Dynamics 365 and PowerPlatform Business Value Assessment ROI Build
VE3 introduces the Business Value Assessment ROI Navigator, meticulously crafted to assist in formulating, strategizing, and implementing business transformation endeavors. Comprising a structured three-stage process encompassing Envisioning, Business Value Assessment, and Solution Assessment, this tool is tailored to equip you with insights and preparedness for navigating disruptive changes.
Features
- Customer Service Management, Tenant Management and Property Management
- Contractor Management and Maintenance Management
- Compliance Management
- Document Management
- Out of the box integration with other Microsoft technologies
- Built in security, compliance and governance
- End to end business process and workflow automation
- IT Service Management (ITSM)
Benefits
- Reduce costs through automated business processes / efficient operational developments
- Integration to systems across authority provides single view of customer
- Reduce costs by providing citizen self service capabilities
- Delivers time savings, improves efficiencies, provides rapid time to value
- Enhance customer satisfaction with personalised and automated services
- Establish a digital platform and take advantage of latest technology
- Low code/ no code rapid app deployment as services evolve
- Improve overall operational and administrative efficiency
- Proactive reporting / trend analysis to maximise improved service provision
Pricing
£175 to £850 a unit
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 3 4 5 0 3 0 5 8 4 8 9 5 3 7
Contact
Ve3 Global Ltd
Nikhil Alex
Telephone: 02045520840
Email: prime@ve3.global
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Microsoft Dynamics 365 and Microsoft Azure
- Cloud deployment model
- Public cloud
- Service constraints
- Internet Access is required to connect to the applications.
- System requirements
- Most up-to-date web browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Support response times Customers will be able to take advantage of industry leading certified engineers and experts on the end of the phone 24x7x365.The service desk is backed by ITIL aligned process and provides comprehensive Response SLAs from P1 to P5:
P1 - 30 Mins
P2 - 1 Hour
P3 - 4 Hours
P4 - 1 Day
P5 - 2 Days
All incidents are recorded in VE3’ Service Desk ITSM system under the Incident Management workflow.VE3 records the name of the person reporting the incident,call time and any pertinent information,along with resolution criteria ensuring that the workflow is initiated correctly. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
We offer two levels of Support below:
- Standard
Portal Access
Telephone and remote diagnostics for faults
Service Desk - Non Business Critical
Service Desk - Business Critical faults
Priority Escalation to Vendor for faults
- Enhanced
*Includes standard offerings
Customer Success
Service Reviews
Change Architecture Validation - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- At VE3, we believe that helping our clients prepare for, implement and manage organisational change is paramount if they are to achieve long-term success. VE3 are highly focussed on helping customers to achieve full user adoption and our implementation methodology has been proven to create an environment that makes success much more likely by focussing on ongoing knowledge transfer and training.
- Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
- MS Word
- End-of-contract data extraction
- Should the contract end for any reason, ANS will need to assess what steps need to be followed to ensure data is extracted efficiently.
- End-of-contract process
- This scenario will need to be discussed on a case by case basis. Access to the support service will end when the contract does.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
Microsoft provide a mobile application for iOS (10+), Android (4.4+) and Windows (10+) which can be configured to provide access to records within D365.
Alternatively, The unified interface in Dynamics 365 ensures that if you chose to access the application via a web browser on a mobile, desktop or tablet, the experience of using and navigating 365 will be the same - Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- The unified interface for Dynamics 365 ensures that accessing the application on different devices such as tables, desktops and mobiles will look and feel the same. Ensuring the user experience is streamlined across multiple form factors.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- Via a web broswer and URL.
- API
- Yes
- What users can and can't do using the API
- This can be controlled and configured by VE3
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Dynamics 365 can be fully configured to suit the customer's specific requirements. As part of our implementation process, VE3 will teach your core team how to manage and configure the solution moving forward.
