1STOP ICT SOLUTIONS LTD
Microsoft Azure
Migrate SMBs from on-premises computer system to cloud based computing
Features
- Real time performance monitoring, configuration change
- Real time cost advisory and scale up or scale out
- Redundancy and high availability
Benefits
- Redundancy and high availability
- Low Total Cost of Ownership
- Flexible resource allocation
- Access from anywhere
Pricing
£42.00 a user a month
- Education pricing available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at bteclezion@1stopictsolutions.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
7 1 0 7 4 3 4 4 1 4 3 9 5 5 0
Contact
1STOP ICT SOLUTIONS LTD
Mrs Beirut Teclezion
Telephone: 02039837227
Email: bteclezion@1stopictsolutions.co.uk
Service scope
- Service constraints
- No
- System requirements
-
- Prepared to migrate data and solution to cloud
- Over 5 users to make the solution cost effective
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 2 hours
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 A
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- A pop up on our home and support page
- Web chat accessibility testing
- None
- Onsite support
- Yes, at extra cost
- Support levels
-
Level 1 - High Priority - within 4 working hours
Level 2 - Medium Priority - Within 8 working hours
Level 3 - Low Priority - within 2 working days - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
Handover training (part of the service)
Familiarity Training (part of the service)
Application trainings (offered at charge) - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
On Encrypted external drive (if large data)
Via link to secured cloud storage (if small to medium size data)
Migration (if moving to another supplier) - End-of-contract process
-
Written "end of contract" notice to be sent to 1 Stop ICT 1 month prior to ending the contract
Internal customer Off-boarding workflow will start
Prepare data and documentation relevant to the service
Liaise with site main contact to go through handover process
Using the service
- Web browser interface
- No
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- Total cloud service and separate resource area for every customer
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- Memory
- Network
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Microsoft
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Files, folders, system state & configuration
- Databases
- Virtual Machines
- Website
- Backup controls
-
A daily backup log is emailed automatically to main site contact as well as a link to access the log provided
Users can add/remove what they want to back up
The frequency and backup type & schedule will be configured by 1 Stop ICT solution support team after discussing the requirements with the customer - Datacentre setup
-
- Multiple datacentres with disaster recovery
- Single datacentre with multiple copies
- Scheduling backups
- Users contact the support team to schedule backups
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
Availability mirrors Microsoft/hosting provider SLA for the service the customer sign up
The SLA and refund policy is in line with Microsoft/hosting provider service credit policy
Service Credit
Example of Azure Active Directory (Azure AD)
MONTHLY UPTIME PERCENTAGE SERVICE CREDIT
< 99.99% 10%
< 99.9% 25%
< 99% 50%
< 95% 100% - Approach to resilience
- The datacentre resilience depends on the service the customer sign up. We can provide this information on request.
- Outage reporting
-
Email Alerts
SMS alert
Support Contact Customer by phone
Identity and authentication
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google apps)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
-
Use strong authentication, such as Windows or client-certificate authentication.
Limit or avoid the use of remote administration and require administrators to log on locally.
Using encrypted channels, for example, with SSL or VPN technology
Remote administration to computers on the internal network by using IPSec policies,
Encrypt the network traffic? - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
Take a holistic approach.
Increase awareness and training
Monitor and measure
Foster open communication
Promote agility and adaptability. - Information security policies and processes
-
Security Policy
Mobile Device Management (MDM) Policy and Procedures
Encryption and Decryption Policy
SPAM Protection Policies
System Maintenance Policy
Vulnerability Management Policy
Process
Preparation
Identification
Containment
Eradication
Recover
Post- Incident
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Improved IT to business alignment
Decreased adverse impact on business operations
Improved visibility into change
Prioritized responsiveness to change
Adherence to government and other compliance regulations
Improved risk management
Reduced service disruptions and system downtime
Increased staff productivity
Faster change implementation - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Plan Ahead, Establish KPIs
Understand and prepare for your elastic attack surface
Build your Vulnerability Management Database
Up-to-date Threat Intelligence
Leverage automation
Report, Report, Report
Prioritization is everything - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Provides real time
security of information systems
detects violations
suspicious activity
and assists organisations with regulatory compliance. - Incident management type
- Supplier-defined controls
- Incident management approach
-
1 - We offer multiple modes for ticket creation including through an email, phone call, or a self-service portal.
2 - Categorize and prioritize IT incidents based on ticket criteria.
3 - Associate SLAs with IT incidents based on ticket parameters like priority.
4 - Ensure that incidents are closed only after providing a proper resolution.
5 - Configure a custom end-user communication process for every step in an IT incident life cycle
6 - Create, and maintain a knowledge base
7 - Handle major incidents by creating unique workflows.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- We use Microsoft, AWS or other major Datacentres and they are responsible for their Energy efficiency
Social Value
- Social Value
-
Social Value
- Equal opportunity
- Wellbeing
Equal opportunity
1StopICT Solution Ltd has hiring process policies in place that makes hiring conditions equal for all applicants and makes it easier for employees from minority groups to work to their full potentialWellbeing
1stopICT Solutuons Ltd has the following provisions to maintain welbeing of its employees.
Offer flexible working to ease pressures from an employee's personal life.
Ensure employees are comfortable with an ergonomically designed office/desk.
Provide inhouse training to ensure good line management.
Promote work-life balance with regular socials.
Pricing
- Price
- £42.00 a user a month
- Discount for educational organisations
- Yes
- Free trial available
- No
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at bteclezion@1stopictsolutions.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.