WR LOGIC LIMITED

Microsoft Power Platform Implementation Services including Dynamics 365

The Application Development Teams work in squads to develop next generation cloud-based applications. Specialising in integration with PaaS services, the team develop responsive and feature rich applications that utilise the best technologies the cloud has to offer. Including PowerApps, PowerPlatform supporting the common data platform Dynamics 365

Features

  • Business solution development using PowerApps, PowerBI, Flow, CDS, Teams, SharePoint
  • Desktop, browser and mobile applications from the same source
  • Integration, Dedicated Team of Engineers, Architects, Testers, Product Managers
  • IT skill up and co-development based on best practice.
  • Power User development support
  • PowerApps, Common Data Platform, Sales, Customer Services and Management
  • Pragmatic advice: licensing, technology selection, consulting
  • Options from knowledge transfer to hands-on development, enhancement, troubleshooting
  • Rapid innovation, development and deployment;
  • MVP (minimally viable product) delivery for Proof of Concept testing

Benefits

  • Enables your existing data, content and processes
  • Engage staff with useful applications that meet daily needs
  • Deliver quick business benefit using Agile delivery methodology
  • Enables the paperless office
  • Transformational applications delivered on mobile and desktop
  • Quickly create and deploy point solutions in days
  • Extend and mobilise your business using no code/low code approaches.
  • Automate processes easily, improving business efficiency
  • Access to best practice, proven adoption approaches
  • Deliver smaller-scale projects without diverting IT resources

Pricing

£980 a person

  • Education pricing available

Service documents

Framework

G-Cloud 12

Service ID

9 4 4 0 2 9 1 2 4 6 5 5 4 7 5

Contact

WR LOGIC LIMITED Dinuka Wijesinghe
Telephone: 07795354854
Email: contact@wrlogic.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
No Specific constraints depending on architect agreed with customer.
System requirements
  • Microsoft Office 365 licences
  • A platform capable of hosting Microsoft services

User support

Email or online ticketing support
Email or online ticketing
Support response times
Our support arrangements are tailored to your specific needs, as our experience shows that no 'one-size' fits all requirements. We will discuss services, service levels, response times, communication channels and reporting to agree your requirements specifically for the managed services you wish to procure.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Yes, at an extra cost
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
We would be pleased to discuss any requirements you may have and provide a service that meets those requirements.
Onsite support
Yes, at extra cost
Support levels
24x7 Remote Support Standard SLA's can be negotiated and agreed Level 1 - Level 4 Engineer available Certified Microsoft and AWS Engineers Security Clearance up to DV Our Managed Service offering is driven by your requirements rather than a standard service catalogue, this allows you to tailor the right level of support for your needs. Our service can include the following: 1 Hour Response; Portal Setup; OS patching; 24 x 7 Proactive Monitoring; AV Management; 30 Day Managed Backup; Application Monitoring; Custom Restores; Service Management; Direct Access to 3rd Line Support; Problem Management; Service Levels and Service Credits; and Advanced Infrastructure Management.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide training options as standard as part of the offering for operations and end-users of the system
Service documentation
Yes
Documentation formats
  • PDF
  • Other
Other documentation formats
Microsoft Word
End-of-contract data extraction
All data remains the property of the customer. WR do not create any bespoke data containers so data can be extracted using a variety of industry standard solutions or WR can offer services to perform migrations to a new system.
End-of-contract process
At the end of the contract, the customer owns all of the contracted deliverables. Any WR IP that is separately licenced reverts to WR and must cease to be used. WR licenced IP in the PowerApps space is used to accelerate on-going development for customer teams. The remaining products will continue to operate without this IP.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
No feature differences. Layouts will auto adapt dependent on screen configuration.
Service interface
No
API
Yes
What users can and can't do using the API
Standard Microsoft API's.
API documentation
No
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
The services are customisation services.

Scaling

Independence of resources
We deliver our off-premise services via the Microsoft Cloud (Azure/O365).

Analytics

Service usage metrics
Yes
Metrics types
Metrics will be provided via PowerApps Admin Analytics tools.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least every 6 months
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Data is kept in standard data formats and can be extracted at any time by the customer using standard Microsoft or other products.
Data export formats
  • CSV
  • Other
Other data export formats
  • SQL Backpacks
  • Other Database Export Formats
Data import formats
  • CSV
  • Other
Other data import formats
  • SQL Backpacks
  • Other Database Formats

Data-in-transit protection

Data protection between buyer and supplier networks
Other
Other protection between networks
Customer own responsibility for the network all the way to the Microsoft Cloud.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
There are no WR specific SLA's since all the services reside on customer infrastructure or the Customers Azure environment.
http://www.microsoftvolumelicensing.com/Downloader.aspx?DocumentId=13655
Approach to resilience
http://aka.ms/Office365DR
Outage reporting
Via the Service status portal.

Identity and authentication

User authentication needed
No
Access restrictions in management interfaces and support channels
We supply permissions based on the customers active directory.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Our Services are delivered within the customer or Microsoft environments and we follow and comply with customer and Microsoft security policies.
FISMA/FedRamp, EU Model Clauses, HIPAA/HITECH, ISB 1596, ISO 27018, SASE16 SOC1 & SOC 2
Information security policies and processes
Our Services are delivered within the customer or Microsoft environments and we follow and comply with customer and Microsoft security policies.
FISMA/FedRamp, EU Model Clauses, HIPAA/HITECH, ISB 1596, ISO 27018, SASE16 SOC1 & SOC 2

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Once created the environment is managed by the customer and WR do not apply any changes other than those requested by customer following their change control procedures.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
This runs in the Microsoft environment, the office 365 and Azure vulnerability management approach applies.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
This runs in the Microsoft environment O365 and Azure, these processes are applied.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Please see http://aka.ms/Office365SIM

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Pricing

Price
£980 a person
Discount for educational organisations
Yes
Free trial available
No

Service documents