SharePoint Custom Application Support
Migration, Support, Development: o365 • SharePoint • PowerBI • Skype for Business • Project Management Office (PMO) • Records Management • Intranet, Continuous Improvement BI - • .Net Development
Features
- SharePoint and o365 setup migration support development consultancy services
- Migration to SharePoint from other document management systems or products
- SharePoint Document Management
- SharePoint Intranet
- SharePoint Workflow
Benefits
- Driving digital transformation
- Removing cost from the business
- Improved process management
- Improved efficiency
- Improved Planning and Reporting
- Continuous improvement
- Improving customer service
- Collaboraiton inside and outside of an organisation
- Meeting Legislation requirements
- Audit and compliance
Pricing
£1,000 an instance
- Education pricing available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at snewman@appetiteforbusiness.com.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 11
Service ID
8 0 8 7 3 2 9 5 8 7 2 6 5 4 3
Contact
Appetite for Business Ltd
Sheryl Newman
Telephone: 01224-824111
Email: snewman@appetiteforbusiness.com
Service scope
- Software add-on or extension
- Yes
- What software services is the service an extension to
- Can also be used as a standalone service
- Cloud deployment model
- Public cloud
- Service constraints
- None
- System requirements
-
- SharePoint hosted
- PowerBI hosted
- CRM hosted
- Windows Server
- SQL server
- Linux
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Azure services are available 24 x 7
• 99.9% availability
• SLA’s can be tailored and agreed to customer requirements, and flexed on a daily bases, as business requirements dictate - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Microsoft Teams instant messaging.
- Web chat accessibility testing
- NA
- Onsite support
- Yes, at extra cost
- Support levels
-
• Azure services are available 24 x 7
• 99.9% availability
• SLA’s can be tailored and agreed to customer requirements, and flexed on a daily bases, as business requirements dictate - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Tailored to customer's requirements
- Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
-
- Micro Videos
- Guides
- End-of-contract data extraction
- Tailored to customer's requirements
- End-of-contract process
- Tailored to customer's requirements
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 10
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari 9+
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The service is optimised for mobile, desktop and tablet use and there are difference. Core functionality is available across all platforms. See https://support.office.com/en-us/article/Office-Online-browser-support-AD1303E0-A318-47AA-B409-D3A5EB44E452.
- Service interface
- No
- API
- Yes
- What users can and can't do using the API
- The full API details are available online at dev.office.com.
- API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Please see https://technet.microsoft.com/en-us/office/dn788774.aspx.
Scaling
- Independence of resources
- Backed by Microsoft's Investment and SLA's
Analytics
- Service usage metrics
- Yes
- Metrics types
- Please see the Business admins section found at https://support.office.com/en-gb.
- Reporting types
-
- API access
- Real-time dashboards
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Microsoft and Flowforma
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- EU-US Privacy Shield agreement locations
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Other
- Other data at rest protection approach
- For data at rest, Office 365 deploys BitLocker with AES 256-bit encryption on services that hold all messaging data, including email and IM conversations, as well as content stored in SharePoint Online and OneDrive for Business. BitLocker volume encryption addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computer and disks. An organisation's files are distributed across multiple Azure Storage containers, each with separate credentials, rather than storing them in a single database.
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Please see https://products.office.com/en-us/business/office-365-online-data-portability.
- Data export formats
-
- CSV
- Other
- Other data export formats
- See https://products.office.com/en-us/business/office-365-online-data-portability
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
- Please see http://fasttrack.microsoft.com/office/onboard/50
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
- Other
- Other protection between networks
- For data in transit, all customer-facing servers negotiate a secure session by using TLS/SSL with client machines to secure the customer data. This applies to protocols on any device used by clients, such as Skype for Business Online, Outlook, and Outlook on the web. See also http://aka/ms/Office365CE.
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection within supplier network
- Please see http://aka/ms/Office365TI and http://aka.ms/Office365CE.
Availability and resilience
- Guaranteed availability
- See https://www.microsoftvolumelicensing.com/Downloader.aspx?Documentld=13655
- Approach to resilience
-
Please see http://aka.ms/Office365DR
Failover Data Centres - 3 across the UK - Outage reporting
- Via the service status portal; emails
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Controls are built in to Microsoft Office 365 and, therefore, various configurations can be complied in relation to security.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Microsoft has strict security governance in place. We ensure that we have Confidentiality & Non-Disclosure Agreements (NDAs) and Data Sharing Agreements in place.
- Information security policies and processes
- We have robust security policies and procedures in place, which comply with BS ISO 27001 Information Security Management, which form part of our Integrated Management System. Our policies and procedures are strictly adhered too and are effectively managed at a senior level within the organisation, i.e. Managing Director.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Microsoft Sharepoint are responsibility for any configurations and change management processes.
There is a dedicated change management module process within our support team, integrated with the configuration, knowledge base,
• Initiate change request
• Validate change request including security
• Assess and plan change (operational)
• Approve change implementation
• Execute and complete change
• Status reporting
• Review post implementation and close change. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Microsoft SharePoint are responsibility for their vulnerability management process.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Microsoft SharePoint are responsibility for the protective monitoring processes.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Our incident management procedure forms part of our Integrated Management System, which complies with BS ISO 9001 and BS ISO 27001. Our procedure details our pre-defined processes for common events, how users report incidents and how our users access incident reports. A copy of our incident management procedure can be provided upon request.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £1,000 an instance
- Discount for educational organisations
- Yes
- Free trial available
- No
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at snewman@appetiteforbusiness.com.
Tell them what format you need. It will help if you say what assistive technology you use.