Salesforce Hyperforce Lightning Sales Cloud
Supporting government’s drive for intelligent revenue generation and comprehensive stakeholder management, Salesforce’s citizen 360 allows tracking of relationships, activities and tasks and easy process automation. From stakeholder to grant and opportunity management, empower your teams to collaborate and succeed, boosting productivity with trusted AI, whilst comprehensive reporting provides transparency. SFDCHS2024GC14
Features
- Activity, task, call and email management tracking all interactions
- Powerful, flexible reporting and dashboards for real-time operational insights
- Comprehensive CRM offering from the worlds no1 SaaS company
- No-code & Low-code declarative configuration, Open API integration, Training included
- Point and Click development, tailoring to your specific processes
- Social and Mobile out of the box
- Extendable using the Salesforce AppExchange
- Opportunity and forecasting, contract, product and campaign management
- Social Collaboration, omni-channel engagement, Mobile ready, Knowledge base, Analytics, AI
Benefits
- Provide mobility to relationship owners across the organisation
- Save time by assigning and tracking tasks within the application
- Collaborate around individuals, companies or opportunities
- Deliver user focused solutions via Agile methodologies
- 360 degree view of the contact through all channels
- Increased adoption from easy-to-use UI
- Integrate with back office using free, open APIs
- Extend processes to digitize manual tasks
- 3 updates a year providing new functionality
- GDPR & CE+ compliant
Pricing
£39.17 a unit
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 5 5 2 9 0 8 1 5 9 6 9 4 0 8
Contact
Softcat Limited
Charles Harrison
Telephone: 01628 403403
Email: psitq@softcat.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Salesforce services are all modular and pre-integrated with Einstein AI built-in. Functionality can be expanded as needed. Customers extend by adding Einstein Analytics to: Service Cloud for case management, Sales Cloud for CRM and 360degree view, and Marketing Cloud for engagements and customer journeys. Further information here https://appexchange.salesforce.com/ and https://www.salesforce.com/uk/products/
- Cloud deployment model
- Public cloud
- Service constraints
-
Key considerations (further detail in our Supplier Terms)
As Salesforce is multi-tenant, there are 'governor limits' which prevent resources from being monopolised by any single organisation.
NB though these limits exist it's rare for customers to be impacted, and even more unusual for our current Public Sector customers. In the unlikely event of a need to increase, limits can be extended with various add-ons separately listed. Hitting a limit is often a sign of an underlying design flaw. Please make yourself aware of these limits at this link https://developer.salesforce.com/docs/atlas.en-us.210.0.salesforce_app_limits_cheatsheet.meta/salesforce_app_limits_cheatsheet/salesforce_app_limits_features.htm
A user’s password may not be shared with any other individual. - System requirements
-
- Connectivity to the Internet
- A standard browser, either desktop or mobile
- Salesforce mobile app is available if preferred to a browser
- Appropriate bandwidth, https://help.salesforce.com/articleView?id=000004958&type=1
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Every Salesforce service includes support as standard. The lowest level relies on the Salesforce user community for responses and has a response time of 2 business days, this can be reduced to 15 minutes with the appropriate upgrade in your support plan. https://www.salesforce.com/content/dam/web/en_us/www/cloud-services/documents/premier-success-plans-datasheet.pdf
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
-
Salesforce has not conducted usability studies to verify that the online chat function works effectively with screen reading and other assistive technology. However, the services have been assessed against the WCAG 2.1 standards and existing customers have conducted testing and are using the Salesforce Webchat capability in live services.
Details of our compliance with WCAG 2.1 AA accessibility standards for our web chat products are described in our VPAT statements available here: https://www.salesforce.com/company/legal/508_accessibility/ - Onsite support
- Yes, at extra cost
- Support levels
- Every Salesforce service includes community-based support. This can be enhanced with guaranteed response times through Premier Success. For more critical applications we provide Signature Success which provides Salesforce staff with a knowledge of a specific customers applications and configurations and an initial response from your designated support team in as little as 15 minutes, with personalised updates every 30 minutes.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Salesforce provides an amazing immersive self-learning environment available called “Trailhead” for anyone who would like to have an engaging and interactive way of learning about salesforce. It is an online and free to use learning environment available here: https://trailhead.salesforce.com/
In addition, Salesforce's Customers for Life is designed to help customers be successful and get up and running quickly. A dedicated group is available for new customers to engage by asking questions, giving feedback, and sharing experiences. this also includes 'Getting Started Webinars', 'Getting started resources','Salesforce Tech-lounge for new customers' and 'getting started live Q&A' further detail available at https://www.salesforce.com/success-gettingstarted/ - Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
- Salesforce also provides free online courses, referred to as 'Trails'
- End-of-contract data extraction
- There are a number of options available for customers to extract their data from the service, either during the contract or when the contract ends. We encourage customers to export their data during their contract on a periodic basis to maintain a local copy of their salesforce database, rather than wait until the end of the contract These options include: The Weekly Export Service – export data from the service on a periodic basis via a zip file containing .csv files over a TLS link. Export data over the API via an integration or middleware solution. A comprehensive Salesforce exit strategy paper is available on request.
