InTechnology Plc

Managed Wi-Fi Service

The solution delivers a fully featured wireless estate with on-going management, provision and support to customers. The service utilises a range of wireless technologies, integrated within a Cloud infrastructure. The wireless service can be further enhanced with additional services such as mobility integration/on-boarding and Active Directory integration.

Features

  • Fully Managed Service
  • Cloud Infrastructure
  • 24x7/365 Support
  • On-boarding
  • Flexible Pricing
  • Active Directory Integration

Benefits

  • Mobile
  • High-speed access to Voice, Video and Data
  • Low Cost, Rapid Deployment
  • Leased Line Replacement
  • Digital Inclusion
  • AMR and Smart Utility Support
  • Superior Interference Mitigation

Pricing

£77.50 a device a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@intechnologyplc.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

1 8 3 6 2 6 6 5 9 8 4 9 9 4 4

Contact

InTechnology Plc Jamie Innes
Telephone: 01423 510 681
Email: tenders@intechnologyplc.com

Service scope

Service constraints
For the benefit of our customers we will allocate a pre-determined planned window which will be utilised to carry out any core infrastructure changes which may carry a minimal risk of disruption to service, or in some instances a period of service downtime which would be kept to an absolute minimum. In either instance, customers will be notified of the full details of the requirement with a minimum of 14 days’ notice prior to the maintenance window.
System requirements
InTechnology Wi-FI network services and or the internet are required

User support

Email or online ticketing support
Email or online ticketing
Support response times
The Inhealthcare support hours are Mon-Fri, 09.00 – 17.30 Additional support outside of these hours/ days will be provided via an on call process. The issue escalation process remains the same for the out of hours support, however the response times from Inhealthcare support team cannot be guaranteed. Responses from Inhealthcare support outside of support hours will be provided on a best endeavours basis.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 A
Web chat accessibility testing
No web chat testing has been completed with assistive technology users.
Onsite support
Onsite support
Support levels
As part of service all customers receive access to the 24x7/365 service desk at no extra cost. Customers will also have access to a customer service manager who will be their main point of contact in the event they have any escalations.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
The managed wireless service is provisioned based on the particular requirements of each individual location rather than using a generic design. This allows InTechnology to ensure that the coverage and performance of the network is tailored for each customer and to their particular requirements.

The service establishment process consists of an initial design, followed by an optional site RF survey and implementation visit.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
At the end of the contract with the customer and if the customer does not wish to renew their service.

InTechnology will assist the Customer in facilitating the orderly transition of the InTechnology Services (in whole or part) from InTechnology to the Customer or any replacement supplier upon the expiry or earlier termination of the agreement. This section sets out the principles regarding the service transition that form the base of an Exit Plan.
End-of-contract process
InTechnology shall produce an Exit Plan upon notification of termination of the agreement, in accordance with the principles set out in this section, as soon as practicable (but not later than 60 days) after any notice of termination of the agreement.

The Exit Plan shall, unless otherwise agreed with the Customer:
• address each of the issues set out in this Exit Plan in order to assist the Customer in facilitating the transition of the InTechnology Services from InTechnology to a replacement supplier or the Customer ensuring to the extent reasonably possible that there is no disruption in the supply of Services and that there is no deterioration in the quality of delivery of the Services during any period of transitional assistance;
• provide an estimate of the scope of transitional assistance that may be required by the Customer and suggest how such assistance might be provided (if required); and
• provide an estimate of InTechnology’s personnel that may be required to provide transitional assistance and suggest the management structure to be put in place and employed to provide such transitional assistance.

Using the service

Web browser interface
No
API
Yes
What users can and can't do using the API
The solution provides RESTful and SOAP based web service interfaces over HTTPS to enable application to application communications. The web services support a number of different authentication and authorisation options including BasicAuth, OAuth2 and mutual SSL certificate based authentication.
API automation tools
Puppet
API documentation
Yes
API documentation formats
  • HTML
  • PDF
Command line interface
No

Scaling

Scaling available
Yes
Scaling type
Manual
Independence of resources
We have monitoring and alarms in place on our platform to ensure that it has sufficient capacity and resources to ensure that users are not experiencing any degradation in service because of other users.
Usage notifications
Yes
Usage reporting
Email

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • Network
  • Number of active instances
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Hardware containing data is completely destroyed
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery
No

