Skip to main content

Help us improve the Digital Marketplace - send your feedback

DotSquares Limited

Dotsquares Azure Integration Services

Our service focuses on facilitating seamless integration between on-premise platforms and cloud applications to drive successful digital transformation. Leveraging Azure Integration Services, we offer expertise in building advanced integration solutions that connect applications and services, whether in the cloud or on-premises, ensuring efficient business operations.

Features

  • Scalable solution for any host, API with secure optimization
  • Out-of-the-box connectors for seamless data integration.
  • Simplified enterprise and cloud messaging with complex routing.
  • Simplify HTTP event delivery for better application reliability.
  • Facilitate business progress by integrating strategic applications.
  • Seamlessly integrate on-premise platforms with cloud applications.
  • Experience in implementing on-premise middleware solutions for integration.
  • Proven expertise in leveraging cloud advancements for integration solutions.
  • Build new solutions connecting on-premises and cloud applications.
  • Ability to kickstart integration projects for cloud or hybrid environments.

Benefits

  • Paas & Iaas Capabilities
  • Security
  • Hybrid Capabilities
  • Analytics & Intelligence
  • Cost-Efficient
  • Access Management

Pricing

£0.10 a unit an hour

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at paul@dotsquares.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

9 8 2 0 0 5 3 1 5 6 7 8 8 9 2

Contact

DotSquares Limited Paul Thomas
Telephone: +44 208 0901819
Email: paul@dotsquares.com

Service scope

Service constraints
See https://docs.microsoft.com/en-gb/azure/ to determine applicable constraints based on buyers requirements
System requirements
N/A

User support

Email or online ticketing support
Email or online ticketing
Support response times
Yes, We do provide 24*7 support and we respond within one hour.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Our web chat is accessible through leading platforms such as Skype, Slack, and Microsoft Teams.
Web chat accessibility testing
N/A
Onsite support
Yes, at extra cost
Support levels
We provide two support options: standard (available 24/7) and dedicated. Standard support offers round-the-clock assistance and access to resources. Dedicated support offers personalized assistance tailored to specific needs, ensuring priority attention and proactive monitoring.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We do not provide onsite training, online training. We do provide User documentation and we have provided a document under the name Acceptable User Policy.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
Spreadsheets
End-of-contract data extraction
We provide all associated credentials of the server infrastructure that we had hosted for the client.
End-of-contract process
We provide all the associated credentials to the client of the server infrastructure we hosted.

Using the service

Web browser interface
Yes
Using the web interface
We offer a dynamic project management interface where clients can seamlessly interact with our services. Should any changes be needed, updates can be made at DSP with no limitations.
Web interface accessibility standard
None or don’t know
How the web interface is accessible
The web interface is accessible through credentials provided to registered or authenticated users.
Web interface accessibility testing
CRM
API
Yes
What users can and can't do using the API
Users can use our API to set up the service, make changes, and access data. They can create accounts, configure settings, and manage resources programmatically. However, certain sensitive actions may be restricted, and rate limits may apply. Complex configurations may require manual intervention, and changes made through the API are subject to validation checks.
API automation tools
  • Ansible
  • Chef
  • OpenStack
  • SaltStack
  • Terraform
  • Puppet
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • PDF
Command line interface
Yes
Command line interface compatibility
  • Linux or Unix
  • Windows
  • MacOS
  • Other
Using the command line interface
Users can set up and make changes to the service through the command line interface by installing necessary tools, authenticating with the service provider's API, and executing commands or scripts to provision, configure, and modify resources. Limitations may include complexity of commands, limited functionality for advanced features, potential for errors, and security considerations regarding authentication and authorization.

Scaling

Scaling available
Yes
Scaling type
  • Automatic
  • Manual
Independence of resources
Leveraging auto-scaling capabilities, Dotsquares ensures optimal application performance and scalability across multiple cloud service providers. Our approach includes horizontal and vertical server resource scaling, adjusting seamlessly during peak traffic and resizing automatically when demand decreases. Regular server resource monitoring ensures scalability readiness, maintaining isolated and operational server environments. With our expertise, clients confidently navigate scaling challenges. Trust Dotsquares for efficient and reliable scaling solutions tailored to your needs.
Usage notifications
Yes
Usage reporting
Email

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
Reporting types
  • Real-time dashboards
  • Regular reports

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Azure

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • Databases
  • Virtual Machines
  • Object Storage
  • Snapshots
  • Files and Folders
  • Disaster Recovery
  • E-mails Backup
Backup controls
Users can control backups through our managed backup console, offering various frequencies like hourly, daily, weekly, or monthly, tailored to business needs. This includes the flexibility to back up different items on different schedules.
Datacentre setup
  • Multiple datacentres with disaster recovery
  • Multiple datacentres
Scheduling backups
Users schedule backups through a web interface
Backup recovery
Users can recover backups themselves, for example through a web interface