- End-of-contract process
-
After termination of all subscriptions associated with an environment, Customer Data submitted to the Covered Services is retained in inactive status within the Covered Services for 120 days, after which it is securely overwritten or deleted from production within 90 days, and from backups within 180 days.
Physical media on which Customer Data is stored during the contract term is not removed from the data centers that Salesforce uses to host Customer Data unless the media is at the end of its useful life or being deprovisioned, in which case the media is first sanitized before removal. This process is subject to applicable legal requirements.
Within 30 days post contract termination, customers may request return of their respective Customer Data submitted to the Covered Services. Salesforce shall provide such Customer Data via downloadable files in comma separated value (.csv) format and attachments in their native format.
For more information on Data Deletion period upon contract termination, Please refer "Deletion of Customer Data" section of the Security, Privacy and Architecture Documentation for the respective services available on the Trust and Compliance site: https://trust.salesforce.com/en/trust-and-compliance-documentation/
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
The capability of Salesforce via a browser and on a mobile device, via either a browser or the native Salesforce1 App is broadly similar. However, there are some subtle differences as described here: https://help.salesforce.com/articleView?id=limits_mobile_sf1_data.htm&type=0
Note that the salesforce browser UI can also be accessed on many mobile devices. - Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- The Salesforce interface is a modern and intuitive design, with help functions throughout. The interface can be configured as maybe required or left as default.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
-
Salesforce is committed to providing applications accessible to all. This includes users working with assistive technology, such as speech recognition software and screen readers. Salesforce follows international best practices in Section 508 of the Web Content Accessibility Guidelines and strives to meet WCAG 2.1 Level AA.
A third party has assessed and documented the accessibility status of Salesforce core products in the VPAT documents published here: https://www.salesforce.com/company/legal/508_accessibility.jsp - API
- Yes
- What users can and can't do using the API
-
For developers changing the system, two APIs are applicable for managing customizations and for building tools that can manage the metadata model.
The Tooling API is specifically designed to help developers build IDE apps for salesforce, while the metadata API is for more general purpose configuration migration. The metadata API is allows for migrations, , including retrieve, deploy, create, update, or delete customisations for your Salesforce instance and migrate changes from testing to production; the Tooling API gives developers a platform for debugging, code coverage, auto complete, and more. - API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Point-and-click configuration: The Salesforce platform makes it easy to modify the functionality of Salesforce applications to meet your unique requirements. Working with the metadata framework and a series of simple point-and-click wizards, you can design custom user interfaces and modify the structure of the data model and the application’s business logic. Configuration enables organisations to modify objects, fields, validation rules, workflow, security settings, formulas, and much more without the need for code.
Customise with code: Although point-and-click configuration with the Salesforce platform is the fastest and easiest way to customise, some functionality is beyond the constraints of a metadata framework. For such cases, developers can create needed functionality in open-ended development environments, using toolkits for most of the common programming languages, or Apex.
Scaling
- Independence of resources
- The daily transaction average for our platform is regularly 6 billion, consistently at sub 250ms response time within the Salesforce environment. Within each logical system, we use load balancers to distribute load among multiple availability zones for hyper-scalability and redundancy. The multitenant application design, combined with the fastest servers and high-performance networking infrastructure leveraged from the public cloud, guarantees fast performance. In addition to scaling for growth anywhere, Salesforce strives to improve the average response time of our services and to back up our claims, full details of transaction volumes and response times are reported in real-time at https://status.salesforce.com/
Analytics
- Service usage metrics
- Yes
- Metrics types
- The service includes various metrics to monitor usage and adoption of the service, for example, last login, login duration etc. For Infrastructure detail metrics are available at https://trust.salesforce.com website provides performance and availability information for the entire service. For specific metric monitoring and for more in-depth detail customers can extend capability through the use of Event Monitoring. For example - which applications are being used, by whom, how are they being used, when, where from and are there performance issues? This data can be used to improve adoption, security and performance of the application.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller (no extras)
- Organisation whose services are being resold
- Salesforce
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Scale, obfuscating techniques, or data storage sharding
- Other
- Other data at rest protection approach
-
Classic Encryption: native Salesforce application feature which can be used to encrypt specific custom fields. There is no additional cost for this, but it does impact some application functionality.
