Thintech

Flexidesk : Desktop as a Service (DaaS)

Thintech team have over 10 years’ experience in virtualisation technology, having delivered over 100,000 desktops and currently support over 60,000 users. Specialising in public, banking and legal sectors, TT can provide a hosted desktop with access to PSN and N3. Their core offering includes dual site resilience with continuous replication.

Features

  • Desktop-as-a-Service (DaaS) platform is a fully customisable
  • Based upon Citrix and Microsoft Windows
  • Virtualise the desktop operating system, applications, user data
  • Flex and Scale the service to meet requirements
  • Enhanced Desktop Experience for End Users
  • Fully serviced and managed with 24x7 support and service
  • Work from anywhere
  • Pay as you go
  • Host your Applications
  • Use your own Licences

Benefits

  • Seamlessly scale from 5 to thousands of users
  • Increased and enhanced flexibility and mobility
  • Increased security by centrally delivering the desktop experience
  • Simplified management and increased control via Cloud Control
  • Streamline key IT processes reducing management time
  • Standard applications or bespoke application deployment
  • Work anytime, anywhere, across your devices
  • Usage based payment. Per user, per month pricing.

Pricing

£37.50 per user per month

  • Education pricing available

Service documents

G-Cloud 11

471753488436873

Thintech

Brett Loveday

01634551050

brett.loveday@thintech.co.uk

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Community cloud
Service constraints The service requires an internet connection and a suitable end point device to run the hosted desktop.
All attempts are made to ensure continuity of service and our datacentre is configured to be high availability with no downtime. If however the services needs to be taken down, this would be planned in advance and timely notice would issued to all users ahead of such service outage.
System requirements No system requirements

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Standard response times are within 15 minutes
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support Web chat
Web chat support availability 24 hours, 7 days a week
Web chat support accessibility standard None or don’t know
How the web chat support is accessible All aspects of the visitor interface are customisable, therefore allowing any changes required. 2 of the 3 standard templates are W3C compliant and the solution has been tested by a representative from RNIB for use with the well-known screen readers. As the visitor interface is fully customisable, with access to the CSS and HTML, accessibility must be considered when customising/ changing the button/windows/forms.
Web chat accessibility testing None completed
Onsite support Yes, at extra cost
Support levels SLA's Start at 24/7/5 with a 15 min response and vary according to requirement.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started By using an onboarding process including visiting every user to migrate their setting and offering a floor walking service.
Service documentation Yes
Documentation formats
  • ODF
  • PDF
End-of-contract data extraction We provide the data on a encrypted device that the customer supplies and they own the encryption key.
End-of-contract process We remove the client off of the service and keep the data for 3 months and then the data is deleted.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
  • Other
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Mobile uses the native applications and can launch published apps, when you use a Windows desktop it overlays the Window desktop with a touch interface.
Accessibility standards None or don’t know
Description of accessibility All aspects of the visitor interface are customisable, therefore allowing any changes required including font sizes, colour and contrast.
Accessibility testing No testing has been completed.
API No
Customisation available Yes
Description of customisation Own branded desktop own email with signatures own apps each user can customise start menu, run disclaimers.

Scaling

Scaling
Independence of resources We offer dedicated resources per client via our Private Cloud model. The whole environment is monitored and trends for the utilisation of the back end infrastructure ensuing we have spare capacity on standby.

Analytics

Analytics
Service usage metrics Yes
Metrics types We provide usage reports on a monthly basis which include consumption reports of various applications, service tickets, change requests and desktop usage.
Reporting types Regular reports

Resellers

Resellers
Supplier type Reseller providing extra features and support
Organisation whose services are being resold Microsoft, Citrix, VMware, Sophos, Migration Wiz, Fuzemail, Datto

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Encryption of all physical media
  • Other
Other data at rest protection approach Antivirus ,only access is via encrypted connection email is securely filtered by an external mail filtering service all systems are backed up hourly against ransomware.
Data sanitisation process No
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Via an encrypted device or via secure FTP.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats Word (.doc .docx)
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Other
Other protection between networks Modified SSL Ciphers to achieve an A+ certification rating. Service is fully encrypted end to end via a relay and there is no direct connection.
Data protection within supplier network Other
Other protection within supplier network Via an anti-virus service, firewall and backups.

Availability and resilience

Availability and resilience
Guaranteed availability 99.9% on SLA
Approach to resilience Designed with single site resilience. All systems are duplicated with no single point of failure which is replicated daily to DR facility.
Outage reporting We will call the client and use social media.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels No Generic accounts. All named users have a User name and password and passcode token. Tiered access hierarchy based on job role and/or designated client.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Cloud security at Thintech team is the highest priority. As an Thintech team customer, you will benefit from a data centre and network architecture built to meet the requirements of the most security-sensitive organizations. Measures taken include but not limited to Anti-Virus, Anti-Phishing, Fusemail-Anispam, Anti-Ransomware, System is backed up hourly, Virtual Desktops are read-only, Client and Virtual desktop run Sophos suite antivirus with daily backend scans.
Information security policies and processes We are currently working towards IS27001 and are using their suggested framework inc policies & processes.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach We have regular technical workshops where changes are discussed and documented this then goes through the Change Advise Board who approve or reject request. Once approved it is then raised as a Change Request within the service desk and any outage are mutually agreed with client.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Thintech team has a documented vulnerability management policy and process, which have been implemented, maintained and assessed in accordance with the guidance from ITIL v.3 and the current ISO20000 and ISO27001 standards. Where technically possible, real-time updates and status reports are identified and sourced from credible vendor sources, which cover a significant proportion of Thintech team asset population. For other systems and software, assigned personnel have responsibility for regularly reviewing technical forums and specialist groups to promptly identify and evaluate any emerging patches or updates which require our attention.
Protective monitoring type Supplier-defined controls
Protective monitoring approach - For mail threats we use a products for mail filtering and heurists called FuseMail, all inbound and outbound mail is filtered using Fusemail prior to delivery.
- Anti-Virus software is deployed across the entire estate in the form of Sophos, the only exclusions included are software supplier related exclusions.
- Firewalls and Application Delivery Controllers are used to publish internal resources and secure networking traffic internally and externally.

- An incident is responded to immediately by a 24/7 helpdesk that will be alerted to any threats. Core business owners are notified of potential breaches and also client if necessary.
Incident management type Supplier-defined controls
Incident management approach Thintech team has a documented incident management policy and process. This activity is responsible for the progression of alerts generated by automated monitoring systems, issues identified by Thintech team personnel, and incidents identified and reported to Thintech team by its customers and partners. All incidents are promptly reported into a central ticketing system, which ensures that each is promptly assigned to an appropriate resource, and its progress tracked (and escalated, as required) to resolution.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks Yes
Connected networks
  • Public Services Network (PSN)
  • NHS Network (N3)

Pricing

Pricing
Price £37.50 per user per month
Discount for educational organisations Yes
Free trial available No

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Terms and conditions
Service documents
Return to top ↑