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
See SLA's for each service here https://azure.microsoft.com/en-gb/support/legal/sla/summary/?msclkid=0132c6f0a91b11ec927496d95a52a9a9
Approach to resilience
"Network reliability through intelligent software
Safe Deployment with AIOps
Resiliency threat modeling for large distributed systems
Low and no impact maintenance
For more detail please see https://azure.microsoft.com/en-us/features/reliability/#features"
Outage reporting
Through Azure Service Health which gives personalised alerts and guidance for Azure service issues

Identity and authentication

User authentication
  • 2-factor authentication
  • Limited access network (for example PSN)
  • Username or password
Access restrictions in management interfaces and support channels
To ensure secure access, we implement robust measures such as enabling Two-Factor Authentication (2FA) on AWS IAM users. Additionally, we carefully assign permissions tailored to specific roles, limiting access to only what's necessary for each user. This approach enhances security by providing an extra layer of authentication while ensuring that users have precisely the access they need to carry out their tasks effectively.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Limited access network (for example PSN)
  • Username or password
Devices users manage the service through
Dedicated device over multiple services or networks

Audit information for users

Access to user activity audit information
Users receive audit information on a regular basis
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users receive audit information on a regular basis
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
DBS
ISO/IEC 27001 accreditation date
17/08/2023
What the ISO/IEC 27001 doesn’t cover
Compliance with industry-specific regulations or standards beyond information security. Third-party systems or services not directly controlled or managed by our organization. Physical security measures outside the scope of information security. Legal or regulatory compliance beyond information security requirements.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
ISO 9001:2015

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Security is integrated into every aspect of Azure. Azure offers unique security advantages derived from global security intelligence, sophisticated customer-facing controls, and a secure hardened infrastructure. This combination helps protect your applications and data, support your compliance efforts, and provide cost-effective security for organizations of all sizes. For more information https://docs.microsoft.com/en-gb/azure/security/

We have policies for infrastructure security, physical security, abailability, components & boundaries, network architecture, production network, SQL DB, operations, monitoring, integrity and data protection. For more information please visit https://docs.microsoft.com/en-gb/azure/security/fundamentals/infrastructure-availability

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
At Dotsquares, we uphold stringent configuration and change management practices to safeguard system integrity across AWS, Azure, GCP, and on-premises environments. Our approach includes meticulous tracking of assets through comprehensive inventory management and CMDB utilization. We employ tagging and labeling in cloud environments for efficient resource organization. Changes undergo a structured process, including risk assessment and thorough testing, ensuring minimal security impact. Integration of security controls and continuous monitoring further fortifies our systems against threats, ensuring adherence to stringent security policies and standards.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Azure security center
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Azure monitor
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Incident management uses a set of documented processes that clearly outline what needs to be done to minimize the negative impact and duration of IT disruption. Apart from the technical management of what went wrong, it also includes the management of customer, user, and stakeholder expectations during an incident. For customers, service level agreements (SLAs) clearly define expected uptime guarantees, resolution times, and communication channels for incidents. It requires comprehensive incident management on the part of the service provider to meet their SLA terms and conditions.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Supplier
Virtualisation technologies used
Hyper-V
How shared infrastructure is kept separate
At Dotsquares, we secure each customer's software-defined networks (SDNs) at the hypervisor layer or on bare metal hosts. Our Cloud Services environments segregate customer content and ensure proper communication and device attachment, guaranteeing data integrity and security.

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
We offer hosting solutions on AWS and Azure, which have data centers that comply with the EU Code of Conduct for Energy Efficient Data Centers.

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

Dotsquares and ESG Dotsquares is moving forward with the powerful aspiration to improve the world. Being a pioneer, we are supporting the advancement of Environmental, Social, and Governance (ESG) and pledging to achieve net-zero emissions of greenhouse gases. The company uses ESG as a roadmap for formulating strategies to reduce its carbon footprint. Our commitment stands out as we intend to take effective steps for the transition to a net-zero business model. Dotsquares' sustainability strategy determines the organisational framework, clearly defined initiatives, and detailed implementation goals.

Pricing

Price
£0.10 a unit an hour
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Please see https://azure.microsoft.com/en-gb/free
Link to free trial
https://azure.microsoft.com/en-gb/free/

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at paul@dotsquares.com. Tell them what format you need. It will help if you say what assistive technology you use.