Skip to main content

Help us improve the Digital Marketplace - send your feedback

Work Networks Ltd

Workplace from Meta and Alternatives

Leading reseller and service partner for digital employee experience, intranet and internal communications platforms, incl Workplace from Meta, migrations, Workvivo from Zoom, Blink, Flip, Staffbase, Humand, Yoobic, Simpplr. HQ to frontline, enable secure, efficient internal comms, AI, collaboration and staff engagement from any device, anywhere.anywhere.

Features

  • Familiar / Consumer-grade interface
  • Access via any device
  • Secure
  • Rapid deployment
  • Live broadcast
  • Video and file sharing
  • Open and closed collaborative groups
  • Chat (text, voice, multi-person video)
  • Multi-company collaboration groups
  • Powerful activity / content insights and analytics

Benefits

  • Cross organisational internal communications
  • Break down siloes
  • Harness collective intelligence / internal crowdsourcing
  • Senior leadership visibility
  • Connected, agile organisation able to adapt fast to change
  • Everyone has a voice (frontline to HQ)
  • Ideation / innovation
  • Real-time communications / live interactive broadcast
  • Real time informal chat / collaboration
  • Increased productivity and engagement

Pricing

£2 to £4 a licence

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at nick.crawford@worknetworks.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

1 1 9 2 0 0 7 7 8 8 0 1 3 7 7

Contact

Work Networks Ltd Nick Crawford
Telephone: 07985723655
Email: nick.crawford@worknetworks.co.uk

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Microsoft 365 (Teams / One Drive / Sharepoint)
Google Apps / G-Suite
57 other integrations and counting
Cloud deployment model
Private cloud
Service constraints
Customers require minimal hardware to get up and running (service is accessed via browser (and 2x optional mobile apps iOS and Android).
Service is SaaS, support is available 24/7 direct via Workplace Support (for system admins)
System requirements
  • Browser (Chrome, Firefox, Edge...)
  • Mobile device (iOS and Android)

User support

Email or online ticketing support
Email or online ticketing
Support response times
24/7
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AAA
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 AAA
Web chat accessibility testing
We have provided direct web chat support to partially sighted users
Onsite support
Onsite support
Support levels
Depending on size and complexity of the client organisation, and scope of the contract, we provide:
On-site and remote senior leadership engagement and training
On-site and remote early adopter / champion training and support
Launch and post-launch on-site and remote user support, training, and ongoing community management services
Technical account manager / cloud support engineer

Services and support vary from £5k quick start package to £50k + depending size, complexity, scope, in-house resource, budget...
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Business case development
Senior Leadership Engagement and training
Onsite and remote training (early adopters / champions / all users)
Online training and educational support
User documentation
Comms Strategy, planning and collateral development
Online community management
Project management for entire deployment pre-launch, launch and beyond as required
Service documentation
Yes
Documentation formats
  • HTML
  • ODF
  • PDF
  • Other
Other documentation formats
  • Powerpoint
  • Video
End-of-contract data extraction
The data gathered from Workplace by Meta will be gathered on behalf of the enterprise signed up to use Workplace by Meta as a service. Enterprise user-generated content contained within the enterprise’s managed community, as well as logged enterprise user activity is stored on Meta's servers until the end of the Workplace by Meta service contract or until the enterprise decides to delete data. Should an enterprise decide to delete their managed community before the end of a contract, then the enterprise may contact the Workplace by Meta team and all data within the managed community (for that enterprise) and all related ents and assocs will be deleted according to Meta's data deletion policies. Enterprise admins may delete groups or enterprise user-generated content. Once the option to delete this data is confirmed, the data will be deleted in line with Meta's data deletion policies. Enterprises also have the option and ability to access or delete any relevant data via the Workplace by Meta API.
End-of-contract process
Use of Workplace and our associated success services will continue throughout the duration of the contract.
Contract can be terminated at any point with one month's notice.
Additional services may be purchased and terminated in addition to the core software resell related contract.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • MacOS
  • Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Service is mobile first with optimal, familiar mobile experience developed by Meta. Mobile experience uses NewsFeed, algorithms, and mobile design to bring relevant content to users wherever they are. Apps even provide relevant access for system admins to Andmin Panel.
Browser view provides full access, integration Workplace and Workplace Chat features.
Service interface
Yes
User support accessibility
WCAG 2.1 AAA
Description of service interface
System Admins (and other admins) have access to Admin Panel, to manage user provisioning, group and content, analytics, integrations, security settings, and a host of other features and functionality
Accessibility standards
WCAG 2.1 AAA
Accessibility testing
Navigation Assistant
Keyboard Shortcuts
Screen Readers and Assistive Technology
Closed Captions and Media
Text Size and Contrast
API
Yes
What users can and can't do using the API
The Graph API for Workplace is a programmatic way to get data in and out of Workplace. It's a low-level HTTP-based API that you can use to query data about objects in a Workplace graph. The Graph API is named after the idea of a graph data model, where objects are represented by nodes and joined along edges.
API documentation
Yes
API documentation formats
  • HTML
  • PDF
  • Other
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Group Structure
Branding
Privacy Settings
Integrations
Bots / AI
SSO
Directory Sync
Automation

