Incremental Group

Microsoft Dynamics 365 Business Central Services

Dynamics 365 Business Central is Microsoft’s all in one business application. Dynamics 365 Business Central unifies ERP and CRM capabilities allowing you to run your entire business with intelligent applications that work seamlessly together in the cloud. Dynamics 365 Business Central also integrates with Windows, Office 365, PowerBI and PowerApps.

Features

  • Dynamics 365 is an all in one business system
  • Strong finance functionality in Dynamics 365 Business Central
  • Optimise your operations and supply chain with Dynamics 365
  • Manage your sales pipeline and track opportunities
  • Keep projects on time and in budget in Dynamics 365
  • Manufacture your products with Dynamics 365 Business Central
  • Case and service management functionality in Dynamics 365
  • Business Central is cloud based solution with hybrid option available
  • Dynamics 365 Business Central is accesible anywhere on any device
  • Built in Intelligence dashboards, recommendations and reports

Benefits

  • No user minimum, start as small as you need
  • Full flexibility, add users and capability as you need
  • Extend the functionality using third party Solutions
  • Role based security and GDPR compliant features
  • Great visual interface and user experience
  • Get greater insights into your organisation with built-in Intelligence
  • All costs are covered in the subscription including hosting
  • Dynamics 365 Business Central never goes out of date
  • New features and updates done monthly
  • Full integration with Microsoft solutions including Office 365

Pricing

£375 to £1400 per person per day

  • Education pricing available
  • Free trial available

Service documents

Framework

G-Cloud 11

Service ID

8 9 6 7 4 4 4 0 2 0 3 0 5 1 3

Contact

Incremental Group

Iain Cherry

03455653000

enquiries@incrementalgroup.co.uk

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Microsoft Dynamics 365 and Bespoke Application Development
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
No immediate constraints.
System requirements
  • Dependency that appropriate licensing is procured.
  • System requirements are dependent on each individual project.

User support

Email or online ticketing support
Email or online ticketing
Support response times
All SLAs and response times are agreed with customers and aligned to their specific requirements.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Onsite support
Support levels
Support Levels, Technical Account Management and all associated costs are agreed separately with customers in line with their support requirements, however all support models are available e.g. 24/7, Core Hours, Emergency Out of Hours. Additionally, Technical Account Management and Cloud Support Engineer services are also available.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Governance Model – agreement on the most suitable governance model to meet the requirements of the engagement; • Delivery approach – agreement on whether an agile, waterfall or hybrid approach is best suited to the project; • Elaboration – engagement with suitably empowered individuals from our Customer with whom we can capture functional and non-functional requirements; • Commercial – finalise the commercial terms of the engagement with the Customer including agreement on delivery milestones.
Service documentation
Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction
All existing and created data in relation to the services in question will remain the property of the customer. Data will be extracted in an agreed format and within agreed timescales as specified in Incremental Groups Exit Plan issued at the start of each project.
End-of-contract process
Upon service commencement, Incremental Group provides an agreed and complete Exit Plan tailored to the specific requirements of each individual customer including details of any additional costs and payment principals. All costs associated with the specified services will be articulated and approved with the customer upon project commencement.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
There is no functional difference between our mobile and desktop service.
Service interface
Yes
Description of service interface
Customers or employees can submit requests with an easy-to-use help center and add Confluence to Jira Service Desk to get an integrated knowledge base. Machine learning intelligently recommends the right service and learns from every interaction, so answers are easy to find. The Jira interface is accessible on desktop, Laptop, Mobile and tablet devices.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
N/A
API
Yes
What users can and can't do using the API
All API services are agreed separately with customers in line with their requirements
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • ODF
  • PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
All customization requirements are agreed separately with Customers in line with their requirements.

Scaling

Independence of resources
Incremental Group provides a flexible and scalable service in order to meet the fluctuations in demand for each individual service. These services are underpinned by a set of pre-agreed SLAs with each individual customer, ensuring continuity of the services being provided.

Analytics

Service usage metrics
Yes
Metrics types
Service Metrics and reporting is agreed with customers in line with their individual requirements.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Microsoft

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
All requirements for data export are agreed separately with Customers in line with their requirements.
Data export formats
  • CSV
  • ODF
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data protection between buyer and supplier networks
IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Incremental Group provides up to 99.99% availability. All availability requirements, including SLAs are agreed with customers in line with their individual requirement.
Approach to resilience
This information is available upon request.
Outage reporting
Outage reporting methods include but are not limited to Public Dashboards, APIs and Email Alerts. All reporting arrangements are agreed with customers in line with their individual requirements.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
It is standard Incremental Group policy to define and implement access restrictions in management interfaces and support channels. with each customer’s specific requirement.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Alcumus ISOQAR
ISO/IEC 27001 accreditation date
04/12/2017
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
Yes
Any other security certifications
  • ISO:9001
  • Cyber Essentials

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Incremental Group has designed detailed policies for information security with ultimate responsibility resting with our Senior Management Team i.e. our Chief Executive Officer, Chief Commercial Officer and Chief Financial Officer.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Incremental Group follows a rigorous ITILv3 aligned Configuration and Change Management process to ensure and maintain the integrity of services throughout their lifetime. We work with customers to ensure that changes and configurations are performed in line with agreed Change Management processes to reduce overall risk. As part of the overall contract governance, we propose that a Change Advisory Board (CAB) is established that approves proposed changes and assists in the security assessment and prioritization of any changes. The CAB should be composed of major stakeholders impacted by potential changes to the services and technical staff responsible for the system.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Our approach to vulnerability management is agreed separately with Customers in line with their requirements. In all cases our approach is designed to offer our customers optimal security.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Incremental Group is technology agnostic and utilises the most fit for purpose tool for protective monitoring. We use tools such as SCOM and Solarwinds and we work with customers to identify the most optimal monitoring solution for their requirements, including using already existing tool-sets available.
Incident management type
Supplier-defined controls
Incident management approach
Incremental Group provides end-to-end incident management and request fulfillment for all incidents and employs ITILv3 aligned processes to ensure that all incidents and requests are logged, categorized, prioritized and tracked consistently, in line with agreed SLAs. Incidents are reported by users via our Service Management Tool and these are then: • Logged; • Reviewed; • Progressed; • Resolved; and • Closed. Incident Management reports can be provided as regularly as weekly and will be issued in a format as agreed with each individual customer.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
Yes
Connected networks
  • Public Services Network (PSN)
  • Police National Network (PNN)
  • NHS Network (N3)
  • Joint Academic Network (JANET)
  • Scottish Wide Area Network (SWAN)
  • Health and Social Care Network (HSCN)

Pricing

Price
£375 to £1400 per person per day
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Trail versions of this service, including the features available and length of the trial is agreed with customers individually.

Service documents

Return to top ↑