Skip to main content

Help us improve the Digital Marketplace - send your feedback

1STOP ICT SOLUTIONS LTD

Microsoft Azure

Migrate SMBs from on-premises computer system to cloud based computing

Features

  • Real time performance monitoring, configuration change
  • Real time cost advisory and scale up or scale out
  • Redundancy and high availability

Benefits

  • Redundancy and high availability
  • Low Total Cost of Ownership
  • Flexible resource allocation
  • Access from anywhere

Pricing

£42.00 a user a month

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at bteclezion@1stopictsolutions.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

7 1 0 7 4 3 4 4 1 4 3 9 5 5 0

Contact

1STOP ICT SOLUTIONS LTD Mrs Beirut Teclezion
Telephone: 02039837227
Email: bteclezion@1stopictsolutions.co.uk

Service scope

Service constraints
No
System requirements
  • Prepared to migrate data and solution to cloud
  • Over 5 users to make the solution cost effective

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 2 hours
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 A
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
A pop up on our home and support page
Web chat accessibility testing
None
Onsite support
Yes, at extra cost
Support levels
Level 1 - High Priority - within 4 working hours
Level 2 - Medium Priority - Within 8 working hours
Level 3 - Low Priority - within 2 working days
Support available to third parties
No

Onboarding and offboarding

Getting started
Handover training (part of the service)
Familiarity Training (part of the service)
Application trainings (offered at charge)
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
On Encrypted external drive (if large data)
Via link to secured cloud storage (if small to medium size data)
Migration (if moving to another supplier)
End-of-contract process
Written "end of contract" notice to be sent to 1 Stop ICT 1 month prior to ending the contract
Internal customer Off-boarding workflow will start
Prepare data and documentation relevant to the service
Liaise with site main contact to go through handover process

Using the service

Web browser interface
No
API
No
Command line interface
No

Scaling

Scaling available
Yes
Scaling type
Automatic
Independence of resources
Total cloud service and separate resource area for every customer
Usage notifications
Yes
Usage reporting
Email

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • Memory
  • Network
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Microsoft

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • Files, folders, system state & configuration
  • Databases
  • Virtual Machines
  • Website
Backup controls
A daily backup log is emailed automatically to main site contact as well as a link to access the log provided

Users can add/remove what they want to back up

The frequency and backup type & schedule will be configured by 1 Stop ICT solution support team after discussing the requirements with the customer
Datacentre setup
  • Multiple datacentres with disaster recovery
  • Single datacentre with multiple copies
Scheduling backups
Users contact the support team to schedule backups
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Availability mirrors Microsoft/hosting provider SLA for the service the customer sign up
The SLA and refund policy is in line with Microsoft/hosting provider service credit policy
Service Credit

Example of Azure Active Directory (Azure AD)

MONTHLY UPTIME PERCENTAGE SERVICE CREDIT
< 99.99% 10%
< 99.9% 25%
< 99% 50%
< 95% 100%
Approach to resilience
The datacentre resilience depends on the service the customer sign up. We can provide this information on request.
Outage reporting
Email Alerts
SMS alert
Support Contact Customer by phone

Identity and authentication

User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Use strong authentication, such as Windows or client-certificate authentication.

Limit or avoid the use of remote administration and require administrators to log on locally.

Using encrypted channels, for example, with SSL or VPN technology

Remote administration to computers on the internal network by using IPSec policies,

Encrypt the network traffic?
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Take a holistic approach.
Increase awareness and training
Monitor and measure
Foster open communication
Promote agility and adaptability.
Information security policies and processes
Security Policy

Mobile Device Management (MDM) Policy and Procedures
Encryption and Decryption Policy
SPAM Protection Policies
System Maintenance Policy
Vulnerability Management Policy

Process

Preparation
Identification
Containment
Eradication
Recover
Post- Incident

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Improved IT to business alignment
Decreased adverse impact on business operations
Improved visibility into change
Prioritized responsiveness to change
Adherence to government and other compliance regulations
Improved risk management
Reduced service disruptions and system downtime
Increased staff productivity
Faster change implementation
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Plan Ahead, Establish KPIs
Understand and prepare for your elastic attack surface
Build your Vulnerability Management Database
Up-to-date Threat Intelligence
Leverage automation
Report, Report, Report
Prioritization is everything
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Provides real time
security of information systems
detects violations
suspicious activity
and assists organisations with regulatory compliance.
Incident management type
Supplier-defined controls
Incident management approach
1 - We offer multiple modes for ticket creation including through an email, phone call, or a self-service portal.
2 - Categorize and prioritize IT incidents based on ticket criteria.
3 - Associate SLAs with IT incidents based on ticket parameters like priority.
4 - Ensure that incidents are closed only after providing a proper resolution.
5 - Configure a custom end-user communication process for every step in an IT incident life cycle
6 - Create, and maintain a knowledge base
7 - Handle major incidents by creating unique workflows.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
No

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
We use Microsoft, AWS or other major Datacentres and they are responsible for their Energy efficiency

Social Value

Social Value

Social Value

  • Equal opportunity
  • Wellbeing

Equal opportunity

1StopICT Solution Ltd has hiring process policies in place that makes hiring conditions equal for all applicants and makes it easier for employees from minority groups to work to their full potential

Wellbeing

1stopICT Solutuons Ltd has the following provisions to maintain welbeing of its employees.

Offer flexible working to ease pressures from an employee's personal life.
Ensure employees are comfortable with an ergonomically designed office/desk.
Provide inhouse training to ensure good line management.
Promote work-life balance with regular socials.

Pricing

Price
£42.00 a user a month
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at bteclezion@1stopictsolutions.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.