Content and Code Ltd

Enterprise Mobility and Security (EM+S) Planning Services

As an "elite" Microsoft security partner, we work closely with Microsoft to guide and improve the Enterprise Mobility + Security technologies. Our capabilities are rooted in consultancy offerings, including set of Identity and Access Management capabilities. Advise on data protections, securing external user access, administrative tasks and mobile device management.


  • Cloud Security Roadmap
  • Microsoft Security Technologies for GDPR
  • Enterprise Mobility Management (EMM) Workshop and Design
  • Azure Information Protection (AIP) Workshop and Concept
  • Microsoft 365 Advanced Data Governance (ADG) Workshop and Concept
  • Data Loss Prevention (DLP) Policy Orchestration
  • Microsoft Cloud App Security (MCAS) Workshop and Concept
  • Advanced Threat Analytics (ATA)/Azure Advanced Threat Protection (ATP) Workshop/Design
  • Identity and Access Management (IAM) Planning Services
  • For more detail, please see


  • Align risks and insights about contemporary threats to security technologies
  • Align security technologies to GDPR requirements
  • Enable mobile working in a secure manner
  • Protect data on any device
  • Classify and label information to demonstrate compliance and establish traceability
  • Detect domain threats and common attacker tactics, techniques and procedures
  • Control the flow of sensitive information outside of your network
  • Protect against accidental or intentional data loss
  • Take advantage of existing Active Directory investments in cloud technologies
  • Discovery cloud usage, govern SaaS apps and control specific actions


£550 a person a day

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

2 2 2 3 4 1 1 8 0 8 8 7 4 0 3


Content and Code Ltd Andy Sayer
Telephone: 07720 262 320


Planning service
How the planning service works
Content and Code’s approach includes:
• Provide an overview of what Rights Management can and cannot do, and the relationship of IRM to other DLP technologies
• Technology education, with a deep focus on clients and file types
• Content and Code gain an understanding of intended uses of Azure RMS
• Introduces Azure RMS-specific concepts like RMS for Individuals, BYOK, the RMS Connector and Super Users
• Content and Code produce an Azure Information Protection document that summarises the content and a client’s position relative to these concerns. The document also seeks to capture the intended scope of subsequent Content and Code activities in support of an RMS deployment.
Planning service works with specific services
Hosting or software services the planning service works with
  • Microsoft 365
  • Microsoft Enterprise Mobility + Security
  • Microsoft Advanced Threat Analytics
  • Azure Advanced Threat Protection
  • Azure Active Directory
  • Azure Information Protection
  • Microsoft Intune
  • Microsoft Cloud App Security


Training service provided
How the training service works
Content and Code provide comprehensive user training on Microsoft 365 products as well as activities that support the training such as adoption support and business change planning. User training services includes training guides for admins and users, videos, quick-start guides, floorwalking, drop-in clinics, training project champions, execs coaching, lunch and learns, classroom-style training, and Yammer self-help sessions (Yam Jams).
Training is tied to specific services
Services the training service works with
  • Microsoft 365
  • Enterprise Mobility + Security
  • Azure Information Protection
  • Microsoft Intune
  • Microsoft Cloud App Security
  • Microsoft Advanced Threat Analytics
  • Azure Advanced Threat Protection
  • System Center Configuration Manager

Setup and migration

Setup or migration service available
How the setup or migration service works
This approach involves:

Plan – Discovery and health checks, design and transition workshops, low level design and solution write-up

Prepare – Implementation of pre-requisites, identity and supporting software to support the transition or migration of data, with full testing included and migration planning, communications, and training.

Migration – Beginning with pilot migrations, we move into velocity migrations and move users to the service based on the migration plan, which aims to remove disruption or downtime for end users, including reducing or removing any impact due to sharing restrictions.
Setup or migration service is for specific cloud services
List of supported services
  • Microsoft 365
  • Enterprise Mobility + Security (EM+S)
  • Microsoft Azure

Quality assurance and performance testing

Quality assurance and performance testing service
How the quality assurance and performance testing works
As we provide cloud solutions to our clients, quality assurance is critical in achieving our goal of delivering “right first time”. Testing against all client's requirements and driving the delivery of high quality code helps us to reduce User Acceptance Testing (UAT) effort and rework. Through the scoping and planning phases, we ascertain the level and depth of quality assurance necessary and tailor our QA efforts accordingly. During the project build phase, we focus solely on functional system testing of the solutions developed.

We utilise a Risk Based Testing, prioritising tests on functionality with highest potential impacts and propensity to failure. We continuously review test plans ensuring we identify and rectify all critical defects. On system test completion, we provide a QA Test Report summarising the test activities and any resulting recommendations. Where required, we also support client UAT needs by providing consultants able to perform UAT management and test analysis in order to guide client teams in the most effective ways to UAT the solution.

Security testing

Security services
Security services type
  • Security strategy
  • Security design
  • Cyber security consultancy
  • Security audit services
  • Other
Other security services
  • Enterprise Mobility + Security consulting
  • Microsoft Cloud Security consulting

Ongoing support

Ongoing support service
Types of service supported
  • Hosting or software provided by your organisation
  • Hosting or software provided by a third-party organisation
How the support service works
This is delivered via our Managed Services function, which is underpinned by ITIL and our own service management framework.

Service scope

Service constraints
Details of services and any constraints that could apply are defined in the service design introduction workshop.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Depends on the priority of the ticket. Initial responses are tied into our response SLAs, however response times for general questions are not targeted. Response times at weekends will depend on whether weekend support is taken up.
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), 7 days a week
Web chat support
Support levels
Content and Code have four tiers of support available for clients: Entry, Essential, Enhanced, and Elite. All levels of support include UK-based support desk with 8:00-18:00 M-F cover (excluding public holidays), extended hours are available as an option at an extra cost to the client; and technical support hours per month increasing from 8 (entry level) to unlimited (elite level). Essential, enhanced, and elite support additionally include service reporting, data analytics, and change management. Enhanced and elite levels have support for service and technical account management, proactive (event) management, and major incident management. Elite is the only level that includes operational run tasks (e.g. scheduled checks).


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)


£550 a person a day
Discount for educational organisations

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.