Scaling
- Independence of resources
- Dynamics 365 is hosted by Microsoft. This service includes platform monitoring allowing you to see in real-time if there are any performance issues
Analytics
- Service usage metrics
- Yes
- Metrics types
- Dynamics includes an admin centre where you can monitor
- Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Reseller (no extras)
- Organisation whose services are being resold
- Dynamics 365 Licences
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- No
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Using standard out-of-the box export functionality within Dynamics 365
- Data export formats
- Other
- Other data export formats
-
- XML
- XLSX
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- XML
- XLSX
- TXT
- ZIP
Data-in-transit protection
- Data protection between buyer and supplier networks
- Private network or public sector network
- Data protection within supplier network
- Other
- Other protection within supplier network
- N/A
Availability and resilience
- Guaranteed availability
- Microsoft maintain service availability. The admin centre allows you to see any potential downtime or issues that may have caused the system issues for any given reason.
- Approach to resilience
- Multiple data centres around the world
- Outage reporting
- Dynamics 365 gives you access to the admin centre where users can monitor the availability of applications in real-time
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
-
Ensure that users assigned to the project can access the system for the duration needed.
The support team will only be able to access the system agreed within the support contract, as and when it's needed - Access restriction testing frequency
- Never
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- EGAC
- ISO/IEC 27001 accreditation date
- 06/01/2024
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- ISO 14000-1
- ISO 22301
- ISO 22301
- ISO 9000-1
- ISO 20000-1
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- Cyber Essentials
- Information security policies and processes
-
Approved and mandated from the Executive with day-to-day responsibility delegated to the Business Assurance Manager, with every manager in the business having responsibility for
ensuring their teams apply the policies and procedures.
The framework consists of ISMS Manual, supported by detailed procedures. All of this is made available to staff on the VE3 intranet, who are directed to read and digest its content as part of ongoing security training and agree to its adherence as part of their contract of employment.
Security procedures are internally audited annually, and subject to annual external surveillance audit.
The Business Assurance Manager reports to the COO for taking direction and providing feedback on ISMS measurements. Further responsibility is addressed with key Senior Managers and procedure owning Managers in the Business Assurance Co-ordination Team, which is supported by a cross business Cyber Security team.
All staff attend induction training as they join VE3, followed by completion of a full security training course within 3 months. Refresher training is provided on an ongoing basis, with specialist training aimed at specific job roles. Ongoing security awareness is provided through newsletters, company-wide “just-in-time” e-mail bulletins, large information screens in the offices, and sessions at the quarterly “All-staff” meetings.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Internal VE3 Change is managed through the application of standard project management process with all projects progressing through approval, CAB review and sign off by stage. All VE3 Business Change includes the following managed stages (whether these are deployed on a formal or informal basis is determined by the size of the project, by cost, resource application and risk):
• Executive or Higher Management sponsor
• Business Case and Success Criteria
• Scope definition
• Documentation
• Risk & Opportunity assessment
• Milestone or stage review
• Stage sign off
• Final Review
• Testing
• Deployment
• Lessons Learned - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Though these are developed in line with ISO27001 and Cyber Essentials, the vulnerability management approach is dictated by the specific requirements of the Application being developed.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
VE3 has implemented an Information Security Management System (ISMS) that has been verified by our external accreditor to be compliant with the international standard for Information Security Management, ISO/IEC 27001. This system is supported by the ISMS manual, detailed policies and procedures, and underpinned by the pragmatic application of industry best practice. The ISMS defines VE3’ approach to its key protective security functions, corresponding in turn to the requirement of the standard (ISO/IEC 27001:2013).
We use the ISMS to develop a Protective Security environment, focusing on the Physical, Personnel and Information assets. - Incident management type
- Supplier-defined controls
- Incident management approach
- Our incident management approach is designed inline with ITIL v.3 standards and Agile methodologies.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Our G-Cloud service provision is deeply committed to fighting climate change, recognizing the urgent need for collective action to address environmental challenges. Here's how our services deliver against this social value theme:
Environmental Sustainability in Operations:
We prioritize running efficient operations to reduce emissions and minimize environmental impacts. This includes implementing energy-efficient practices, optimizing resource usage, and adopting renewable energy sources wherever possible within our data centers and infrastructure.
