Managed Wi-Fi Service
The solution delivers a fully featured wireless estate with on-going management, provision and support to customers. The service utilises a range of wireless technologies, integrated within a Cloud infrastructure. The wireless service can be further enhanced with additional services such as mobility integration/on-boarding and Active Directory integration.
Features
- Fully Managed Service
- Cloud Infrastructure
- 24x7/365 Support
- On-boarding
- Flexible Pricing
- Active Directory Integration
Benefits
- Mobile
- High-speed access to Voice, Video and Data
- Low Cost, Rapid Deployment
- Leased Line Replacement
- Digital Inclusion
- AMR and Smart Utility Support
- Superior Interference Mitigation
Pricing
£77.50 a device a month
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
1 8 3 6 2 6 6 5 9 8 4 9 9 4 4
Contact
InTechnology Plc
Jamie Innes
Telephone: 01423 510 681
Email: tenders@intechnologyplc.com
Service scope
- Service constraints
- For the benefit of our customers we will allocate a pre-determined planned window which will be utilised to carry out any core infrastructure changes which may carry a minimal risk of disruption to service, or in some instances a period of service downtime which would be kept to an absolute minimum. In either instance, customers will be notified of the full details of the requirement with a minimum of 14 days’ notice prior to the maintenance window.
- System requirements
- InTechnology Wi-FI network services and or the internet are required
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- The Inhealthcare support hours are Mon-Fri, 09.00 – 17.30 Additional support outside of these hours/ days will be provided via an on call process. The issue escalation process remains the same for the out of hours support, however the response times from Inhealthcare support team cannot be guaranteed. Responses from Inhealthcare support outside of support hours will be provided on a best endeavours basis.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 A
- Web chat accessibility testing
- No web chat testing has been completed with assistive technology users.
- Onsite support
- Onsite support
- Support levels
- As part of service all customers receive access to the 24x7/365 service desk at no extra cost. Customers will also have access to a customer service manager who will be their main point of contact in the event they have any escalations.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
The managed wireless service is provisioned based on the particular requirements of each individual location rather than using a generic design. This allows InTechnology to ensure that the coverage and performance of the network is tailored for each customer and to their particular requirements.
The service establishment process consists of an initial design, followed by an optional site RF survey and implementation visit. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
At the end of the contract with the customer and if the customer does not wish to renew their service.
InTechnology will assist the Customer in facilitating the orderly transition of the InTechnology Services (in whole or part) from InTechnology to the Customer or any replacement supplier upon the expiry or earlier termination of the agreement. This section sets out the principles regarding the service transition that form the base of an Exit Plan. - End-of-contract process
-
InTechnology shall produce an Exit Plan upon notification of termination of the agreement, in accordance with the principles set out in this section, as soon as practicable (but not later than 60 days) after any notice of termination of the agreement.
The Exit Plan shall, unless otherwise agreed with the Customer:
• address each of the issues set out in this Exit Plan in order to assist the Customer in facilitating the transition of the InTechnology Services from InTechnology to a replacement supplier or the Customer ensuring to the extent reasonably possible that there is no disruption in the supply of Services and that there is no deterioration in the quality of delivery of the Services during any period of transitional assistance;
• provide an estimate of the scope of transitional assistance that may be required by the Customer and suggest how such assistance might be provided (if required); and
• provide an estimate of InTechnology’s personnel that may be required to provide transitional assistance and suggest the management structure to be put in place and employed to provide such transitional assistance.
Using the service
- Web browser interface
- No
- API
- Yes
- What users can and can't do using the API
- The solution provides RESTful and SOAP based web service interfaces over HTTPS to enable application to application communications. The web services support a number of different authentication and authorisation options including BasicAuth, OAuth2 and mutual SSL certificate based authentication.
- API automation tools
- Puppet
- API documentation
- Yes
- API documentation formats
-
- HTML
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Manual
- Independence of resources
- We have monitoring and alarms in place on our platform to ensure that it has sufficient capacity and resources to ensure that users are not experiencing any degradation in service because of other users.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- Network
- Number of active instances
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Hardware containing data is completely destroyed
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- No
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- InTechnology's Managed Wi-Fi service does not provide guaranteed SLA's due to environmental factors which can affect the provision of its service. For example, the network provided by a third party organisation.
