Business Cloud Integration Ltd.

SharePoint Online Project Portals

Deploying SharePoint project portals help organisations manage projects with maximum efficiency and minimal risk. SharePoint project portals help organisations get the most from their employees and assets, run more efficient projects, effectively share knowledge and resources, and manage compliance requirements with granular permissions, enhanced auditing features, and clear reporting dashboards.

Features

  • Real-time project reporting
  • Project team collaboration
  • In depth auditing
  • Secure external sharing and collaboration
  • Dedicated project sites
  • Project site and documentation templates
  • Project management
  • Efficient internal collaboration
  • Integration with Project Management tools
  • Enhanced audit trails

Benefits

  • Access important project information securely from any device
  • Real time collaboration in Office documents for multiple users
  • Enhanced version control
  • Best practice guidance
  • Enhanced search to find the right documents quickly and easily
  • Business process integration for maximum efficiency
  • Workflow automation
  • Enhanced major/minor version control and detailed version history
  • Automated document retention plans
  • Clear reporting dashboards

Pricing

£700 to £1250 per person per day

Service documents

G-Cloud 10

402463958788670

Business Cloud Integration Ltd.

Sharon Sumner

01223772365

ssumner@businesscloudintegration.co.uk

Service scope

Service scope
Software add-on or extension Yes
What software services is the service an extension to Office 365
Cloud deployment model Public cloud
Service constraints None.
System requirements Office 365 tenancy

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Customer determined SLA's - 24 hour support provided if required
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support Yes, at an extra cost
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard WCAG 2.0 AA or EN 301 549 9: Web
Web chat accessibility testing None.
Onsite support Yes, at extra cost
Support levels Support is completely bespoke to customer requirements, and may involve on site support or remote support via telephone or Skype. Support can be purchased in blocks of time to be called off within a 12 month period, or monthly dedicated support as a managed service.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started The service is provided on a consultancy basis and so begins with an in depth requirements gathering session with the client's key stakeholders and project champions, generally on the client site. The format of this session will be guided by the client's current situation and exact project methodology. From the outcomes of this session we develop a project scope and development roadmap.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
  • Video tutorials
  • Guided on screen walkthroughs
End-of-contract data extraction All data is hosted in the client's own tenancy and so is always available to them.
End-of-contract process The contract will include delivery, support through UAT, and training as defined in the original roadmap. There is also the option for additional support to be purchased on either a monthly managed support or annual call off basis.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Responsively designed to be effective on all platforms/devices.
Accessibility standards WCAG 2.0 AA or EN 301 549
Accessibility testing None.
API No
Customisation available Yes
Description of customisation The service is consultancy led and therefore designed to meet the actual requirements of the end users. At the project discovery phase user stories will be used to determine the business requirements and develop an appropriate plan of development. This plan is subject to change and developed iteratively and in close collaboration with our client's own project team.

Scaling

Scaling
Independence of resources Each client/project is assigned its own dedicated team of resources. During the development of the roadmap, both the client's and our own resources are taken into account, and a plan is drawn up to ensure that adequate skills, people, and resources are available at all times, including during times of holiday and illness.

Analytics

Analytics
Service usage metrics No

Resellers

Resellers
Supplier type Reseller providing extra features and support
Organisation whose services are being resold Microsoft

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
  • Other locations
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency Never
Protecting data at rest Encryption of all physical media
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach All data is hosted in the client's own tenancy and so is always available to them.
Data export formats Other
Other data export formats Not applicable
Data import formats
  • CSV
  • Other
Other data import formats Microsoft Office

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Bespoke SLAs are developed for each client on an individual basis.
Approach to resilience Available upon request from Microsoft as our services are all hosted in the Office 365 Cloud.
Outage reporting Our service is not dependent on platform provision. This is provided by Microsoft.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels This is not applicable to this service.
Access restriction testing frequency Never
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach We use Office 365 as our primary data platform, in addition to which client system access credentials are protected and obfuscated within password vaults.
Information security policies and processes Information security policies dictate that each client has separate and secured data storage within SharePoint Online and that any credentials are stored in obfuscated password vaults. Data is kept in accordance with our own non-disclosure arrangements in addition to any conditions that may be supplied by the client and can be easily destroyed upon project completion if required. Responsibility for the securing of this data lies with the Client Services Director who is responsible for the addition and deletion of any such data.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach The severity and complexity of the process is dependent on the business impact to the client. In its most controlled implementation, we ask the clients to justify the reasons for the change and how it doesn't meet the original brief and demonstrate that all other options have been considered prior to the change being approved by the change committee. In the least controlled implementation we maintain an open issues log which records all requests for change, each is assigned an owner, and a priority and severity level, based on the impact. This is always approved by the client before development.
Vulnerability management type Supplier-defined controls
Vulnerability management approach All of the vulnerabilities lie within the platform used rather than the service we provide. While permission management is a top priority for confidential data within the information architecture, the potential threats and security vulnerability of the platform is managed by Microsoft.
Protective monitoring type Supplier-defined controls
Protective monitoring approach All of the vulnerabilities lie within the platform used rather than the service we provide. While permission management is a top priority for confidential data within the information architecture, the potential threats and security vulnerability of the platform is managed by Microsoft.
Incident management type Supplier-defined controls
Incident management approach All of the vulnerabilities lie within the platform used rather than the service we provide. While permission management is a top priority for confidential data within the information architecture, the potential threats and security vulnerability of the platform is managed by Microsoft.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £700 to £1250 per person per day
Discount for educational organisations No
Free trial available No

Documents

Documents
Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