iomart Group Plc

Microsoft Office 365 - O365

Microsoft Office 365 (O365) enables work and collaboration from virtually anywhere. As a Tier 1 certified Microsoft CSP partner, iomart manages your complete Office 365 customer experience, from migration, O365 deployment and service. Office 365 offers all familiar Office features in cloud solution.

Features

  • File storage and sharing with 1TB storage/user
  • Business class email, calendar and contacts with a 50GB inbox
  • Office on tablets and phones, full and installed
  • Unlimited online meetings, IM and HD video conferencing
  • Enterprise management of apps with Group policy
  • Word, Excel, Powerpoint, Outlook, Publisher and OneNote
  • Skype for Business with advanced call handling
  • Skype includes real-time and historical monitoring and reporting services

Benefits

  • Outstanding service levels from our Microsoft accredited support staff
  • iomart ensures a seamless migration process
  • Collaborative working across your organisation
  • Familiar using experience
  • Truly mobile working solutions
  • Always up to date
  • Return on investment
  • Secure online storage
  • Fully managed Skype for Business

Pricing

£1 per user per month

Service documents

G-Cloud 10

235322494561774

iomart Group Plc

GCloud Team

01419316400

gcloud@iomart.com

Service scope

Service scope
Service constraints None
System requirements Compatible Web browser

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Severity 1 (Critical Service Incident) - Within 15 mins
Severity 2 (Critical Service Incident) - Within 15 mins
Severity 3 (Non-Critical Service Incident) - Within 1hr
Severity 4 (Minor Support Request)
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels Our support teams are available 24/7 to respond to alerts, take calls, make decisions and act to ensure that your services are operating effectively every second of the day. The support desk is accredited to ISO20000-2011 and ISO27001-2013 standards and brings together 250 technical operations staff employed to cover everything with a guaranteed qualified engineering response within 15 minutes of notice. As part of our on-going commitment to service excellence iomart will assign a dedicated Account Manager (Service Delivery Manager) and Technical Manager to the client. Our approach to Account Management has been developed to provide a value added service to our customers. The Account Manager’s main role is to understand the core objectives of our clients’ businesses and ensure the services we are providing continually support the achievement of their goals.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Iomart provide a full on boarding service with supported online training supporting user documentation.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Data can be extracted/downloaded at any time and for any reason without any assistance from Microsoft. Exchange Online data, including emails, calendar appointments, contacts, and tasks, can be downloaded to a local computer by any end user at any time via the Import and Export wizards. SharePoint Online documents can be downloaded at any time from the workspace into your local computer.
End-of-contract process Iomart will immediately stop providing the Service

Payments due or payable by you under the Agreement will become due and payable immediately, including any unpaid Charges due for the remainder of the Initial Term or any Renewal Term (except where the Agreement has ended for iomart's material breach

Within 30 days after this Agreement ends, each of us will return all Confidential Information of the other in its possession at the time this Agreement ends and will not make or keep any copies of that Confidential Information except as required to comply with any applicable legal or accounting record keeping requirement.

Using the service

Using the service
Web browser interface Yes
Using the web interface Iomart deliver service desk facilities primarily via the iomart customer control panel. iomart provides customers with a web-based Control Panel, which provides a broad view of information and services surrounding their solution which allows authorised users to create and manage cloud services as well as raise, track and report on support tickets.
Web interface accessibility standard None or don’t know
How the web interface is accessible The web interface is compatible with standard Windows accessibility options
Web interface accessibility testing None
API No
Command line interface No

Scaling

Scaling
Scaling available Yes
Scaling type Manual
Independence of resources Office365 is highly available and easily scalable with high capacity for a large numbers of users
Usage notifications Yes
Usage reporting Email

Analytics

Analytics
Infrastructure or application metrics Yes
Metrics types Other
Other metrics
  • Email activity report
  • Office activation's report
  • SharePoint site usage report
  • OneDrive for Business usage report
  • Skype for Business report
  • Yammer report
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Reseller providing extra features and support
Organisation whose services are being resold Microsoft

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
  • Hardware containing data is completely destroyed
Equipment disposal approach A third-party destruction service

Backup and recovery

Backup and recovery
Backup and recovery No

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • Bonded fibre optic connections
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection within supplier network By default, network security is set to deny all network traffic in all directions. iomart will consult with clients to determine the most appropriate firewall configuration, enabling access to ports as required.

