Across Microsoft 365, get total control and visibility of 'who has access to what'. Designed for business users, automated for IT, and trusted by security and compliance. Simple, intelligent and automatic, Torsion empowers business data owners to take responsibility for their own data. Seamlessly in Teams, SharePoint and OneDrive.


  • Comprehensive visibility of data access for business owners and IT
  • Dynamic automatic access controls
  • Security certification campaigns
  • Automated security issue detection and resolution
  • Attribute-based access controls
  • Comprehensive reporting on all data, users and access
  • Strategic focus on business users, as well as IT
  • Works consistently across SharePoint, Teams, OneDrive
  • Vast and complex data access controls run on auto-pilot
  • Shift responsibility towards the data users, without being a burden


  • Get visibility and control of 'who has access to what'
  • Data security through precise, automated control of access
  • Simplify compliance, it simple to demonstrate control under audit
  • Save money by removing manual governance processes
  • Democratize your data, by engaging responsibility of the data owners
  • Get control of external sharing
  • Ensure security and compliance
  • Intelligently pinpoint inappropriate access, and automatically fix it
  • Seamlessly embedded inside existing systems
  • Simple – no user training required


£17.08 to £38.60 a user a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 13

Service ID

2 3 9 1 7 8 7 2 1 0 9 2 4 3 1


Telephone: +447767017981

Service scope

Software add-on or extension
What software services is the service an extension to
Microsoft 365
Office 365
Cloud deployment model
Private cloud
Service constraints
Torsion connects to the customers' Microsoft Office 365 collaboration tools, including SharePoint, Teams and OneDrive.
System requirements
Microsoft Office 365

User support

Email or online ticketing support
Email or online ticketing
Support response times
Same business day.
User can manage status and priority of support tickets
Phone support
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Customer support sessions are typically carried out online via Teams or Zoom.
Web chat accessibility testing
Onsite support
Support levels
Level 1, 2 and 3 support are all available.
Support costs and model will depend on the customer circumstance and whether a delivery partner (such as a partner consultancy) is involved in the customer relationship. Engaging our direct support is available, in which a product support engineer will be assigned to the ticket directly.
Support available to third parties

Onboarding and offboarding

Getting started
Customers have access to a considerable library of documentation, videos and online help. Furthermore, partner consultancies are fully trained and available to support customers to onboard the solution according to their unique requirements and circumstances.
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Depending on the data required, some extraction functionality is available through the product via the extensive reporting capabilities. All other data can be extracted and delivered to the customer upon request.
End-of-contract process
Prior to the end of the contract subscription period, the customer will be contacted to discuss whether the subscription shall be renewed. If the customer chooses to renew, payment is received and the service continues without interruption. If the customer declines to renew, the service discontinues on the expiry date. 30 days after the expiry date, all customer data is deleted. This deletion can be completed earlier upon request.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Designed for use on mobile devices
Service interface
User support accessibility
None or don’t know
Customisation available
Description of customisation
The service is configured as part of deployment. The configuration is reflects the Data Access Governance requirements of the customer organisation. Configuration is carried out by IT administrators through a simple administration console.


Independence of resources
We create a unique and isolated set of all application services, databases ands communication channels for every customer. This logically isolates each customer from a system performance perspective.


Service usage metrics
Metrics types
All user actions within Torsion are tracked and reportable in various ways. e.g. Torsion is able to orchestrate a Security Certification Campaign, whereby data owners are periodically requested to certify the access to their own information. All user actions, certification outcomes, deadline slippages and results are included in the available reports.
Reporting types
Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Export / reporting functionality is built into the service. Reports are generated in Microsoft Excel format.
Data export formats
Other data export formats
Microsoft Excel
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
We're able to offer a 99.9% uptime SLA, with any overruns being reimbursed in service credits.
Approach to resilience
All service components (web servers, application servers, databases, communication buses, etc) are based on highly available cloud infrastructure, which includes the ability to rapidly replicate, failover, scale and respond to all resilience events.
Outage reporting
Email alerts are shared with customers and partners.

