Preact Limited

Microsoft Dynamics 365 for Sales

Microsoft Dynamics 365 for Sales helps organisations manage opportunities more efficiently and gain insights to enhance performance.

Using a common data platform with Office 365 and leveraging familiar apps such as Outlook and LinkedIn, it provides an intuitive experience to empower teams for business development, client acquisition, and customer engagement.

Features

  • Lead & opportunity management
  • Guided process flows
  • Sales dashboards & real-time sales reporting
  • Unified interface across web, mobile & Outlook
  • Embedded LinkedIn Sales Navigator
  • Microsoft Office 365 Integration
  • Embedded AI and machine learning capabilities
  • Process automation & business rules
  • Products, Price Lists, Quotes, Orders & Invoices
  • Gamification features

Benefits

  • Consistent user experience across devices & screen sizes
  • Highly scalable platform helps organisations analyse, act and automate
  • Connects contact & sales data to a central hub
  • Faster on-boarding of new sales people
  • Enforces business rules for consistent processing & better data quality
  • Increases productivity with connected Office 365 & LinkedIn
  • Simplifies handling of routine processes
  • Single source of truth for sales reporting & forecasting
  • Connects with Power BI for advanced analytics & visualisations
  • Win faster with embedded intelligence & less administration

Pricing

£71.6 per person per month

  • Education pricing available

Service documents

Framework

G-Cloud 11

Service ID

6 6 4 4 0 3 6 7 8 3 1 5 9 3 5

Contact

Preact Limited

Sales Team

0800 381 1000

gcloud@preact.co.uk

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Microsoft Dynamics 365 Customer Engagement apps, Dynamics 365 Customer Engagement Plan, Dynamics 365 Unified Operations Plan and Dynamics 365 Plan.
Cloud deployment model
Public cloud
Service constraints
No. The Microsoft Dynamics 365 (Online) Service Description is shown at:
https://docs.microsoft.com/en-us/office365/servicedescriptions/microsoft-dynamics-365-online-service-description
System requirements
  • Processor: 3.3 GHz or faster 64-bit dual core processor
  • Memory: 4-GB RAM or more
  • Display: Super VGA with a resolution of 1024 x 768
  • Bandwidth greater than 50 KBps (400 kbps)
  • Windows 10: Internet Explorer 11, Microsoft Edge, Mozilla Firefox
  • Windows 8.1: IE 11, Microsoft Edge, Google Chrome, Firefox
  • Windows 7: IE11, Google Chrome, Firefox
  • Mac OS X 10.8, 10.9 or 10.10: Google Chrome

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Support is available between 9:00 am and 5:00 pm (UK time) Monday to Friday

Priority 1 – 1 hour response. For major system errors, entire system down preventing processing within any area of the licensed programs
Priority 2 - 2-4 hour response. For a major system error where the processing cannot continue within significant areas of the application.
Priority 3 - 24 hour response. Systems error identified but the customer can continue using all other application area.
Priority 4 - 48 hour response. For cosmetic errors or minor usability inconvenience.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Priority 1 – 1 hour response. For major system errors, entire system down preventing processing within any area of the licensed programs
Priority 2 - 2-4 hour response. For a major system error where the processing cannot continue within significant areas of the application.
Priority 3 - 24 hour response. Systems error identified but the customer can continue using all other application area.
Priority 4 - 48 hour response. For cosmetic errors or minor usability inconvenience.

Issues can be logged 24 hours / 7 days a week via online portal.

A named Technical Account Management will be appointed for managed service clients that elect to formalize an engagement plan.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Preact provides a complete on-boarding service for each business requirement. This includes requirements scoping, documentation, group training and go-live support. This in additional to many online learning tools provided by Microsoft.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
At any point, customers can access and export their data, subject to defined user security permissions. Preact would make a copy of your data and supply this in a readable, secure format.
End-of-contract process
Unless specifically stated otherwise, the customer's Dynamics 365 licensing agreement will automatically renew at the expiration of the term.

In the event of termination or cancellation of the service by the customer, Microsoft may delete Customer’s Content permanently from its servers. Notwithstanding the foregoing, Microsoft will keep customer content for a period of 90 days before it is deleted from Microsoft’s servers.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Function and service parity between mobile and desktop usage, each tailored to security roles and form factors to provide a responsive user interface.
Service interface
No
API
Yes
What users can and can't do using the API
The Customer Engagement Web API provides a development experience that can be used across a wide variety of programming languages, platforms, and devices. The Web API implements the OData (Open Data Protocol), version 4.0, an OASIS standard for building and consuming RESTful APIs over rich data sources.

Dynamics 365 for Customer Engagement apps are built on the Common Data Service platform, which is also the underlying data platform for PowerApps. The Common Data Service Web API provides a development experience that can be used across a wide variety of programming languages, platforms, and devices. The Web API implements the OData v4.0, an OASIS standard for building and consuming RESTful APIs over rich data sources.

Because these Web API's are built on open standards, Microsoft does not provide assemblies for a specific developer experience. HTTP requests can be composed for specific operations or use third-party libraries to generate classes for whatever language or platform you want.
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Microsoft Dynamics 365 is a highly customisable and flexible business application that securely stores and manage data across a common data service that is also used by Office 365. Dynamics 365 includes native functionality to customise the user interface, user security, reporting, workflow automation, approval processes, integrations and deploy self-service web portals. Most customisations can be carried out without requiring custom development. This includes creating new entities, forms, views and workflows. For instances where custom development is required, Microsoft provides a software developer kit (SDK).

