Espire Infolabs Ltd

Office 365

Espire offers a comprehensive suite of cloud services focusing on seamless collaboration across your business functions – creating an agile, flexible, and a customer-centric environment – employing the highest level of security, resiliency, and disaster recovery standards.

Features

  • Onsite & offshore services engagement
  • Experienced and certified resources
  • Enterprise Content Management - WCM, DMS, Workflows etc. (SharePoint Online)
  • Real time Collaboration and Communication (Skype for Business)
  • Enterprise Cloud Storage and Offline Sync (One Drive for Business)
  • Enterprise Social (Yammer )
  • Advanced Analytics/Visualizations (Power BI) with Pro Plans Add-ons
  • Enterprise Archiving Services (with GDPR toolbox) in Higher Plans
  • Advanced Threat Protection (With Machine learning) in Higher Plans
  • Enterprise Mailbox (Exchange Online)

Benefits

  • Highly available service financially backed by MS
  • Any device access (Mobile, tablet, Laptop, Desktop)
  • Anywhere access with Global Microsoft Data Centers
  • Offline Sync - work when not connected to internet
  • Larger Storage (Mailbox, Cloud storage)

Pricing

£210 to £510 per person per day

  • Education pricing available

Service documents

G-Cloud 10

338292926171118

Espire Infolabs Ltd

Pravin Patel

+447909118148

Pravin.Patel@espireinfo.co.uk

Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to Enterprise Content Management - WCM, DMS, Workflows etc. (SharePoint Online)
Real time Collaboration and Communication (Skype for Business)
Enterprise Cloud Storage and Offline Sync (One Drive for Business)
Enterprise Social (Yammer )
Advanced Analytics/Visualizations (Power BI) with Pro Plans Add-ons
Enterprise Archiving Services
Advanced Threat Protection
Enterprise Mailbox (Exchange Online)
Cloud deployment model Hybrid cloud
Service constraints O365 Service and features are constrained by Software boundaries and limits for SharePoint Server 2016
See
https://docs.microsoft.com/en-us/sharepoint/install/software-boundaries-and-limits-0 for details.
System requirements
  • Valid Office 365 Plan for each user
  • Browser (Safari, Chrome, Firefox, Edge, IE)
  • High Speed Internet
  • OS (like Windows 10/8.1/8/7, Windows 10 Server/2012/2012R2/2008R2)
  • Email Client (Like Outlook 2016/2013/2010, Outlook for Mac)
  • Various O365 Apps for IOS/Android

User support

User support
Email or online ticketing support Yes, at extra cost
Support response times It will be purely depending on the mutually agreed SLA's
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.0 AA or EN 301 549
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support Yes, at an extra cost
Web chat support availability 24 hours, 7 days a week
Web chat support accessibility standard WCAG 2.0 AA or EN 301 549 9: Web
Web chat accessibility testing NO.
Onsite support Yes, at extra cost
Support levels Our service model is flexible and tailorable. We are able to offer bespoke packages to clients that include only the features that they need to support their business or organisation. Each client that we support is assigned a Support Account Manager to act as a single point of contact and to participate in regular reviews with the client. Any specific resources and costs for support would be identified during the process of clarifying requirements and agreeing charges with the client prior to any order being placed.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started The O365 services provided by Espire Infolab are documented based on the specific needs of the clients. The services documentation is made available to the client stakeholders.

Training - can be planned at client premise, if require or can be conducted through online medium.
Service documentation Yes
Documentation formats
  • PDF
  • Other
Other documentation formats
  • MS word
  • MS PowerPoint
End-of-contract data extraction At contract end, the customized O365 system and the data in the system are available to the client. Espire Infolab access to the O365system can be disabled by the client, at contract end stage.

For Microsoft best practices - https://enterprise.microsoft.com/en-gb/articles/industries/public-sector/microsofts-open-transparent-approach-cloud-services-data-portability/
End-of-contract process At the end-of-contract, the customized O365 system based on the business needs of the client is formally handed over to the client. All costs are included in the service contract with the client. There is no additional cost associated with the end-of-contract.

