Resource4u Ltd

Virtual Meetings Management System (V2MS)

V2MS turn Microsoft Office 365 Teams to a fully functional meeting management system offering features like board membership management, invites, papers sharing, video conferencing and virtual meetings. Meetings management one-stop-shop.

All information stored on the system is protected & assured with strict Microsoft security and compliance standards.

Features

  • Board Meetings are collaboratively managed
  • Calendar, Papers, Members, Chat, Notes etc. all in one place
  • Meetings Management System
  • Integrated with Office 365 Active Directory
  • Trusted Custom Business Application over Microsoft Office 365
  • Robust solution backed with Microsoft Reliable SLAs
  • Complete solution including launch, uptake and tech support

Benefits

  • Manage board & committee meetings
  • Invites, document sharing, notes, chats all in one place
  • Multi-factor security and access control
  • Board packs digital reading
  • Cross device intuitive reading access
  • Notes and annotations
  • Personal and group note books

Pricing

£18000 to £24500 per instance per year

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 11

928894457450213

Resource4u Ltd

Rizwan Malik

02030026340

info@resource4u.co.uk

Service scope

Service scope
Software add-on or extension Yes
What software services is the service an extension to The system is founded on trusted Microsoft platforms combining the powers of Teams, SharePoint and Office365 groups. MarketPlace add-on are available as well as further extension development is possible using APIs.
Cloud deployment model Public cloud
Service constraints No
System requirements
  • Browsers: Current versions Chrome; Firefox, Safari, Edge, IE
  • Mobile devices requirements: Windows 10, iOS9.0, Android 5.0
  • Device Types: Smart Phones, Tablets Min. 7"
  • Outlook 2013 or Web App, OWA for iPhone, iPad, Android

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Critical Incident: 1 hr response time, then regular updates till resolution.
Medium Risk Incident: 3 hours response time, then regular updates till resolution
General Support: Within 24 hours, Monday to Friday. Weekend service can be provided at additional cost on case by case basis.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Silver - An essential level support: Technical and user query support. Problem arising during usage. Manage escalations for defects. Provide technical and user guidance. Provide action plans and schedules regarding further system advancements. Support start from £9 per user per month.

Platinum - An enhanced level support: Includes all of the above, user access and licensing management, customisations and configurations of existing entities, knowledge transfer. Support starts from £19 per user per month.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Engage stakeholders at all levels of deployment including specific business requirements, analysis to pre-stage development, on-site / off-site training from basic to advance levels. Onboarding users with period of shadowing until system champions take the local control and ownership,. Generally ITIL v3 transition guidelines are followed, however, bespoke onboarding approaches are also developed upon clients' requests on case by case basis.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
  • Recorded videos
  • Flow charts
End-of-contract data extraction End-of-contract approach is typically agreed at the time of getting started with the implementation. Formulation of exit strategy is defined by keeping in mind the client's requirements.
End-of-contract process End-of-contract scenarios are pre-agreed. Typically, we propose a defined framework approach or custom develop a methdology inline with clients requirements. Costs (if any) depending on size, nature and complexity of the deployment are also pre-agreed at the time of procurement.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Desktop service offers full features whereas some features may not be available on mobile services.
Accessibility standards WCAG 2.1 AA or EN 301 549
Accessibility testing Leveraged upon compliant Microsoft platforms to meet accessibility standards.
API Yes
What users can and can't do using the API The Web API if offered by the core platforms Microsoft Teams, SharePoint. This provides a development experience which can be used across a wide variety of programming languages, platforms and devices.
API documentation Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation The solution is customisable and tailored to the given organisation's business needs. With the on-going development support package we offer customisation services. Customisations include but are not limited to user interfaces, datafields workflows, automations, reporting, approval processes, line of business integration, custom portal, mobile interface customisation, custom integrations with 3rd party services via APIs.

Scaling

Scaling
Independence of resources Scales automatically and service quality is leveraged with Microsoft Dynamics 365 CRM, SharePoint 365 and PowerBI SLAs.

Analytics

Analytics
Service usage metrics Yes
Metrics types System tracks usages and keeps audit trails. Reporting formats are discussed and agreed on case by case basis.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency Never
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach System offers data export wizards to configure export parameters or options to full export. Data is exported in Excel and CSV formats.
Data export formats
  • CSV
  • Other
Other data export formats Files (Attachments: word, PDF, PowerPoint etc.)
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Service level 99.9% backed with Microsoft CRM Dynamics, SharePoint and PowerBI SLAs.
Approach to resilience Information available upon request.
Outage reporting Service outage can be communicated using various methods including public dashboards, email alerts and phone etc.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Username or password
Access restrictions in management interfaces and support channels Role based access control (RBAC) aligned with clients' requirements.
Access restriction testing frequency Never
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information You control when users can access audit information
How long user audit data is stored for Between 1 month and 6 months
Access to supplier activity audit information You control when users can access audit information
How long supplier audit data is stored for Between 1 month and 6 months
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Security governance is not certified, however, the security framework is based on the principles set within the ISO/IEC 27001.
Information security policies and processes We have an information security policy that applies to the implementation of the systems and processes involved. During onboarding through induction and training, users are informed with the policy guides and the policy compliance is validated through various auditing techniques.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach ITIL framework guidelines are adopted to ensure systematic configuration and change management processes that deliver the outcomes.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Proactive threat and intrusion detection is leveraged upon Microsoft security assurance and compliance.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach Various tools and techniques are used to control and safeguard the implementation and environment including access control, role based security and technical security monitoring managed and assured by Microsoft SLAs.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach We leverage on the guides provided by ITIL framework to lead on incident management approach. A bespoke and prioritised incident management approach can be agreed on case by case basis.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £18000 to £24500 per instance per year
Discount for educational organisations Yes
Free trial available Yes
Description of free trial 30 days free trial including:
- Contextual trial guide tailored to specific requirements
- Includes an instance of Microsoft Office365 Teams and SharePoint

Service documents

pdf document: Pricing document pdf document: Terms and conditions
Service documents
Return to top ↑