Scaling

Independence of resources
We are growing a team of deployment experts and are an official preferred Workplace reseller and deployment partner. We were one of the first in the UK starting in Jan 2016. The Workplace software has 7 million paid users around the Globe. They span retail, technology, telecommunications, financial services, media, entertainment, hospitality, food and drink, transport, property, utilities, delivery and government. Its used by 31,000+ organisations, and is fully scalable (built by Meta who have experience of 2.9 billion users on the consumer platform, Facebook).

Analytics

Service usage metrics
Yes
Metrics types
Provisioned users
Account claims
Monthly / weekly / Daily active users
Content volume / engagement
App usage
Profile completion
Retained users
Connections (across the org between users)
Group activity
Group membership
Group most active members
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Workplace from Meta

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
System admins can export data at any time via the Admin Panel and via API
In addition end users can export their data (self service) in line with GDPR
Data export formats
CSV
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • Jpeg
  • Pdf
  • Doc
  • Xls
  • Ppt
  • Mov
  • Mpeg
  • Html

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • Other
Other protection between networks
Workplace follows standards focused on security and confidentiality:
Data Access is based on agreements with the individuals, businesses or organizations using the product.
Access measures protect data in accordance with security / confidentiality commitments within these agreements.
Data from different Workplace communities is segregated using the communities’ unique identifier.
Measures are in place to collect, use, retain, and dispose of data in accordance with security / confidentiality agreements.
Data protected against theft or misuse.
Processes and controls are in place to inhibit, detect, respond to malicious activity.
Compliance with security / confidentiality policies procedures are monitored on ongoing basis.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network
Workplace is segregated into separate and private managed communities. Facilitated by the same technology that enforces Meta’s core privacy features and controls within the Facebook public platform. When an enterprise signs up for Workplace, a unique enterprise identifier is created. Data created by administrators and users within that enterprise’s managed community are associated to that respective enterprise ID, thereby protecting the confidentiality of that data.
The Workplace by Meta product has available tools to help enterprise administrators manage and control their data.
The enterprise owns all data produced and maintained within the managed community while Meta provides the platform.

Availability and resilience

Guaranteed availability
In 5 years we have had 0% downtime. Customers pay monthly and can cancel with one month's notice.
In the unlikely event of unacceptable downtime we would refund the buyer their licence costs.
Approach to resilience
Available on request to customers via SOC2 report
Outage reporting
There is a real-time dashboard in the Admin Panel for system admins.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Workplace is segregated into separate private managed communities. Meta creates a unique enterprise identifier. All data created by enterprise administrators and users are associated to that enterprise ID, thereby protecting the confidentiality of that data.
Initial setup is facilitated to ensure the core security and experience features function appropriately, but afterwards, the enterprise is solely responsible for managing user access, data deletion, data retention, and content moderation until the enterprise terminates services. Workplace by Meta product has available tools to help administrators manage and control their data.
The enterprise owns all data produced and maintained while Meta provides the platform.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
EY Certify Poin
ISO/IEC 27001 accreditation date
12/7/2017
What the ISO/IEC 27001 doesn’t cover
The certification scope is limited to Meta teams supporting Workplace platform
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
  • ISO 27018
  • EU-US Data Privacy Shield
  • SOC2 / SOC3 Global Standards

