Azure Managed Cloud (Azure Managed Services)
Our flexible service allows clients to offload operational management to ISO20000 certified managed service. We manage networking, server operating systems, applications and end-to-end digital services. Available for Azure, Amazon Web Services (AWS) and others.
Providing UK Government with on-demand, scalable public cloud resources to migrate and deliver transformational solutions.
Features
- 24/7 monitoring/response- IaaS, PaaS, Kubernetes and serverless platforms.
- Support across networking, operating systems, applications and end-to-end services.
- Pay as you go support - per item, monthly.
- Cloud hosting, cost optimisation and management.
- Cloud design, continuous improvement and deployment services on demand.
- NCSC aligned approach and suitable for OFFICIAL/OFFICIAL SENSITIVE solutions.
- ISO 9001, ISO 20000 and ISO 27001 (ITIL) certified.
- UK based support centre with 24/7 Service Desk support.
- Application Development and Management, Service Management, Incident/Change Management.
- AWS Advanced Consulting and MS Gold Cloud Platform Partner.
Benefits
- Secure, accredited ITIL aligned managed service.
- Scalable, flexible service with commercial model tailored to you.
- Ability to draw on varied skills as required.
- Pay-As-You-Go charging model providing ease of cost management.
- Proactive cloud cost optimisation to drive down costs.
- Easily scale support up/down with cloud platform consumption.
- Rapid, repeatable deployment and operation driven by automation tooling.
- Enhanced access to cloud providers through extensive, award-winning partnerships.
- Securely managed cloud platform monitored 24x7.
- Tailored SLAs to meet your service requirements.
Pricing
£0.01 a virtual machine an hour
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 6 7 9 7 2 9 4 2 2 1 6 2 1 9
Contact
Kainos Software Ltd
Gareth Black
Telephone: 028 9057 1100
Email: presales@kainos.com
Service scope
- Service constraints
- See https://docs.microsoft.com/en-gb/azure/ to determine applicable constraints based on buyers requirements
- System requirements
- See https://docs.microsoft.com/en-gb/azure/
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- Our standard support response times range from 30 minutes to 5 days depending on the incident categorisation and prioritisation as defined in a tailored service level agreement (SLA) per service.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Web chat allows our support clients to chat directly to support engineers in private instant messaging groups sharing information on support activities over the internet. Clients and support engineers are able to share text, documents, voice, and video within the boundaries of information security protocols.
- Web chat accessibility testing
- For many of our support clients, we configure private chat groups to allow the client real-time access to the support team.
- Onsite support
- Yes, at extra cost
- Support levels
-
For more information, visit https://azure.microsoft.com/en-us/support/plans/ and https://www.microsoft.com/en-us/unifiedsupport/overview
Kainos delivers expert support services that relieve organisations’ IT departments from the day-to-day demands of maintaining their cloud based applications. We have extensive experience of running and optimising a broad range of bespoke and off-the-shelf (COTS) business applications in a wide range of cloud environments. For many of our customers we support legacy applications and integration points, and we have specifically transitioned support from existing service providers or ESCROW to ourselves. We quickly resolve problems and performance issues, which raise user satisfaction levels.
Our ISO 20000 accredited support methodology is based on the rigor of ITIL and the flexibility of Agile principles and a Dev Ops culture. Services offered include incident investigation, service desk, change controls, service and supplier management, consultancy, hosting and cloud services, solution upgrades and training.
Our ISO 27001 accreditation allows us to support data marked as Official (previously IL0 to IL3) platforms for Government departments. Many cloud applications we support are securely administered via the Internet but we have a Code of Connection and associated Code of Practice to enable administration and support of environments with PSN Protected connectivity. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
- See https://azure.microsoft.com/en-us/resources/ plus comprehensive online documentation for various solutions available across the platform. See https://docs.microsoft.com/en-us/azure/. We also offer free of charge remote best practice guidance from our Azure Engineers called FastTrack for Azure. https://azure.microsoft.com/en-us/programs/azure-fasttrack/#overview
- Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
- https://azure.microsoft.com/en-us/support
- End-of-contract data extraction
-
As a customer, you maintain ownership of your data—the content, personal and other data you provide for storing and hosting in Azure services. Microsoft will not store or process customer data outside the geography you specify, except for certain non-regional services. You are also in control of any additional geographies where you decide to deploy your solutions or replicate your data.
