ADM Computing

Bespoke SharePoint & PowerBI configuration and implementation

Bespoke SharePoint consultancy and implementation - on premise, private cloud or cloud via Microsoft Office 365. Tailored reporting and business intelligence using Microsoft Power BI.

Features

  • Operational efficiency and compliance tools
  • Bespoke Design
  • Document Control & Centralisation
  • Secure access from any device
  • Realtime Reporting
  • Staff and Resource Management
  • Change Management

Benefits

  • Cost reduction
  • Central control and management of data
  • Data Security
  • Manage content "on the move" efficiently
  • Integration with existing infrastucture
  • Greater staff engagement.

Pricing

£750 per unit per day

Service documents

G-Cloud 11

443854023602524

ADM Computing

Kailas Bryant - Sales & Marketing

01227 473503

kailas.bryant@adm-computing.co.uk

Service scope

Service scope
Software add-on or extension Yes
What software services is the service an extension to Microsoft SharePoint
Cloud deployment model Public cloud
Service constraints No Constraints.
System requirements Microsoft Technology

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Support services are available as follows:  0830-1730 Mon-Fri, OOH Critical Support  15 minutes response critical, 1 hour urgent, 1 business day non-urgent Account Management and Dedicated Technical Teams available
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Service availability is 99.99%
Support services are available as follows:
 0830-1730 Mon-Fri, OOH Critical Support
 15 minutes response critical, 1 hour urgent, 1 business day non-urgent
Account Management and Dedicated Technical Teams available
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started When onboarding a new customer, a full project specification is drawn up and agreed. This will cover all areas both technical and operational. A project manager will be assigned with oversight from relevant Directors.

Working in collaboration with the customer and any applicable third party suppliers, ADM will create and implement a project plan covering (but not exclusively):
 Knowledge gaining of any existing systems being migrated
 Liaison with third party suppliers and all customer stakeholders
 Implementation of support processes
 Migration / Implementation of systems
 User Training

Should offboarding be required, data will be made available and the contract terminated in liaison with the customer, again working in a fully managed fashion.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Admin access to allow migration of data between old and new platforms (private cloud). Data can be provided in an agreed format on demand.
End-of-contract process Data extraction included within cost of contract, any additional hardware or licencing charged as applicable.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Simpler touch friendly interface, optimised for smaller screen sizes.
Service interface No
API No
Customisation available Yes
Description of customisation Workflow, permissions management.

Scaling

Scaling
Independence of resources Proactive monitoring tools and dedicated resource allocation.

Analytics

Analytics
Service usage metrics Yes
Metrics types Service summary, uptime reports, views of all site data (subject to agreement with customer around requirements).
Reporting types Real-time dashboards

Resellers

Resellers
Supplier type Reseller providing extra features and support
Organisation whose services are being resold Microsoft

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process No
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach JavaScript query
Data export formats
  • CSV
  • Other
Other data export formats XML
Data import formats Other
Other data import formats XML

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Service Availability / Service Credit
99.0% to 99.5% inclusive / 25%
95.0% to 98.9% inclusive / 50%
Less than 95% / 100%
Approach to resilience Available on request.
Outage reporting Email alerts, public dashboard, telephone contact

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Appropriate user access permissions configured and managed.
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 The British Assessment Bureau
ISO/IEC 27001 accreditation date 20/09/2016
What the ISO/IEC 27001 doesn’t cover Covers ADM Computing single site
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification Yes
Who accredited the PCI DSS certification Worldpay (ADM self validated certificate)
PCI DSS accreditation date 14/12/2016
What the PCI DSS doesn’t cover Covers ADM Computing single site
Other security certifications Yes
Any other security certifications
  • Cyber Essentials
  • Cyber Essentials Plus

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards ISO 9001, Cyber Essentials, Cyber Essentials Plus
Information security policies and processes Cyber Essentials, Cyber Essentials Plus, ISO:9001, ISO:27001

Information Security Management Team underpinned by a Microsoft SharePoint based management system.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach ISO:9001 compliant change management process.
Vulnerability management type Undisclosed
Vulnerability management approach Proactive security monitoring tools. Immediate action where required subject to change management processes.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Proactive security monitoring tools. Immediate action where required subject to change management processes.
Incident management type Supplier-defined controls
Incident management approach Incidents reported by proactive monitoring tools or from users (via phone or email). Incident reports provided on request at no extra charge.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £750 per unit per day
Discount for educational organisations No
Free trial available No

Service documents

pdf document: Pricing document pdf document: Terms and conditions
Service documents
Return to top ↑