Azure Cloud Service Provider (CSP/EA)
Azure CSP/EA service offers comprehensive cloud solutions, facilitating businesses to leverage Microsoft Azure's capabilities. It includes flexible and scalable cloud computing, storage, and networking services, with expert support, management, and integration services. Tailored to meet diverse business needs, it enables efficient cloud adoption and management.
Features
- Scalable cloud computing resources adapt to your changing business demands
- Extensive storage solutions, including blob, file, and queue storage
- Robust networking capabilities for secure, reliable cloud connectivity
- Expert Azure support and management services ensure optimal performance
- Seamless integration with existing systems, enhancing operational efficiency
- Tailored solutions to meet specific business needs and objectives
- Advanced security and compliance features for data protection
- Cost-effective pricing models, including pay-as-you-go and reserved instances
- Access to the full range of Azure products and services
- Continuous monitoring and proactive management of cloud resources
Benefits
- Enhances business agility and flexibility in a dynamic market
- Reduces IT infrastructure costs with scalable cloud-based solutions
- Ensures high availability and reliability of business-critical applications
- Simplifies IT management, allowing focus on core business activities
- Offers robust security, protecting against cyber threats and data breaches
- Streamlines regulatory compliance with Azure’s comprehensive compliance offerings
- Provides global reach with Microsoft Azure’s extensive cloud infrastructure
- Facilitates innovation with access to cutting-edge cloud technologies
- Delivers tailored cloud solutions, perfectly aligning with business strategies
- Offers peace of mind with expert guidance and support
Pricing
£0.01 to £99,999 a unit
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 7 2 3 1 1 1 3 3 9 8 4 3 9 2
Contact
Node4
David Cheetham
Telephone: 0345 123 2222
Email: bidmanagement@node4.co.uk
Service scope
- Service constraints
-
Planned maintenance events of the underlying Azure infrastructure are typically transparent to uses of the service.
Notifications of maintenance events are posted in the Service Health section of the user’s tenancy. - System requirements
- A Microsoft Azure Tenant
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Node4 shall prioritise all Service Tickets based on its reasonable assessment of the Priority level (P1 to P4); and respond to all Service Tickets in accordance with the initial response times specified below:
Response Acknowledgement - P1=30 Mins, P2=1 Hour, P3=2 Hours, P4=4 Hours
Commencement – P1=1 Hour, P2=2 Hours, P3=4 Hours, P4=N/A
Frequency of Updates – P1=1 Hour, P2=2 Hours, P3 and P4 =12 Hours if Resolve / Target to Fix exceeded
Resolve / Target to Fix – P1=4 Hours, P2=8 Hours, P3=12 Hours, P4=36 Hours. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- Standard testing with accessibility software.
- Onsite support
- Yes, at extra cost
- Support levels
-
Support level options are as follows: -
Business Hours
Standard business hours support 9am to 5:30pm weekdays, excluding bank and national holidays
24 x 7
Priority 1 and 2 – Support hours 24/7
Priority 3, 4 and Service Request – Support hours between 9am and 5.30pm weekdays, excluding bank and national holidays. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Azure Portal: Users can configure network settings, add users, deploy desktops and applications, and enable security.
Azure Quickstart Center: Offers a checklist for basic tasks and services, videos, and links to explore more about Azure.
Learning Resources: Azure provides documentation, example code, guidance, tutorials, and hands-on training.
Azure Free Account: Users new to Azure can create a free account to start building solutions.
Azure Mobile App: Allows users to stay connected to their resources from their mobile device.
These resources make it easy for users to create, deploy, and manage apps and services - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
-
When an Azure subscription ends, data goes through stages: Expired, Disabled, and Deleted.
Initially, all users can access the data.
In the Disabled stage, only admins can access the data.
After 90 days, the data is deleted.
To extract data, users should back up their data before the subscription ends.
If the subscription has already ended, users may need to upgrade to a Pay-as-you-go subscription or contact Microsoft support.
For large amounts of data, users can use Azure Import/Export service3. - End-of-contract process
-
When an Azure contract ends, the enrolment status changes.
It goes from Active to Indefinite Extended Term, where pricing is at retail rates.
Before the end date, the Enrolment Administrator should decide to renew the enrolment, transfer it to a new one, migrate to the Microsoft Online Subscription Program (MOSP), or confirm disablement of all services.
If no action is taken, the enrolment status becomes Expired. Services aren’t immediately disabled, but there’s a risk.
To stop using Azure services, close your subscription in the Azure portal.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Users are able to access the full range of Azure services whether setup, configure and administered by the Node4 CSP service or not.