Identity and authentication

User authentication needed
User authentication
Identity federation with existing provider (for example Google Apps)
Access restrictions in management interfaces and support channels
Logins to the administration console are provided by the administrator's Office 365 identity. Each account in the Torsion administration console is assigned a role, which controls which areas of functionality and data they are able to access or modify. Possible roles include Compliance Auditor, IT Administrator, Full Control. Limitations can also be enforced according to organisational boundaries.
Access restriction testing frequency
At least every 6 months
Management access authentication
Identity federation with existing provider (for example Google Apps)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Cyber essentials
Cyber essentials plus
Other security certifications
Any other security certifications
Microsoft Co-Sell Ready

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
The CTO takes direct responsibility for the security of the service. The CTO reports to the CEO, who in turn is responsible for all commercial relationships within and outside of the organisation. Our security practices are externally audited on an annual basis against all ISO27001 requirements, and the results of each successful annual audit are shared with all stakeholders.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All solution components are carefully tracked, defined, documented, change controlled, tested and monitored on a constant basis. This tracking and monitoring is carried out using a range of services including Azure DevOps, Grafana and ZenDuty. Every component is wrapped in an enormous array of automated and manual tests, which are carried out whenever anything changes, and released only when all tests have passed without incident. Customers are advised ahead of all solution updates.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Potential threats are evaluated on a constant basis by the CTO. Internal and external testers are constantly engaged to develop and execute more and more system testing which is aimed at identifying vulnerabilities. All logs of firewalls and externally-facing systems are reviewed regularly. Any discovered vulnerabilities are patched within 2 business days, and typically much more quickly than that.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
The system is constantly monitored by a range of bespoke and third-party applications. The monitoring observes system stability, performance, security, access and all user / administrator actions. All monitoring is consolidated in a single dashboard, which includes real-time alerting for engineers in response to any potential incidents. At least one engineer is on-call at all times, providing 24/7 rapid response to all incidents.
Incident management type
Supplier-defined controls
Incident management approach
We do have a range of pre-defined processes for common events. These processes are automated where possible, and documented where this is more appropriate. Users are able to report incidents via a support ticketing system. Where appropriate, users are kept up to date regarding affected incidents through regular reports through to resolution.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks

Social Value

Fighting climate change

Fighting climate change

As Torsion will enable workers to continue to work remotely without compromising business data security our software can play a pivotal role in the move towards home working for those that want or need it. The environmental advantages created by a drastic reduction of commuting is clear. The UK daily commute produces over 77 million tons of CO2 emissions annually (CompareMyMove, 2020). Removing this entirely would meet 1/3rd of the UK’s emissions targets. Reducing the number of commuting journeys by the equivalent of 1 day per person per week would still save over 15 million tons of CO2 emissions per year.

A key reason why many large organisations are hesitant to move their information management systems into the cloud is concern over data security, with 66% of IT professionals say security is the biggest concern (RedLock, 2019). When sensitive files are stored in the cloud instead of on-premises servers, they can be accessed from anywhere, at any time, and so controlling access to those files becomes more difficult. However, cloud data centres are far more efficient than company-operated server rooms – cloud data centres often have their own sustainable carbon-minimised power generation, and are designed with environmental considerations as priority. Company-operated server rooms, by contrast, run on regular grid power, with no particular consideration for environmental impacts. One study found Amazon Web Services cloud servers to be 3.6 times more energy efficient than the average US company’s server rooms, (541 Research, 2019), and that is before any green energy generation is considered. Torsion enables organisations to remove their security concerns about the cloud, and thus embrace more environmentally efficient cloud computing services.
Covid-19 recovery

Covid-19 recovery

In terms of environmental sustainability, Torsion enables organisations to maintain data security whilst staff work remotely. Whilst the initial catalyst for the dramatic shift to home working was Covid-19, 50% of large UK businesses have not yet implemented a return to office plan (BBC, 2020). The drive for more remote working is increasing - 40% of businesses reported an increase in productivity during lockdown, and 85% of businesses are now expanding their remote working policies as a result of the pandemic so they can be continued post-lockdown (City AM report, June 2020). Security issues are the most common reason people gave pre-lockdown as the reason they weren’t able to work remotely (Seareach, 2020).


£17.08 to £38.60 a user a year
Discount for educational organisations
Free trial available
Description of free trial
We provide an unlimited 30-day free trial. All service features are available without limitation during the trial period.
Link to free trial

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.