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
The Security Team has developed a dynamic risk assessment program in response to the dynamic environment in which it operates. The team tracks and manages risks identified from multiple sources including the team’s expertise and experience, risk assessment activities, security monitoring tools, and company-wide incident management response systems. The Security team manages on-going operational and consultative risk assessments which are outlined below.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Procedures in place for change management and software development of Workplace. Change management process covers changes to code and back-end systems including infrastructure, back-end environment, databases, and security tools. Changes tracked through internal code tracking system and source code via version control tools.
Training on secure coding practices, tools, all aspects of the technology stack.
Peer review including code, unit testing, test case development.
Enforcing strict accountability for changes and effectiveness during the release process.
Post production monitoring: bug bounty, incident management, including root cause analysis, corrective action
Dev servers receive same security configurations across tech stacks as production systems.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Workplace has a vulnerability management team in place responsible for performing vulnerability scans/detection to identify and evaluate risks posed by vulnerabilities. The vulnerability management team also works on identifying and prioritizing threats posed, associating threats with owners, and working towards an acceptable remediation of the threat or acceptance of risk. External scanning is performed at least on a quarterly basis and Internal scanning/detection is performed on a continuous basis. The results are validated internally and tracked to resolution. Penetration testing is performed as needed by designated security engineers or external service providers who specialize in attack and penetration testing.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Monitoring of system configurations and security settings is managed by configuration management tools. These continually update security settings and configurations on production servers with master settings to ensure systems are consistent with expected security standards.
Security event logging is performed and monitors for threats in accordance with predefined security criteria configured in a centralized security monitoring tool. Alerts are reviewed by authorized personnel. The security team coordinates with CERT, Legal, HR and other outside parties as necessary, for triaging the security events.
Meta has DDOS detection and mitigation mechanisms in place to protect the network from denial of service attacks.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Incidents relating to site, platform, or infrastructure issues are managed and escalated through the general incident management process. Incidents are tracked in the Meta incident management system and assigned a severity level. The Incident On-Call team will evaluate each incident ticket in the Meta incident management system to determine if the severity level, which impacts the resolution timing, is appropriate. The incident management team conducts an Incident Management Review on a weekly basis to ensure high and medium severity incidents are discussed, resolved, and a root cause is determined.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

We enable synchronous and asynchronous communication and collaboration, as well as instant translation and other outcomes which help minimise the need for physical travel.

Covid-19 recovery

Since Covid we have emerged into a world of hybrid working, where it is vital organisations provide fair access to work, information, knowledge and opportunities. We enable all of the above, plus we have specific case studies from our work globally with the WHO and with NHS Trusts across the UK which further demonstrate this.

Tackling economic inequality

We believe that everyone has a voice, but that voices are often not heard. We help connect frontline workers with HQ and everyone in between, ensuring that everyone's voice can be heard should they wish. This fuels opportunity and career progression for everyone across the organistaion, whatever their background.

Equal opportunity

Equality Diversity and Inclusion is rightly at the top of the corporate and governmental agenda. We enable opportunities, openness and discussion across all communities inside organisations, and have helped drive allyship and break boundaries eg between LGBTQ+, BMe and people of all backgrounds.

Wellbeing

In a post covid world of Teams and Zoom meeting burn,out, we enable asynchronous comms and collaboration to alleviate the pressure of 'always on' synchronous vide meeting cultures. In addition we surface company wellbeing schemes and packages helpjbg employees to engage with these offers (which often they are unaware of).

Pricing

Price
£2 to £4 a licence
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
30 Day free trial of Workplace from Meta
Full features included
Free 1 hour strategic consultancy session
Link to free trial
https://www.worknetworks.co.uk/connect-with-us

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at nick.crawford@worknetworks.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.