Scaling

Independence of resources
Dynamics 365 leverages Microsoft Online Services which in turn utilises various Cloud Scale techniques and technologies, to ensure multi-tenant services are not affected in times of peak usage across Microsoft's data-centres.

Analytics

Service usage metrics
Yes
Metrics types
Administration area provides details including storage capacity / usage, active users, API calls, user operations, system jobs and plug-ins.
Reporting types
Real-time dashboards

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Dynamics 365 requirements scoping, implementation, training, support and managed service.

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Other
Other data at rest protection approach
All instances of Dynamics 365 (Online) use Microsoft SQL Server Transparent Data Encryption (TDE) to perform real-time encryption of data when written to disk, also known as encryption at rest.
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Subject to sufficient usage permissions, users can export list views to Microsoft Excel / CSV format and use the Software Development Kit (SDK) to manually export data using the data export functionally. Specialist third-party solutions are also available to handle export / integration requirements.
Data export formats
  • CSV
  • Other
Data import formats
  • CSV
  • Other
Other data import formats
  • Excel
  • SQL
  • XML Spreadsheet
  • Data Import Wizard

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Microsoft provides a service level up-time commitment of 99.9%.

In the event that the service level falls below 99.9% for a given month, Microsoft will provide a Service Credit.

Refer to Microsoft agreement for detailed terms and conditions: http://www.microsoftvolumelicensing.com/Downloader.aspx?DocumentId=12249
Approach to resilience
Microsoft Dynamics 365 is hosted in Microsoft datacenters and uses security measures and mechanisms to protect data. Microsoft blocks unauthorized traffic to and within datacenters, using a variety of technologies such as distributed denial-of-service (DDoS) attack prevention.

Microsoft Dynamics 365 is deployed in Microsoft datacenters, which are protected by defense-in-depth security that includes perimeter fencing, video cameras, security personnel, secure entrances, and real-time communications networks. The defense-in-depth security continues through every area of the facility and to each physical server unit.

Detailed information at: https://www.microsoft.com/en-us/trustcenter/security/dynamics365-security
Outage reporting
Public Dashboard
Customer email alerts
Service health reported through the customers personal portal

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Microsoft Dynamics 365 relies on Azure Active Directory (AAD) to provide authentication for users, helping to protect from unauthorised access. It simplifies the management of users and groups and enables administrators to assign and revoke privileges.

Dynamics 365 uses the same identity platform as Office 365, so a user of both services has the same username and password. Customers can federate an on-premises AAD or other directory stores to enable using corporate credentials to authenticate.

Through role-based security, users are assigned security roles based on their responsibilities and their participation in business processes.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
08/03/2016
What the ISO/IEC 27001 doesn’t cover
This certification was obtained by Microsoft for the Dynamics 365 service. Further details can be obtained here: https://www.microsoft.com/en-us/trustcenter/compliance/iso-iec-27001
ISO 28000:2007 certification
No
CSA STAR certification
Yes
CSA STAR accreditation date
12/02/2018
CSA STAR certification level
Level 3: CSA STAR Certification
What the CSA STAR doesn’t cover
N/a
PCI certification
Yes
Who accredited the PCI DSS certification
PCI Security Standards Council
PCI DSS accreditation date
19/03/2019
What the PCI DSS doesn’t cover
N/a
Other security certifications
Yes
Any other security certifications
  • ISO 27017
  • ISO 27018

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
We work to industry and Microsoft standards for all security related standards. Our solutions leverage Microsoft Cloud Services which in term comply to ISO/IEC 27001 and CSA CCM v3.0.
Information security policies and processes
We have an Information Security Policy which is available on request. We have rigorous induction and training methods which ensure policies are followed.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Microsoft Dynamics 365 has developed formal standard operating procedures (SOPs) governing the change management process. These SOPs cover both software development and hardware change and release management, and are consistent with established regulatory guidelines including ISO 27001, SOC 1/SOC 2, NIST 800-53, and others.

Microsoft also uses Operational Security Assurance (OSA), a framework that incorporates the knowledge gained through a variety of capabilities that are unique to Microsoft.

More detail is shown at: https://www.microsoft.com/en-us/securityengineering/sdl/
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Potential threats are monitored through multiple sources, including external repositories and vendor feeds proactively according to internally defined processes. Assessment of patches, hot fixes updates and associated deployment guidelines are dictated by severity, client requirements and/ or vendor recommendations.

Refer to https://www.microsoft.com/en-us/securityengineering/sdl/threatmodeling
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Dynamics 365 leverages the Microsoft Cyber Defense Operations Center (CDOC), which brings together security response experts from across the company to help protect, detect and respond 24x7 to security threats against its infrastructure and services in real-time. Informed by trillions of data points across an extensive network of sensors, devices, authentication events and communications, the CDOC teams employ automated software, machine learning and behavioural analysis and forensic techniques to protect all endpoints, better detect attacks and accelerate response.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Microsoft’s approach to managing a security incident conforms to the National Institute of Standards and
Technology (NIST) Special Publication (SP) 800-61, and Microsoft has several dedicated teams that work
together to prevent, detect, and respond to security incidents.

Please refer to https://www.microsoft.com/en-us/download/confirmation.aspx?id=55110

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Pricing

Price
£71.6 per person per month
Discount for educational organisations
Yes
Free trial available
No

Service documents

Return to top ↑