Phoenix Software Ltd

AvePoint Policies and Insights for Microsoft 365

Secure Microsoft 365 Teams, Groups, SharePoint, and OneDrive with ease. Reduce IT’s security burden. Easily find, prioritize, fix, and enforce controls for permissions, membership, and configuration. All your workspaces, completely secure.

Features

  • Security search gives insight into Team, Group, SharePoint, OneDrive permissions
  • Actionable insights -- expire, remove, or edit permissions from reports
  • Set access policies for external users based on workspace metadata
  • Highlight known and potential security issues, prioritized by content sensitivity
  • Define risk w/ Microsoft sensitive info types for industry, region
  • Monitor for, automatically notify, or adjust unauthorised or outofpolicy changes.
  • Security dashboards track exposure, anonymous links, external users over time
  • Add, edit, expire, remove permissions for sensitive workspaces or files
  • Heatmaps aggregate exposed content with sensitive information across Microsoft365
  • 20+ OOTB rules can be used for automatic policy enforcement

Benefits

  • Enable central monitoring over Microsoft 365 security
  • Get critical security insights for Teams, Groups, Sites, OneDrive
  • Easily identify exposure -- anonymous links or Teams' shadow users
  • Highlight gaps between your intended governance policies and current state.
  • Automatically resolve violations and report on or repair unauthorized changes.
  • Cut through the noise. Admins focus on critical security issues
  • Build policies based on insights and best practices, enforce guidelines
  • Revert or notify of configuration drift and security issues automatically
  • Built to scale: get insights and apply batch fixes fast
  • Maintain record of adoption and exposure over time via dashboards

Pricing

£6.50 a user

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at gcloud@phoenixs.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

8 1 6 3 9 6 0 0 5 3 2 9 9 8 7

Contact

Phoenix Software Ltd Jonny Scott
Telephone: 01904 562200
Email: gcloud@phoenixs.co.uk

Service scope

Software add-on or extension
Yes
What software services is the service an extension to
Office 365, Microsoft 365
Cloud deployment model
Public cloud
Service constraints
N/A
System requirements
  • The architecture comprises a manager and agents and
  • Requirements are defined in the user guide.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Telephone requests are immediate, other methods will be within 2 hours or more dependant on the severity of the request. For more information https://avepoint.com/products/support.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
This is available through https://www.avepoint.com/products/support
Web chat accessibility testing
AvePoint conducts extensive Quality Assurance before any release, and follows industry best practices for Accessibility. For further details, contact AvePoint.
Onsite support
Yes, at extra cost
Support levels
We provide - Low, Medium, High and Very High levels, more information can be found at https://www.avepoint.com/products/support
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Onboarding services are defined and agreed in a Statement of Work
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Customers own their own data. Compliance Guardian is run in fully customer controlled environments, and stores data in designated locations.
End-of-contract process
The functionality will stop working and the customers obligations will end. Where applicable customer data can be exported.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Yes
Compatible operating systems
Windows
Designed for use on mobile devices
No
Service interface
Yes
Description of service interface
The interface is menu-driven and provides access to all the functionality provided by Compliance Guardian.
Accessibility standards
WCAG 2.1 A
Accessibility testing
Access via URL where management interface is installed
API
Yes
What users can and can't do using the API
APIs will allow configuration and scaning against data souces that are not available out of the box.
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
No
Customisation available
No

Scaling

Independence of resources
The deployment architecture is designed based on specific demand forecast on a per customer basis.
.

Analytics

Service usage metrics
Yes
Metrics types
Compliance Guardian works with AvePoint's extended Compliance Solutions to provide a heat map that provides additional actionable context about the document including: how old is the document, who authored it, how many times has it been accessed, who can access it, who has accessed it, and what have they done with it. In this way, organizations can take specific steps to protect and mitigate their risk.
Reporting types
Real-time dashboards

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least every 6 months
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
N/A
Data export formats
Other
Other data export formats
N/A
Data import formats
Other
Other data import formats
N/A

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
Other
Other protection within supplier network
AvePoint leverages Microsoft Azure for hosting it's cloud service, which uses TLS.

Availability and resilience

Guaranteed availability
Availability is set within the SLA
Approach to resilience
AvePoint leverages Microsoft Azure for hosting it's cloud service, which has a number of data centers for HA. CB - Availability of Compliance Guardian can be dependent on a number of components that might be cloud-based or on-premise depending on which sources are in-scope. AvePoint leverages Microsoft Azure for hosting it's cloud service, which has a number of data centers to support HA environments. For components of Compliance Guardian that are deployed within the customers network, availability will be reliant upon redundancy and disaster recovery planning.
Outage reporting
AvePoint will notify customer's of any outtages or service interruptions.

Identity and authentication

User authentication needed
Yes
User authentication
2-factor authentication
Access restrictions in management interfaces and support channels
All authentication is carried out against Microsoft Azure or any support Azure authentication method
Access restriction testing frequency
At least every 6 months
Management access authentication
Identity federation with existing provider (for example Google Apps)

Audit information for users

Access to user activity audit information
Users receive audit information on a regular basis
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
ControlCase
ISO/IEC 27001 accreditation date
29/06/2018
What the ISO/IEC 27001 doesn’t cover
N/a
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
No
Security governance certified
No
Security governance approach
N/A
Information security policies and processes
N/A

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Change Management is documented, requested, reviewed, approved, tested, and finally rollowed out during off hours in order to have minimal effect on customers.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We subscribe to security bulletins and stauy abreast of recent 0 day vulnerabiltiies as well as maintaining an active patch cycle
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We leverage the Azure Health Status page as well as service monitoring. Please refer to Azure documentation https://docs.microsoft.com/en-us/azure/best-practices-network-security for details. Customers are notified via Administrative Console alerts or directly by Customer Success as threats are identified, with proposed course of action.
Incident management type
Supplier-defined controls
Incident management approach
Long standing experienced help-desk available 24x7, backed by breach management procedures to notify customers, post information publicly when necessary, and dedicate development resources to a swift resolution.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Pricing

Price
£6.50 a user
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
It is possible to trial the product for a limited period.
Link to free trial
https://www.avepoint.com/uk/products/hybrid/compliance-guardian Please contact Sales_UK@AvePoint.com to intitate a trial.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at gcloud@phoenixs.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.