Skip to main content

Help us improve the Digital Marketplace - send your feedback

Bytes Software Services

Quest On-Demand

A secure, Azure-hosted SaaS management platform to help IT teams, partners and MSPs move faster, tighten security and stay in control of hybrid Office 365 environments. Migrate, manage, report, secure and recover all hybrid AD and Office 365 workloads across all tenants from a single dashboard. bssgc

Features

  • Migration
  • Audit
  • Recovery
  • Office 365
  • License Management
  • Group management
  • Teams Management

Benefits

  • Merge or consolidate Office 365 mail, accounts and data
  • Backup and recovery of Office 365 and Azure AD users
  • Ensure the optimum number of licenses are available
  • Audit all changes made across Office 365 and Azure AD
  • Control Office 365, Azure AD and hybrid AD groups
  • Assess, plan and execute migrations with ease

Pricing

£4.38 a user a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@bytes.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

1 8 1 2 7 0 8 3 0 5 7 4 3 8 5

Contact

Bytes Software Services Chris Swani
Telephone: +44 (0) 7951 326815
Email: tenders@bytes.co.uk

Service scope

Software add-on or extension
Yes
What software services is the service an extension to
Product helps you to manage office 365 environments.
Cloud deployment model
Public cloud
Service constraints
N/a
System requirements
  • Office 365
  • Azure

User support

Email or online ticketing support
Email or online ticketing
Support response times
Please refer to the Quest Support services document https://support.quest.com/essentials/support-offerings
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
N/a
Web chat accessibility testing
None
Onsite support
No
Support levels
Please refer to the Quest Support services document https://support.quest.com/essentials/support-offerings
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Training and Professional services is availiable to help onboard customers with the prodcut.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
Requests for data extraction should be communicated to Quest for review.
End-of-contract process
As per GDPR guidelines, we notify customers prior to 90 days then proceed to delete all customer data after 90 days of the subscription ending if no action is taken on the customers end.  We maintain an audit of these actions.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
Yes
Compatible operating systems
  • Linux or Unix
  • Windows
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
The majority of these services are delivered via Microsoft Azure cloud services. The exception being the user interface, which is delivered using Amazon Web Services CDN network
Accessibility standards
None or don’t know
Description of accessibility
As part of our ISO requirements, we maintain a Production Access Clearance (PAC) list that is used for the Production Access Approval process, which is used when determining whether qualified and entitled individuals can obtain access to production resources. DIB + CBAS provide both the Sign-in and Sign-up On Demand
Accessibility testing
Tests and scans are performed monthly for On Demand solutions.
API
No
Customisation available
No

Scaling

Independence of resources
The On Demand solution takes advantage of the fault-tolerance and high availability of the Azure infrastructure. For example the solution has provisions to scale dynamically to respond to load. The Azure data centers store multiple redundant of the data at rest on separate network and hardware. Additional resource are automatically added depending on the demand.

Analytics

Service usage metrics
No

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Quest

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Other
Other data at rest protection approach
Customer data is protected through the Azure built in data at rest server-side encryption mechanism. It uses the strongest FIPS 140-2 approved block cipher available. Advanced Encryption standard (AES) algorithm, with a 256-bit key.
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
UI, PoweShell. Some capabilities exist depending on the specific product of the On Demand solution to view historical data. For example, for the On Demand Migration product, information about past migrations is available and Audit logs can be exported. Some capabilities exist depending on the specific product of the On Demand solution to view historical data. For example, for the On Demand Migration product, information about past migrations is available and Audit logs can be exported
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Given our usage of Microsoft Azure and the high availability measures in place, it's extremely rare for the application to be unavailable. We strive for 99.9% uptime. Status on maintenance and downtime can be found here: https://status.quest-on-demand.com/
Approach to resilience
As part of the ISO 27001 certification
Outage reporting
We have release\maintenance Windows twice per week on Tuesdays and Thursdays at 16:00 UTC which the customer can subscribe to for updates.  We usually don’t require downtime but either way, the website is updated 2 weeks prior to the maintenance if downtime is necessary. https://status.quest-on-demand.com/

Identity and authentication

User authentication needed
Yes
User authentication
Other
Other user authentication
As part of our ISO requirements, we maintain a Production Access Clearance (PAC) list that is used for the Production Access Approval process, which is used when determining whether qualified and entitled individuals can obtain access to production resources.
Access restrictions in management interfaces and support channels
Privileged access is controlled through the On Demand access process and monitoring/review of activities
Access restriction testing frequency
At least every 6 months
Management access authentication
Other
Description of management access authentication
"Quest employs a least privileged model where employees are only granted the permissions that are necessary to perform their work tasks.  Elevated privileges are granted temporarily through a privileged access group model, where the access must first be approved, and its use is audited until it is automatically revoked.
Multi-factor authentication is employed to ensure secure access to business sensitive data."