Promoting Sustainable Practices:
VE3 actively engages with our suppliers and clients to promote sustainable business practices. Through our services, we advocate for the adoption of environmentally friendly technologies, responsible sourcing, and waste reduction strategies, thereby reducing carbon footprints across the supply chain.
Responsible by Design Framework:
Our G-Cloud services adhere to a 'Responsible by Design' framework, ensuring that environmental considerations are integrated into the development and deployment of digital solutions. By prioritizing environmental protection and minimizing negative impacts, we strive to deliver sustainable outcomes for our clients.
Training and Education:
VE3 invests in training and education programs focused on environmental sustainability. Through initiatives like the Sustainability Quotient (SQ) training, we equip our teams with the knowledge and skills to adopt climate-smart behaviors and implement environmentally conscious practices in their work.
Community Engagement:
We actively engage with communities to support environmental objectives and promote climate action. By partnering with local organizations and stakeholders, we contribute to initiatives aimed at addressing climate change, such as tree planting programs, clean energy projects, and environmental education campaigns.Covid-19 recovery
Our G-Cloud service provision plays a crucial role in supporting the COVID-19 recovery effort by facilitating resilience, adaptation, and innovation in the face of unprecedented challenges. Here's how our services contribute to the recovery process:
Remote Work Enablement:
VE3's digital solutions empower organizations to transition to remote work seamlessly. By providing secure and reliable cloud-based infrastructure, collaboration tools, and remote access solutions, we enable businesses to maintain productivity while ensuring the safety and well-being of their employees.
Business Continuity Planning:
We assist organizations in developing and implementing robust business continuity plans to mitigate disruptions caused by the pandemic. Our services include data backup and recovery solutions, disaster recovery planning, and resilience testing to ensure operational continuity in the face of unforeseen events.
Digital Transformation Acceleration:
VE3 accelerates digital transformation initiatives to help organizations adapt to the new normal. By modernizing legacy systems, implementing cloud-based technologies, and digitizing processes, we enable businesses to optimize efficiency, improve agility, and remain competitive in a rapidly evolving landscape.
Healthcare Support Solutions:
We provide specialized healthcare support solutions to assist frontline workers and healthcare organizations in responding to the COVID-19 crisis. This includes telemedicine platforms, patient management systems, and data analytics tools to enhance patient care, streamline operations, and support decision-making processes.
Economic Stimulus through Innovation:
VE3 fosters innovation and entrepreneurship to stimulate economic recovery in the aftermath of the pandemic. Through our G-Cloud services, we support startups, small businesses, and enterprises in developing and deploying innovative solutions that address emerging challenges, create new opportunities, and drive economic growth.Tackling economic inequality
We recognize the importance of tackling economic inequality and are committed to leveraging our G-Cloud service provision to address this pressing social issue. Here's how our services contribute to tackling economic inequality:
Access to Affordable Technology:
We strive to make cutting-edge technology accessible and affordable to all, regardless of economic status. By offering scalable and cost-effective cloud-based solutions, we enable organizations, including small and medium-sized enterprises (SMEs) and underserved communities, to access the tools and resources they need to compete in the digital economy.
Skills Development and Training:
VE3 invests in skills development and training programs to empower individuals with the knowledge and expertise needed to thrive in the digital age. Through initiatives like online courses, certifications, and workshops, we equip people from diverse backgrounds with the skills required for high-demand roles in technology and innovation, thereby enhancing their employability and economic prospects.
Support for Minority-Owned Businesses:
We actively support minority-owned businesses and entrepreneurs by providing access to mentorship, networking opportunities, and resources to help them grow and succeed. Through initiatives like supplier diversity programs and partnerships with minority business organizations, we promote inclusion and diversity in the technology sector and contribute to creating more equitable economic opportunities.
