ANS Group

Microsoft Dynamics 365 and PowerPlatform for Alumni Management

Our Business Value Assessment ROI Navigator is designed to help you build, plan and execute business transformation strategies. It’s made up of a 3-stage process which includes Envisioning, a Business Value Assessment and a Solution Assessment, designed to help you understand and prepare for disruptive changes.


  • Customer Service Management, Tenant Management and Property Management
  • Contractor Management and Maintenance Management
  • Compliance Management
  • Document Management
  • Out of the box integration with other Microsoft technologies
  • Built in security, compliance and governance
  • End to end business process and workflow automation
  • IT Service Management (ITSM)


  • Reduce costs through automated business processes / efficient operational developments
  • Integration to systems across authority provides single view of customer
  • Reduce costs by providing citizen self service capabilities
  • Delivers time savings, improves efficiencies, provides rapid time to value
  • Enhance customer satisfaction with personalised and automated services
  • Establish a digital platform and take advantage of latest technology
  • Low code/ no code rapid app deployment as services evolve
  • Improve overall operational and administrative efficiency
  • Proactive reporting / trend analysis to maximise improved service provision


£0.01 a unit

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 13

Service ID

4 0 3 5 9 5 8 2 4 8 6 4 0 4 5


ANS Group Reece Whittaker
Telephone: +44 (0) 1612271000

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Microsoft Dynamics 365 and Microsoft Azure
Cloud deployment model
Public cloud
Service constraints
Internet Access is required to connect to the applications.
System requirements
Most up-to-date web browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
Customers will be able to take advantage of industry leading certified engineers and experts on the end of the phone 24x7x365.The service desk is backed by ITIL aligned process and provides comprehensive Response SLAs from P1 to P5:

P1 - 30 Mins
P2 - 1 Hour
P3 - 4 Hours
P4 - 1 Day
P5 - 2 Days

All incidents are recorded in ANS’ Service Desk ITSM system under the Incident Management workflow. ANS records the name of the person reporting the incident, call time and any pertinent information, along with resolution criteria ensuring that the workflow is initiated correctly.
User can manage status and priority of support tickets
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Phone support availability
9 to 5 (UK time), 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
We offer two levels of Support below:
- Standard
Portal Access
Telephone and remote diagnostics for faults
Service Desk - Non Business Critical
Service Desk - Business Critical faults
Priority Escalation to Vendor for faults

- Enhanced
*Includes standard offerings
Customer Success
Service Reviews
Change Architecture Validation
Support available to third parties

Onboarding and offboarding

Getting started
At ANS, we believe that helping our clients prepare for, implement and manage organisational change is paramount if they are to achieve long-term success. ANS are highly focussed on helping customers to achieve full user adoption and our implementation methodology has been proven to create an environment that makes success much more likely by focussing on ongoing knowledge transfer and training.
Service documentation
Documentation formats
  • PDF
  • Other
Other documentation formats
MS Word
End-of-contract data extraction
Should the contract end for any reason, ANS will need to assess what steps need to be followed to ensure data is extracted efficiently.
End-of-contract process
This scenario will need to be discussed on a case by case basis. Access to the support service will end when the contract does.

Using the service

Web browser interface
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Microsoft provide a mobile application for iOS (10+), Android (4.4+) and Windows (10+) which can be configured to provide access to records within D365.

Alternatively, The unified interface in Dynamics 365 ensures that if you chose to access the application via a web browser on a mobile, desktop or tablet, the experience of using and navigating 365 will be the same.
Service interface
User support accessibility
None or don’t know
Description of service interface
The unified interface for Dynamics 365 ensures that accessing the application on different devices such as tables, desktops and mobiles will look and feel the same. Ensuring the user experience is streamlined across multiple form factors.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
Via a web broswer and URL.
What users can and can't do using the API
This can be controlled and configured by ANS
API documentation
API documentation formats
  • PDF
  • Other
API sandbox or test environment
Customisation available
Description of customisation
Dynamics 365 can be fully configured to suit the customer's specific requirements. As part of our implementation process, ANS will teach your core team how to manage and configure the solution moving forward.


Independence of resources
Dynamics 365 is hosted by Microsoft. This service includes platform monitoring allowing you to see in real-time if there are any performance issues


Service usage metrics
Metrics types
Dynamics includes an admin centre where you can monitor
Reporting types
  • Real-time dashboards
  • Reports on request


Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Dynamics 365 Licences

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Using standard out-of-the box export functionality within Dynamics 365
Data export formats
Other data export formats
  • XML
  • XLSX
Data import formats
  • CSV
  • Other
Other data import formats
  • XML
  • XLSX
  • TXT
  • ZIP

Data-in-transit protection

Data protection between buyer and supplier networks
Private network or public sector network
Data protection within supplier network
Other protection within supplier network

Availability and resilience

Guaranteed availability
Microsoft maintain service availability. The admin centre allows you to see any potential downtime or issues that may have caused the system issues for any given reason.
Approach to resilience
Multiple data centres around the world
Outage reporting
Dynamics 365 gives you access to the admin centre where users can monitor the availability of applications in real-time

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Ensure that users assigned to the project can access the system for the duration needed.

