Business Solutions and Process Automation
Bespoke cloud software solutions for business processes and automation using efficient no-code or low-code building blocks in Microsoft 365, Azure, SharePoint, Power Platform, Power Automate with scope for integrations such as AI and Copilot.
Features
- Low-code tools for rapid app development.
- Pixel-perfect control over app design and navigation.
- Scalable solutions that grow with your business.
- Connected, secure data across Microsoft’s platforms.
- Custom code development for tailored business solutions.
- Enterprise-grade governance for data security and compliance.
- Custom GPTs and AI plugins with Copilot Studio.
- Cloud-native RPA with Power Automate for process automation.
- AI-powered development with Copilot in Power BI.
- Integration with Microsoft services like Office 365, Teams, SharePoint.
Benefits
- Streamlines processes, saving time and resources.
- Enhances productivity with familiar tools and workflows.
- Reduces manual efforts through automation.
- Improves data management and analytical capabilities.
- Facilitates real-time collaboration among team members.
- Lowers costs by reducing technical debt.
- Boosts operational efficiency with scalable apps.
- Promotes efficient data sharing within organisations.
- Supports digital transformation goals for businesses.
- Customisable to meet specific business needs.
Pricing
£2,850 a unit a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 6 5 0 0 5 5 0 8 7 8 1 5 0 0
Contact
Resource4u Ltd
Peter Smith
Telephone: 02030026340
Email: info@resource4u.co.uk
Service scope
- Software add-on or extension
- Yes
- What software services is the service an extension to
- Microsoft Cloud Services such as Microsoft 365
- Cloud deployment model
- Public cloud
- Service constraints
- None
- System requirements
-
- Microsoft 365 Licensing
- Azure AD for identity and access management
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Critical Incident: 1 hr response time, then regular updates till resolution. Medium Risk Incident: 3 hours response time, then regular updates till resolution General Support: Within 24 hours, Monday to Friday. Weekend service can be provided at additional cost on case by case basis
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- Using Microsoft Team Instant Messages adhere assistive technology principles.
- Onsite support
- Yes, at extra cost
- Support levels
- 1st Line Support: Resolves requests, problems and educates users’ around non-complex requirements. This is where all incidents and requests begin. The issue is recorded, and the basic review or troubleshooting is performed. Support requests are acknowledged within 2 hours and aimed to be resolved within 4 hours during support hours. If the request cannot be resolved within the timeframe due to complexity, it is elevated to 2nd line support. 2nd to 4th Line Support: 2nd line support requests are elevated where 1st line support was unable to resolve the issue or offer satisfactory guidance on the request. 2nd, 3rd and 4th line support is performed with combination of on-site and remote assistance as complex support using specialist staff appropriately. Regular updates are communicated to the requester until resolution is provided.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- By offering diverse support options to aid users in getting started efficiently. Users access online training resources like videos and webinars, while detailed user documentation serves as a reference. Optional onsite training is available for personalized guidance. Our responsive support team assists promptly via email, phone, or chat.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Use built-in data export tools provided by the platform. Access data programmatically through APIs, suitable for complex or large
- End-of-contract process
- Off Boarding scope via statement of works based on complexity and volumes.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Automatically adjust to fit Mobile Interfaces to best screen.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- Via Internet Browser
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- Internal user testing for color blindness carried out to support assistive technology check.
- API
- Yes
- What users can and can't do using the API
- Users can make use Microsoft Graph REST APIs to provision, administer and manage the platform and its services and content, as well as make changes to and interact with the data and dashboard content already available and published. The API is used through an Azure Active Directory (Azure AD) app registration and can be accessed using the Azure AD (v1.0; ADAL) or the Microsoft identity platform (v2.0; MSAL) endpoints.
- API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- Business solutions are developed as bespoke to end user requirement and can be customised by supplier and client.
Scaling
- Independence of resources
- By Following Systematic Request Management via predefined escalation protocols.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Real time Statistics of Business Solutions and Automation.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Microsoft
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
Users export data through built-in options, download buttons/links, or API access.
Built-in options are commonly found in account or data management settings.
Download buttons or links may be provided in user interfaces.
API access enables programmatically retrieving data.
Third-party tools or integrations can offer additional export options.
Data requests may be necessary for sensitive data, complying with privacy laws - Data export formats
-
- CSV
- ODF
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Bonded fibre optic connections
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- Microsoft typically provides service level agreements (SLAs) for the availability of their various products and services, such as Microsoft Azure, Office 365, and other cloud-based offerings. These SLAs often specify the level of uptime guaranteed for the service, typically expressed as a percentage over a given period (e.g., 99.9% uptime per month). If Microsoft fails to meet the guaranteed level of availability, they may offer service credits or refunds to affected customers as compensation, as outlined in their SLA terms and conditions. The process for requesting refunds or service credits typically involves users submitting a claim to Microsoft, providing details of the outage or downtime experienced and demonstrating that the SLA was not met. Microsoft then evaluates the claim against the terms of the SLA and may issue refunds or credits accordingly. For specific information on Microsoft's SLAs and refund processes, users should refer to the SLA documentation provided by Microsoft for the particular service they are using.