More information here: http://sfdc.co/FieldEncryption
Platform Encryption: allows customers to encrypt data stored through Salesforce such as: files and attachments, certain standard and custom fields, and use an advanced key management system. It uses native strong, standards-based encryption. Controls help to protect data, which include the use of derived data encryption keys and customer-controlled key rotation, generation, and destruction process. Available for an additional cost.
More information here: https://help.salesforce.com/s/articleView?id=sf.security_pe_concepts.htm&type=5 - Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
Multiple options are available for ad hoc data export or regular backup:
Direct Export - into csv/Excel files from a list view or report. Commonly utilised by end users.
Salesforce Data Loader - a free tool for importing/updating/exporting data.
Salesforce API - export via APIs at any time.
Weekly Export Service - to csv files.
Backup & Restore - our native data recovery service: https://www.salesforce.com/products/platform/solutions/data-security/backup-restore-data-recovery/
Partner Tools - pre-integrated third party tools like Mulesoft or OwnBackup. - Data export formats
-
- CSV
- Other
- Other data export formats
-
- XLS
- Out of The Box import via the open standard API
- API export in open standards such as XML and OData
- API also support bulk export and upload
- Pre-integrated ETL tools such as MuleSoft etc.
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- Out of The Box import via the open standard API
- API imports in open standards such as XML and OData
- API also support bulk export and upload
- Pre-integrated ETL tools such as MuleSoft etc.
- Salesforce can also store content in any flat file format.
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Other
- Other protection between networks
- Customers connect to the service over the public Internet with all transmissions between the user and the Salesforce Services secured using TLS 1.2 or higher and encrypted using 256 or 128-bit encryption. The Services use International/Global Step Up SSL certificates with 2048-bit Public Keys. Web Service callouts can be secured using TLS, and mutual TLS. Additionally, customers can partner with a selection of supported ISPs for a more direct connection to the Salesforce service. In the UK, BT are one such ISP. This service is known as Salesforce Express Connect. Specifically, Hyperforce also includes Salesforce Private Connect through AWS.
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection within supplier network
- Customer data is protected within the Salesforce service through a mature, standards-based defence in depth security architecture. Logical and physical access is strictly controlled and monitored and the controls used are in scope for the various security certifications the company has, and audited regularly by third parties. Controls such as firewalls, intrusion detection, anti-malware, file integrity monitoring are augmented with extensive monitoring to provide a robust prevention, detection and response model. Internal and external, as well as third-party vulnerability scanning and application penetration testing are also in place.
Availability and resilience
- Guaranteed availability
- The Salesforce Services are designed with the concept of continuous improvement and Trust (e.g. Availability, Performance and Security) in the infrastructure. Salesforce uses commercially reasonable efforts to make its on-demand services available to its customers 24/7, except for (minimal) planned downtime, for which Salesforce gives customers prior notice, and force majeure events. This service leverages Public Cloud region, and uses multiple availability zones. This pattern allows services to withstand up to two different zonal faults and continue to be available. Live and historical statistics on Salesforce system performance are publicly published at: https://trust.salesforce.com/en/#systemStatus, and further detail can be shared upon request and NDA
- Approach to resilience
-
A Hyperforce instance resides in a single public cloud region, and uses three availability zones for disaster recovery. This allows services to withstand up to two different zonal faults and continue to be available.
Compute resources are deployed across (at least) three zones within a given region. A regional level load balancer is placed on top of the instances and manages spreading load appropriately. Blob storage and certain other provider specific services will also be at a regional level (the list of services vary based on provider). Any service deployed in this pattern will need to tolerate two millisecond latency across zones. More detailed information is available under NDA on request. - Outage reporting
- Outages are publicised on a public portal and via email alerts. Escalation policies are established and maintained as Salesforce's goal is to rapidly restore service. In the event of an extended outage, periodic updates are provided in near real time to customers via the trust.salesforce.com dashboard site and in addition, service notifications are provided to nominated contacts via various channels such as email. Update frequency for notifications is dependent on the customer support service plan.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Other
- Other user authentication
-
Salesforce has a comprehensive set of authentication mechanisms that customers can chose from. These include Multi-factor authentication, Single Sign-on, Custom Login flows, and Connected Apps. A connected app is a framework that enables an external application to integrate with Salesforce using APIs and standard protocols, such as SAML, OAuth, and OpenID Connect. Connected apps use these protocols to authenticate, authorise, and provide single sign-on (SSO) for external apps.