The support team will only be able to access the system agreed within the support contract, as and when it's needed
Access restriction testing frequency
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
No audit information available
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
Alcumus ISOQAR
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Who accredited the PCI DSS certification
NCC Group
PCI DSS accreditation date
What the PCI DSS doesn’t cover
Cyber essentials
Cyber essentials plus
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
Cyber Essentials
Information security policies and processes
Approved and mandated from the Executive with day-to-day responsibility delegated to the Business Assurance Manager, with every manager in the business having responsibility for ensuring their teams apply the policies and procedures.

The framework consists of ISMS Manual, supported by detailed procedures. All of this is made available to staff on the ANS intranet, who are directed to read and digest its content as part of ongoing security training and agree to its adherence as part of their contract of employment.
Security procedures are internally audited annually, and subject to annual external surveillance audit.

The Business Assurance Manager reports to the COO for taking direction and providing feedback on ISMS measurements. Further responsibility is addressed with key Senior Managers and procedure owning Managers in the Business Assurance Co-ordination Team, which is supported by a cross business Cyber Security team.

All staff attend induction training as they join ANS, followed by completion of a full security training course within 3 months. Refresher training is provided on an ongoing basis, with specialist training aimed at specific job roles. Ongoing security awareness is provided through newsletters, company-wide “just-in-time” e-mail bulletins, large information screens in the offices, and sessions at the quarterly “All-staff” meetings.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Internal ANS Change is managed through the application of standard project management process with all projects progressing through approval, CAB review and sign off by stage. All ANS Business Change includes the following managed stages (whether these are deployed on a formal or informal basis is determined by the size of the project, by cost, resource application and risk):

• Executive or Higher Management sponsor
• Business Case and Success Criteria
• Scope definition
• Documentation
• Risk & Opportunity assessment
• Milestone or stage review
• Stage sign off
• Final Review
• Testing
• Deployment
• Lessons Learned
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Though these are developed in line with ISO27001 and Cyber Essentials, the vulnerability management approach is dictated by the specific requirements of the Application being developed.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
ANS has implemented an Information Security Management System (ISMS) that has been verified by our external accreditor to be compliant with the international standard for Information Security Management, ISO/IEC 27001. This system is supported by the ISMS manual, detailed policies and procedures, and underpinned by the pragmatic application of industry best practice. The ISMS defines ANS’ approach to its key protective security functions, corresponding in turn to the requirement of the standard (ISO/IEC 27001:2013).

We use the ISMS to develop a Protective Security environment, focusing on the Physical, Personnel and Information assets.
Incident management type
Supplier-defined controls
Incident management approach
Our incident management approach is designed inline with ITIL v.3 standards and Agile methodologies.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks

Social Value

Fighting climate change

Fighting climate change

As a company built on our culture and values, we are committed to protecting the natural world and being socially responsible. From sourcing 100% of our electricity from renewable sources, to reducing the waste arising from commercial activities and increasing the percentage of waste recycled each year, we have instilled eco-friendly practices into everything we do. In the past few years ANS has:
- Sent over 10 tons of old servers for recycling with all profits going to charity
- Going 100% LED for our lighting in 2022, saving 50% in energy use
- We’re relocating data centre cooling equipment in 2022 to reduce the solar gains and save energy
- The majority of staff PCs are now laptops and we’ve removed old, inefficient computers
- We report our data centre energy use to TechUK and through our efficiency receive reductions in the climate change levy part of our electric bill
- We are ISO 14001 certified for environmental management and audited twice a year.

It doesn’t stop there. We encourage our employees to be environmentally conscious through our environmental training, cycle to work and electric car schemes, providing video conferencing tools and work from home programs to avoid unnecessary travel, targeted digital messaging and eco-friendly campaigns.
Equal opportunity

Equal opportunity

ANS recognises equity and fairness throughout the business and that discrimination in any form is unacceptable. Equal opportunities has long been a feature of our employment practices and procedure, that’s why we have an equal opportunities policy in place. Breaches of the policy will lead to disciplinary proceedings and, if appropriate, disciplinary action.

The aim of the policy is to ensure no job applicant, employee or worker is discriminated against either directly or indirectly on the grounds of race, colour, ethnic or national origin, religious belief, political opinion or affiliation, sex, marital status, sexual orientation, gender reassignment, age or disability. We ensure the policy is circulated to any agencies responsible for our recruitment and a copy of the policy will be made available for all employees and made known to all applicants for employment.

ANS are proud to be a Disability Confident Employer. The scheme, set up by the Department for Work and Pensions, is designed to help employers recruit and retain disabled people and people with health conditions for their skills and talent. As a Disability Confident committed employer, ANS is providing inclusive and flexible recruitment processes such as offering video interviews and supporting flexible working patterns where possible. We also ensure our workplace is suitable to support any employee that may have a disability.


£0.01 a unit
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.