- Web interface accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web interface accessibility testing
- Standard testing with accessibility software
- API
- Yes
- What users can and can't do using the API
-
The Azure API is extensive and capabilities are described in the following documentation:
https://learn.microsoft.com/en-us/rest/api/azure/ - API automation tools
-
- Ansible
- Chef
- OpenStack
- SaltStack
- Terraform
- Puppet
- Other
- Other API automation tools
-
- Azure Automation: Uses Windows PowerShell cmdlets for Azure API Management
- Jenkins: An open-source automation server, it integrates with Azure DevOps
- GitLab: Web-based DevOps lifecycle tool, it integrates with Azure DevOps
- SauceLabs: Cloud-based platform for automated testing, integrates with Azure DevOps
- BrowserStack: Web and mobile testing platform, integrates with Azure DevOps
- Bamboo: Continuous integration and delivery tool, integrates with Azure DevOps
- Heroku: Cloud platform as a service, integrates with Azure DevOps
- Bitbucket: Web-based version control repository, integrates with Azure DevOps
- TravisCI: Hosted continuous integration service, integrates with Azure DevOps
- CircleCI: Continuous integration and delivery platform, integrates with Azure DevOps
- API documentation
- Yes
- API documentation formats
- HTML
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- MacOS
- Using the command line interface
-
CLI capabilities are fully defined in the Microsoft Azure PowerShell documentation here:
https://learn.microsoft.com/en-us/powershell/azure/get-started-azureps?view=azps-11.3.0&viewFallbackFrom=aztools
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
-
Azure ensures that users are not adversely impacted by the demand placed by other users on the service through several mechanisms:
Logical Isolation: Azure segregates each customer’s data from others, preventing unauthorized access.
Data Encryption: Customers can encrypt data at rest and in transit using Azure’s encryption capabilities.
Access Control: Microsoft denies default access to customer data and grants it only via audited just-in-time policies.
Multi-Factor Authentication: Azure support personnel access data using secure consoles and unique corporate Active Directory accounts.
Data Redundancy: Microsoft safeguards data against cyberattacks or physical damage to datacenters. - Usage notifications
- Yes
- Usage reporting
-
- SMS
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Other
- Other metrics
-
- Availability Percentage: Shows the percentage of successful web test runs
- Availability Test Duration: Measures time for web tests to run
- Availability Test Count: Count of web tests by Azure Monitor
- Browser Page Load Time: Time taken for page to load
- Client Processing Time: Measures time processing on the client side
- Page Load Network Connect Time: Connection time during page load
- Receiving Response Time: Time to receive a response from server
- Reporting types
-
- API access
- Real-time dashboards
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Microsoft
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Other
- Other data at rest protection approach
-
Encryption at rest provides data protection for stored data.
Implementation: Azure uses symmetric encryption to swiftly encrypt and decrypt large amounts of data. Here’s how it works:
A symmetric encryption key encrypts data as it’s written to storage.
The same key decrypts the data when it’s readied for use in memory.
Data can be partitioned, with different keys for each partition.
Keys are securely stored with identity-based access control and audit policies. - Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- On-premises backup: Backs up files, folders, system state
- Azure VMs backup: Backs up entire Windows/Linux VMs
- Azure Managed Disks backup: Backs up Azure Managed Disks
- Azure Files shares backup: Backs up Azure File shares
- SQL Server in Azure VMs: Backs up SQL Server databases
- SAP HANA databases: Backs up SAP HANA databases
- Azure Database for PostgreSQL servers: Backs up Azure PostgreSQL databases
- Azure Blobs backup: Operational backup for Azure Blobs
- Azure Kubernetes service backup: Overview of AKS backup
- Backup controls
- In Azure, users control backups through the Azure portal. They can manage backup policies, run on-demand backups, and stop or resume protection of VMs. Users can modify backup policies and switch between them as needed. The Azure Backup Center provides a centralized console for managing and monitoring the entire backup estate
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Users schedule backups through a web interface
- Backup recovery
- Users can recover backups themselves, for example through a web interface
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Bonded fibre optic connections
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
-
Availability Zones:
Definition: Azure regions have three physically separate Availability Zones.
Features: Each zone has distinct power, network, and cooling. Replicating VMs across zones safeguards against data center loss.
Benefit: If one zone fails, apps and data are instantly available in another zone1.
Availability Sets:
Purpose: Logical grouping of VMs ensures redundancy and availability.
