iomart Group Plc

Microsoft Office 365 - O365

Microsoft Office 365 (O365) enables work and collaboration from virtually anywhere. As a Tier 1 certified Microsoft CSP partner, iomart manages your complete Office 365 customer experience, from migration, O365 deployment and service including fully managed Skype for Business with advanced call handling, real-time historical monitoring and reporting services.

Features

  • File storage and sharing with 1TB storage/user
  • Business class email, calendar and contacts with a 50GB inbox
  • Office on tablets and phones, full and installed
  • Unlimited online meetings, IM and HD video conferencing
  • Enterprise management of apps with Group policy
  • Word, Excel, Powerpoint, Outlook, Publisher and OneNote
  • Skype for Business with advanced call handling
  • Skype includes real-time and historical monitoring and reporting services

Benefits

  • Outstanding service levels from our Microsoft accredited support staff
  • iomart ensures a seamless migration process
  • Collaborative working across your organisation
  • Familiar using experience
  • Truly mobile working solutions
  • Always up to date
  • Return on investment
  • Secure online storage
  • Fully managed Skype for Business

Pricing

£3.80 per user per month

Service documents

G-Cloud 9

743182769988846

iomart Group Plc

GCloud Team

01419316400

gcloud@iomart.com

Service scope

Service scope
Service constraints None
System requirements
  • Windows Server 2008 R2
  • Windows Server 2012
  • Windows 7
  • Windows 8
  • Mac OS X version 10.6 or later

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Severity 1 (Critical Service Incident) - Within 15 mins
Severity 2 (Critical Service Incident) - Within 15 mins
Severity 3 (Non-Critical Service Incident) - Within 1 hr
Severity 4 (Minor Support Request) - Within 2 hrs
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels Our support teams are available 24/7 to respond to alerts, take calls, make decisions and act to ensure that your services are operating effectively every second of the day. The support desk is accredited to ISO20000-2011 and ISO27001-2013 standards and brings together 250 technical operations staff employed to cover everything with a guaranteed qualified engineering response within 15 minutes of notice.
As part of our on-going commitment to service excellence iomart will assign a dedicated Account Manager (Service Delivery Manager) and Technical Manager to the client. Our approach to Account Management has been developed to provide a value added service to our customers. The Account Manager’s main role is to understand the core objectives of our clients’ businesses and ensure the services we are providing continually support the achievement of their goals.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Iomart provide a full onboarding service with supported online training supporting user documentation.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Data can be extracted/downloaded at any time and for any reason without any assistance from Microsoft.

Exchange Online data, including emails, calendar appointments, contacts, and tasks, can be downloaded to a local computer by any end user at any time via the Import and Export wizards.

SharePoint Online documents can be downloaded at any time from the workspace into your local computer.
End-of-contract process At the point of termination, all data, accounts and access will be permanently deleted, and will not be able to be recovered or restored.

It is the responsibility of the customer to remove all data prior to termination.

Additional costs driven by Microsoft may be applicable.

Using the service

Using the service
Web browser interface Yes
Using the web interface Iomart deliver service desk facilities primarily via the iomart customer control panel.
iomart provides customers with a web-based Control Panel, which provides a broad view of information and services surrounding their solution which allows authorised users to create and manage cloud services as well as raise, track and report on support tickets.
Web interface accessibility standard None or don’t know
How the web interface is accessible The web interface is compatible with standard Windows accessibility options
Web interface accessibility testing No testing has been completed with assistive technology users.
API No
Command line interface No

Scaling

Scaling
Scaling available Yes
Scaling type Manual
Independence of resources Office365 is a highly available and easily scalable with high capacity for large numbers of users
Usage notifications Yes
Usage reporting Email

Analytics

Analytics
Infrastructure or application metrics Yes
Metrics types Other
Other metrics
  • Email activity report
  • Office activations report
  • SharePoint site usage report
  • OneDrive for Business usage report
  • Skype for Business report
  • Yammer report
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Reseller providing extra features and support
Organisation whose services are being resold Microsoft

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach In-house
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
  • Hardware containing data is completely destroyed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Backup and recovery No

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Bonded fibre optic connections
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Monthly Uptime Percentage <99.9% = 25% Service credit <99% = 50% Service credit <95% = 100%
Approach to resilience Delivering services at huge scale requires a radically different approach to designing, building, deploying and operating datacenters. When software applications are built as distributed systems, every aspect of the physical environment — from the server design to the building itself — creates an opportunity to drive systems integration for greater reliability, scalability, efficiency and sustainability
Outage reporting Email alerts

Identity and authentication

Identity and authentication
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Access to all service interfaces (for consumers and providers) is constrained to authenticated and authorised individuals.
Remote management access is authenticated and directly associated to authorised individuals rather than group accounts
All managed systems monitored and access logged and tracked for auditing purposes
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device on a government network (for example PSN)
  • Dedicated device over multiple services or networks
  • Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 ISOQAR
ISO/IEC 27001 accreditation date 18/12/2008
What the ISO/IEC 27001 doesn’t cover As detailed within the SOA
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations Yes
Any other security accreditations Cyber Essentials

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation Yes
Security governance standards ISO/IEC 27001
Information security policies and processes The iomart Group adheres to the Security Classification Definitions as described in the Government Security Classifications Policy (GSCP). This is outlined and defined in section 5.3 of the iomart Quality Manual and forms part of iomarts overall integrated management system, which consists of UKAS / APMG / NCSC accredited systems. Notably; ISO 27001:2013 Information Security Management; ISO 20000-1:2011 IT Service Management; ISO 9001:2015 Quality Management; ISO 14001:2015 Environmental Management and NCSC compliance for iomarts Cloudsure service. All are regularly audited for compliance by an accredited certifying body.
These standards require iomart to have robust controls in place to manage data, documents and records. Showing that iomart has appropriate and measured controls in place to manage OFFICIAL information that if lost, stolen or published in the media could have more damaging consequences (for individuals, an organisation or government generally).
All iomart Data Centres and have been independently assessed on a number of occasions by local authorities and UK Government Departments, Senior Information Risk Owner’s (SIRO) as suitable for holding and processing their sensitive information to OFFICIAL level.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach Our change management processes are in line with ISO27001 control A.12.2
Controlled mechanism for making changes to the operational environment are in place.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Iomart vulnerability management process is aligned with ISO27001:2013 control A12.6.1 which addresses 3 key areas:
• Timely identification of vulnerabilities
• Assessment of or exposure to a vulnerability
• Defined measures to address the risk
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach Iomart Protective Monitoring process is aligned with ISO27001:2013 control A.12.4 which details:

• Event Logging
• Protection of log information
• Admin & operator logs
• Clock synchronisation
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach Iomart incident management is aligned with ISO27001:2013 subsection A.16.1
Full incident management procedure
Responsibilities & procedures
Assessment of and decision on security events
Response process
Evidence collection
Learning from incidents

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart Yes
Who implements virtualisation Supplier
Virtualisation technologies used Other
Other virtualisation technology used Microsoft Azure Hypervisor
How shared infrastructure is kept separate Microsoft cloud services, including Office 365, were designed with the assumption that all tenants are potentially hostile to all other tenants. Thus, multiple forms of protection have been implemented throughout Office 365 to prevent customers from compromising Office 365 services or applications, or gaining unauthorized access to the information of other tenants or the Office 365 system itself.

Energy efficiency

Energy efficiency
Energy-efficient datacentres No

Pricing

Pricing
Price £3.80 per user per month
Discount for educational organisations No
Free trial available Yes
Description of free trial Iomart can provide a POC of the service
Link to free trial https://products.office.com/en-gb/try

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