Piran Technologies Ltd

Microsoft Office 365

Office 365 is a subscription plan that includes access to a suite of Office applications and other productivity services. These services are cloud-based. The Office 365 service package specifics vary on different levels which are detailed on Microsoft's website. Features vary depending on licence.

Features

  • Assistance with email migration to Office 365
  • Supports a quick and effective transition to Microsoft Office 365
  • For more detail, please see www.pirantech.co.uk

Benefits

  • Support knowledge sharing and collaboration
  • Provides the foundation for cloud technology adoption
  • Determines readiness for migration to Office 365 services
  • Basic access to core service features within Office 365 environment
  • Manage documents within business context
  • Leverage all the features of the Microsoft Office 365 stack

Pricing

£5 to £500 per licence per month

  • Education pricing available

Service documents

Framework

G-Cloud 11

Service ID

4 1 8 3 8 2 6 5 7 7 0 1 1 3 7

Contact

Piran Technologies Ltd

Daniel Pugh

01209708608

dan@pirantech.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
None
System requirements
No Specific Requirements

User support

Email or online ticketing support
Email or online ticketing
Support response times
2 Hour SLA Monday to Friday 9am-5pm GMT

Weekends and out of hours available at a premium rate.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
We provide a comprehensive help-desk facility to clients. This includes an out of hours service and flexible service where support cover can be enhanced for short periods of time for specific events. Typically requests are received to the help-desk via email or telephone and logged immediately in the support log. The support log is accessible 24/7 to clients, allowing them to see tickets raised and updated them or alternatively raise any new issues. The SLA offered would depend on the type of support being provided and would be tailored to fit the needs to the client.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Tailored training and mentoring can be provided when requested.
Service documentation
No
End-of-contract data extraction
Extracts are made as per customer requirements
End-of-contract process
Termination terms will vary depending on the service offered, and will be agreed at the time of service commencement.

Using the service

Web browser interface
No
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Minor interface differences to display content appropriately on each device
Service interface
No
API
No
Customisation available
No

Scaling

Independence of resources
Logical isolation is used to segregate each customer's data from that of others. this provides the scale and economic benefits of multi-tenant services while rigorously preventing customers from accessing one another's data

Analytics

Service usage metrics
Yes
Metrics types
Usage metrics can be configured as per client requirements
Reporting types
Reports on request

Resellers

Supplier type
Reseller (no extras)
Organisation whose services are being resold
Microsoft

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Data exports are made as per customer requirements
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Typical service availability is 99% The SLA offered would depend on the type of service being provided and would be agreed at the start of the contract
Approach to resilience
Available on request
Outage reporting
Outages are reported on a service dashboard or via email alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
VPN Access. Two Factor Authentication. Usernames and Passwords
Access restriction testing frequency
Less than once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
Yes
Any other security certifications
Cyber Essentials

Security governance

Named board-level person responsible for service security
No
Security governance certified
No
Security governance approach
We work to ISO 27001 level and are in working towards our accreditation
Information security policies and processes
We have an follow all required information security policies and procedures for ISO 27001 and are working towards our accreditation

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Typically comply with SCA CCM v3.0 standards, supplemented by Piran Technologies change management process
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Our services typically comply with CSA CCM v3.0 standards, supplements by Piran Technologies vulnerability management processes
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Our services typically comply with CSA CCM v3.0 standards, supplemented with Piran Technologies protective monitoring processes
Incident management type
Supplier-defined controls
Incident management approach
Our services typically comply with CSA CCM v3.0 standards, supplemented with Piran Technologies incident management processes

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Pricing

Price
£5 to £500 per licence per month
Discount for educational organisations
Yes
Free trial available
No

Service documents

Return to top ↑