- Approach to resilience
- Microsoft cloud hosting designs its services with robust resilience in mind. Strategies include redundancy at various levels, such as hardware, data centers, and networking components, to mitigate the impact of failures. Critical data and services are geo-replicated across multiple regions for continuity in the face of regional outages. Load balancing optimises performance by evenly distributing traffic, while automatic failover mechanisms seamlessly switch to backup systems during disruptions. Regular data backups ensure data integrity and facilitate recovery. Strong security measures, including encryption and continuous monitoring, safeguard against cyber threats. Comprehensive disaster recovery plans enable swift service restoration in emergencies. Through these measures, Microsoft ensures highly available, reliable, and secure services for its users.
- Outage reporting
- Ur service promptly reports outages through various channels: Dashboard: We maintain dashboard showing real-time service status and ongoing incidents or outages. Users can visit to stay informed. API Access: An API allows users to programmatically access outage information and status updates. This enables integration with third-party monitoring tools or custom applications for automated monitoring. Email Alerts: Users can subscribe to email alerts for notifications about service outages, incidents, or maintenance. These updates provide timely information directly to their inbox. These reporting mechanisms ensure transparency, keeping users informed about any incidents that may affect their usage.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Geo-Location restrictions, IP Ranges including Azure Identity authentication.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- At our organisation, information security is paramount. We are dedicated to safeguarding the confidentiality, integrity, and availability of all data entrusted to us. To achieve this, we have implemented robust policies and processes: "Data Confidentiality": We ensure that user interactions and data remain confidential, accessible only to authorised personnel. "Data Integrity": We maintain the accuracy and completeness of data throughout its lifecycle, preventing unauthorised alterations. Access Control: Access to sensitive information is strictly controlled, limiting it to authorised individuals or processes. "Encryption": We employ encryption techniques to protect data during transmission and storage, safeguarding against unauthorised access. "Vulnerability Management": Regular assessments and proactive measures are taken to identify and mitigate potential security vulnerabilities. "Incident Response": We have established procedures to promptly detect, respond to, and recover from security incidents, minimising disruption and ensuring swift resolution. "User Authentication": Strong authentication mechanisms verify the identity of users accessing our systems, enhancing security. "Regulatory Compliance": We adhere to relevant data protection regulations and industry standards, ensuring legal compliance and maintaining trust. This policy underscores our unwavering commitment to information security, ensuring a secure environment for our users and stakeholders.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Systematic configuration and change management processes with audit logs.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Systematic vulnerability management via automated alerts, escalation with regular patch management by engineering team.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Regular monitoring of solutions access, geo locations including Azure identity access controls. Incidents are responded as per SLA
- Incident management type
- Supplier-defined controls
- Incident management approach
- Users commonly report incidents through designated channels such as help desks, online portals, or dedicated reporting tools. Incident reports are provided through various means, including email notifications, online dashboards, or regular status updates, detailing incident details, actions taken, and resolutions achieved for transparency and accountability.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- Public Services Network (PSN)
- Health and Social Care Network (HSCN)
- Other
- Other public sector networks
-
- Internet First
- Project Gigabit
Social Value
- Social Value
-
Social Value
- Covid-19 recovery
- Equal opportunity
- Wellbeing
Covid-19 recovery
The company pledges to actively support pandemic recovery efforts through volunteering resources and expertise. Their commitment includes assisting vulnerable populations, supporting healthcare professionals, and participating in local initiatives to build a stronger society together.Equal opportunity
We aim to promote equal opportunities, eliminate discrimination and eliminate harassment through the following: Opposing all forms of unlawful and unfair discrimination. All employees (whether part-time, full-time or temporary), volunteers, members, and beneficiaries will be treated fairly and with respect.Wellbeing
Our company values prioritise the wellbeing of our employees, customers, and communities. We recognise that wellbeing encompasses physical, mental, and emotional health, as well as a sense of belonging and fulfillment. In our operations, we prioritise initiatives that support and promote wellbeing, whether through flexible work arrangements, mental health resources, or community engagement programs. By fostering a culture of wellbeing, we aim to enhance the quality of life for all those we touch, contributing to a healthier, happier, and more resilient society
Pricing
- Price
- £2,850 a unit a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Indicative Demos or Mockups available.