- Approach to resilience
- Where possible we operate all hardware components as minimum of N+1 – multiple network feeds, A+B power feeds, redundant PSU/memory/CPU, etc. The power to the data centre also has UPS backup and diesel generators so can withstand prolonged mains grid failure without interruption to service.
- Outage reporting
- As part of its ISO 27001 accreditation we have fully documented and well rehersed business continuity and major incident policies. In the unlikely event that a major incident is invoked an incident manager will be responsible for managing all external communication with customers. As part of its existing ISO 27001 and ISO 9001 accreditations we have a major incident policy which details the processes to be followed in the event of a major incident. As part of the contract with the customer we will appointment a customer account manager who will be the central point of contact between us and the customer and will ensure that both parties confirm to their respective major incident policies.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- We ensure that as part of support and developments roles that users only have access to the systems that they require. In addition, certain access permissions are only opened for a limited time whilst activities such as upgrades or support investigations take place. This ensures that users do not have access to potentially sensitive information or make changes without access being opened up by a senior operative.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Dedicated device over multiple services or networks
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 17/05/16
- What the ISO/IEC 27001 doesn’t cover
- All of the InTechnology Plc functions are covered by the ISO 27001 certification.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- As part of our ISO 27001 and ISO 9001 accreditation we have wide range of supporting information security policies and processes. These are meticulously followed within the organisation and your security and compliance manager ensures that all staff go through induction and regular training to ensure compliance. Any security incidents are logged by the security and compliance manager and are reviewed at quarterly forum meetings where representatives from all over the business, including the CEO are present.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- InTechnology is committed to continually improving and expanding its core network and data centre capabilities, thus striving to provide the highest levels of service to its customers. In order to facilitate these improvements, it is necessary to carry out essential work from time to time. These activities are carefully scheduled through the use of an internal change control process which is designed to present maximum visibility of that change and thereby ensure that planning and implementation are carried out to minimize the effect on customers and their network services.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We regularly perform patches to services based on the recommendations of software manufacturers. We sign up to mailing lists from software manufacturers so that we can be made aware of potential threats and then perform an internal risk analysis to determine how quickly a patch needs to be deployed.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Within its services we deploy different layers of monitoring to reduce the risk of compromises, including Firewalls with IDS / IPS and Anti-virus software. In the event a comprise was found we would invoke its major incident process to determine the extend of the compromise and from this the resulting actions which need to be undertaken.
- Incident management type
- Supplier-defined controls
- Incident management approach
- As part of its ISO 27001 and 9001 accreditation's we have a proven major incident process which ensures that all reported incidents are logged by service users from. In addition the policy ensures that incident reports are provided to users in the event of a major incident which details the root cause and the steps which have been undertaken to stop it occurring again in the future.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Fighting climate change
-
Fighting climate change
InTechnology delivers its digital services through the use of AWS (Amazon Web Services) Cloud technologies. We work with AWS to ensure that we are running our cloud operations as efficiently as possible, reducing our electricity and carbon footprint accordingly. In addition, AWS are on path to powering their operations with 100% renewable energy by 2025 further reducing the impact of cloud operations on the climate. - Covid-19 recovery
-
Covid-19 recovery
InTechnology has a number of companies within the group which support NHS organisations with digital services for Healthcare providers. InTechnology’s WiFi and smart city products are being used to support organisations in delivering care closer to home and providing greater access to technology in remote areas for healthcare professionals. - Tackling economic inequality
-
Tackling economic inequality
InTechnology WiFi’s products are used across a number of different towns and cities across the UK to ensure that citizens have free and equal access to the internet, supporting households who may not be able to afford private internet access within their homes. - Equal opportunity
-
Equal opportunity
InTechnology is an equal opportunity employer and we support a diverse workforce, promoting a good and harmonious working environment in which employees will be treated with dignity and respect. - Wellbeing
-
Wellbeing
At InTechnology we promote employee wellbeing and ensure that employees have access to support, coaching and guidance in the event that they feel they require any additional support outside of the work environment.
Pricing
- Price
- £77.50 a device a month
- Discount for educational organisations
- No
- Free trial available
- No