Recommendation: Create multiple VMs within an availability set to achieve a highly available application and meet the 99.95% Azure SLA.
Cost: No cost for the availability set itself; pay only for VM instances1.
Azure Load Balancer:
Function: Distributes traffic between VMs.
Resilience: Combine with availability zones and scale sets for maximum application resiliency.
Inclusion: Included for Standard tier VMs1.
Azure Storage Redundancy:
Data Protection: Multiple copies of data stored.
Resilience: Ensures availability and durability even during failures.
Tradeoffs: Choose redundancy based on cost and availability needs. - Approach to resilience
-
Azure is designed to be resilient, ensuring robustness and availability for critical workloads. Here’s a concise overview:
Azure Virtual Desktop (AVD):
Architecture: AVD components, including web services, brokers, and gateways, form a resilient infrastructure.
Responsibilities: Microsoft manages core VDI components, while you handle session hosts, network connectivity, and user access.
Azure Services: Leverage Azure Traffic Manager and Azure Front Door for efficient user routing.
Availability Zones:
Purpose: Distribute session hosts across physically separate datacenters within an Azure region.
Benefits: Independent power, cooling, and networking enhance resilience.
Azure Backup and Site Recovery: Safeguard session hosts and replicate data to another Azure region1.
Azure Infrastructure Investments:
High Availability: Azure offers built-in options for disaster recovery and maximum resilience.
Expanding Regions and Availability Zones: Ensures redundancy and fault tolerance.
Security: Continual enhancements maintain app and data security2.
In summary, Azure’s resilient foundation, combined with configurable features, ensures your applications and services remain available even during failures - Outage reporting
-
Azure Status Page:
Real-Time Updates: The Azure status page displays the current health status of Azure services. It’s updated in real time as service conditions change.
Public Dashboard: Users can check this dashboard to see if there are any ongoing outages or incidents affecting Azure services1.
Azure Service Health:
Notifications: Targeted notifications are sent directly to impacted customers and partners.
Azure Portal: Azure Service Health within the Azure portal provides details on outages, upcoming maintenance, and advisories.
Alerts: Configured alerts trigger when incidents impact your resources.
Impacted Resources Tab:
In the Azure portal, the Impacted Resources tab under Service Health > Service Issues displays resources that are or might be affected by an outage.
Personalized Health Dashboard:
By clicking on the map in the Azure status page, users can access specific event details.
This information helps warn engineering teams and customers about the impact of service incidents4.
In summary, Azure ensures timely communication through public dashboards, personalized alerts, and detailed information to keep users informed during outages.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Role-based Access Control
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Dedicated device on a government network (for example PSN)
- Dedicated device over multiple services or networks
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Alcumus ISOQAR
- ISO/IEC 27001 accreditation date
- 29/03/2022
- What the ISO/IEC 27001 doesn’t cover
- All aspects are covered.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- ClaraNet Ltd
- PCI DSS accreditation date
- 12/08/2023
- What the PCI DSS doesn’t cover
- PCI controls 2d, 2e, 3, 4, 5, 6, 7, 8, 10, 11
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Node4 operates an Information Security Management System (ISMS) which conforms to ISO27001. The purpose of the ISMS is to assess and manage risk and to protect the organisation’s information assets from all threats, whether internal or external, deliberate or accidental. The CEO has approved the information security policy. The Information Security Objectives of Node4 are to: -
Protect information against unauthorised access
Assure the confidentiality of information
Maintain the integrity of the information
Ensure the availability of information as required by the business processes
Meet all regulatory and legislative requirements
Implement, maintain and test DR / BC plans in line with the security policy
Train all staff on information security
Continually review and improve the ISMS
Additional policies and procedures exist to support the Information Security Policy. These include, but are not limited to, physical and logical access controls, network security, malware controls, vulnerability management and business continuity.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- All changes are assessed for their potential security impact through the Change Advisory Board. A Low-Risk change is one which has a possibility of causing up to a Priority 3 or 4 Incident. A High-Risk change is one which has a possibility of causing a Priority 1 or 2 Incident or a large amount of Priority 3 and 4 Incidents for multiple customers.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Vulnerability testing is performed monthly using internal and external tool sets. Vulnerabilities are assessed and remediation actions performed depending on risk. Information about potential threats is provided by the vulnerability scanning tools
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- Protective monitoring is performed by the SIEM tool and monitored by the Security Operations Centre. The SIEM provides realtime alerts of any potential compromises and a process of detect, analyse and response is followed with 1 hour.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
The following approach in used for incident management to ensure the objectives are achieved
Incident Resolution is achieved in the most effective manner
All Incidents are identified promptly and correctly
All Incidents are evaluated, categorised, and prioritised correctly
Communication is maintained with all Stakeholders throughout the lifecycle of all Incidents
All Incidents are constantly monitored throughout their lifecycle
Incidents are handled as outlined in the Incident Management Schedule Document here
https://node4.co.uk/app/uploads/2022/07/Schedule-Incident-Management-07.04.2021-release.pdf
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Third-party
- Third-party virtualisation provider
- Microsoft Azure
- How shared infrastructure is kept separate
-
Azure tenant level isolation ensures security and separation in the Azure public cloud:
Multi-Tenancy: Azure shares infrastructure among multiple customers, improving efficiency. Each customer’s instance is called a tenant.
