Academic Software Platform
Academic Software Platform - is a modern workplace deployment solution for educational institutions, where every type of user (staff, students, teachers, researchers) can access, deploy and license the tools they need through the single sign-on of their institution
Features
- All digital assets in one place
- Login with your school account
- All devices
- All software programs
- Easy deployment methods
- Monitoring licence use
- Manuals & Tutorials
- Helpdesk
- Self-service
Benefits
- Standardized access to online, cloud or installable software applications
- Platform provides user defined selection of applications
- Access from school and/or student devices, any operating system
- One platform - providing access to any SW title
- Supporting Cloud, VDI and Installable applications
- Providing analytics to optimize license allocation and costs
- Embedded installation guides and tutorials for easy access
- We support all users - Unburdening internal IT & teachers
- Licences are allocated fully automatically.
Pricing
£4.60 to £206.32 a user a year
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 2 7 8 9 9 7 4 8 9 7 5 5 4 1
Contact
Academic Software
Gregory Boulahouache
Telephone: +32 497 130 134
Email: gregory@academicsoftware.com
Service scope
- Service constraints
- Platform is available 24/7/365
- System requirements
- No system requirements for users
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 8H on weekdays
- User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- N/A
- Onsite support
- No
- Support levels
-
We offer first line, second line and third line support.
Support is always included in platform fee.
We assign customer success managers to clients who coordinate the support. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
Customer Success Manager is assigned. CMS oversees implementation. Testcases are provided and implemented. After sign-off the platform can go live to all users.
Onboarding can be a combination of Teams calls and on-site visits, depending on the user needs.
Platform users do not need training. All materials and manuals are integrated in the platform.
User documentation is available in the platform. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- At end of contract relevant data will be provisioned in SQL dump or Excel.
- End-of-contract process
- Contracts don't have cancellation costs or fees.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Platform as a Service. Setup is done by Academic Software together with the Customer Success Manager. Reporting is possible via the web interface. Integration is done via LMS and/or SSO of the customer.
- Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- All text is accessible. However, the use of tools via the platform depends on the tool itself.
- Web interface accessibility testing
- N/A
- API
- Yes
- What users can and can't do using the API
- Setup is done via Academic Software. Integration of API of LMS and SSO (SAML2) is possible. Web-hooks for certain events are available.
- API automation tools
- OpenStack
- API documentation
- No
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- By actively monitoring and autoscaling
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
- Other
- Other metrics
-
- Usage analytics
- Number of licenses used
- Cost of cloud consumption
- Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- Backup controls
-
Platform is a SaaS platform. All data is backuped according to industry standards.
Users have no impact on backup - Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection within supplier network
- Data encryption at rest
Availability and resilience
- Guaranteed availability
-
99,9% SLA
Refund according to contract terms - Approach to resilience
-
Service based on Azure data-center
We focus on microservices architecture - Outage reporting
- E-mail alerts
Identity and authentication
- User authentication
- Identity federation with existing provider (for example Google apps)
- Access restrictions in management interfaces and support channels
- Role based group membership in directory of organization providing specifically defined role based access.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Identity federation with existing provider (for example Google Apps)
- Devices users manage the service through
- Dedicated device over multiple services or networks
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- ISO27001 Data centres
Security governance
- Named board-level person responsible for service security
- No
- Security governance certified
- No
- Security governance approach
- As our platform is hosted within MS Azure, security governance is handled by Microsoft
- Information security policies and processes
- Microsoft Azure policies are followed
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Scheduled update timeframes for out-of-date services
Centralized monitoring of all services
Design, develop and release environments with analysis of impact on security and performance - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Usage of XDR on entire infrastructure providing real-time threat monitoring and assessment.
Patches for any vulnerability are applied within 24 hours. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Usage of XDR on entire infrastructure providing real-time threat monitoring and assessment.
24/7/365 technician on call receiving alerts directly from XDR or any service.
Response within an hour - Incident management type
- Supplier-defined controls
- Incident management approach
-
Usage of XDR on entire infrastructure providing real-time threat monitoring and assessment.
24/7/365 technician on call receiving alerts directly from XDR or any service.
Response within an hour
Submission of incident report by technician to be reviewed internally for future improvement or mitigation.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Third-party
- Third-party virtualisation provider
- Microsoft
- How shared infrastructure is kept separate
- XYC
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- See: https://blogs.microsoft.com/eupolicy/2019/06/18/data-centers-sustainable-energy-transformation/
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
Through the Academic Software platform, every user has an equitable opportunity to access the necessary software and tools for their studies.
Pricing
- Price
- £4.60 to £206.32 a user a year
- Discount for educational organisations
- Yes
- Free trial available
- No