Audit information for users

Access to user activity audit information
Users receive audit information on a regular basis
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Schellman Compliance, LLC
ISO/IEC 27001 accreditation date
22/08/2023
What the ISO/IEC 27001 doesn’t cover
No exceptions to the ISO 27002 set of controls
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
SOC2 Type 2

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
As part of the ISO 27001 certification, a Global Physical Security Policy and associated processes covering the physical security for facilities are defined. A Information Security Operations Physical and Environmental Security Policy and associated processes concerning IS specific physical security are defined. The On Demand solution relies on the Physical Security Policies provided by Microsoft for all Azure provided resources.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Formal, secure Software Development Life-Cycle (SDLC) processes are in place that have been approved by management, communicated to appropriate constituents. These processes include change management and are reviewed and maintained regularly. Dev and Ops Teams are trained to properly configure an Approved Configuration for the Cloud environment (Virtual Networks, NSG, WAF). Benchmarks published by the CIS are followed as baselines and non-compliance is detected by leveraging built-in Azure or AWS tools as well as custom scripts. The deployment process follows a strict Change Management process where all changes are identified, reviewed and approved by the Dev and Ops teams.​
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Monthly Vulnerability scans are performed internally. During the yearly Third-Party penetration testing exercise outsourced scans are also performed
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
"The On Demand solution leverages Azure PaaS infrastructure. Monitoring of that infrastructure is dynamic. For the Quest environment, Quest IS has a defense in depth approach including Patch Management, vulnerability scanning, SIEM solution, Email scanning, IDS/IPS.

The On Demand solution is protected through leveraging a multi-layer approach at the Azure environment and Application layers."
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
For its On Demand solution, Quest has established a formal process of preparation, detection, analysis, containment, eradication, recovery, and post-incident activities. As well, in accordance with international privacy laws, Quest has established a Security Breach Notice process.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

We take our environmental management and the impact we have on the environment very seriously. We have environmental policies in place and hold the ISO14001 accreditation. Our environmental assessments are conducted annually by an external Lead ESOS Assessor; they are signed-off by the board and compliance reported to the regulator (the Environment Agency). Our environmental policy is published on our website at https://www.bytes.co.uk/company/sustainability/environmental.
Bytes achieved carbon net zero in March 2022 through approved carbon offsetting schemes. We are always seeking to reduce our impact on the environment. We aim to minimise waste, reduce pollutants and use renewable materials. Our offices have recycling facilities for cans, plastic and paper. We aim to reduce our office printing to zero within the next few years.
An Environmental Steering Committee has been established to coordinate environmental activities and drive change.
To drastically reduce our emissions, we have switched to renewable energy. Our Head Office has reached our first milestone of using a specialist 100% renewable electricity provider. We are also exploring options to install solar panels on our Headquarters building.
Other environmental initiatives include installing electric vehicle charging points and encouraging staff to commute to work without the car (setting up a car share network and installing secure cycle parking).
We produce a SECR (Streamlined Energy and Carbon Reporting) report that details the companies energy consumption and carbon emissions. This report is produced annually by an independent assessor.
This report provides details of our emissions in Scope 1, 2 and 3 categories. It details the activities previously taken to reduce emissions and also recommendations for further improvements.
For scope 1,2 and 3 emissions we aim to reduce these by 50% by 2025-2026 from our 2021 baseline.
We aim to be Net Zero by 2040, covering our own operational emissions.

Pricing

Price
£4.38 a user a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Quest provides a limted 30 day Trial version of the product allowing you to migrate and manage your office 365 environment.
Link to free trial
https://www.quest.com/signup/114290/

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@bytes.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.