Microsoft Entra ID: Tenants are isolated using Microsoft Entra ID. Each Azure subscription is associated with one Entra directory.
Role-Based Access Control: Users, groups, and applications from a directory manage resources within an Azure subscription.
Security Boundaries: Tenants are logically isolated to prevent unauthorized access or compromise.
In essence, Azure provides robust isolation to safeguard data and resources across tenants
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
In our commitment to fighting climate change, we take a holistic approach that encompasses reducing carbon emissions, enhancing energy efficiency, and promoting sustainable practices in the delivery of our cloud hosting and software services. Our strategies include:
Energy Efficiency: We optimise our datacentres and cloud infrastructure to be as energy-efficient as possible, employing the latest in green technology and design principles. This reduces our overall energy consumption and minimises our carbon footprint.
Renewable Energy: Where feasible, we power our operations with renewable energy sources, such as solar and wind, to reduce reliance on fossil fuels. This commitment extends to encouraging our suppliers and partners to also adopt renewable energy.
Carbon Offsetting: We invest in carbon offset projects, including reforestation and renewable energy projects, to compensate for our unavoidable emissions. These efforts contribute to global carbon reduction initiatives.
Sustainable Practices: We advocate for and implement sustainable practices within our organisation, including reducing waste, promoting recycling, and encouraging the digitalisation of processes to minimise paper use.
Client Engagement: We work with our clients to understand and minimise the environmental impact of their cloud and software service choices. This includes offering guidance on how to use cloud resources more efficiently and sustainably.
Innovation: We continuously explore innovative ways to reduce the environmental impact of our services, including the development of more energy-efficient software and the utilisation of AI to optimise resource usage.
Our aim is to lead by example in the fight against climate change, demonstrating that it is possible to deliver high-quality cloud services while also making a positive impact on the environment. Through these actions, we not only contribute to the sustainability of our planet but also offer our clients the opportunity to engage with a provider that aligns with their values on environmental responsibility.Covid-19 recovery
In our efforts to support COVID-19 recovery, we're committed to leveraging our cloud hosting and software services to aid businesses, communities, and public sector organisations in navigating the challenges posed by the pandemic and its aftermath. Our strategies include:
Remote Work Solutions: We provide robust cloud solutions that enable seamless remote work, ensuring that organisations can continue their operations without interruption. This includes secure access to critical applications, collaboration tools, and data storage solutions, facilitating productivity and connectivity among dispersed teams.
Digital Transformation Acceleration: Recognising the increased need for digital services, we assist organisations in accelerating their digital transformation journeys. This involves migrating traditional services to the cloud, enabling them to offer their own customers more flexible and resilient services.
Educational Support: To address the surge in demand for online learning, we offer cloud-based learning platforms and tools that educational institutions can leverage to deliver high-quality education remotely. This includes solutions for virtual classrooms, online assessments, and resource sharing.
Healthcare Support: We support healthcare providers by offering cloud solutions that enhance their ability to deliver telehealth services, manage patient data securely, and scale their resources in response to fluctuating demands.
Economic Resilience: We're committed to supporting economic resilience by offering flexible pricing models and financial assistance programs for businesses affected by the pandemic, helping them to maintain their cloud services without financial strain.
Community Engagement: We engage with communities and non-profit organisations, providing technology resources and expertise to support recovery efforts, including initiatives aimed at bridging the digital divide and supporting vulnerable populations.
