Optisource Technology Solutions Limited

G-Suite Setup, Admin and Support

Service is to setup, configure, administer and support G-Suite enterprise solutions

Features

  • Easy to Use software
  • Familiar interface
  • Backed by one of the biggest brands in the world
  • Secure Platform

Benefits

  • Accessible from anywhere
  • Give you user base an already familiar interface
  • Flexible pricing structure
  • Manage content on the move

Pricing

£500 per instance per month

Service documents

Framework

G-Cloud 11

Service ID

8 7 2 1 8 5 4 1 0 4 1 8 0 5 3

Contact

Optisource Technology Solutions Limited

Digital Transformation Team

0121 2275019

Contact@optisourcetech.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints None it is delivered in a Software as A Service
System requirements Internet enabled device

User support

User support
Email or online ticketing support Email or online ticketing
Support response times 8hrs Weekday
24hrs Weekend
User can manage status and priority of support tickets No
Phone support No
Web chat support No
Onsite support Yes, at extra cost
Support levels Standard Remote support is included in every package.
Onsite Support is quoted separately and this is context dependent as we factor in team/org size, location , workload etc.
Each account is assigned a technical account manager
Each account is assigned a super admin
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started We provide comprehensive user documentation in print and digital format as standard. Online and onsite training can be arranged at an additional cost.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Data can be exported in a portable format.
End-of-contract process Buyers are required to give a month's notice to cancel the contract. During this time we will do everything possible to support data export.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Screen size is the main difference as the service is delivered as SaaS
Service interface Yes
Description of service interface Standard Google User Interface
Accessibility standards None or don’t know
Description of accessibility https://www.google.com/drive/accessibility/
https://www.google.com/docs/about/accessibility/
https://www.google.com/sheets/about/accessibility/
https://www.google.com/slides/about/accessibility/
https://www.google.com/forms/about/accessibility/
https://www.google.com/sites/accessibility.html
https://www.google.com/intl/en_us/mail/help/accessibility.html
Accessibility testing https://www.google.com/drive/accessibility/
https://www.google.com/docs/about/accessibility/
https://www.google.com/sheets/about/accessibility/
https://www.google.com/slides/about/accessibility/
https://www.google.com/forms/about/accessibility/
https://www.google.com/sites/accessibility.html
https://www.google.com/intl/en_us/mail/help/accessibility.html
API Yes
What users can and can't do using the API The link below is a comprehensive overview of Google APIs
https://developers.google.com/gsuite/aspects/apis/overview
API documentation Yes
API documentation formats HTML
API sandbox or test environment Yes
Customisation available Yes
Description of customisation The service set can be extended with applications from the Google Market Place

Scaling

Scaling
Independence of resources Being a cloud based solution backed by infrastructure on the scale of those provided by Google, scalability is not an issue.

Analytics

Analytics
Service usage metrics Yes
Metrics types GSuite has a built in usage dashboard which organisation admins can use to monitor use and trends
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Reseller providing extra features and support
Organisation whose services are being resold Google

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Google has introduced a data export facility. https://gsuiteupdates.googleblog.com/2018/05/export-all-your-g-suite-data-in-one-step.html We will support the buyer to use this service.
Data export formats Other
Other data export formats
  • ZIP
  • TGZ
  • VCard
  • Pdf
  • Doc.x
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Buyers have a guarantee of the level of service provided by Google
Approach to resilience Gsuite runs on Google infrastructure which is designed to be scalable and resilient.
Outage reporting There is a public dashboard on Gsuite
An email alert can be set up

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels Strong identity management based on Google's authentication system
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach We leverage off the checklist and controls prescribed in the NIST standards.
Information security policies and processes NIST SP 800-100

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach .
Vulnerability management type Supplier-defined controls
Vulnerability management approach We rely on NIST SP 800-100 to guide our vulnerability management services. All our hardware are part of a patch management program and are configured to automatically apply critical updates.
We have a cyber security arm of our company and we constantly perform vulnerability testing on our in-house infrastructure.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach NIST information security SP800-100
Incident management type Supplier-defined controls
Incident management approach NIST information security SP800-100

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £500 per instance per month
Discount for educational organisations No
Free trial available No

Service documents

Return to top ↑