Azure has established internal records-retention requirements for back-end data. You are responsible for identifying your own record retention requirements. For records that are stored in Azure, you are responsible for extracting your data and retaining your content outside of Azure for a customer-specified retention period.
Azure allows you to export data and audit reports from the product. The exports are saved locally to retain the information for a customer-defined retention time period.
For more information on protection of customer data, visit: https://docs.microsoft.com/en-us/azure/security/fundamentals/protection-customer-data - End-of-contract process
-
Microsoft is governed by strict standards and follows specific processes for removing cloud customer data from systems under our control, overwriting storage resources before reuse, and purging or destroying decommissioned hardware. In our Online Service Terms, Microsoft contractually commits to specific processes when a customer leaves a cloud service or the subscription expires. This includes deleting customer data from systems under our control.
Please see Data Protection Addendum for full and up to date details about how Microsoft manages your data. https://www.microsoft.com/licensing/docs/view/Microsoft-Products-and-Services-Data-Protection-Addendum-DPA?lang=1
Using the service
- Web browser interface
- Yes
- Using the web interface
-
Azure provides several web interfaces that allow users to interact with the platform, manage resources, and build applications. These interfaces include, but are not limited to, the following:
- Azure Portal - provides a unified view of all your Azure resources; users can create, configure, and manage various services, virtual machines, databases, etc.
- Azure Cloud Shell: interactive, browser-based shell environment that allows users to manage Azure resources using either Bash or PowerShell; provides a command-line interface directly within the Azure Portal, eliminating the need to install any local tools - Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- Azure Portal supports all success criteria defined at WCAG 2.1 AA and WCAG 2.1 A. The WCAG 2.1 AA criteria include requirements such as ensuring that the color contrast of text is 4.5:1, navigation elements are consistent, headings are used in a logical order, captions are provided for live audio and video media, web forms have accurate labels, and content is available on both vertical and horizontal device orientation. Microsoft's accessibility conformance reports are accessible at https://www.microsoft.com/en-us/accessibility/conformance-reports
- Web interface accessibility testing
-
Microsoft has made significant efforts to ensure the accessibility of its web interfaces. They have developed and utilized various tools and practices for testing their web interfaces with assistive technology users.
One of the key tools Microsoft uses is Accessibility Insights. This is an open-source web extension that allows users to perform more than 50 automated and manual tests and easily document the detected issues. As of now, it catches up to 40 percent of accessibility bugs, and Microsoft plans to improve this percentage through more automated testing and the expanded use of AI. For more information, visit https://accessibilityinsights.io/docs/web/overview/ - API
- Yes
- What users can and can't do using the API
-
Azure users can set up services and make changes via Microsoft’s API using Azure API Management. To set up a service, users can sign in to the Azure portal, navigate to your API Management instance, and create a resource from the Azure portal menu. Detailed instructions for setting up services are available at https://learn.microsoft.com/en-us/azure/api-management/get-started-create-service-instance
From the API Management section of the Azure Portal, users can make changes using by selecting "Add API" and following the steps listed at https://learn.microsoft.com/en-us/azure/api-management/add-api-manually
There are some limitations when using Azure API Management. For instance, the maximum number of subscription (API Keys) per service instance is 500. Additional API import restrictions are available at https://learn.microsoft.com/en-us/azure/api-management/api-management-api-import-restrictions - API automation tools
-
- Ansible
- Chef
- SaltStack
- Terraform
- Puppet
- API documentation
- Yes
- API documentation formats
- HTML
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- MacOS
- Other
- Using the command line interface
-
The Azure Command-Line Interface (Azure CLI) allows users to interact with Azure services and manage their Azure resources in many ways, including the following:
- Create, update, delete, and manage Azure resources (e.g., virtual machines, storage accounts, web apps, databases, and networks)
- Automate routine tasks (e.g., deploying applications, scaling resources, and configuring networks)
- Integrate with other tools and services (e.g., with Azure DevOps for CI/CD pipelines)
- Using multiple shell environments (e.g., Windows Command Prompt, Bash, PowerShell)
- Learning and understanding Azure services
For more information on Azure CLI's features and capabilities, visit:
- https://learn.microsoft.com/en-us/cli/azure/
