Skip to main content

Help us improve the Digital Marketplace - send your feedback

Through Technology Limited

Archive360 Archive2Azure (per terabyte)

We are an Archive360 Global Channel Partner offering Archive360 products through G-Cloud 12. Archive2Azure provides an elastic and efficient cloud-based archive ensuring fast, secure, and compliant access, validation and classification, retention, and disposition. Suitable for many use cases and free from any supplier or vendor lock-in.


  • Infinitely scalable secure data archiving, retention & disposition.
  • Archive any data in its native format
  • Customisable data indexing for performance and efficiency
  • Cost effective use of tiered storage
  • Managed service in a secure dedicated Azure subscription
  • Fully configurable retention policies and Disposition workflows
  • Granular logging of all access per item.
  • Web-Portal or API Access
  • Multiple options for data ingest by volume, security or connectivity
  • Granular role-based access control.


  • Implement or simplify data retention and disposition/disposal
  • Simplify responses to Freedom of Information and Subject Access Requests
  • Compliant with GDPR, DPA, NCSC guidance and other applicable standards
  • No vendor lock-in, native format storage in dedicated Azure subscription.
  • Azure AD integration for customer-managed role-based access control
  • Integrate with business applications via API/SDK or Landing Zone ingest.
  • Straightforward archiving, restoration and disposal of Office 365 data.
  • Validate and classify data on ingestion
  • Option to use Azure Services for transcription of audio/video
  • No data migration required at contract end.


£790 a terabyte a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 13

Service ID

6 3 2 6 7 9 0 7 6 8 1 1 1 5 7


Through Technology Limited Peter Hanney
Telephone: +44 (0)7913334794

Service scope

Software add-on or extension
Cloud deployment model
  • Public cloud
  • Hybrid cloud
Service constraints
The service is hosted in a dedicated Microsoft Azure Subscription and uses Azure Platform as a Service functions. Azure administration can be provided with this service or undertaken by the customer as required.
System requirements
  • Archive2Azure uses native Azure Services (estimates provided on quotation).
  • Users require access via the internet or customer-owned ExpressRoute connection.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Support levels are best determined in response to your requirements as a customer and the nature, criticality and rate of change in the data stored. For this reason we address support requirements as part of the quotation/ordering process. Depending on your requirement, support hours and response times may vary from those shown below.
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
Web chat accessibility testing
We typically utilise Microsoft Teams federation with customers or the customer's own ITSM tooling. Microsoft tools comply with the above accessibility standard.
Onsite support
Yes, at extra cost
Support levels
Through Technology provide support and implementation for Archive360 products through our Lot 3 - Cloud Support service: "Cloud Archiving Service, Powered by Archive360".

Support levels are best determined in response to your requirements as a customer and the nature, criticality and rate of change in the data your will store. For this reason we address support requirements as part of the quotation/ordering process. Depending on your requirement, support hours and response times may vary from those shown above.
Support available to third parties

Onboarding and offboarding

Getting started
Please get in touch with us for an initial consultation regarding the data types, volumes and sources for archive. From this we can arrange a quotation, considering the optimum method for ingesting data and onboarding users to the service.

Our team will create an instance of the Archive2Azure service in a dedicated Azure subscription for you and provide training for nominated administrative points of contact in your organisation along with system documentation and user guidance. We can also setup and operate the archive for you as a managed service if required, where Through Technology will manage the Azure subscription and (if required) the full archive service.
Service documentation
Documentation formats
  • HTML
  • ODF
  • PDF
  • Other
Other documentation formats
Microsoft Document Formats
End-of-contract data extraction
Data is stored in its native format in Azure Blob Storage in a dedicated subscription within a customer-owned Azure enrolment. The data is encrypted with the customer's keys. This means that the data is always under the customers control and does not require extraction. At the end of the contract, the customer still owns the Azure storage and all the data within, which remains in its native format. Extraction to an alternate location can be arranged with our engineers based upon our ratecard, but this is not typically necessary where the data is always in a customer-owned storage medium and subject to customer control. This is a key difference between our service and competitor products, please contact us to discuss in further detail.
End-of-contract process
Archive2Azure services will be removed from the customer Azure subscription. Leaving the data within the customer's subscription in its native format. Should customers require data to be moved to alternate locations, this can be done by the customer prior to contract end, after contract end using standard tools for Azure data transfer or by our engineers based upon our Lot3 Support Rate Card during the contract exit. Any additional customer adminsitrative users are added and our AzureAD permissions to access the Archive and underlying Azure Services are revoked.

We will discuss any specific end of contract requirements as part of our initial consultation and quotation.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
None except for screen size, which has a useability impact for reviewing larger sets of search results. Computer use is therefore recommended.
Service interface
User support accessibility
What users can and can't do using the API
API can be used for any number of integration and archiving scenarios. Please contact us to discuss as this requires more than the 200 words available to us in this service description on Digital Marketplace.
API documentation
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • ODF
  • PDF
API sandbox or test environment
Customisation available
Description of customisation
Retention and disposition policies and their associated workflows can be customised to meet any record retention requirements at a very granular level. Role-based access control can be configured at a granular level to control who has access to view and search different data sets or types. Archive2Azure is an immensely powerful and flexible archiving tool so we strongly recommend asking us specific clarifications or booking a demonstration, as it cannot be adequately covered in the 200-word limit for a this question in a G-Cloud Application.


