Cantium Business Solutions

O365 Hosting Services

Cantium Business Solutions have Microsoft O365 certified staff that work with our customers to provide a tailor-made O365 hosting solutions that fits within the desired budget while still being able to meet the business needs.Using Microsoft Cloud solutions we provide a flexible and cost-efficient cloud strategy.

Features

  • Office suite incl. Word, Excel, Outlook, PowerPoint, Publisher and OneNote
  • 1Tb OneDrive storage per user
  • Advanced call handling with Skype for Business
  • Enhanced email capabilities
  • Real-time co-authoring with colleagues
  • Advanced Security features
  • Edit and convert PDF Documents
  • Access Office on mobile devices (Phones & Tablets)

Benefits

  • Outstanding service levels from our Microsoft accredited support staff
  • Flexibility to scale - can grow with your business
  • Capability to work anywhere with an Internet connection
  • Excellent collaboration features
  • Always up to date
  • Reduces capital spend through subscriptions
  • Reduces hardware and energy costs
  • Different plans for different staff
  • Multi-device usage on up to 5 devices per user

Pricing

£0.01 per unit

  • Education pricing available

Service documents

Framework

G-Cloud 11

Service ID

7 1 3 4 3 4 6 8 6 1 8 9 4 9 7

Contact

Cantium Business Solutions

Bids Cantium

03000411115

bids@cantium.solutions

Service scope

Service constraints
N/A
System requirements
N/A

User support

Email or online ticketing support
Email or online ticketing
Support response times
P1 - Entire site/multiple site outage: Network, Telephony or Internet Target Response - 20 Minutes Target Resolution - 6 Hours P2 - Critical Support Incident, Service Affecting over 50% users down Target Response - 1 Hour Target Resolution - 10 Hours P3 - Urgent support incident, service affecting more than 1-50% of users Target Response - 1 Working Day Target Resolution - 3 Working Days P4 Target Response - 1 Working Day Target Resolution - 4 Days Support incident, single user down P5 - Non-service affecting fault Target Response - 2 Working Days Target Resolution - 5 Working Days
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Onsite support
Support levels
We provide a standard support service delivering to the following SLA:

P1 - Entire site/multiple site outage: Network, Telephony or Internet Target Response - 20 Minutes Target Resolution - 6 Hours P2 - Critical Support Incident, Service Affecting over 50% users down Target Response - 1 Hour Target Resolution - 10 Hours P3 - Urgent support incident, service affecting more than 1-50% of users Target Response - 1 Working Day Target Resolution - 3 Working Days P4 Target Response - 1 Working Day Target Resolution - 4 Days Support incident, single user down P5 - Non-service affecting fault Target Response - 2 Working Days Target Resolution - 5 Working Days

Onsite support may be required with response times varying depending on location and priority level
Support available to third parties
No

Onboarding and offboarding

Getting started
Dedicated onboarding team who will produce a project plan highlighting the tasks and timeframes from data gathering to implementation. Onboarding Officer will arrange a project initiation meeting, completing a client checklist from which they will produce a project plan that is specific for each client and takes into consideration any anomalies which could impact the delivery timeframes, amending the project plan accordingly. The project plan will be maintained by the Onboarding Officer and will be reviewed weekly. Training and support is provided as required in order to access any systems systems. Cantium will provide you with a standard template for easy data collection and migration. We will undertake to upload this template and will then validate and check once the upload has been completed. We will work closely with you to resolve any identified discrepancies through the provision of a validation report that covers information relating to individuals and your organization. Quality assurance and testing forms part of our onboarding project plan.
Service documentation
Yes
Documentation formats
  • PDF
  • Other
Other documentation formats
  • Word
  • Hard Copy
End-of-contract data extraction
This is provided in an agreed format at the end of the contract through our established off boarding process. The data is usually provided in excel format (CSV) as standard although other formats may be available upon request.
End-of-contract process
Following notification of cancellation we will engage with the customer to confirm the termination date and agree timeframes for supplying the customers information to them. If additional/bespoke reporting requirements are requested this would be costed on a POA basis and provided as required.

Using the service

Web browser interface
No
API
No
Command line interface
No

Scaling

Scaling available
Yes
Scaling type
  • Automatic
  • Manual
Independence of resources
Our hosting environment automatically scales to accommodate usage and extensive workforce planning is undertaken to ensure suitable support resources are available during peak times.
Usage notifications
No

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • Memory
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Microsoft O365

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Deleted data can’t be directly accessed
  • Hardware containing data is completely destroyed
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery
Yes
What’s backed up
Data Warehouse (upon request)
Backup controls
Determined at the outset of the service with the customer
Datacentre setup
Multiple datacentres
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection within supplier network
Cantium Business Solutions will work with clients to determine appropriate network security and firewall settings to ensure service availability while preventing any unauthorized internal or external access to customer data.

Availability and resilience

Guaranteed availability
SLAs for Azure Stack are available from Microsoft depending on the cloud service selected and the level of availability chosen during configuration
Approach to resilience
Azure stack can be configured at multiple locations with backup and recovery to the cloud or second stack site
Outage reporting
Website notification
direct email
telephone/account management team

Identity and authentication

User authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Access is managed through Azure RBAC controls configurable by the customer
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
British Assessment Bureau
ISO/IEC 27001 accreditation date
06/02/2019
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
Yes
Any other security certifications
Cyber Essentials

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
We utilise ITIL based processes and adhere to all requirements needed to meet ISO27001 accreditation

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We utilise ITIL based processes and adhere to all requirements needed to meet ISO27001 accreditation
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We utilise ITIL based processes and adhere to all requirements needed to meet ISO27001 accreditation
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We utilise ITIL based processes and adhere to all requirements needed to meet ISO27001 accreditation
Incident management type
Supplier-defined controls
Incident management approach
We utilise ITIL based processes and adhere to all requirements needed to meet ISO27001 accreditation

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
No

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
By utilising Microsoft Azure infrastructure the data-centres we use follow Microsoft's best practice for energy efficiency.

Pricing

Price
£0.01 per unit
Discount for educational organisations
Yes
Free trial available
No

Service documents

Return to top ↑