Transparity Solutions Limited

Office 365 Consultancy

Transparity provide a range of Office 365 consultancy services, from initial onsite discovery workshops to solution design, migration and support. We cover the entire Office 365 suite and can ensure you get the most out of your investment in the platform.


  • Office 365 Discovery Workshop
  • Office 365 Design
  • Office 365 Migration
  • Office 365 Support


  • Rapid deployment of Office 365
  • Training for Office 365 Deployments
  • Expert guidance of Microsoft best practices
  • Ensuring you get the most of our Office 365
  • Increase user productivity


£550 to £950 per unit per day

  • Free trial available

Service documents

G-Cloud 9


Transparity Solutions Limited

Tim Hannibal and David Jobbins

01202 800000

Service scope

Service scope
Service constraints No
System requirements
  • Internet Connectivity
  • Office 365 Subscription

User support

User support
Email or online ticketing support Email or online ticketing
Support response times All tickets are responded to within an hour during contracted times. We provide bespoke SLA's based upon the customers specific requirements.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard None or don’t know
How the web chat support is accessible Customers are able to contact support via a Web Chat facility on our website.
Web chat accessibility testing N/A
Onsite support Yes, at extra cost
Support levels We provide a tailored consultancy service which may include support where required. Transparity are able to provide a range of support levels and services to suit the customers requirements.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started The initial phase of engagement is recommended to be our onsite workshop meeting. This helps us build a better picture of the requirements and gives our customers confidence in our approach, services and experience.

Following this the subsequent design, planning and migration would be undertaken.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Users have access to any information and documentation generated as part of the consultancy engagement. They can have PDF and Word copies of all data gathered and generate on request.

All customer data recorded against our work is stored in a safe location and can be permanently deleted should our customer require.
End-of-contract process At the end of each project we provide a project handover and sign off with the relevant stakeholders in the business. All information gathered is disclosed as part of this.

Using the service

Using the service
Web browser interface No
Command line interface No


Scaling available No
Independence of resources The Office 365 service is load balanced across multiple data centres around the world.
Usage notifications No


Infrastructure or application metrics No


Supplier type Reseller providing extra support
Organisation whose services are being resold Microsoft

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency Never
Protecting data at rest Other
Other data at rest protection approach Data is encrypted at rest using Bitlocker drive encryption
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Backup and recovery

Backup and recovery
Backup and recovery Yes
What’s backed up Office 365 Services
Backup controls Methods depend upon the solution implemented.
Datacentre setup Multiple datacentres with disaster recovery
Scheduling backups Users schedule backups through a web interface
Backup recovery Users can recover backups themselves, for example through a web interface

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Office 365 has a financially backed 99.9% uptime SLA
Approach to resilience The Office 365 platform is resilient through being replicated to multiple data centres around the world. The service can be failed over between data centres should an issue arise.
Outage reporting A public web dashboard, email alerts and a web app display all service information.

Identity and authentication

Identity and authentication
User authentication
  • 2-factor authentication
  • Username or password
  • Other
Other user authentication The Office 365 service can deliver the authentication solution required for each specific engagement.
Access restrictions in management interfaces and support channels Not applicable
Access restriction testing frequency At least once a year
Management access authentication 2-factor authentication
Devices users manage the service through Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Audit information for users
Access to user activity audit information No audit information available
Access to supplier activity audit information No audit information available
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations Yes
Any other security accreditations
  • ISO 27001 Accredited (Microsoft)
  • ISO 27018 Accredited (Microsoft)
  • Safe Harbor Accredited (Microsoft)
  • SSAE16 SOC1 Type II Accredited (Microsoft)
  • SOC2 Type II Accredited (Microsoft)
  • FISMA Accredited (Microsoft)

Security governance

Security governance
Named board-level person responsible for service security No
Security governance accreditation No
Security governance approach The Office 365 platform complies to all standards detailed within the Microsoft Security and Compliance Centre.
Information security policies and processes Transparity are committed to the security of our customer data at all times. We have a detailed policy on this which is followed in all we do. More information and the policy is available on requets.

The key objectives of Transparity Solutions Information Security Policy are to preserve:
• Confidentiality - Access to information shall be restricted to those staff of Transparity Solutions and relevant others with agreed authority to view it.
• Integrity – Records are to be complete and accurate with all filing and management systems operating correctly.
• Availability - Information shall be readily available and delivered to the authorised individual or entity, when it is needed.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach The purpose and objective of our Change Management process is to control the lifecycle of all changes, enabling beneficial changes to be made with minimum disruption to Transparity and its customers services.
Our full Change Management process is available on request.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Each consultancy process is different and associated vulnerability management is defined within the project scope.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Each consultancy process is different and associated protective monitoring is defined within the project scope.
Incident management type Supplier-defined controls
Incident management approach Incidents are escalated internally as per our pre defined controls. Escalations include client interaction as required and incident reports are always disclosed.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart No

Energy efficiency

Energy efficiency
Energy-efficient datacentres Yes


Price £550 to £950 per unit per day
Discount for educational organisations No
Free trial available Yes
Description of free trial We provide a free 1 day Workshop and Planning service to all our clients.


Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