Power Platform Solution Development (PowerApps, RPA and AI - Intelligent Automation)
Delivers PowerPlatform business solutions.
Primary skills in PowerApps, PowerAutomate, PowerBI and Microsoft RPA (PowerAutomate Desktop)
Features
- PowerApps
- PowerBI
- PowerAutomate
- RPA - Software Automation
- Reporting
- PowerPlatform
- Business Applications
- Virtual Agent 24/7
- Power Apps - Clinical Automation Power Automate Desktop
- Office365
Benefits
- Integrate all services and data with Office 365
- Show data from multiple data sources within a single application
- Automate data transfers and repetitive tasks
- Teams ensures the right audience for your custom PowerApp
- Customer Services
- Healthcare chatbot - Virtual Agent
- Office365
Pricing
£650 to £950 a unit a day
- Education pricing available
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at admin@digpacks.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 13
Service ID
2 6 6 2 0 5 3 4 8 2 8 1 3 9 8
Contact
DIGPACKS LTD
Bill Irvine
Telephone: 0203 576 0089
Email: admin@digpacks.co.uk
Service scope
- Software add-on or extension
- Yes
- What software services is the service an extension to
- PowerPlatform suite of products and services
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- Microsoft Office 365 licencing
- System requirements
- Office 365 licencing
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Depending upon agreement with client.
Within 24 hours as a standard. Monday to Friday. - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Standard support available Mon-Fri, 9am - 5pm
Other levels of support and technical account manager by individual agreement with client - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
We can have teams meetings.
Develop your application or service.
We will provide documentation on application usage and or support and can offer in person services if required. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- All data is likely to be held on customers own environment.
- End-of-contract process
-
Contract will be for development of applications and/or services.
After application is built and delivered, our relationship can end.
Or, we can provide support for a period of time, eg: 12 months. When that support period is complete, again, our relationship can end or we can continue the support contract.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- No difference between the SERVICE. The applications we develop may be designed for different user interface functionality - ie: less screen space ona mobile device to desktop - so maybe show less controls
- Service interface
- No
- User support accessibility
- WCAG 2.1 AAA
- API
- No
- Customisation available
- Yes
- Description of customisation
- We offer a custom business application service. The customisations come by design.
Scaling
- Independence of resources
- This is provided and back by Microsoft PowerPlatform services
Analytics
- Service usage metrics
- Yes
- Metrics types
- Microsoft PowerPlatform admin centre provides full metrics on customer usage
- Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- Never
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Data is held in clients own environment
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
-
We work off the back of the Microsoft PowerPlatform
We rely on Microsoft availability, that is also what ourcustomers will be relying on as their custom applications will be accessing this directly - Approach to resilience
- We do not have our own data center. Weuse cloud services from the Microsoft PowerPlatform
- Outage reporting
- Email alerts from Microsoft
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- We use Microsoft security groups to manage permissions for resources. Membership of these groups are under constant review at director level.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Acceptable Encryption and Key Management Policy.
Acceptable Use Policy.
Clean Desk Policy.
Data Breach Response Policy.
Disaster Recovery Plan Policy.
Personnel Security Policy.
Data Backup Policy.
User Identification, Authentication, and Authorization Policy.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Our main clients are NHS trusts, we comply to their change management processes operated at the ISO 27001 standard.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
How you assess potential threats to your services:
Antivirus software which provides vulnerability assessments and recommendations. This is also updated automatically when new virus/malware definition files are available.
How quickly you deploy patches to your services:
We ensure that our organsiations assets are centrally managed, and enforce bi-weekly patch management.
Where you get your information about potential threats from:
For our cloud service, we analyse the Office 365 security center to identify any risks to our services. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
How you identify potential compromises:
Microsoft 365 Defender to identify potential compromises to our cloud service.
We run attack simulation training throughout the organisation so that our staff can experience how to respond to a threat.
Check device compliance to ensure that each device connected to the environment is secured.
how you respond when you find a potential compromise:
Take device offline
Force sign out of all cloud services
Run relevant security tools to resolve situation
how quickly you respond to incidents
We get alerted via email to any security incidents and respond immediately. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Our incident management process begins with a dedicated Microsoft Form that is available for users to complete. Upon creation, this is automatically sent to the triage team to manage the escalation and assignment of the incident. All incidents are logged and progress monitored and status assigned.
We review all incidents at service management meetings on a daily basis.
Standard common events are pre-approved and have their own specific SLA.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Wellbeing
-
Wellbeing
All our employees are given flexible working at any time, if they feel they need time off work, they can have it.
We like to encourage our employees to have a good work/life balance and we encourage them to develop external interests, even if it means performing these during business hours.
We are looking in the near future to bring in employee gym membership and at all times are conscious of removing any stigma against mental and physical well being.
All matters related to employee well being are treated in the strictest confidence.
Pricing
- Price
- £650 to £950 a unit a day
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
-
We often provide FREE applications for our public sector customers, such as our 'Asset Booker' application.
This is a fully fledged, Free application with no expiration period.
https://www.youtube.com/watch?v=ADRulha4p6o
https://www.youtube.com/watch?v=oFaUTKvaMVI - Link to free trial
- https://www.youtube.com/watch?v=oFaUTKvaMVI
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at admin@digpacks.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.