Strategic planning and project management of MS Azure
We redesign existing/create new services, identifying the technology, systems, data, staff, partnerships, and capabilities needed to deliver them. Our strategic planning services deliver cost-optimised, quality-assured solutions, providing certainty of outcome for our clients by adopting proven project management and planning practices through tailored engagement models.
Features
- project management
- Prince 2
- Managed Service Provider MSP
- LEAN six sigma
- Value chain
- Consultancy
- Azure intunes and tenant implementation
- Azure Defender setup and implementation
- Azure Sentinel setup and implemenation
Benefits
- Budget optimisation
- Budget control
- Decreased delivery timescales
- Market management
- System optimisation
- Business growth
- Quality assurance
Pricing
£250 to £550 a unit a day
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 4 8 3 7 8 7 7 8 5 7 6 5 1 3
Contact
BEMA CYBER TECH LIMITED
Theron Lessey
Telephone: 07789647997
Email: theron.lessey@bemacybertech.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Hybrid cloud
- Service constraints
- None
- System requirements
- N/A
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Bespoke to need
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- Chat messaging function
- Onsite support
- Onsite support
- Support levels
- Bespoke to the project
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Bespoke consultancy services and tailored support
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
- Bespoke consultancy services and tailored support
- End-of-contract process
- Bespoke consultancy services and tailored support
Using the service
- Web browser interface
- No
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Any device -bespoke services
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- No
- Customisation available
- Yes
- Description of customisation
- Bespoke services
Scaling
- Independence of resources
- Bespoke consultancy services and tailored support
Analytics
- Service usage metrics
- Yes
- Metrics types
- Bespoke consultancy services and tailored support
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Bespoke consultancy services and tailored support
- Data export formats
-
- CSV
- ODF
- Data import formats
-
- CSV
- ODF
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Bonded fibre optic connections
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- Bespoke consultancy services and tailored support
- Approach to resilience
- Available on request
- Outage reporting
- Dashboard available
Identity and authentication
- User authentication needed
- Yes
- User authentication
- 2-factor authentication
- Access restrictions in management interfaces and support channels
- N/A
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Citation
- ISO/IEC 27001 accreditation date
- 02/03/21
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- Yes
- CSA STAR accreditation date
- Feb 2021
- CSA STAR certification level
- Level 2: CSA STAR Attestation
- What the CSA STAR doesn’t cover
- N/A
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- We work to GDPR levels of security, and all Information Security Policies and Processes are well documented. We provide thorough training to all authorised users on these policies, and we conduct regular and random checks to ensure that policies and protocols remain compliant.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- We work to recognised standards, details available on request.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- We work to recognised standards, details available on request.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- We work to recognised standards, details available on request.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- We work to recognised standards, details available on request.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
BCT is committed to fighting climate change through our social value priorities. We are committed to identifying and delivering opportunities to remove or reduce any negative environmental impacts. We recognise that in our day-to-day operations we inevitably influence the local, regional, and global environment in different ways, and we work to minimise the potentially harmful effects of our activities wherever and whenever possible. We are committed to the principles of sustained improvement of the environmental impact of our business activities and seek to achieve the following environmental objectives. BCT: • Encourages use of public transport, where practical, together with car sharing • Ensures employees are aware of the fuel consumption and emissions of vehicles • Encourages all staff to have their vehicles properly serviced and maintained to achieve optimum operating efficiency. Where practicable we will: • Reduce the need to travel, restricting to necessity trips only • Promote the use of travel alternatives such as email, video/phone conferencing • Make additional efforts to accommodate the needs of those using public transport or bicycles To minimise the adverse environmental impact associated with the activities conducted in our office, we: • Minimise the use of paper in the office • Where possible, prioritise reuse over recycling or disposal (i.e. office furniture) • Seek to buy recycled and recyclable paper products and other consumables • Recycle all paper where possible • Evaluate the environmental impact of any new products we intend to purchase • Encourage the electronic transfer of data, information, and messages to reduce paper and toner usage.
Pricing
- Price
- £250 to £550 a unit a day
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- To be agreed