Our goal is to be a proactive partner in COVID-19 recovery, providing technology solutions that not only help organisations adapt to the new normal but also contribute to building a more resilient and inclusive future.Tackling economic inequality
In addressing economic inequality, we are committed to leveraging our cloud hosting and software services as tools for empowerment and opportunity creation. Our approach is centered on making technology accessible and beneficial for all segments of society, particularly those who are most vulnerable or have been traditionally underserved. Here’s how we contribute:
Accessibility and Affordability: We strive to ensure our services are accessible and affordable, offering scalable solutions that cater to the needs of small and medium-sized enterprises (SMEs), non-profits, and educational institutions. This includes flexible pricing models for qualifying organisations, enabling them to leverage technology to drive their missions forward.
Skills Development and Training: Recognising the importance of digital literacy in the modern economy, we offer training programs and resources aimed at developing the digital skills of individuals from disadvantaged backgrounds. By partnering with educational institutions and community organisations, we aim to close the skills gap and open up new opportunities for employment and entrepreneurship in the tech industry.
Supporting Social Enterprises: We actively support social enterprises and organisations working to tackle economic inequality through preferential access to our cloud and software services. This support extends to collaboration on projects that leverage technology to address social issues, such as unemployment, education, and access to healthcare.
Innovation for Inclusion: We invest in developing innovative solutions that address barriers to economic participation. This includes technologies that enhance financial inclusion, support remote work and education, and enable access to essential services for underserved populations.
Economic Opportunity Creation: Through our ecosystem of partners, customers, and suppliers, we seek to create economic opportunities by prioritising diversity and inclusion in our procurement processes and by fostering an environment where small and diverse businesses can thrive.Equal opportunity
Our dedication to promoting equal opportunity is woven into the fabric of our operations, services, and community engagements. We believe that technology has the power to level the playing field, providing access to information, resources, and opportunities that can transform lives regardless of background, location, or circumstance. Here’s our approach:
Diverse and Inclusive Hiring Practices: We are committed to fostering a diverse and inclusive workforce by implementing fair hiring practices that actively seek out and welcome candidates from a variety of backgrounds, including underrepresented groups. This diversity enriches our team with a wide range of perspectives and ideas, driving innovation and understanding of the diverse needs of our clients.
Workplace Equality: We ensure that all employees have equal access to opportunities for growth, development, and advancement. This includes creating a supportive work environment that respects and values each individual's contributions, and implementing policies that promote work-life balance, fair compensation, and professional development.
Technology Accessibility: Our cloud hosting and software services are designed with accessibility in mind, ensuring that individuals with disabilities have equal access to our technologies. This includes adherence to accessibility standards and guidelines, and providing tools and features that enhance usability for all users.
Community Programmes and Partnerships: We engage in community programmes and partnerships aimed at promoting equal opportunity in the technology sector and beyond. This includes supporting educational initiatives that provide technology access and digital literacy training to underserved communities, and collaborating with organisations that work towards social inclusion.
Supplier Diversity: We are committed to supplier diversity by ensuring that small and minority-owned businesses are given fair opportunities to participate in our procurement processes. This not only supports economic inclusion but also enriches our supply chain with a diversity of ideas and products.Wellbeing
In addressing wellbeing, we recognise the critical importance of mental and physical health, particularly in today’s fast-paced and often stressful work environments. Our approach to wellbeing is holistic, focusing on creating a supportive and healthy work culture for our employees, and extending this ethos to our clients and the communities we serve. Here’s how we contribute:
Employee Wellbeing Programmes: We implement comprehensive wellbeing programmes that support the mental, physical, and emotional health of our employees. These include access to mental health resources, such as counselling services and stress management workshops, as well as initiatives promoting physical health, like fitness classes and ergonomic workplace assessments. We believe that a healthy team is more engaged, productive, and innovative.
Flexible Working Arrangements: Recognising the diverse needs of our workforce, we offer flexible working arrangements to help employees balance their professional and personal lives. This flexibility includes options for remote work, flexible hours, and the provision for necessary breaks to recharge, contributing to a more sustainable work-life balance.
Healthy Work Environment: We strive to create a work environment that promotes wellbeing, including safe and comfortable physical spaces, a positive and inclusive culture, and opportunities for social connection and community building among employees.
Client and Community Support: Beyond our internal initiatives, we extend our commitment to wellbeing through the services and support we provide to clients and the wider community. This includes offering products and services that encourage healthy work practices and partnering with organisations focused on mental health and wellbeing.
Continuous Learning and Development: We believe in the wellbeing benefits of lifelong learning and professional development. Our programmes are designed to support continuous growth and development, reducing the risk of burnout and increasing job satisfaction by providing meaningful opportunities for advancement and skill enhancement.
Pricing
- Price
- £0.01 to £99,999 a unit
- Discount for educational organisations
- Yes
- Free trial available
- No