WR LOGIC LIMITED

Microsoft Power Platform: Power Apps Implementation

WR Logic's Microsoft Azure Power Platform Services offer expertise in designing, implementing, and adopting transformative Microsoft Power Platform Solutions. This includes Power BI, Power Apps, Power Automate, Power Virtual Agents, AI Builder, and Power Apps Portals. They guide clients through every phase, from design to support, ensuring successful implementation.

Features

  • Licensing, consulting, implementing, and supporting Microsoft Power Apps.
  • Swift setup, customisation, and deployment of Power Platform solutions.
  • Gather needs through workshops to determine Power Apps requirements.
  • Aid in envisioning and validating concepts with proof of concept.
  • Strategise transformations and manage change during project execution.
  • Practical Power Apps tutorials for hands-on experience and learning.
  • Connect Power Apps to various data sources using built-in connectors.
  • Backing for technical, organisational adoption, and skill enhancement.
  • Services for Power Automate, Power BI, and Power Virtual Agents.
  • Comprehensive Microsoft Power Platform solutions for diverse business needs.

Benefits

  • Profound knowledge from trusted Microsoft Cloud Partner enhances implementations.
  • Employ secure cloud services for data protection and accessibility.
  • Cost reduction via canvas-apps, replacing expensive native app development.
  • Expedite solutions with efficient low-code/no-code development strategy.
  • Empower all to create apps with readily available templates.
  • Enable on-the-move access with a comprehensive mobile-ready platform.
  • Leverage advanced analytics for data-driven insights in real-time.
  • Streamline workflows with seamless integration of Power Automate.
  • Optimise operations using Dynamics 365 for enhanced business management.
  • Elevate efficiency with scalable and adaptable Power Platform solutions.

Pricing

£980 a person

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at contact@wrlogic.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

2 0 8 9 3 1 1 2 1 9 3 1 1 2 4

Contact

WR LOGIC LIMITED Navneet Rojas
Telephone: 07414221313
Email: contact@wrlogic.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
No Specific constraints depending on architect agreed with customer.
System requirements
  • Microsoft Office 365 licences
  • A platform capable of hosting Microsoft services

User support

Email or online ticketing support
Email or online ticketing
Support response times
Our support arrangements are tailored to your specific needs, as our experience shows that no 'one-size' fits all requirements. We will discuss services, service levels, response times, communication channels and reporting to agree your requirements specifically for the managed services you wish to procure.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Yes, at an extra cost
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
We would be pleased to discuss any requirements you may have and provide a service that meets those requirements.
Onsite support
Yes, at extra cost
Support levels
24x7 Remote Support Standard SLA's can be negotiated and agreed Level 1 - Level 4 Engineer available Certified Microsoft and AWS Engineers Security Clearance up to DV Our Managed Service offering is driven by your requirements rather than a standard service catalogue, this allows you to tailor the right level of support for your needs. Our service can include the following: 1 Hour Response; Portal Setup; OS patching; 24 x 7 Proactive Monitoring; AV Management; 30 Day Managed Backup; Application Monitoring; Custom Restores; Service Management; Direct Access to 3rd Line Support; Problem Management; Service Levels and Service Credits; and Advanced Infrastructure Management.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide training options as standard as part of the offering for operations and end-users of the system
Service documentation
Yes
Documentation formats
  • PDF
  • Other
Other documentation formats
Microsoft Word
End-of-contract data extraction
All data remains the property of the customer. WR do not create any bespoke data containers so data can be extracted using a variety of industry standard solutions or WR can offer services to perform migrations to a new system.
End-of-contract process
At the end of the contract, the customer owns all of the contracted deliverables. Any WR IP that is separately licenced reverts to WR and must cease to be used. WR licenced IP in the PowerApps space is used to accelerate on-going development for customer teams. The remaining products will continue to operate without this IP.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
No feature differences. Layouts will auto adapt dependent on screen configuration.
Service interface
No
User support accessibility
WCAG 2.1 AA or EN 301 549
API
Yes
What users can and can't do using the API
Standard Microsoft API's.
API documentation
No
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
The services are customisation services.

Scaling

Independence of resources
We deliver our off-premise services via the Microsoft Cloud (Azure/O365).

Analytics

Service usage metrics
Yes
Metrics types
Metrics will be provided via PowerApps Admin Analytics tools.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least every 6 months
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Data is kept in standard data formats and can be extracted at any time by the customer using standard Microsoft or other products.
Data export formats
  • CSV
  • Other
Other data export formats
  • SQL Backpacks
  • Other Database Export Formats
Data import formats
  • CSV
  • Other
Other data import formats
  • SQL Backpacks
  • Other Database Formats

Data-in-transit protection

Data protection between buyer and supplier networks
Other
Other protection between networks
Customer own responsibility for the network all the way to the Microsoft Cloud.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
There are no WR specific SLA's since all the services reside on customer infrastructure or the Customers Azure environment.
http://www.microsoftvolumelicensing.com/Downloader.aspx?DocumentId=13655
Approach to resilience
http://aka.ms/Office365DR
Outage reporting
Via the Service status portal.

Identity and authentication

User authentication needed
No
Access restrictions in management interfaces and support channels
We supply permissions based on the customers active directory.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Our Services are delivered within the customer or Microsoft environments and we follow and comply with customer and Microsoft security policies.
FISMA/FedRamp, EU Model Clauses, HIPAA/HITECH, ISB 1596, ISO 27018, SASE16 SOC1 & SOC 2
Information security policies and processes
Our Services are delivered within the customer or Microsoft environments and we follow and comply with customer and Microsoft security policies.
FISMA/FedRamp, EU Model Clauses, HIPAA/HITECH, ISB 1596, ISO 27018, SASE16 SOC1 & SOC 2

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Once created the environment is managed by the customer and WR do not apply any changes other than those requested by customer following their change control procedures.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
This runs in the Microsoft environment, the office 365 and Azure vulnerability management approach applies.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
This runs in the Microsoft environment O365 and Azure, these processes are applied.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Please see http://aka.ms/Office365SIM

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Fighting climate change

Fighting climate change

WR Logic adopts a policy of "work from anywhere" with its employees. Remote work contributes to reducing emissions.
We also adopt a paperless approach and all our processes are handled digitally. This reduces our impact on forests, decreases the amount of waste that is dumped into landfills, cuts energy use and helps lessen the impact of climate change

Pricing

Price
£980 a person
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at contact@wrlogic.com. Tell them what format you need. It will help if you say what assistive technology you use.