance when a customer needs assistance with data extraction/migration to another supplier. This will be charged at our standard daily consultancy rate.
Individual files generated in the virtual environment can be extracted in the same format as they were created.
A VMware OVF, VMDK or ISO image file is also available to extract from the environment.
Wanstor will purge and destroy all customer data from any computers, storage devices and storage media at the end of the contractual period in line with ISO 27001 standards.
End-of-contract process
Off-boarding from the Wanstor infrastructure will follow the appropriately documented process. This will involve the extraction and removal of the customer data and customer-specific information from the Wanstor platforms.

Data extraction at contract termination

Customers will be able to extract any customer data from the servers and are not limited to the type of data that can be extracted. The type of data that can be extracted includes any customer generated content, metadata, structure and configuration data. There are several available tools that allow customer data to be extracted from VMware environments, these include free to use tools. Wanstor does not charge for data extraction, however some data extraction tools may need to be purchased if the current tools do not meet the standards required by the customer.

Data formats

Individual files generated in the virtual environment can be extracted in the same format as they were created. A VMware OVF, VMDK or ISO image file is also available to extract from the environment.

Purging and destroying customer data

Wanstor will purge and destroy all customer data from any computers, storage devices and storage media at the end of the contractual period in line with ISO 27001 standards.

Using the service

Web browser interface
Yes
Using the web interface
A self-service portal of Wanstor’s service management tool will also be provided to enable the logging and resolution of new incidents, service requests, changes and tracking the status of open tickets.

Users can see the logging and resolution of new incidents, service requests, changes and tracking the status of open tickets.
Web interface accessibility standard
WCAG 2.1 AA or EN 301 549
Web interface accessibility testing
None.
API
Yes
What users can and can't do using the API
Self Service platform with API integration, API is REST.
API automation tools
Other
API documentation
Yes
API documentation formats
HTML
Command line interface
No

Scaling

Scaling available
Yes
Scaling type
  • Automatic
  • Manual
Independence of resources
Our customers are logically separated on the platforms, at compute, network and storage levels with minimum and maximum resource guarantees throughout, which ensures each customer cannot exceed their allotted allocation without prior change notifications in to our Operations & Engineering teams.
Usage notifications
Yes
Usage reporting
  • Email
  • Other
Other usage reporting
Reporting analytics through Service Now delivered via Power BI, and reviewed at monthly service reviews

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Microsoft

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • Files
  • Virtual Machines
  • Databases
  • M365 data
Backup controls
This enterprise-class solution enables Wanstor to provide a unified backup and recovery platform spanning all our customers’ solutions today, while also ensuring that new applications, operating systems and databases will be supported on release, without the need to undertake changes to the back-end infrastructure in the future.
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Service availability achieved within any month shall be calculated monthly as follows:
(Total online hours of availability – service downtime) x 100%
Total online hours of availability
The service availability calculation above will exclude any time which occurred as a result of events outside the control of Wanstor.
In the event the service availability service level of 99.9% is not achieved when measured over a monthly period, the following service credits shall apply.
System availability achieved Applicable service credit
99.9% to 100% 0% of the monthly charge for the affected service line
99% to 99.89% 5% of the monthly charge for the affected service line
98% to 98.9% 10% of the monthly charge for the affected service line
Less than 98% 15% of the monthly charge for the affected service line
Approach to resilience
Wanstor’s Internet feeds into the data centre's are delivered from diverse providers. The Storage Area Network (SAN) used by the IaaS platform runs on redundant hardware to ensure uptime.
Outage reporting
Email alerts to relevant nominated parties.

Identity and authentication

User authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels
Where access to customer infrastructure is required, Wanstor uses a secure backup and admin connection to components for monitoring, support and backups. All traffic across this connection is secure and segregated.
For remote access requirements for support services, Wanstor can provide two-factor authenticated remote access via the internet to administer the server infrastructure using SSL-VPN access.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device over multiple services or networks
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
  • Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
31/01/2016
What the ISO/IEC 27001 doesn’t cover
Scope is all Wanstor sites and services requiring security certification.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
  • ISO/IEC 27001
  • Cyber Essentials Plus
  • IASME governance

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
In line with 27001 Information Security requirements.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
A change control process in-line with our ISO27001 procedures.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
The Wanstor Security Steering Group uphold the Risk Management Policy which is aligned to ISO27001 data risk management best practices. We assess threats to services on a real time basis by using a range of network and security monitoring tools from vendors such as Trend Micro and PRTG. We work with ManageEngine and use their desktop central product. This automatically deploys patches across all major operating systems as soon as they are released. We gather information about threats from a variety of sources including vendors e.g. Symantec, Checkpoint, Cisco, Microsoft etc, and the centre for internet security.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
In line with our Audit and Monitoring Policies - The Wanstor Security Manager must be informed immediately of any unusual traffic flows or network device activity that arises from regular network monitoring or alerts. Quantitative or qualitative information on network activity may indicate either device failure or network attacks. The Security Manager need to be made aware of this activity to investigate the possibility of a network attack that requires remedial action or escalation.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Wanstor follows an ITIL based approach to incident management. We have a range of pre-defined processes and escalation paths depending on the nature of the incident being reported by the user. Users can report IT incidents through Phone, Email, Chat and via a Website. We can provide incident reports to users in the form of an email which details their IT incident, action taken to resolve and how long the end outcome will be. Additionally IT teams can access a variety of incident reports showing, volume, type, timings, actions taken and resolution rates in line with agreed SLA's.

Secure development

Approach to secure software development best practice
Supplier-defined process

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Supplier
Virtualisation technologies used
VMware
How shared infrastructure is kept separate
Virtualisation technology is used to keep applications and users sharing the same infrastructure apart.

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
Group Involvement - We have established an approval board containing representatives from all disciplines across the business. Consider the environmental impact of installed devices - We carry out audits of existing equipment to maximise any unused existing capability by ensuring that all areas of optimisation, consolidation and aggregation are identified prior to new material investment. Environmental Management - We have introduced a plan for Environmental Management based on the policies outlined in ISO 14001. Energy Management - We have introduced a set of guidelines and processes for managing energy in the data centre based on ISO 50001. Asset Management - We have adopted many of guidelines in ISO 55000. We have full knowledge of the numbers, types and purposes of the assets deployed in our data centre and how they impact energy management. Sustainable energy - We record and reporting on the proportion of sustainable / renewable energy used against the overall energy consumption. The metric we use in the "Renewable Energy Factor” (in kWh) compared to overall consumption (in kWh). Monitor and manage air quality - We ensure air quality is monitored and managed. We base filter choices on the guidance set out in ISO 16890-1.

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery

Fighting climate change

Improve workplace conditions that support remote working, and sustainable travel solutions

Covid-19 recovery

Improve workplace conditions that support remote working, and sustainable travel solutions

Pricing

Price
£2,550 a unit a day
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Free Migration Readiness workshop to review strategy and overview to define business justification and cover expected outcomes of adoption.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sales@wanstor.com. Tell them what format you need. It will help if you say what assistive technology you use.