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
InTechnology's Managed Wi-Fi service does not provide guaranteed SLA's due to environmental factors which can affect the provision of its service. For example, the network provided by a third party organisation.
Approach to resilience
Where possible we operate all hardware components as minimum of N+1 – multiple network feeds, A+B power feeds, redundant PSU/memory/CPU, etc. The power to the data centre also has UPS backup and diesel generators so can withstand prolonged mains grid failure without interruption to service.
Outage reporting
As part of its ISO 27001 accreditation we have fully documented and well rehersed business continuity and major incident policies. In the unlikely event that a major incident is invoked an incident manager will be responsible for managing all external communication with customers. As part of its existing ISO 27001 and ISO 9001 accreditations we have a major incident policy which details the processes to be followed in the event of a major incident. As part of the contract with the customer we will appointment a customer account manager who will be the central point of contact between us and the customer and will ensure that both parties confirm to their respective major incident policies.

Identity and authentication

User authentication
  • 2-factor authentication
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
We ensure that as part of support and developments roles that users only have access to the systems that they require. In addition, certain access permissions are only opened for a limited time whilst activities such as upgrades or support investigations take place. This ensures that users do not have access to potentially sensitive information or make changes without access being opened up by a senior operative.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device over multiple services or networks

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
17/05/16
What the ISO/IEC 27001 doesn’t cover
All of the InTechnology Plc functions are covered by the ISO 27001 certification.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
As part of our ISO 27001 and ISO 9001 accreditation we have wide range of supporting information security policies and processes. These are meticulously followed within the organisation and your security and compliance manager ensures that all staff go through induction and regular training to ensure compliance. Any security incidents are logged by the security and compliance manager and are reviewed at quarterly forum meetings where representatives from all over the business, including the CEO are present.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
InTechnology is committed to continually improving and expanding its core network and data centre capabilities, thus striving to provide the highest levels of service to its customers. In order to facilitate these improvements, it is necessary to carry out essential work from time to time. These activities are carefully scheduled through the use of an internal change control process which is designed to present maximum visibility of that change and thereby ensure that planning and implementation are carried out to minimize the effect on customers and their network services.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We regularly perform patches to services based on the recommendations of software manufacturers. We sign up to mailing lists from software manufacturers so that we can be made aware of potential threats and then perform an internal risk analysis to determine how quickly a patch needs to be deployed.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Within its services we deploy different layers of monitoring to reduce the risk of compromises, including Firewalls with IDS / IPS and Anti-virus software. In the event a comprise was found we would invoke its major incident process to determine the extend of the compromise and from this the resulting actions which need to be undertaken.
Incident management type
Supplier-defined controls
Incident management approach
As part of its ISO 27001 and 9001 accreditation's we have a proven major incident process which ensures that all reported incidents are logged by service users from. In addition the policy ensures that incident reports are provided to users in the event of a major incident which details the root cause and the steps which have been undertaken to stop it occurring again in the future.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
No

Energy efficiency

Energy-efficient datacentres
No

Social Value

Fighting climate change

Fighting climate change

InTechnology delivers its digital services through the use of AWS (Amazon Web Services) Cloud technologies. We work with AWS to ensure that we are running our cloud operations as efficiently as possible, reducing our electricity and carbon footprint accordingly. In addition, AWS are on path to powering their operations with 100% renewable energy by 2025 further reducing the impact of cloud operations on the climate.
Covid-19 recovery

Covid-19 recovery

InTechnology has a number of companies within the group which support NHS organisations with digital services for Healthcare providers. InTechnology’s WiFi and smart city products are being used to support organisations in delivering care closer to home and providing greater access to technology in remote areas for healthcare professionals.
Tackling economic inequality

Tackling economic inequality

InTechnology WiFi’s products are used across a number of different towns and cities across the UK to ensure that citizens have free and equal access to the internet, supporting households who may not be able to afford private internet access within their homes.
Equal opportunity

Equal opportunity

InTechnology is an equal opportunity employer and we support a diverse workforce, promoting a good and harmonious working environment in which employees will be treated with dignity and respect.
Wellbeing

Wellbeing

At InTechnology we promote employee wellbeing and ensure that employees have access to support, coaching and guidance in the event that they feel they require any additional support outside of the work environment.

Pricing

Price
£77.50 a device a month
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@intechnologyplc.com. Tell them what format you need. It will help if you say what assistive technology you use.