Skip to main content

Help us improve the Digital Marketplace - send your feedback

Rockstone Technologies Ltd

Hosted Exchange

To provide hosted Exchange mailboxes with remote access via mobile devices and Web browser via Outlook Web Access..

Features

  • Remote Exchange Mailboxes
  • Activesync Mobile Device Access
  • Outlook Web Access via Web Browser
  • IMAP and POP3 connectivity

Benefits

  • Access email from anywhere
  • Secure Access
  • Server side Anti SMAP email filtering
  • Server side Anto Virus email scanning

Pricing

£1.00 to £500.00 a user a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at john.grocock@rockstone-technologies.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

1 3 8 3 8 1 1 1 2 6 9 1 7 2 0

Contact

Rockstone Technologies Ltd John Grocock
Telephone: 07799663882
Email: john.grocock@rockstone-technologies.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
None
System requirements
  • Microsoft Office 2007 minimum requirement for Exchange 2016.
  • Compatibility with non Microsoft email clients not guaranteed.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Support response times
Tickets can be reported on a 24x7 basis, by email.
User can manage status and priority of support tickets
No
Phone support
No
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Standard support included in mailbox pricing.
Level 4 support engineer on a call of arrangement to suit the customers specific needs. This can be negotiated as part of the contract.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
All user docuemntation support and training available from Microsoft.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
On termination of contract users can download a copy of their mailbox from the server prior to it ebign securely deleted.
End-of-contract process
Standard email mailbox contract is for a 1GB mailbox with full anto SPAM and anti virus filtering at no extra cost.
Additional mailbox space availabele at additional cost.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Chrome
  • Safari
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
None. Full functionality available on desktop and mobile devices.
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
The service interface is available via the standard Microsoft Exchange OWA web portal.
Accessibility standards
None or don’t know
Description of accessibility
.
Accessibility testing
.
API
No
Customisation available
No

Scaling

Independence of resources
Datastores are never more than 60% utilised. Multiple Client access portals available.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Microsoft Outlook Clients allow mailbox export.
Data export formats
Other
Other data export formats
.PST Outlook format
Data import formats
Other
Other data import formats
.PST Outlook format

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
SLA in line with Tier 4 Data centre at 99.995%

Refunds are define in Terms & Conditions.
Approach to resilience
Multipple datcentre external connections. All network hard has redundant connectivity and power. All storage is fault tolerant, and all mail datasotes backed up daily.
Outage reporting
Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels
Support tools accessed via username/password.

Users have no access to management channels.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
Less than 1 month
Access to supplier activity audit information
No audit information available
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Security policies outlined and implemented at director level.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We provide a service based on a Microsoft COTS priduct and follow their update and security patch protcols.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Threat and security vulnerabilities assess from Micosoft a CERT bulletins. Patches are installed as soon as available.
Protective monitoring type
Undisclosed
Protective monitoring approach
Equipment monitor tools to identify intrusion attempts and DDoS attempts. Immediate repsonse to potential threats, but aim to deal with incidents within an hour.
Incident management type
Supplier-defined controls
Incident management approach
Users report incidents via helpddesk ticketing or via phone support.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Equal opportunity

Equal opportunity

Rockstone Technologies is an Equal Opportunities Employer. The company is committed to equal employment opportunities regardless of age, sexual orientation, gender, pregnancy, religion, nationality, ethnic origin, disability, medical history, skin colour, marital status, genetic information or parental status. We base all our employment decisions on merit, job requirements and business needs

Pricing

Price
£1.00 to £500.00 a user a month
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at john.grocock@rockstone-technologies.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.