Cetus Solutions Limited

Cetus365

Office 365 is becoming the de facto standard for collaboration and data management for many organisations. The challenge is the pace of change within the platform and the ability for organisations to extract maximum value. Cetus 365 combines technical solutions, our expertise and experience to ensure adoption is widespread

Features

  • Managed Office 365 from deployment to backup, governance and compliance
  • Service integration support to drive value from 365 subscriptions
  • End user enablement portal to drive adoption and increase skills
  • Integrated threat protection, secure users from email, teams, OneDrive threats
  • Support to augment existing teams, 3rd line to fully managed
  • 365 backup to ensure protection from data loss, corruption, deletion
  • Office 365 Governance and Compliance options to ensure controlled adoption
  • Security reviews ensure features are configured to best practices
  • Simple monthly billing with self service portal for granular control
  • Email continuity and archiving options to meet compliance requirements

Benefits

  • Remove the complexity of keeping pace with Microsoft 365 services
  • Ensure protection and continuity of critical email and collaboration services
  • Empower users to leverage the 365 platform and collaborate freely
  • Governance services control MS Teams sprawl and apply data compliance
  • Protection from email & file threats across the 365 platform
  • Provide email continuity services in the event of 365 outages
  • Leverage wider 365 services, DLP, information protection and CASB etc
  • Microsoft 365 Adoption & Change Management to increase ROI
  • Executive identity protection against phishing or impersonation attacks
  • GDPR data discovery and compliance features underpinned by Microsoft 365

Pricing

£10 a user

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at salesgroup@cetus-solutions.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

8 5 2 2 3 8 7 3 6 8 2 4 1 9 9

Contact

Cetus Solutions Limited Sales Group
Telephone: 0161 848 4315
Email: salesgroup@cetus-solutions.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
O365, EM&S, Windows10, Email Security, User Training, Cyber Awareness training, Backup.
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
None
System requirements
  • Windows 10
  • MAC OS
  • IOS
  • Android

User support

Email or online ticketing support
Email or online ticketing
Support response times
24x7
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Web Interface accessibility will be defined upon contract agreement.
Web chat accessibility testing
None
Onsite support
Yes, at extra cost
Support levels
Four levels of support are offered as per below: Essential: Cetus works with customer to complete diagnostics and issue resolution. Customer implements change with Cetus remote assistance. Advanced: Cetus works with customer to complete diagnostics and issue resolution. Customer implements change with Cetus remote assistance. Enterprise: Cetus to complete diagnostics and implement fix subject to customer approval. Customer owns change control and decision process. Fully Managed: Cetus completed diagnostics and implements resolution. Cetus liaise with customer to complete change control procedures where appropriate. Enterprise and Fully Managed Contracts include a Service Delivery Manager. POA
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Full service on boarding including migration and training are provided as part of the service. Exact levels are defined as part of the contract
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
Data is held in Microsoft Azure and is subject to Microsoft service data extraction policies. Tenants can be transferred to the customer at contract end to ease off boarding
End-of-contract process
All costs associated with the specified services will be articulated and approved upon project commencement.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Microsoft optimise each 365 application for mobile use to enable easy end user interaction
Service interface
No
API
Yes
What users can and can't do using the API
The services provides a API that can be used to query and manage the service, functions are dependant on exact options contracted for.
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
Services Levels for support both end user and ICT can be chosen. features and functions of the various M365 SKU can be chosen

Scaling

Independence of resources
Each customer is provided a dedicated tenant for services to ensure separation and performance.

Analytics

Service usage metrics
Yes
Metrics types
Usage and adoption metrics are provided as a service dashboard.
Reporting types
Real-time dashboards

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Microsoft

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Data can be exported in multiple formats as required and can be agreed with your service delivery manager during the off boarding process
Data export formats
  • CSV
  • Other
Other data export formats
  • PST
  • Native document formats
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
SLA is a minimum of 99.9 and can be greater dependant on the exact service contracted for. Service credits are defined as part of the contract on boarding
Approach to resilience
This information is available on request
Outage reporting
Outages are reported via dashboard and email alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
Access restrictions in management interfaces and support channels
All management interfaces and support channels are accessed via named accounts conforming to multi factor authentication. This includes, web, API and CLI access
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Cetus has documented security policies and procedures in place to ensure the confidentiality, availability, and integrity of the system. We have appointed senior personnel and teams that ensure the proper and total implementation of our security policies and procedures across the entire organisation. Our security policies includes the organizational structure of the organisation's security team and its responsibilities, principles, security incident response procedures, access policies, security vetting requirements, onboarding and offboarding procedures, and data and systems security.
We hold ISO9001 and are working towards ISO 27001 and Cyber Essentials Plus.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Configuration and change management are variable based on the service options chosen. The exact process will be defined as part of service on boarding
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Vulnerability management are variable based on the service options chosen. The exact process will be defined as part of service on boarding
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Proactive Monitoring is variable based on the service options chosen. The exact process will be defined as part of service on boarding
Incident management type
Supplier-defined controls
Incident management approach
Incident management are variable based on the service options chosen. The exact process will be defined as part of service on boarding

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
Yes
Connected networks
  • Public Services Network (PSN)
  • Police National Network (PNN)
  • NHS Network (N3)
  • Health and Social Care Network (HSCN)

Pricing

Price
£10 a user
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at salesgroup@cetus-solutions.com. Tell them what format you need. It will help if you say what assistive technology you use.