Computer Assistance


Office 365 is mail hosting platform


  • Real-Time Co-Authoring (Word, Excel, PowerPoint)
  • Chat with co-workers in Office apps
  • Power Map in Excel: Turning data into a map
  • 50GB of email storage
  • Retrieving the right version of a document
  • Working anywhere from any device
  • Office 365 Planner to help organize your team’s workflow
  • Intelligent email inbox that can de-clutter itself


  • email from anywhere
  • application in Office


£1.50 to £38 per user per month

  • Education pricing available

Service documents


G-Cloud 11

Service ID

2 8 3 9 2 4 7 3 6 2 2 7 0 3 6


Computer Assistance

Phil Cannel


Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
An extension of services in the sense we provide management, maintenance and combinations of these differing services.
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
Our data centres are slipstreamed and optimised with SAN controllers and thus little to no downtime can be expected.

Usability is often, if not always, not impacted upon by our maintenance.
System requirements
  • Anti-virus
  • Good broadband network

User support

Email or online ticketing support
Yes, at extra cost
Support response times
As a company we aim for one hour, although sometimes it can take a couple hours.

Remote support services are unavailable during the weekend.
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Our web chat is free and available on our website, it is a pop-up which allows you to enter basic details and talk to a member of staff.
Web chat accessibility testing
Onsite support
Yes, at extra cost
Support levels
Dependent upon the requirement of each and every individual client and customer.
Support available to third parties

Onboarding and offboarding

Getting started
User documentation, on-site training, thorough one-on-one, remote training and inductions.

We also provide documentation and guidelines for our clients and their services.
Service documentation
Documentation formats
  • HTML
  • ODF
  • PDF
  • Other
Other documentation formats
End-of-contract data extraction
Through request.
End-of-contract process
Termination of requested services, official destruction of data if requested.

Preparation for migration, exit procedures and protocols.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
  • Other
Designed for use on mobile devices
Differences between the mobile and desktop service
Accessibility options and GUI aesthetic can differ.
Service interface
Customisation available
Description of customisation
Dependent again upon the needs of each individual receiver of service.


Independence of resources
We manage the services from a centralised standpoint, and thus can ensure all demand/supply is met in regards to the services we provide our customers.


Service usage metrics
Metrics types
Dependent upon cloud based service.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Reseller providing extra support
Organisation whose services are being resold
Office 365

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Via facilities provided by the services and applications used, or securely and manually through Wise Serve LTD UK.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Bonded fibre optic connections
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection within supplier network
By following the precedent of standard procedure, protocol and certification.

Availability and resilience

Guaranteed availability
Dependent upon all SLAs, however Monday - Friday, 0900-1730 is the standardised level of availability.
Approach to resilience
By following all supplier-defined and equipment guidelines on security, efficiency and vulnerability our servers are as resilient as possible.
Outage reporting
Via an API-developed bot that automatically informs of any down times.

Identity and authentication

User authentication needed
Access restrictions in management interfaces and support channels
We have in every service we provide access restrictions established by traditional admin/user relationships secured via a plethora of methods, not limited to user/passwords and VPN tunnel protocol.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
Microsoft Gold Partner

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
By assessment and judgement from the engineer line managers.

Auditing procedures.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
An assessment of risk, as well as the development of a plan, is made when a change or adjustment is attempted to ensure thorough security preparations and precautions are made.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Informed of changes to security flaws and updates is directed often by suppliers themselves who authorise updates to keep up with modern threats in cyber security.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We respond to any and all incidents as soon as is possible, however we strive to reach little to no incidents of complaint.

If an action can be made to further tighten security of our customers, we will always make it within an appropriate time-scale.
Incident management type
Supplier-defined controls
Incident management approach
Incidents are reported and escalated accordingly to the relevant and responsible company agents.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
Connected networks
  • NHS Network (N3)
  • Other
Other public sector networks
  • Parish Councils
  • Local Councils


£1.50 to £38 per user per month
Discount for educational organisations
Free trial available

Service documents

Return to top ↑