Dynamics 365 portal - Adxstudio implementation service
xRM Technologies offers the complete range of professional services, tailored for the delivery of Microsoft Dynamics 365 portal, Adxstudio and associated technologies. The end solution offers a rich self serve experience that supports your OMNI channel for customer interaction.
- Web portal solution based on Dynamics 365 portals
- Complex Event Management for scheduling course, conference, training
- OMNI channel (Multi-channel) support for web, social, chat, email, telephone
- Online self serve solutions with rich user experience
- Microsoft (SaaS) Software as a Service
- Azure cloud deployment or self hosted option is available
- No code apporach
- Portal theme and custom branding to match with your website
- Mobile, tablet and multiple browser supported
- Rich user experience by self service solution
- Implement portal solution for for customers, employees or partners
- Custom authentication with SSO
- Reduce cost to support with minimised bespoke development
- Streamline business processes with powerful back office integration
£450 to £1100 per person per day
- Education pricing available
- Free trial available
2 7 6 3 4 8 7 6 5 9 3 7 7 4 0
+44 (0)203 824 2427
|Software add-on or extension||Yes, but can also be used as a standalone service|
|What software services is the service an extension to||
Dynamics 365 portal
Dynamics CRM 2015
Dynamics CRM 2016
|Cloud deployment model||
|System requirements||Dynamics CRM or Dynamics 365|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
P1: 2 hours
P2: 8 hours
P3: 24 hours
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||WCAG 2.1 AA or EN 301 549|
|Phone support availability||9 to 5 (UK time), 7 days a week|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
|Support levels||Depending on the requirement to be onsite we attend the onsite support request.|
|Support available to third parties||Yes|
Onboarding and offboarding
As a part of the implementation scope for training and documentation will be agreed.
We offers multiple training options including onsite training, training guide, documentation. Also we aim to provide the separate training for normal user and admin users.
As part of training documentation we also provides the "how to" videos on request.
|End-of-contract data extraction||The proposed solution will be based on online applications including SharePoint Online, Dynamics CRM, Visual studio Online (TFS) etc where we stores the documents and data. At the end of the contract we assign the ownership of all online applications to customer and make sure they have removed our access. Also, we make sure to remove any information, data, database and files from our system by end of the engagement|
We perform following activities at the end of the contract which will be based in time-material and agree with customer
*Sign off process including UAT report.
*Knowledge transfer and handover all solutions
*Exit meeting with all documentation handover
*Data and information removal process
*Make sure support process in place for the solution
*Handover the project execution reports including any Audit reports, Defects and resolutions report, development documents
*Training material and related documentation handover
*Commercial exists and paperwork
Using the service
|Web browser interface||Yes|
|Application to install||Yes|
|Compatible operating systems||Windows|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||
The Dynamics 365 portal is supported on Phone, Tablet and Web browser. that means user will able to use the solution from any devices.
Depending on the phone devices and desktop browser the solution will available to use it
|Description of customisation||
We use Dynamics 365 portal from Microsoft which is configurable and can be enhance further by development
|Independence of resources||
The service tenant/database/account will be separate for each customer.
Also we have separate dedicated resources assign to each customer to give 100% attention and we make sure not to share the resources.
|Service usage metrics||Yes|
The Service usage report will be available with limited information out the entire solution.
Also we can provide service usage from Dynamics CRM, Adxstudio logs and Azure cloud service.
|Supplier type||Not a reseller|
|Staff security clearance||Staff screening not performed|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Managed by a third party|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||In-house|
|Protecting data at rest||
|Data sanitisation process||No|
|Equipment disposal approach||In-house destruction process|
Data importing and exporting
|Data export approach||User will able to export the data using Advance Find feature/utility from Dynamics 365/Dynamics CRM.|
|Data export formats||CSV|
|Data import formats||CSV|
|Data protection between buyer and supplier networks||
|Data protection within supplier network||
Availability and resilience
Our service is based on Dynamics CRM Online/Dynamics 365 online and CRM portal which will be hosted by Microsoft (Microsoft SaaS)
|Approach to resilience||
The proposed solution and services will be based on the Microsoft SaaS.
As part of proposed solution the email alert will be setup on Microsoft Office 365 service area to receive any service alert and maintenance related messages.
Any further report and dashboard for service report can be available on request.
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||We have a system to manage the document and process with multiple roles to apply different level of restriction to different users. Each staff member/user have username password to login to the system and each user is setup with one or more specific role that will provide the access to the information which they are allowed to access.|
|Access restriction testing frequency||Less than once a year|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||We are following the security standards as defined in ISO 27001 security guidelines and we are in the middle of processing the ISO/IEC 27001.|
|Information security policies and processes||
We have processes in place for following Information security policies. We arrange the regular audit to ensure the process and policies are followed.
• Authorized users of information systems
• Acceptable use of information systems
• Personal Information
• Information system Acceptable use policy
• Network password policy
• Network connection policy
• Software licensing policy
• E-mail usage policy
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||
We manage the requirements in Visual Studio online - team Services (Formally known as TFS) as Epic, stories, back long and Task.
For any change we maintain change request document which will have the references of requirement id from TFS. Each change request document needs to agree and sign off by customer to process ahead.
Using TFS online the change-set will be maintain along with the change request references.
TFS online use the online secure authentication where individual user will able to login using secure password and maintain the requirements and change request.
|Vulnerability management type||Undisclosed|
|Vulnerability management approach||
Vulnerability management process consists of five phases:
Preparation, Vulnerability scan, Define re-mediating actions, Implement actions and Re-scan
As an Implement action phase we deploy the patch/fixes with the backup and rollback plans. Also we make sure to deploy the patch first on non-production environment and once its quickly tested the we rollout to production environment.
As a Re-scan process we test the patch/fixes on non production and production environment
|Protective monitoring type||Undisclosed|
|Protective monitoring approach||NA|
|Incident management type||Supplier-defined controls|
|Incident management approach||We maintain the Incident management register to capture the detail and each action for taken for incident.|
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||No|
|Price||£450 to £1100 per person per day|
|Discount for educational organisations||Yes|
|Free trial available||Yes|
|Description of free trial||
Trial instance of Dynamics 365 - Sales, Service and Operations
Trial Instance of CRM Portal (Adxstudio)