Microsoft 365 migration and deployment services
Bridgeall provides a full range of Microsoft 365 migration and deployment including older version of Microsoft Office or G-suite. Our proven Microsoft 365 migration uses the latest automation tools to streamline the process and we add best in class security.
Bridgeall are Microsoft 365 experts and multiple Microsoft Gold partner.
Features
- Microsoft 365 migration from Office, G-suite or Lotus
- Microsoft 365 migration and licensing advise included
- Latest automation tools utilised to improve migration
- Full range of Microsoft 365 solutions covered
- Microsoft 365 migration with best security and governance approach
- Improve security and productivity with Microsoft 365
- SharePoint Development and Office 365 integration services
- Embrace new Microsoft 365 solutions
- Bridgeall is a leading Microsoft gold partner for Microsoft 365
- Microsoft certified Microsoft 365 consultants
Benefits
- Microsoft 365 migration to improve security
- Enable automated transfer of files, data and documents
- Maximise your Microsoft 365 licensing
- Improve collaboration by migrating to Microsoft 365
- Microsoft 365 migration to improve your employee experience
- Microsoft 365 migration to enable EMS suite
- Dedicated UK support team for Microsoft 365
- Microsoft Guarantee 99.9% up-time for Microsoft 365
- Intuitive and user-friendly interface across Microsoft 365 range
- Microsoft 365 embedded with AI to drive productivity
Pricing
£5 a user a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 8 7 4 3 7 3 8 8 1 8 1 0 8 8
Contact
Bridgeall Limited
Andrew Hart
Telephone: 01412126400
Email: tenders@bridgeall.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Microsoft 365
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- Our Microsoft 365 migration service has no constraints that we are aware of.
- System requirements
-
- Windows Server
- Dependency on appropriate licensing
- Microsoft 365 requirements available from Microsoft
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- M-F 9-5pm
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- Fair Start Scotland/DWP
- Onsite support
- Yes, at extra cost
- Support levels
-
• Azure services are available 24 x 7
• 99.9% availability
• SLA’s can be tailored and agreed to customer requirements, and flexed on a daily basis, as business requirements dictate - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Our Microsoft 365 migration and deployment services are tailored to customer’s requirements
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Our Microsoft 365 migration and deployment services end of contract data extraction is tailored to customer’s requirements
- End-of-contract process
- Our Microsoft 365 migration and deployment services end of contract process is tailored to customer’s requirements
Using the service
- Web browser interface
- No
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Microsoft 365 works consistently across both Mobile and desktop via browser or the available applications.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AAA
- Description of service interface
- Set up through Change Management.
- Accessibility standards
- WCAG 2.1 AAA
- Accessibility testing
-
Microsoft 365 applications work seamlessly with screen readers and keyboards on most devices.
Microsoft 365 applications are designed with the requirements of EN 301 549, WCAG 2.0 AA and US Section 508 in mind. - API
- Yes
- What users can and can't do using the API
-
Users can use the API for the transfer of data and integration to other products.
All API services are agreed separately with customers in line with their requirements. - API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Subject to customer business requirements and Contract discussion
Scaling
- Independence of resources
- Backed by Microsoft's Investment and SLA's
Analytics
- Service usage metrics
- Yes
- Metrics types
- Office 365 reporting
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Microsoft Azure Managed Services, Consultancy and our own Software IPR
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Tailored to customer’s requirements
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Bonded fibre optic connections
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- 99.99
- Approach to resilience
- Failover Data Centres - 3 across the UK.
- Outage reporting
- Public dashboard, API, email alerts, SMS
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Active Directory Services and Azure AD Connect
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- QEC
- ISO/IEC 27001 accreditation date
- 10 May 2021
- What the ISO/IEC 27001 doesn’t cover
- NA
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- ISO 9001
- Subject to the Return on Investement model ROI
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- ISO/IEC 27001
- Information security policies and processes
- ISO27001 and Cyber Security
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
The CMDB data is maintained by leveraging the request and change management processes, dedicated modules in the Service Desk suite, which are fully integrated into the CMDB. There is a dedicated change management module within the Bridgeall Service Desk, integrated with the configuration, knowledge base, incident and service request modules. The process provides the following core activities through the ITILV3 Service Desk:
• Initiate change request
• Validate change request including security
• Assess and plan change (operational)
• Approve change implementation
• Execute and complete change
• Status reporting
• Review post implementation and close change. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Follow the ITIL process for Vulnerability Management processes, as well as applying our Quality ISO9001 and Security ISO27001 processes. Bridgeall will coordinate and perform regular IT health checks and audits, that provide the interface for vulnerability management. The process shall provide the following core activities:
• Preparation
• Vulnerability scan
• Define remediating actions
• Implement remediating actions
• Rescan
We utilise several proprietary tools provided by Nessus, Qualys and Verisign and work with CREST approved NCC Group. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Environments are monitored extensively for both the application and infrastructure covering system availability, performance and automated system jobs.
