Ideal Networks Ltd

Ideal CloudSuite: Office 365 Productivity Platform

A comprehensive Office 365 Productivity Platform to ensure that all enterprises can benefit from best-of-breed Identity & Access Management, SaaS, Public Cloud and email security and point-in-time Backup and Disaster Recovery as a Service


  • SSO to Office 365 with optional enforced Multi-Factor Authentication(MFA)
  • Single administration pane for user management including employee exits
  • Monitoring of cloud-hosted data including compliance and remediation tools
  • Protection from data leakage via shadow IT and SaaS usage
  • Point-in-time recovery of Exchange Online mailboxes, tasks and contacts
  • Endpoint protection for new threat sources


  • Single sign on for users
  • Single pane of glass user management
  • Full visibility of cloud operations
  • Cloud compliance and security
  • Back up of data that is not covered by SaaS
  • Visibility of shadow IT


£2.50 to £33.26 per user per month

Service documents

G-Cloud 10


Ideal Networks Ltd

Mike Henson

01273 957500

Service scope

Service scope
Software add-on or extension Yes
What software services is the service an extension to To Office 365
Cloud deployment model Public cloud
Service constraints No
System requirements No system requirements

User support

User support
Email or online ticketing support Yes, at extra cost
Support response times P1 response tiem fo 15 minutes
4 hour response for general queries.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support No
Support levels Telephone support is available on core service 24/7
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started Online documentation will be provided
Service documentation Yes
Documentation formats
  • HTML
  • ODF
  • PDF
  • Other
Other documentation formats
  • Plain text format
  • MS Word
End-of-contract data extraction Manual data extraction is possible
End-of-contract process Licences for suite components are an additional cost

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service No differences
Accessibility standards None or don’t know
Description of accessibility Not applicable
Accessibility testing Not applicable
Customisation available Yes
Description of customisation Customers can chose which components of the Ideal Cloud Suite they wish to use to customise a Cloud Package


Independence of resources Not applicable


Service usage metrics No


Supplier type Reseller providing extra support
Organisation whose services are being resold Okta, PAN Aperture & Traps, Spanning, Cisco Umbrella

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency Never
Protecting data at rest Other
Other data at rest protection approach Not applicable
Data sanitisation process No
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Not applicable
Data export formats Other
Other data export formats Not applicable
Data import formats Other
Other data import formats Not applicable

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Individual services have individual SLAs
Approach to resilience Available on request, varies per service element.
Outage reporting Not applicable

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
Access restrictions in management interfaces and support channels Not applicable
Access restriction testing frequency Never
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for Between 1 month and 6 months
Access to supplier activity audit information No audit information available
How long system logs are stored for Less than 1 month

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach We work to the principles of ISO27001
Information security policies and processes Within Ideal, all employees, contractors and third party users shall understand their role in ensuring the security of information assets (and their supporting assets), however, additional roles and responsibilities are defined in order that the ISMS shall operate efficiently and in accordance with the guidelines of ISO/IEC 27001:2013. The Managing Director (supported by the Management Leadership Team) is ultimately responsible for agreeing the level of acceptable residual risk within the Risk Assessment Methodology, approving any decisions not to address any unacceptable residual risks where identified and assigning appropriate resources to manage and operate the ISMS effectively. The Information Security Manager has functional responsibility for operational management of ISMS and reviewing. The IT Manager is responsible for the day to day management and review of security controls and procedures. Wherever this is possible, automated systems are used for controlling and reporting. Where this is not possible business risks are highlighted and the impact to the business is presented to the SMT for periodic review.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Not applicable
Vulnerability management type Supplier-defined controls
Vulnerability management approach Not applicable
Protective monitoring type Supplier-defined controls
Protective monitoring approach Not applicable
Incident management type Supplier-defined controls
Incident management approach Not applicable

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £2.50 to £33.26 per user per month
Discount for educational organisations No
Free trial available No


Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