EntServ UK Ltd part of the DXC Technologies Group

DXC Technology Investment and Benefits Management

For the benefits of Cloud initiatives to be truly realised supporting business transformation is essential. DXC Technology has a proven track record in transforming public sector services,achieved through our business transformation consultancy capability. Our core services enable delivery of improved and innovative customer services with increased agility and cost reduction.

Features

  • Benefits Management and Realisation to ensure cloud benefits are achieved
  • Business Architecture re-design to maximise value of cloud services
  • Programme Management and Management of Change supporting transition to cloud
  • A business led approach to adoption of cloud services
  • IT Organisational design supporting multi-supplier delivery models and cloud brokering
  • Assistance in stakeholder management and communication
  • A collaborative approach to transitioning to cloud services
  • Expertise in transformation without the need to use DXC cloud
  • Industry standards AGILE, COBIT, ITIL, TOGAF, MODAF, PRINCE 2, MSP
  • Adherence to Government Service Design Manual and Treasury Green Book

Benefits

  • Managing business transformation during cloud adoption increasing benefits achieved
  • Business led approach to cloud adoption demonstrating value of IT
  • Stakeholders aligned in the benefits of the cloud technology
  • A transformation to cloud aligned to business strategy
  • Proven methodologies for transitioning to cloud supporting all organisation sizes
  • Communication plan and approach enabling users to feel engaged
  • Customers benefit from DXC’s UK public sector and global experiences
  • Wide range of skills required for transition to cloud
  • Client Side Advisory, Enterprise Architecture, Project and Programme Management
  • Knowledge transfer throughout the engagement to support internal teams

Pricing

£320.00 to £1990.00 per person per day

Service documents

G-Cloud 9

354746885054175

EntServ UK Ltd part of the DXC Technologies Group

UKPS G-Cloud Sales

+44 (0)560 303 4826

UKPSFramework.response@dxc.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Hybrid cloud
Service constraints N/A
System requirements Requirements vary with the situation in hand. Contact for advice.

User support

User support
Email or online ticketing support Email or online ticketing
Support response times As quickly as possible
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support Web chat
Web chat support availability 24 hours, 7 days a week
Web chat support accessibility standard None or don’t know
How the web chat support is accessible It varies with the service provided.
Web chat accessibility testing Testing has been done with assistive technology users.
Onsite support Yes, at extra cost
Support levels Levels cover the entire spectrum of support - there is a support level to meet every need.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started By contacting DXC though the G-Cloud contact information provided.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction By arrangement with DXC.
End-of-contract process It varies with the contract provided.

Using the service

Using the service
Web browser interface No
Application to install No
Designed for use on mobile devices No
Accessibility standards None or don’t know
Description of accessibility It varies with the users requirements.
Accessibility testing Limited.
API No
Customisation available Yes
Description of customisation It can be customised to meet user needs.

Scaling

Scaling
Independence of resources By careful planning, prioritisation, and control.

Analytics

Analytics
Service usage metrics Yes
Metrics types Using the means and metrics that are suited to the Client.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
  • Other locations
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach In-house
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach It varies according to user capabilities.
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Bonded fibre optic connections
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability Service levels vary in accordance with client needs. Service credit regimes can also be used if necessary.
Approach to resilience By using appropriate service assurance, DR, and mirroring techniques.
Outage reporting It varies according to client needs.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Users receive audit information on a regular basis
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users receive audit information on a regular basis
How long user audit data is stored for User-defined
Access to supplier activity audit information Users receive audit information on a regular basis
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 BSI
ISO/IEC 27001 accreditation date 23/09/2015
What the ISO/IEC 27001 doesn’t cover N/A
ISO 28000:2007 certification No
CSA STAR certification Yes
CSA STAR accreditation date 29/11/2016
CSA STAR certification level Level 3: CSA STAR Certification
What the CSA STAR doesn’t cover N/A
PCI certification No
Other security accreditations Yes
Any other security accreditations
  • HMG Accreditation
  • PSN Accreditation

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation Yes
Security governance standards
  • CSA CCM version 3.0
  • ISO/IEC 27001
Information security policies and processes We follow company the most demanding public standards in terms of security policies and processes.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach All necessary configuration and change management are implemented in accordance with the above standards.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Vulnerability management processes are carried out in accordance with the above standard to fully meet client needs.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach All protective montoring is carried out in accordance with the above standard.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach All incident management is carried out in accordance with the above standard.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks Yes
Connected networks
  • Public Services Network (PSN)
  • Other

Pricing

Pricing
Price £320.00 to £1990.00 per person per day
Discount for educational organisations No
Free trial available No

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