Automatic monitoring is conducted at regular intervals depending. Alerts are raised by email with customisable multi-user notification escalations available.
Critical Alerts
• Ping/Port Availability Checks
• HTTP on all sites
• SMTP Service Check
• Database Service Check
• URL Availability Check
Trend Alerts
• CPU Usage
• Memory Usage
• Storage Capacity
• Disk I/O
• Disk Read/Write Times
URL Response/Wait Times - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Our ITIL V3 Service Desk manages incidents and escalations until resolution. The Service Desk acts as the end user single point of contact for incident restoration, including requests for information and issues. The Service Desk monitors outstanding trouble tickets or records until they are resolved.
We provide the following activities:
Detection and recording
Classification and initial support
Investigation and diagnosis
Resolution and recovery
Tracking and communication.
Major Incident Process:
Follow procedures
Communication
Defines incident severities,
Escalations
Roles and responsibilities - internal and external organisations
Review process and issue a report - actions taken, lessons learned.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- Public Services Network (PSN)
- Police National Network (PNN)
- NHS Network (N3)
- Joint Academic Network (JANET)
- Scottish Wide Area Network (SWAN)
- Health and Social Care Network (HSCN)
Social Value
- Social Value
-
Social Value
- Equal opportunity
- Wellbeing
Equal opportunity
Bridgeall's equal opportunities ethos is reinforced by our proactive measures to prevent discrimination and promote equality in all aspects of our employment and service delivery. We abide by the Equality Act 2010 and have established a diverse workforce that reflects the communities we serve. Our policies ensure fair treatment for all, with a particular focus on supporting disabled individuals through career development and tailored training programs.
Our commitment to fair work practices is evident in our status as a signatory to the Scottish Government's Scottish Business Pledge and our accreditation as a Living Wage Employer. We believe that fair compensation is crucial for attracting and retaining top talent, boosting morale, and enhancing productivity. Investing significantly in staff development, we prioritise continuous learning and growth, tailoring training based on annual appraisals, and offering various resources for advancement.
Bridgeall has made significant progress in improving employee retention over the past few years. The retention rates have steadily increased from 82% in 2021 to 98% in 2023.
To ensure a consistent team with minimal turnover we adopt numerous practices across the entire business, which includes; Investing in Employee Development, Competitive Compensation and Benefits, Work-Life Balance, Flexible Working, Transparent Communication, Recognising and Celebrating Achievements, Addressing Employee Concerns, Promoting Mental Health & Well Being, Collaboration and Team-Building Exercises, Career Growth Opportunities, Exit Interviews and Analysis, Annual Reviews and Recognition Program.
Bridgeall's dedication to equal opportunities is not just a policy but a core principle that guides our actions and decisions, ensuring a workplace where everyone can thrive.Wellbeing
Bridgeall firmly believes in supporting the health and wellbeing of our employees and the wider community. We have robust policies and initiatives in place to promote physical, mental, and emotional wellness.
Our comprehensive health and wellbeing policies encompass various aspects such as mental health support, stress management, work-life balance, and access to resources. These policies undergo regular reviews to align with best practices and evolving needs. We actively promote a culture of openness and support through regular communications highlighting available resources, wellness events, relaxation techniques, and tips for maintaining a healthy work-life balance.
Mental health is a key priority for Bridgeall. We have a dedicated intranet site serving as a central hub for mental health resources, information, and support services. Employees can access articles, guidance, and tools to enhance their mental wellbeing. Additionally, some select staff are trained Mental Health First Aiders who can provide a confidential listening ear and suggest appropriate support options when needed.
Bridgeall encourages a healthy work-life balance through flexible work arrangements, enabling employees to strike an equilibrium between professional commitments and personal lives. We conduct training and awareness programmes to equip our team with knowledge and strategies for self-care and overall wellbeing.
Extending our commitment beyond our workforce, Bridgeall actively supports community engagement and integration. Our approach is flexible and responsive, supporting community-led initiatives that align with our values and objectives.
Bridgeall believes in continuous improvement and collaboration. We are dedicated to sharing our experiences, evaluating outcomes, identifying areas of success, and exploring opportunities to grow and enhance our health and wellbeing initiatives for the greatest impact on the communities we serve.
Pricing
- Price
- £5 a user a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- A 1 month free trial of Office 365 is available.
- Link to free trial
- https://products.office.com/en-gb/try