- https://learn.microsoft.com/en-us/cli/azure/use-azure-cli-successfully
Scaling
- Scaling available
- Yes
- Scaling type
-
- Automatic
- Manual
- Independence of resources
- We currently have On-Demand Capacity Reservation in preview https://docs.microsoft.com/en-us/azure/virtual-machines/capacity-reservation-overview
- Usage notifications
- Yes
- Usage reporting
-
- API
- SMS
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Other
- Other metrics
-
- A comprehensive list such as AD, Server, Service, Configuration Stores
- Spring, Automation, Private Cloud, Batch, Workspaces, Accounts, Blockchain Members
- Bot Services, Redis, App Firewall policies, Profiles, Roles, VM's
- Storage accounts, blob services, file services, queue services, table services
- Storage accounts, blob services, file services, queue services, table services
- All metrics can be found here:
- https://docs.microsoft.com/en-us/azure/azure-monitor/essentials/metrics-supported
- Reporting types
- API access
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Microsoft
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Other
- Other data at rest protection approach
- Azure Key Vault & Azure Active Director see https://docs.microsoft.com/en-us/azure/security/fundamentals/encryption-atrest?msclkid=b2f26c8ea91a11ecac8f8d24fb4e36fc
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- On-premises Back-up files/folders/system state with Microsoft Azure Recovery Services
- Back up entire Windows/Linux VMs
- Back up Azure Managed Disks
- Back up Azure File shares to a storage account
- Back up SQL Server databases running on Azure VMs
- Backup SAP HANA databases running on Azure VMs
- PostgreSQL Back databases, retain backups for up to 10 year
- Azure Blobs - Overview of operational backup for Azure Blobs
- Backup controls
- By assigning Azure Policies in Backup Center.
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Users schedule backups through a web interface
- Backup recovery
- Users can recover backups themselves, for example through a web interface
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection between networks
-
Transit encryption using Transport Layer Security (TLS) 1.2. All traffic leaving a data centre is encrypted in transit. TLS provides strong authentication, message privacy, and integrity (enabling detection of message tampering, interception, and forgery), interoperability, algorithm flexibility, and ease of deployment and use.
An additional layer of encryption is provided at the infrastructure layer. Whenever Azure customer traffic moves between datacentres-- outside physical boundaries not controlled by Microsoft or on behalf of Microsoft-- a data-link layer encryption method using the IEEE 802.1AE MAC Security Standards (also known as MACsec) is applied from point-to-point across the underlying network hardware. - Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
-
Microsoft’s approach to enabling two layers of encryption for data at rest is:
Disk encryption using customer-managed keys. You provide your own key for disk encryption. You can bring your own keys to your Key Vault (BYOK – Bring Your Own Key), or generate new keys in Azure Key Vault to encrypt the desired resources.
Infrastructure encryption using platform-managed keys. By default, disks are automatically encrypted at rest using platform-managed encryption keys.
Availability and resilience
- Guaranteed availability
- See SLA's for each service here https://azure.microsoft.com/en-gb/support/legal/sla/summary/?msclkid=0132c6f0a91b11ec927496d95a52a9a9
- Approach to resilience
-
Network reliability through intelligent software
Safe Deployment with AIOps
Resiliency threat modelling for large distributed systems
Low and no impact maintenance
For more detail please see https://azure.microsoft.com/en-us/features/reliability/#features - Outage reporting
- Through Azure Service Health which gives personalised alerts and guidance for Azure service issues.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google apps)
- Username or password
- Other
- Other user authentication
-
Azure Active Directory is Microsoft’s multi-tenant cloud-based directory and identity management service. Azure-AD includes a full suite of identity management capabilities including multi-factor authentication, device registration, self-service password management, self-service group management, and privileged account management.
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-methods?msclkid=b2a138a1a92d11ec918375623c320dc1 - Access restrictions in management interfaces and support channels
- Azure-AD can designate separate administrators to serve different functions. These administrators will have access to features in the Azure portal and, depending on their role, will be able to create or edit users, assign administrative roles to others, reset user passwords, manage user-licenses, and manage domains, among other things. A user who is assigned an admin role will have the same permissions across all of the cloud services that your organization has subscribed to, regardless of whether you assign the role in the Office365 portal, in the Azure classic portal, or by using the Azure-AD module for Windows PowerShell.