Salesforce provides each user with a unique username and password that they enter at each login. Administrators can configure several settings to ensure that users' passwords are strong and secure. - Access restrictions in management interfaces and support channels
- Management access for service support and delivery is done through multiple layers of controls including, but not limited to, multiple 2-factor authentication, bastion host and proxy control and segregation of duties. These controls are in scope for SSAE-18 auditing and evidences through the SOC 2/ISAE3402 report. Access to the management interface for the customer to configure their salesforce environment is configured by the customer themselves. The options are outlined in the above response. Robust application design and testing ensures that users without administrative access rights cannot access more sensitive areas of the application.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- EY CertifyPoint
- ISO/IEC 27001 accreditation date
- January 25, 2024
- What the ISO/IEC 27001 doesn’t cover
- Listing of current exclusions within the ISO27001 Statement of Applicability available to view at https://compliance.salesforce.com/en/documents/a006e000010P47JAAS
- ISO 28000:2007 certification
- No
- CSA STAR certification
- Yes
- CSA STAR accreditation date
- 10/01/2022
- CSA STAR certification level
- Level 1: CSA STAR Self-Assessment
- What the CSA STAR doesn’t cover
- The available CSA STAR self-assessment covers all points in the latest CCM; version 4.02.
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- Coalfire Systems, Inc
- PCI DSS accreditation date
- 27th July 2023
- What the PCI DSS doesn’t cover
- No exclusions
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- ISO 27017
- ISO 27018
- NEN7510
- ENS
- SOC 1,2, 3
- HDS Certificate
- Data Privacy Framework (DPF) Program
- UK Cloud Security Principles + NCSC Cloud Security Principles
- EU Cloud Code of Conduct
- CSA STAR
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- ISO/IEC 27001
- Other
- Other security governance standards
- ISO 27017 ISO 27018 NEN7510 ENS SOC 1,2, 3 HDS Certificate UK NHS DSPT Data Privacy Framework (DPF) Program HIPAA
- Information security policies and processes
- Salesforce's Information Security Management System (ISMS) and information security policies are based on the ISO 27002 framework of best practices and are ISO 27001 certified. As required by this certification, the ISMS is endorsed by Senior Management. The EVP of Security has responsibility for the information security policies and ISMS. The Trust Strategy Alignment (TSA) Committee approves/authorizes all changes to the policies, the Statement of Applicability (SoA), the information security manual, and any separate policy statements. During the ISO 27001 audit process (as well as other audits such as SOX and SSAE 16 SOC 1), Senior Management for various departments are involved in verifying that policies and procedures are in place and adhered to. Policies are reviewed/approved at least annually.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Salesforce has formal processes for placing a system into production. This procedure includes a build checklist, server hardening checklist and pre-production testing. Baseline configurations for servers, network devices, and databases are consistent with industry-accepted CIS (Center for Internet Security) system hardening guidelines. Change control procedures include steps for testing, review, authorization, communication, verification, and back-out procedures. All changes to the infrastructure components are tested in a dedicated environment before being deployed into production.
Changes to Salesforce products in pre-production and production environments and data centers, must be managed by a documented change control process and approved change management system. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Vulnerability and Patch Management Program is implemented where Salesforce performs vulnerability scans on external and internal facing systems using internal scanning resources and with third-party vendors to conduct external vulnerability assessments. Internal scans are completed daily, external service providers are used to perform penetration tests prior each major release (three times annually). Commercial and proprietary vulnerability scanning tools are configured to identify vulnerabilities and measure vulnerability impact in CVSS scores. Patching is applied following a risk-based approach and SLAs while using the change management process to ensure mitigations are deployed. detail on responsible disclosure https://trust.salesforce.com/en/security/responsible-disclosure-policy/ .
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Salesforce Threat Intelligence and Detection team monitors the Salesforce services 24x7 for threats and unauthorized intrusions via the latest cutting edge technology and industry analysis, and in collaboration with the Security Incident Reponse teams. Extensive logging and monitoring is conducted across all Salesforce Services and environments (at application, network and database layers). All suspicious activities are flagged and reported to Salesforce CSIRT for investigation, management, communication, and resolution of security events and incidents in line with the NIST Incident Response model.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Salesforce has a formal Incident Management Process that guides the Salesforce Computer Security Incident Response team in investigation, management, communication, and resolution activities. Salesforce will promptly notify the customer in the event of any security breach of the Service resulting in an actual or reasonably suspected unauthorised disclosure of Customer Data. Notification may include phone contact by Salesforce support, email to customer's administrator and Security Contact and public posting on trust.salesforce.com. Salesforce.com is a member of the prestigious Forum of Incident Response and Security Teams (FIRST) and complies with the FIRST framework and best practices for incident response.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Softcat are dedicated to reducing our environmental impact and actively promoting sustainability. Our commitment to sustainability is a core aspect of our business strategy, driving us to innovate and lead in the creation of a more sustainable future for our company and the communities we serve. This commitment is embedded in our policies, operating procedures, and training programs.