Independence of resources
The solution is implemented in a dedicated subscription within the customer's Azure environment. This maintains customer control over the data whilst providing total segregation between Archive360 customers and from the customer's other services. The solution is therefore totally independent of any other customer's instance and massively scaleable due to use of native Azure Services. Multiple existing customers archive multiple petabytes.

Tiered storage is used and selected based upon the specific requirements of each archived data type.


Service usage metrics
Metrics types
Standard Azure Monitoring and metrics.
Comprehensive data on Archive consumption, data types etc.
Any metrics possible through the powerful search and analytics available in the console (demo recommended).
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Reseller providing extra features and support
Organisation whose services are being resold

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Data can be exported in its original format to its source location or a range of other storage platforms from the admin console. Exports can be generated from ediscovery making responses to security investigation, Freedom of Information and Subject Access Requests straightforward. Search and Export functions are subject to role-based access control.
Certain data sources (such as Office 365) include features to seamlessly re-inject data into the user's account retaining original metadata and folder structures.
For security investigation, Freedom of Information and Subject Access Requests, appropriately authorised users can restore Office365 data into separate folders in a chosen account.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • Data is exported in its native format
  • Ie. The format in which it was originally ingested.
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
Data is stored and imported in any file format

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
See Microsoft Azure service descriptions. Archive360 support SLAs and service hours will be agreed on an individual customer basis based upon the nature and criticality of each data type.
Approach to resilience
Our service utilises Microsoft Azure resilience features and capabilities to provide a robust service to customers. Further details upon request.
Outage reporting
Service outage reporting is available via dashboards and alerting.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Access to the service is managed through the Customer's Azure AD with Role-based access and separation of duties are used to provide access management for administrative functions. This is defined on a per customer basis following principles of least privilege. Azure Privileged Identity Management (PIM) can also be used if required. All admin permissions are assigned on a least privilege basis. All resources are appropriately security vetted and subject to regular account-specific security briefings. More information available upon request.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Description of management access authentication
Authentication is managed through the customer's Azure AD with Two factor authentication preferred. This means the customer holds ultimate control over access to your data and the capability to view and audit admin permissions at any time. Privileged Identity Management can be used if required. Where on-premise data collection servers are required, the customer provides the OS and access as a pre-requisite for system installation and therefore defines the authentication mechanism and remote connectivity (e.g. VPN).

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
British Standards Institute (BSI) - Certificate Number IS 743920
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
Nothing, It covers all elements of our services offered on the G-Cloud 13 Framework.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Cyber essentials
Cyber essentials plus
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Through Technology operates using its ISO27001 certified Information Security Management Systems processes and procedures. Our own systems are also certified for Cyber Essentials Plus. Security processes are directly monitored and overseen by one of our managing partners and our internal Information Security Forum, but are the responsibility of all our staff. We will also align our service delivery to any required customer security processes and SAL.
Archive360 is a signatory to the Cyber Tech Accord and operates their own stringent security policies and processes governing development and support activity. Details available upon request.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Archive360 follow Agile CI/CD development, QA, and deployment methodology -- all Features are tracked Epic, User Story, Task and are correlated to Github and Jenkins automation for QA, functional QA tests and random pathological corner QA tests are also linked before deployment by Services, all code supports rollback. Defects are tracked via Zendesk and link to Jira. We follow "4 eye" review of commit approvals and final deployment releases.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Archvie360 provides Software as a Service based upon Microsoft Azure, we inherit Azure's updating of both our Microsoft Azure Application and Azure Services: such as CosmosDB. For on-premise Fast Collect Migration Server, this is the Customer's OS to patch. Archive360 supplies patches as it relates to the relative code. Archive2Azure relies on Azure Application, CosmosDB, Search -- respective SLAs, in particular updates, are at .

For managed services, subscriptions are managed with Microsoft Security Center and the 3rd party tools from Qualys. As part of that managed service, Archive360 leverages Qualys Application Vulnerability
Protective monitoring type
Protective monitoring approach
Protective Monitoring requirements, integration and options will be discussed as part of our initial engagement. We can provide a SIEM capability specifically for the service or integrate with the Buyer's existing SIEM solution
Incident management type
Supplier-defined controls
Incident management approach
Through Technology follow our ISO27001 accredited security incident management process and align this to the customers requirements. For Archive360 software related incidents - All defects are tracked via Archive360 Zendesk, auto-generate Jira tickets, Tickets are auto-assigned to respective Section Manager, updated with notifications to Zendesk. We have assigned Scrum Master for monitoring Dev, and assigned Service Manager for monitoring Customer tickets all the way from defect resolution, QA test, documentation and release notes, and arrangement with Customer for deployment.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks

Social Value

Fighting climate change

Fighting climate change

Through Technology is a Carbon Negative Business and formally assessed and certified as such with the PAS2060 Carbon Neutral Plus standard. This means that our services are operated to remove more carbon dioxide from the atmosphere than our business has created or will create in future, already significantly exceeding HM Government's Net Zero targets. Our business was designed with a very carbon-efficient business model. Building on this foundation, we have a process of continual improvement. We annually calculate our carbon footprint using the reputable service, identify further reductions in our environmental impact, then offset -double- the residual carbon footprint of our business through the same scheme reputable UK tree-planting scheme used to offset HM Government ministerial travel. Measuring our footprint every year, optimising it and offsetting double, scales with our business and automatically applies to every service we provide (through G-Cloud or elsewhere). Furthermore, because trees last for many years, our positive impact on carbon capture and storage will continue to grow greater and greater across the lifetime of our business. As a business, we are also focussed upon helping our customers achieve your outcomes. We consider environmental impact in the work we undertake as part of our services many of which involve carbon reduction through modernisation of systems and migration to the cloud. Fighting Climate Change is something we are passionate about. We are proud of the contribution we make as UK Small Business. It also shows our commitment to not only meet, but exceed government targets for fighting climate change and goals of Procurement Policy Notes PPN 06/20 (Social Value) and PPN 06/21 (Taking account of Carbon Reduction in major contracts). Further detail, including "Beyond Net Zero - The Through Technology Environmental Impact Plan" available upon request.
Covid-19 recovery

Covid-19 recovery

In Through Technology, we have a very strong focus on achieving value for the tax-payers money and on supporting the UK economy. We are a UK Small Business, paying all our taxes in the UK and operating in full compliance with UK Tax regulations. We are members of the TechUK industry body, volunteering time via our seat on their Justice and Emergency Services Committee to help to define and deliver best practice in work between the Digital & Technology industry and government. We are signatories to the UK Government Small Business Commissioner’s Prompt Payment Code. Meaning we commit to paying our supply chain within 30 days and have never yet failed to do so, even when we ourselves have faced delays in our payments. Our company principles include sharing knowledge and building capability with our customers’ internal teams. This can be seen in our “Insource Transition Support” service published on G-Cloud. Helping our customers insource and develop their internal teams will drive upskilling and job creation within our public sector customers. We have a defined standard business process to actively seek out opportunities for savings and cost avoidance for our customers in everything we do. This process has resulted in savings and cost avoidance of over £10M in the last 3 years, saving our customers more than we have cost them while we have also delivered all of our contracted scope. We have also created new jobs in our business during the Covid 19 pandemic and continue to collaborate effectively with our customers remotely through their choice of tooling and onsite following all current Covid guidance.
Tackling economic inequality

Tackling economic inequality

Through Technology are committed to fighting economic inequality. As a modern business without strong geographic ties, our hiring policy is to prioritise recruitment from areas of high social deprivation as identified in the Department for Levelling Up, Housing and Communities' English Indices of Deprivation). At present, 40% of our staff are from these areas and as our business grows, so will this percentage, ensuring that most of the tax-payer money spent on our services ends up in the local UK communities that need it the most. We are an equal opportunities employer that recognises and actively seeks out the benefits of diverse and inclusive teams to our business, to our customers and to wider society.
Equal opportunity

Equal opportunity

We are an equal opportunities employer that recognises and actively seeks out the benefits of diverse and inclusive teams to our business, to our customers and to wider society. This is built into our policies, procedures and contracts, and lived day to day. We have worked to remove any bias from our organisational processes, including subconscious bias where it may exist. An example is that the first stage of our recruitment process is anonymised, minimising the impact of any potential bias in CV and Application evaluation. We are signatories to the Armed Forces Covenant and seek proactively to recruit ex-forces personnel, overcoming some of their challenges in returning to civilian life. Our recruitment process for opportunities is intentionally designed to be accessible and open to all. Our teams working through G-Cloud are diverse and include people from different parts of the UK, age groups, ethnic origin, gender, disability and faith.


Through Technology’s defining characteristic is the quality of our people, so we take well-being very seriously and have a number of measures in place to support the well-being of our staff and people they work with. Despite our relative small size, we have a board member responsible for staff wellbeing and a number of policies and processes which we live every week to maintain it. Examples include: Providing private health cover for all employees, offering time out for voluntary work in our local communities (including current staff acting as school governors, volunteering careers guidance in schools, acting as community representatives and teaching practical philosophy/life skills), funding a qualified Mental Health First Aider within the business, fostering a culture that welcomes private or public discussion of mental health and well-being (including open discussion of our CEO’s personal experiences). We also care about the well-being of those we work with in our supply chain, our customers, and their third-party suppliers. If we identify any well-being or stress-related issues with colleagues outside our organisation, then we handle these sensitively through the appropriate process or channel.


£790 a terabyte a month
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.