- Access restriction testing frequency
- Never
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- The Certification Body of Schellman & Company, LLC
- ISO/IEC 27001 accreditation date
- November 28, 2023 for Certificate version 13. Original registration date: November 29, 2011
- What the ISO/IEC 27001 doesn’t cover
- Please see https://docs.microsoft.com/en-gb/compliance/regulatory/offering-ISO-27001?view=o365-worldwide
- ISO 28000:2007 certification
- No
- CSA STAR certification
- Yes
- CSA STAR accreditation date
- Microsoft obtained CSA STAR Certification in 2013
- CSA STAR certification level
- Level 2: CSA STAR Attestation
- What the CSA STAR doesn’t cover
- None
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- Microsoft’s PCI DSS certification was accredited by Coalfire
- PCI DSS accreditation date
- Azure expanded PCI DSS cert scope 15/03/2021
- What the PCI DSS doesn’t cover
- Service Scope is identified here http://aka.ms/azure-pci
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
- MS certs https://learn.microsoft.com/en-us/compliance/regulatory/offering-home?view=o365-worldwide
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- ISO/IEC 27001
- Other
- Other security governance standards
- EN 301 549, ENISA IAF, EU Model Clauses, UK Cyber Essentials Plus, UK NPIRMT, CIS Hardened images, SOC 1 Type 2, SOC 2 Type 2,
- Information security policies and processes
- We have policies for infrastructure security, physical security, availability, components & boundaries, network architecture, production network, SQL DB, operations, monitoring, integrity, and data protection. For more information please visit https://docs.microsoft.com/en-gb/azure/security/fundamentals/infrastructure-availability
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Azure addresses change management practices through Microsoft's configuration management policy, which is part of the Microsoft Security Policy (MSP) and the Microsoft Security Program Policy (MSPP). Azure implements the configuration management policy and associated controls through a series of Standard Operating Procedures (SOPs), including the Microsoft Change Management Standard, the Azure Software Change and Release Management SOP, Azure Hardware Change and Release Management SOP. The Azure SOPs cover the change management process around information system design, development, and implementation of changes and align with Microsoft’s Security Development Lifecycle (SDL) process.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Vulnerability management recommendations focus on addressing issues related to continuously acquiring, assessing, and acting on new information in order to identify and remediate vulnerabilities as well as minimizing the window of opportunity for attackers.
1: Run automated vulnerability scanning tools
2: Deploy an automated operating system patch management solution
3: Deploy an automated patch management solution for third-party software titles
4: Compare back-to-back vulnerability scans
5: Use a risk-rating process to prioritize the remediation of discovered vulnerabilities
For more information https://docs.microsoft.com/en-us/security/benchmark/azure/security-control-vulnerability-management - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Microsoft Defender for Cloud helps you prevent, detect, respond to threats. Defender for Cloud gives you increased visibility into, and control over, the security of your Azure resources as well as those in your hybrid cloud environment.
Defender for Cloud performs continuous security assessments of your connected resources and compares their configuration and deployment against the Azure Security Benchmark to provide detailed security recommendations tailored for your environment.
Intelligent Security Graph provides real-time threat protection in Microsoft products/services. It uses advanced analytics that links threat intelligence and security data to provide insights that can strengthen organisational security. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Microsoft has developed robust processes to facilitate a coordinated response to incidents.
• Identification – System and security alerts may be harvested, correlated, and analysed.
• Containment – The escalation team evaluates the scope and impact of an incident.
• Eradication – The escalation team eradicates any damage caused by the security breach, and identifies the root cause for why the security issue occurred.
• Recovery – During recovery, software or configuration updates are applied to the system, and services are returned to a full working capacity.
• Lessons Learned –Each security incident is analysed to protect against future reoccurrence.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- Other
- Other virtualisation technology used
-
VMware, Hyper-V, Oracle VM, Red Hat Virtualisation, KVM hypervisor
Microsoft uses a combination of virtual machines (VMs), virtual disks, data virtualization, and container technologies, automatically deployed through Azure Resource Manager (ARM) templates to enable a dynamically scalable and resource-rich data platform. - How shared infrastructure is kept separate
- In the cloud-enabled workplace, a tenant can be defined as a client or organization that owns and manages a specific instance of that cloud service. With identity platform provided by Azure, a tenant is a dedicated instance of Azure Active Directory (Azure AD) that your organization receives/owns when it signs up for a Microsoft cloud service. Each Azure AD directory is distinct and separate from other Azure AD directories. The Azure AD architecture isolates customer data and identity information from co-mingling. This means users/administrators of one Azure AD directory cannot accidentally/maliciously access data in another directory. More information: https://docs.microsoft.com/en-us/azure/security/fundamentals/isolation-choices
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
-
Microsoft datacenters adhere to the EU Code of Conduct for Energy Efficiency in Data Centres by implementing a variety of best practices and measures:
Power Utilisation Effectiveness (PUE): The EU Code of Conduct for Data Centres uses PUE as a key metric to assess the overall efficiency of a data center. PUE represents the ratio of total data center input power to IT load power. The lower the PUE value, the higher the efficiency of the facility1. The ultimate goal is to achieve a PUE close to 1.0, indicating a perfectly efficient data center where almost all power is delivered to IT equipment.