Digital Inclusion Initiatives:
VE3 is committed to promoting digital inclusion and bridging the digital divide by ensuring that everyone has access to essential digital services and technologies. We collaborate with governments, nonprofits, and community organizations to implement initiatives such as digital literacy programs, affordable internet access schemes, and community technology centers, thereby empowering underserved populations and promoting economic equity.
Fair and Transparent Procurement Practices:
We adhere to fair and transparent procurement practices to create opportunities for businesses of all sizes and backgrounds to participate in government contracts and procurement processes.Equal opportunity
We recognize the importance of tackling economic inequality and are committed to leveraging our G-Cloud service provision to address this pressing social issue. Here's how our services contribute to tackling economic inequality:
Access to Affordable Technology:
We strive to make cutting-edge technology accessible and affordable to all, regardless of economic status. By offering scalable and cost-effective cloud-based solutions, we enable organizations, including small and medium-sized enterprises (SMEs) and underserved communities, to access the tools and resources they need to compete in the digital economy.
Skills Development and Training:
VE3 invests in skills development and training programs to empower individuals with the knowledge and expertise needed to thrive in the digital age. Through initiatives like online courses, certifications, and workshops, we equip people from diverse backgrounds with the skills required for high-demand roles in technology and innovation, thereby enhancing their employability and economic prospects.
Support for Minority-Owned Businesses:
We actively support minority-owned businesses and entrepreneurs by providing access to mentorship, networking opportunities, and resources to help them grow and succeed. Through initiatives like supplier diversity programs and partnerships with minority business organizations, we promote inclusion and diversity in the technology sector and contribute to creating more equitable economic opportunities.
Digital Inclusion Initiatives:
VE3 is committed to promoting digital inclusion and bridging the digital divide by ensuring that everyone has access to essential digital services and technologies. We collaborate with governments, nonprofits, and community organizations to implement initiatives such as digital literacy programs, affordable internet access schemes, and community technology centers, thereby empowering underserved populations and promoting economic equity.
Fair and Transparent Procurement Practices:
We adhere to fair and transparent procurement practices to create opportunities for businesses of all sizes and backgrounds to participate in government contracts and procurement processes.Wellbeing
Environmental Sustainability:
We are committed to environmental sustainability as a core component of wellbeing. By prioritizing eco-friendly practices, resource conservation, and carbon reduction efforts in our operations and services, we contribute to creating a healthier and more sustainable environment. We prioritize the wellbeing of individuals and communities in all aspects of our G-Cloud service provision. Here's how our services contribute to enhancing wellbeing:
User-Centric Design:
VE3 designs our G-Cloud services with a user-centric approach, prioritizing usability, accessibility, and intuitive design. By focusing on the needs and preferences of users, we create digital experiences that enhance overall wellbeing by reducing frustration, stress, and cognitive load.
Health and Safety Protocols:
We implement robust health and safety protocols to protect the wellbeing of employees, clients, and partners. This includes adherence to strict security standards, data privacy regulations, and compliance with industry best practices to ensure the safety and integrity of our digital infrastructure and services.
Promotion of Work-Life Balance:
VE3 recognizes the importance of work-life balance in maintaining overall wellbeing. Through our G-Cloud services, we enable remote work, flexible scheduling, and collaboration tools that empower individuals to achieve a healthy balance between their professional and personal lives, leading to greater job satisfaction and wellbeing.
Mental Health Support:
We prioritize mental health support for our employees and clients by offering resources, programs, and initiatives aimed at promoting mental wellbeing. This includes access to counseling services, mindfulness training, stress management workshops, and employee assistance programs designed to support individuals in times of need.
Community Engagement and Social Impact:
VE3 actively engages with communities to address social determinants of health and promote holistic wellbeing. Through partnerships, philanthropic initiatives, and volunteer efforts, we support local organizations and projects focused on improving access to healthcare, education, housing, and other essential services that contribute to overall community wellbeing.
Pricing
- Price
- £175 to £850 a unit
- Discount for educational organisations
- Yes
- Free trial available
- No