Dotsquares Azure Integration Services
Our service focuses on facilitating seamless integration between on-premise platforms and cloud applications to drive successful digital transformation. Leveraging Azure Integration Services, we offer expertise in building advanced integration solutions that connect applications and services, whether in the cloud or on-premises, ensuring efficient business operations.
Features
- Scalable solution for any host, API with secure optimization
- Out-of-the-box connectors for seamless data integration.
- Simplified enterprise and cloud messaging with complex routing.
- Simplify HTTP event delivery for better application reliability.
- Facilitate business progress by integrating strategic applications.
- Seamlessly integrate on-premise platforms with cloud applications.
- Experience in implementing on-premise middleware solutions for integration.
- Proven expertise in leveraging cloud advancements for integration solutions.
- Build new solutions connecting on-premises and cloud applications.
- Ability to kickstart integration projects for cloud or hybrid environments.
Benefits
- Paas & Iaas Capabilities
- Security
- Hybrid Capabilities
- Analytics & Intelligence
- Cost-Efficient
- Access Management
Pricing
£0.10 a unit an hour
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 8 2 0 0 5 3 1 5 6 7 8 8 9 2
Contact
DotSquares Limited
Paul Thomas
Telephone: +44 208 0901819
Email: paul@dotsquares.com
Service scope
- Service constraints
- See https://docs.microsoft.com/en-gb/azure/ to determine applicable constraints based on buyers requirements
- System requirements
- N/A
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Yes, We do provide 24*7 support and we respond within one hour.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Our web chat is accessible through leading platforms such as Skype, Slack, and Microsoft Teams.
- Web chat accessibility testing
- N/A
- Onsite support
- Yes, at extra cost
- Support levels
- We provide two support options: standard (available 24/7) and dedicated. Standard support offers round-the-clock assistance and access to resources. Dedicated support offers personalized assistance tailored to specific needs, ensuring priority attention and proactive monitoring.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We do not provide onsite training, online training. We do provide User documentation and we have provided a document under the name Acceptable User Policy.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
- Spreadsheets
- End-of-contract data extraction
- We provide all associated credentials of the server infrastructure that we had hosted for the client.
- End-of-contract process
- We provide all the associated credentials to the client of the server infrastructure we hosted.
Using the service
- Web browser interface
- Yes
- Using the web interface
- We offer a dynamic project management interface where clients can seamlessly interact with our services. Should any changes be needed, updates can be made at DSP with no limitations.
- Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- The web interface is accessible through credentials provided to registered or authenticated users.
- Web interface accessibility testing
- CRM
- API
- Yes
- What users can and can't do using the API
- Users can use our API to set up the service, make changes, and access data. They can create accounts, configure settings, and manage resources programmatically. However, certain sensitive actions may be restricted, and rate limits may apply. Complex configurations may require manual intervention, and changes made through the API are subject to validation checks.
- API automation tools
-
- Ansible
- Chef
- OpenStack
- SaltStack
- Terraform
- Puppet
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- MacOS
- Other
- Using the command line interface
- Users can set up and make changes to the service through the command line interface by installing necessary tools, authenticating with the service provider's API, and executing commands or scripts to provision, configure, and modify resources. Limitations may include complexity of commands, limited functionality for advanced features, potential for errors, and security considerations regarding authentication and authorization.
Scaling
- Scaling available
- Yes
- Scaling type
-
- Automatic
- Manual
- Independence of resources
- Leveraging auto-scaling capabilities, Dotsquares ensures optimal application performance and scalability across multiple cloud service providers. Our approach includes horizontal and vertical server resource scaling, adjusting seamlessly during peak traffic and resizing automatically when demand decreases. Regular server resource monitoring ensures scalability readiness, maintaining isolated and operational server environments. With our expertise, clients confidently navigate scaling challenges. Trust Dotsquares for efficient and reliable scaling solutions tailored to your needs.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
-
- Real-time dashboards
- Regular reports
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Azure
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Databases
- Virtual Machines
- Object Storage
- Snapshots
- Files and Folders
- Disaster Recovery
- E-mails Backup
- Backup controls
- Users can control backups through our managed backup console, offering various frequencies like hourly, daily, weekly, or monthly, tailored to business needs. This includes the flexibility to back up different items on different schedules.