Monitoring and Improvement: By regularly monitoring PUE, data center operators can identify areas of inefficiency and implement targeted energy-saving measures. Those who demonstrate the effective adoption of the Code of Conduct best practices, leading to significant reductions in energy consumption, are eligible for the annual EU Code of Conduct in Data Centres Awards.
Adoption of Best Practices: The Code of Conduct encourages data center operators and owners to adopt best practices that reduce energy consumption and promote sustainability. These best practices are outlined in a document that is revised annually to include the latest technological developments.
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Microsoft’s approach to addressing the climate crisis starts with the sustainability of our own business. In 2020, we made a bold set of commitments: to be a carbon negative, water positive, zero waste company that protects ecosystems—all by 2030. Three years into this journey, we remain steadfast in our commitment. 2022 was a reminder that to mitigate the most severe impacts of climate change, our commitments need to extend beyond our four walls, and we must continue to accelerate investments that will enable progress for decades to come.
In 2022 we launched Microsoft Cloud for Sustainability, a comprehensive suite of enterprise-grade sustainability management tools. We also helped to advance a set of global sustainability initiatives that aim to benefit every person and organization on the planet. These include accelerating the availability of new climate technologies through our Climate Innovation Fund, strengthening our climate policy agenda, helping to develop a more reliable and interoperable carbon accounting system, advocating for skilling programs to expand the green workforce, and working to enable a just transition for the vulnerable populations of the global south.
We believe that Microsoft has an important role to play in developing and advancing new climate solutions, but also recognize that the climate crisis can’t be solved by any single company, organization, or government. The global community needs partnerships, new innovations, policies, and global commitment to ensure a healthy future for all.Covid-19 recovery
In response to the urgent health crisis caused by the COVID-19 pandemic, we have marshaled our resources to protect public health by providing tools and technology to those on the front lines–including health care providers and researchers–to better understand the virus, its transmission, treatment and potential vaccine. Specific actions include:
• Using Azure high-performance computing capabilities and our data scientists and Microsoft researchers to protect public health. One example of this is our expanded commitment to our AI for Health Program, dedicating an additional $20 million in funding to advance the efforts of researchers on the front lines of COVID-19.
• Through AI for Health we are focused on funding projects that use data to help public health authorities make informed and effective decisions on social distancing policies and healthcare capacity needs, help healthcare providers respond to the immediate crisis more safely and effectively, and accelerate scientific efforts to understand and treat COVID-19 and develop a vaccine.
• We have awarded more than 150 grants through AI for Health to organizations tackling the COVID-19 pandemic, including:
• Duke University, selected through the White House High Performance Computing Consortium, whose research team is addressing the short supply of ventilators by developing a new technique that allows them to be split and used with multiple patients.
• COVID-19 Moonshot project by UCB that is leveraging Azure to screen targets and potential entities for research.
• Folding@home, a global organization using distributed computing to research COVID-19 proteins and inform new therapies.
• Helping establish and make available the COVID-19 Open Research Dataset, representing the most extensive machine-readable coronavirus literature collection available for data and text mining to date, with more than 130,000 scholarly articles. The aim is to aid research and discovery efforts for scientists, clinicians, and those working toward a solution.Tackling economic inequality
Inclusive economic growth means leaving no one behind. To this end, we have programs in place to support and help the most vulnerable in our communities.
Our business is one of collaboration, co-creation, partnership, and interdependence, particularly with our partner ecosystem, which includes over 40,000 organisations in the UK, employing over 570,000 people. In delivering social value we adopt a similar approach with our partners and customers as we do in the technology delivery – a commitment to maximize social and economic ROI through partnership.
Through our Partner Pledge we extend this ambition to our partner ecosystem, focusing on five critical themes: digital skills, apprenticeships, diversity, responsible & ethical AI, sustainability.