Mechanisms are in place to restrict unauthorized internal and external access to data with access to data appropriately segregated. Firewalls configured not to permit traffic from a source IP or Media Access Control (MAC) address other than its own Data in transit protection for iomart services are subject to audit at least annually under ISO 27001 and PCI-DSS certification requirements.

Availability and resilience

Availability and resilience
Guaranteed availability Monthly Uptime Percentage
<99.9% = 25% Service credit
<99% = 50% Service credit
<95% = 100% Service credit
Approach to resilience Delivering services at huge scale requires a radically different approach to designing, building, deploying and operating data centers. When software applications are built as distributed systems, every aspect of the physical environment — from the server design to the building itself — creates an opportunity to drive systems integration for greater reliability, scalability, efficiency and sustainability
Outage reporting Email alerts

Identity and authentication

Identity and authentication
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Access to all service interfaces (for consumers and providers) is constrained to authenticated and authorised individuals. Remote management access is authenticated and directly associated to authorised individuals rather than group accounts All managed systems monitored and access logged and tracked for auditing purposes
Access restriction testing frequency At least every 6 months
Management access authentication 2-factor authentication
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device on a government network (for example PSN)
  • Dedicated device over multiple services or networks

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 ISOQAR
ISO/IEC 27001 accreditation date 18/12/2008
What the ISO/IEC 27001 doesn’t cover As detailed within the SOA
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Cyber Essentials

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes The iomart Group adheres to the Security Classification Definitions as described in the Government Security Classifications Policy (GSCP). This is outlined and defined in section 5.3 of the iomart Quality Manual and forms part of iomarts overall integrated management system, which consists of UKAS / APMG / NCSC accredited systems. Notably; ISO 27001:2013 Information Security Management; ISO 20000-1:2011 IT Service Management; ISO 9001:2015 Quality Management; ISO 14001:2015 Environmental Management and NCSC compliance for iomarts Cloudsure service. All are regularly audited for compliance by an accredited certifying body. These standards require iomart to have robust controls in place to manage data, documents and records. Showing that iomart has appropriate and measured controls in place to manage OFFICIAL information that if lost, stolen or published in the media could have more damaging consequences (for individuals, an organisation or government generally). All iomart Data Centres and have been independently assessed on a number of occasions by local authorities and UK Government Departments, Senior Information Risk Owner’s (SIRO) as suitable for holding and processing their sensitive information to OFFICIAL level.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach Our change management processes are in line with ISO27001 control A.12.2 Controlled mechanism for making changes to the operational environment are in place.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Iomart vulnerability management process is aligned with ISO27001:2013 control A12.6.1 which addresses 3 key areas:

• Timely identification of vulnerabilities
• Assessment of or exposure to a vulnerability
• Defined measures to address the risk
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach Iomart Protective Monitoring process is aligned with ISO27001:2013 control A.12.4 which details:
• Event Logging
• Protection of log information
• Admin & operator logs
• Clock synchronisation
• Incident Management
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach Iomart incident management process is aligned with ISO27001:2013 control A.16.1 which details:
• The full incident management procedure
• Responsibilities & procedures
• Assessment of and decision on security events
• Response process
• Evidence collection
• Learning from incidents

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart Yes
Who implements virtualisation Supplier
Virtualisation technologies used Other
Other virtualisation technology used Microsoft Azure Hypervisor
How shared infrastructure is kept separate Microsoft cloud services, including Office 365, were designed with the assumption that all tenants are potentially hostile to all other tenants. Thus, multiple forms of protection have been implemented throughout Office 365 to prevent customers from compromising Office 365 services or applications, or gaining unauthorized access to the information of other tenants or the Office 365 system itself.

Energy efficiency

Energy efficiency
Energy-efficient datacentres No

Pricing

Pricing
Price £1 per user per month
Discount for educational organisations No
Free trial available Yes
Description of free trial Iomart can provide a POC of the service
Link to free trial https://products.office.com/en-gb/try

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