We are proud to be the first FTSE 250 company to be awarded 5-star status in relation to the United Nations Sustainable Development Goals.
We aim to achieve a Carbon Net-Zero Value Circle by 2040 by prioritising renewable energy, reducing natural resource use, minimising waste, and safeguarding biodiversity in compliance with environmental legislation.
At Softcat, we have taken significant steps towards securing renewable energy across our organisation, reducing our scope 1 & 2 emissions. We had the target of using 100% Renewable Energy across all our locations by 2024. We successfully delivered against this target ~2 years early.
In May 2023 we took delivery of 15 electric vehicles, replacing all existing fossil-fuelled company cars used by employees for business means. The implementation of the EV pool fleet will see a saving of over 80 tons of CO2e per year. A huge impact on our Net Zero targets.Tackling economic inequality
As a value-add reseller, Softcat outsources the products, services, and solutions through our extensive network of partners, to best suit the needs of our broad client base. We always consider and promote SMEs and local providers where appropriate, particularly for the products and services we offer via the G Cloud framework.
We remain dedicated to improving employability and educational awareness across schools, colleges, and universities to help break down the barriers to joining technology organisations.
We work collaboratively with many schools that are close in proximity to our offices, to ensure we are actively supporting the community as well as schools from lower socio-economic backgrounds.
We visit the schools to talk about the IT sector and the roles in our organisation, as well as promoting work-experience opportunities during the summer. In particular, we actively encourage students from diverse backgrounds to engage in work experience to appreciate the roles available in our sector.
For ambitious school and college leavers, a Softcat Apprenticeship is a great first step into the world of work, with 94% of our apprentices offered a permanent position at Softcat post apprenticeships, which goes to show the amazing opportunity available with us.
We were ranked 1st in IT & Consultancy, and 10th overall in by RateMyApprenticeship.com - Best 100 Apprenticeship Employers 2023-2024 list.
Softcat now also offer 12 month paid internships to University students looking to complete a year in industry as part of their undergraduate studies.Equal opportunity
Our approach to diversity and inclusion is introduced first during our induction training, as part of our Softcat values, outlining responsibility to uphold our principles. This message is reinforced by our process and policies, networks, Allyship Training and Inclusion Awareness campaigns.
Softcat supports diversity and inclusion through various networks including:
- Supporting Women in Business (SWIB)
- The Ethnic and Cultural Network
- The Pride Network
- The Family Network
- The Empowering Disability and Neurodiversity Network (EDN)
- The Faith at Work Network
- Armed Forces & Veterans Network
These networks aim to create a supportive and inclusive work environment for all employees, regardless of gender, ethnicity, sexual orientation, disability, or family commitments.
Our allyship programme, Stronger Together, is a mixture of event and workshop-based training available to all staff. Programme topics include, bias, power, privilege, and being a greater ally.
Inclusion Awareness campaigns include race, disability, sexual orientation, gender, faith, and caring responsibilities. These sessions highlight and celebrate minority groups, through panel sessions, Q&A sessions and training, providing an opportunity to discuss and understand ways to be more inclusive.
Our efforts to improve diversity and inclusion have been incredibly successful. Since 2020, the number of female employees below management level has increased to 35%, and the number of ethnic minority employees rose to 17%.Wellbeing
At Softcat, all employees are provided with access to our multidimensional wellbeing programme which includes flexible work arrangements, free nutritious breakfast, mental health support, employee benefits scheme, health and wellbeing week activities, and online workshops.
Giving back to the community is an innate part of who we are as a company. All Softcat employees are therefore given two volunteer days per year to support a charitable or community cause.
Each of our 10 regional offices also support local charities through fundraising, donations and events. For example, our Manchester office has raised over £30,000 for the WeLoveMCR charity. This funding has supported young, disadvantaged Manchester citizens in gaining qualifications to broaden their work opportunities and supporting local groups in delivering indispensable services that enable community cohesion.
Pricing
- Price
- £39.17 a unit
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Complete version limited by time only
- Link to free trial
- Please contact us for the current trial link or setup