The contract usually includes software licenses, training, support, initial configuration, and documentation.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Minor Interface/UI differences but all content remains same
Accessibility standards WCAG 2.0 A
Accessibility testing No.
API Yes
What users can and can't do using the API REST API, Microsoft Graph APIs
API documentation Yes
API documentation formats HTML
API sandbox or test environment No
Customisation available Yes
Description of customisation General Branding customisations, Out of Box Workflows or Microsoft Flows, Business Automation using supported API's and services CSOM, PowerApps, Apps for SharePoint etc

Scaling

Scaling
Independence of resources Espire Infolab is experienced in effective workload management and in the seamless distribution of the work transactions with the support team members, such that none of the users experience the undue delay in response to their reported issue(s).

Analytics

Analytics
Service usage metrics Yes
Metrics types Metrics types

The service metrics are created based on the Service Level Agreement parameters, such that there is clarity on the quantum of service delivered, quality of service delivered and effectiveness of the O365 support and maintenance services provided by Espire Infolab.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Reseller providing extra support
Organisation whose services are being resold Microsoft O365

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations No
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least every 6 months
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Other
Other data at rest protection approach For data at rest,Office 365 deploys BitLocker with AES 256-bit encryption on servers that hold all messaging data, including email and IM conversations, as well as content stored in SharePoint Online and OneDrive. BitLocker volume encryption addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers and disks.
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Different Services, APIs and PowerShell cmdlets provided by O365
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection between networks Microsoft uses multiple encryption methods, protocols, and algorithms across its products and services to help provide a secure path for data to travel through the infrastructure, and to help protect the confidentiality of data that is stored within the infrastructure.
Protocols and technologies examples include:
- Transport Layer Security/Secure Sockets Layer (TLS/SSL)
- Internet Protocol Security (IPsec)
- Advanced Encryption Standard (AES)-256
- BitLocker encryption
- Microsoft Azure Storage Service Encryption
- Transparent Data Encryption (TDE)
- Azure Key Vault
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection within supplier network Microsoft uses multiple encryption methods, protocols, and algorithms across its products and services to help provide a secure path for data to travel through the infrastructure, and to help protect the confidentiality of data that is stored within the infrastructure.
Protocols and technologies examples include:
- Transport Layer Security/Secure Sockets Layer (TLS/SSL)
- Internet Protocol Security (IPsec)
- Advanced Encryption Standard (AES)-256
- BitLocker encryption
- Microsoft Azure Storage Service Encryption
- Transparent Data Encryption (TDE)
- Azure Key Vault

Availability and resilience

Availability and resilience
Guaranteed availability Monthly Uptime Percentage of 95% guaranteed
Approach to resilience http://download.microsoft.com/download/A/0/7/A07FF75D-1FDC-4642-897F-9F390978E759/Data%20Resiliency%20in%20Office%20365.pdf
Outage reporting Service dashboard
Administration alerts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels Role based access
Access restriction testing frequency At least every 6 months
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for Between 1 month and 6 months
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for Between 1 month and 6 months
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 Intertek Certification Limited
ISO/IEC 27001 accreditation date 02/03/2017
What the ISO/IEC 27001 doesn’t cover N/A
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Policy owner reports to the CTO/MD, who in turn reports to the Business Owner.
Policies are easily accessible.
Policy Owners are audited on a regular basis.
Automation is used where appropriate.
Policies are acknowledged by workers.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach The ITIL Change Management Continual Process Improvement methodology is used to manage change.

All changes are considered and assessed on business and security impact by the Change Advisory Board before implementation.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Potential threats are rated on risk, likelihood of occurrence and potential impact of the threat.
Patches are developed, tested and released as soon as approved.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Security and Compliance dashboard real-time monitoring

Email alerts

Automation where appropriate
Incident management type Supplier-defined controls
Incident management approach Incident Management process follows the ITIL Incident Management best practices.
Users can report incidents by phone, email or portal.
Incident reports are provided in PDF format on a monthly basis.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £210 to £510 per person per day
Discount for educational organisations Yes
Free trial available No

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Terms and conditions document View uploaded document
Return to top ↑