Microsoft’s mission is empower every person and every organization on the planet to achieve more - with inclusiveness at it’s core. By taking the following steps, Microsoft actively addresses workforce inequality across employment, skills, pay, and development, further demonstrating our commitment to creating an inclusive and diverse work environment:
• Diverse and inclusive hiring: We believe diversity brings unique perspectives, accelerates innovation, and contributes to economic equality.
• Skills development: We're dedicated to providing ongoing training and development opportunities for our employees to improve their skills, increase their knowledge, and advance their careers.
• Pay equity: We regularly review our compensation packages to facilitate parity across roles, experience, and locations, regardless of gender, or ethnicity.
• Employee Resource Groups (ERGs) and Employee Networks: Microsoft supports various ERGs which provide career development and networking opportunities, as well as activities that promote community engagement and cultural awareness.
• Transparency: As one of the most transparent multinational companies of our size, we publicly share our diversity and inclusion metrics, pay equity analysis, and progress towards equality goals.Equal opportunity
Microsoft recognizes that a diverse workforce is essential to innovation and growth. We promote a cooperative and productive work environment by supporting the cultural and ethnic diversity of our workforce, and are actively committed to providing equal employment opportunity to all qualified employees and applicants. We have many initiatives and programs in place to promote diversity and inclusion, including employee resource groups, diversity and inclusion training, and partnerships with organizations that support underrepresented groups.
We maintain a work environment free from discrimination, one where employees are treated with dignity and respect. All employees share in the responsibility for fulfilling Microsoft's commitment to equal employment opportunity.
Microsoft does not discriminate against any employee or applicant on the basis of age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable laws, regulations and ordinances. We adhere to these principles in all aspects of employment, including recruitment, hiring, training, compensation, promotion, benefits, social and recreational programs, and discipline. In addition, it is the policy of Microsoft to provide reasonable accommodation to qualified employees who have protected disabilities to the extent required by applicable laws, regulations and ordinances where a particular employee works. We are committed to equally opportunity practices as demonstrated in the following links:
https://careers.microsoft.com/us/en/legalpolicies
https://www.microsoft.com/en-us/diversity/default.aspx
https://www.microsoft.com/en-us/diversity/inside-microsoft/default.aspx
Microsoft is committed to equal opportunities employment practices. Microsoft policies on managing and developing workforce, how to empower employees and Inclusive hiring can be found here:
https://www.microsoft.com/en-us/corporate-responsibility/empowering-employeesWellbeing
Microsoft has implemented several initiatives to foster the wellbeing of its employees:
Microsoft Viva: Microsoft Viva is an employee experience platform that fosters a culture of wellbeing and improves productivity. It provides data-driven, privacy-protected insights and recommendations to help improve employee wellbeing.
Work-Life Integration: Microsoft promotes work-life integration, which is the natural evolution of work-life balance. In many flexible employment situations, the boundaries between work life and home life are blurred. This makes it even more important to consider how work—and the rest of life—are more integrated than we might think.
Mental Health Resources: Microsoft has deeply invested in mental health resources as an integral part of employee wellbeing, through its benefits package and workplace culture.
Employee Empowerment: Microsoft focuses on bringing out the best in people, supporting their goals, and allowing them to find deep meaning in their work. They strive to create a respectful, rewarding, diverse, and inclusive work environment.
Diversity and Inclusion: Microsoft believes in empowering everyone on the planet and sees diversity and inclusion as core to its business model. The better they represent diversity inside Microsoft, the better they’re able to innovate for those they seek to empower.
Learning and Development Opportunities: Microsoft provides personalized, integrated, and relevant views of all learning opportunities on Microsoft Learning and LinkedIn Learning. They also offer frequent promotion opportunities.
Benefits and Rewards: Microsoft develops dynamic, sustainable, and strategic programs that together provide a highly differentiated portfolio to attract, reward, and retain top talent.
Pricing
- Price
- £0.01 a virtual machine an hour
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Depending upon the service there are range of trial offerings available. There is also a free trial of Azure
- Link to free trial
- Free trial of Azure at https://azure.microsoft.com/en-gb/free/search/?ef_id=_k_d00f79182b1a1d5b7a5a1f0d4a8f4aaf_k_&OCID=AIDcmm3bvqzxp1_SEM__k_d00f79182b1a1d5b7a5a1f0d4a8f4aaf_k_&msclkid=d00f79182b1a1d5b7a5a1f0d4a8f4aaf