- Datacentre setup
-
- Multiple datacentres with disaster recovery
- Multiple datacentres
- Scheduling backups
- Users schedule backups through a web interface
- Backup recovery
- Users can recover backups themselves, for example through a web interface
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- See SLA's for each service here https://azure.microsoft.com/en-gb/support/legal/sla/summary/?msclkid=0132c6f0a91b11ec927496d95a52a9a9
- Approach to resilience
-
"Network reliability through intelligent software
Safe Deployment with AIOps
Resiliency threat modeling for large distributed systems
Low and no impact maintenance
For more detail please see https://azure.microsoft.com/en-us/features/reliability/#features" - Outage reporting
- Through Azure Service Health which gives personalised alerts and guidance for Azure service issues
Identity and authentication
- User authentication
-
- 2-factor authentication
- Limited access network (for example PSN)
- Username or password
- Access restrictions in management interfaces and support channels
- To ensure secure access, we implement robust measures such as enabling Two-Factor Authentication (2FA) on AWS IAM users. Additionally, we carefully assign permissions tailored to specific roles, limiting access to only what's necessary for each user. This approach enhances security by providing an extra layer of authentication while ensuring that users have precisely the access they need to carry out their tasks effectively.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Limited access network (for example PSN)
- Username or password
- Devices users manage the service through
- Dedicated device over multiple services or networks
Audit information for users
- Access to user activity audit information
- Users receive audit information on a regular basis
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users receive audit information on a regular basis
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- DBS
- ISO/IEC 27001 accreditation date
- 17/08/2023
- What the ISO/IEC 27001 doesn’t cover
- Compliance with industry-specific regulations or standards beyond information security. Third-party systems or services not directly controlled or managed by our organization. Physical security measures outside the scope of information security. Legal or regulatory compliance beyond information security requirements.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- ISO 9001:2015
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Security is integrated into every aspect of Azure. Azure offers unique security advantages derived from global security intelligence, sophisticated customer-facing controls, and a secure hardened infrastructure. This combination helps protect your applications and data, support your compliance efforts, and provide cost-effective security for organizations of all sizes. For more information https://docs.microsoft.com/en-gb/azure/security/
We have policies for infrastructure security, physical security, abailability, components & boundaries, network architecture, production network, SQL DB, operations, monitoring, integrity and data protection. For more information please visit https://docs.microsoft.com/en-gb/azure/security/fundamentals/infrastructure-availability
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- At Dotsquares, we uphold stringent configuration and change management practices to safeguard system integrity across AWS, Azure, GCP, and on-premises environments. Our approach includes meticulous tracking of assets through comprehensive inventory management and CMDB utilization. We employ tagging and labeling in cloud environments for efficient resource organization. Changes undergo a structured process, including risk assessment and thorough testing, ensuring minimal security impact. Integration of security controls and continuous monitoring further fortifies our systems against threats, ensuring adherence to stringent security policies and standards.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Azure security center
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Azure monitor
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Incident management uses a set of documented processes that clearly outline what needs to be done to minimize the negative impact and duration of IT disruption. Apart from the technical management of what went wrong, it also includes the management of customer, user, and stakeholder expectations during an incident. For customers, service level agreements (SLAs) clearly define expected uptime guarantees, resolution times, and communication channels for incidents. It requires comprehensive incident management on the part of the service provider to meet their SLA terms and conditions.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- Hyper-V
- How shared infrastructure is kept separate
- At Dotsquares, we secure each customer's software-defined networks (SDNs) at the hypervisor layer or on bare metal hosts. Our Cloud Services environments segregate customer content and ensure proper communication and device attachment, guaranteeing data integrity and security.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- We offer hosting solutions on AWS and Azure, which have data centers that comply with the EU Code of Conduct for Energy Efficient Data Centers.
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Dotsquares and ESG Dotsquares is moving forward with the powerful aspiration to improve the world. Being a pioneer, we are supporting the advancement of Environmental, Social, and Governance (ESG) and pledging to achieve net-zero emissions of greenhouse gases. The company uses ESG as a roadmap for formulating strategies to reduce its carbon footprint. Our commitment stands out as we intend to take effective steps for the transition to a net-zero business model. Dotsquares' sustainability strategy determines the organisational framework, clearly defined initiatives, and detailed implementation goals.
Pricing
- Price
- £0.10 a unit an hour
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Please see https://azure.microsoft.com/en-gb/free
- Link to free trial
- https://azure.microsoft.com/en-gb/free/