Cantium Business Solutions

Microsoft InTune Hosting Services

Cantium Business Solutions have Microsoft certified staff that work with our customers to provide a tailor-made InTune hosting solutions that fits within the desired budget while still being able to meet the business needs.Using Microsoft Cloud solutions we provide a flexible and cost-efficient cloud strategy.

Features

  • InTune migrate for detailed assessments prior to migration
  • High Availability with Availability Sets and Availability Zones
  • Mobile Services with Intune
  • Business Analytics
  • Scale Sets to allow on the fly scaling of resources
  • Manage IT environments with unified infrastructure when integrated with SCCM
  • Provides the ability to remote wipe devices
  • Ensures devices are in an acceptable security state before deployment
  • Prepare devices for efficient deployment of Office 365/other software

Benefits

  • Outstanding service levels from our Microsoft accredited support staff
  • Deployable anywhere with Azure Stack
  • Compliancy reports from built in Advisor
  • Automatic patching of hardware by Microsoft
  • Huge savings by rights sizing VMs and created Reserved Instances
  • Support moving from IaaS to PaaS and SaaS solutions
  • New features constantly being rolled out
  • Policy, security, software management and self service delivery
  • Mobile device management (MDM)
  • Mobile application management (MAM)

Pricing

£0.01 per person

  • Education pricing available

Service documents

Framework

G-Cloud 11

Service ID

8 6 3 7 9 9 5 1 1 4 3 2 4 3 7

Contact

Cantium Business Solutions

Bids Cantium

03000411115

bids@cantium.solutions

Service scope

Service constraints
N/A
System requirements
N/A

User support

Email or online ticketing support
Email or online ticketing
Support response times
P1 - Entire site/multiple site outage: Network, Telephony or Internet
Target Response - 20 Minutes
Target Resolution - 6 Hours

P2 - Critical Support Incident, Service Affecting over 50% users down
Target Response - 1 Hour
Target Resolution - 10 Hours

P3 - Urgent support incident, service affecting more than 1-50% of users
Target Response - 1 Working Day
Target Resolution - 3 Working Days

P4
Target Response - 1 Working Day
Target Resolution - 4 Days
Support incident, single user down

P5 - Non-service affecting fault
Target Response - 2 Working Days
Target Resolution - 5 Working Days
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Onsite support
Support levels
We provide a standard support service delivering to the following SLA:

P1 - Entire site/multiple site outage: Network, Telephony or Internet Target Response - 20 Minutes Target Resolution - 6 Hours P2 - Critical Support Incident, Service Affecting over 50% users down Target Response - 1 Hour Target Resolution - 10 Hours P3 - Urgent support incident, service affecting more than 1-50% of users Target Response - 1 Working Day Target Resolution - 3 Working Days P4 Target Response - 1 Working Day Target Resolution - 4 Days Support incident, single user down P5 - Non-service affecting fault Target Response - 2 Working Days Target Resolution - 5 Working Days

Onsite support may be required with response times varying depending on location and priority level
Support available to third parties
No

Onboarding and offboarding

Getting started
Dedicated onboarding team who will produce a project plan highlighting the tasks and timeframes from data gathering to implementation. Onboarding Officer will arrange a project initiation meeting, completing a client checklist from which they will produce a project plan that is specific for each client and takes into consideration any anomalies which could impact the delivery timeframes, amending the project plan accordingly. The project plan will be maintained by the Onboarding Officer and will be reviewed weekly. Training and support is provided as required in order to access any systems systems. Cantium will provide you with a standard template for easy data collection and migration.
We will undertake to upload this template and will then validate and check once the upload has been completed. We will work closely with you to resolve any identified discrepancies through the provision of a validation report that covers information relating to individuals and your organization. Quality assurance and testing forms part of our onboarding project plan.
Service documentation
Yes
Documentation formats
  • PDF
  • Other
Other documentation formats
  • Word
  • Hard Copy
End-of-contract data extraction
This is provided in an agreed format at the end of the contract through our established off boarding process. The data is usually provided in excel format (CSV) as standard although other formats may be available upon request.
End-of-contract process
Following notification of cancellation we will engage with the customer to confirm the termination date and agree timeframes for supplying the customers information to them. If additional/bespoke reporting requirements are requested this would be costed on a POA basis and provided as required.

Using the service

Web browser interface
No
API
No
Command line interface
No

Scaling

Scaling available
Yes
Scaling type
  • Automatic
  • Manual
Independence of resources
Our hosting environment automatically scales to accommodate usage and extensive workforce planning is undertaken to ensure suitable support resources are available during peak times.
Usage notifications
No

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • Memory
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Microsoft InTune

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Deleted data can’t be directly accessed
  • Hardware containing data is completely destroyed
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery
Yes
What’s backed up
Data Warehouse (upon request)
Backup controls
Determined at the outset of the service with the customer
Datacentre setup
Multiple datacentres
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection within supplier network
Cantium Business Solutions will work with clients to determine appropriate network security and firewall settings to ensure service availability while preventing any unauthorized internal or external access to customer data.

Availability and resilience

Guaranteed availability
SLAs for Azure Stack are available from Microsoft depending on the cloud service selected and the level of availability chosen during configuration
Approach to resilience
Azure stack can be configured at multiple locations with backup and recovery to the cloud or second stack site
Outage reporting
Website notification
direct email
telephone/account management team

Identity and authentication

User authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Access is managed through Azure RBAC controls configurable by the customer
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
British Assessment Bureau
ISO/IEC 27001 accreditation date
06/02/2019
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
Yes
Any other security certifications
Cyber Essentials

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
We utilise ITIL based processes and adhere to all requirements needed to meet ISO27001 accreditation

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We utilise ITIL based processes and adhere to all requirements needed to meet ISO27001 accreditation
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We utilise ITIL based processes and adhere to all requirements needed to meet ISO27001 accreditation
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We utilise ITIL based processes and adhere to all requirements needed to meet ISO27001 accreditation
Incident management type
Supplier-defined controls
Incident management approach
We utilise ITIL based processes and adhere to all requirements needed to meet ISO27001 accreditation

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
No

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
By utilising Microsoft Azure infrastructure the data-centres we use follow Microsoft's best practice for energy efficiency.

Pricing

Price
£0.01 per person
Discount for educational organisations
Yes
Free trial available
No

Service documents

Return to top ↑