Azure Hybrid Cloud (Azure Stack HCI)
Azure Hybrid Cloud with Azure Stack HCI combines the flexibility of cloud computing with on-premises datacentre infrastructure, delivering a seamless and scalable hybrid solution. It integrates with Azure services for consistent, secure, and easy-to-manage cloud and edge computing, optimised for Windows and Linux workloads.
Features
- Fully Managed Service with enhanced service models available on demand
- Seamlessly integrates cloud and on-premises resources for a unified experience
- Offers scalable and flexible deployment options for diverse business needs
- Simplified management of resources with familiar Azure tools and interfaces
- Supports both Windows and Linux workloads, enhancing application compatibility
- Advanced security features integrated, aligning with Azure's security standards
- Optimised for virtualisation with Hyper-V and Kubernetes container orchestration
- Built-in, end-to-end hybrid capabilities for Azure services integration
- Cost-effective solution, includes the ability to Co-Lo services
- Provides high availability and resilient storage using industry-leading technologies
Benefits
- Enhances flexibility, adapting to changing workloads and business requirements
- Streamlines cloud migration, offering a bridge between environments
- Reduces IT complexity through centralised management and automated operations
- Enhances security posture with Azure's robust security mechanisms
- Offers improved cost-efficiency, lowering overall infrastructure expenses
- Facilitates innovation with support for modern application development approaches
- Ensures business continuity with high availability and disaster recovery options
- Simplifies compliance, aligning with global and industry-specific standards
- Accelerates deployment and scalability of critical business applications
- Strengthens data sovereignty by keeping sensitive data on-premises
Pricing
£0.03 to £15,500.00 a unit a month
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 5 3 1 0 3 1 5 0 5 4 4 9 2 8
Contact
Node4
David Cheetham
Telephone: 0345 123 2222
Email: bidmanagement@node4.co.uk
Service scope
- Service constraints
-
Customer may not and is not licensed to install or use software or technology in any way that infringes any Third-Party Software Vendor’s intellectual property, technology or licencing usage rights.
Where the relevant software License prescribes, Third Party Software Vendors (or their agents) may have a right to conduct audits on the deployment/usage of their software in the Services.
Node4 will endeavour to perform essential maintenance during periods of lower usage and will endeavour to give the Customer ten days prior notice. In the event of an emergency, change or Service Affecting Incident notice may be less than 24 hours. - System requirements
-
- Customers using own licenses are responsible for ensuring mobility rights
- Connectivity Requirements and Firewalling (if not supplied by Node4)
- Patching & Update maintenance of OS (if not by Node4)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Node4 shall prioritise all Service Tickets based on its reasonable assessment of the Priority level (P1 to P4); and respond to all Service Tickets in accordance with the initial response times specified below:
Response Acknowledgement - P1=30 Mins, P2=1 Hour, P3=2 Hours, P4=4 Hours
Commencement – P1=1 Hour, P2=2 Hours, P3=4 Hours, P4=N/A
Frequency of Updates – P1=1 Hour, P2=2 Hours, P3 and P4 =12 Hours if Resolve / Target to Fix exceeded
Resolve / Target to Fix – P1=4 Hours, P2=8 Hours, P3=12 Hours, P4=36 Hours. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- Standard testing with accessibility software.
- Onsite support
- Yes, at extra cost
- Support levels
-
Support level options are as follows: -
Business Hours
Standard business hours support 9am to 5:30pm weekdays, excluding bank and national holidays
24 x 7
Priority 1 and 2 – Support hours 24/7
Priority 3, 4 and Service Request – Support hours between 9am and 5.30pm weekdays, excluding bank and national holidays. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We've developed a seven-stage initiation process to help clients onboard Azure Stack HCI. Initially, we collaborate with customer executive sponsors to secure budget approval, defining clear motivations and outcomes. A robust business case is formulated, highlighting our solution's financial and transformational advantages, leading to a customer letter of intent.
Upon agreeing on a contract, we proceed to fulfil Requests for Information (RFIs) essential for the commercial contract and high-level design. This phase culminates in a signed customer contract, underpinning our commitment.
We craft a detailed low-level design and migration plan, ensuring all necessary equipment is ordered for deployment. The delivery of the Azure Hybrid Platform involves deploying the Azure Stack HCI Cluster, Azure Landing Zone, ExpressRoute, customer networking, and operational tooling, supplemented with comprehensive customer training.
Migration of customer workloads is planned and executed, ensuring seamless service transition and integration into support. Post-migration, we fine-tune monitoring and operational processes, establish service management, and initiate a continuous review process.
Finally, we assess migrated workloads for modernization opportunities, supporting ongoing improvements and fostering a culture of innovation through a Cloud Center of Excellence (CCOE). This approach ensures a seamless transition, operational excellence, and continuous evolution in our clients' hybrid cloud journey. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
-
At the end of a contract, clients are empowered to securely and efficiently extract their data from the Azure Hybrid Cloud platform, underlining our commitment to data sovereignty and control. Clients are advised well in advance of contract conclusion, receiving detailed instructions on planning their data extraction. This guidance covers all aspects of preparing Azure and Azure Stack HCI data, ensuring it is correctly packaged, encrypted, and ready for retrieval.
Clients have access to a range of extraction tools and methodologies specifically designed for Azure environments, facilitating options such as direct downloads and secure data transfer protocols. For larger datasets or sensitive information, physical data shipping can be arranged, ensuring clients can choose the method that best suits their needs.
Throughout this process, our support team remains on hand to offer technical assistance and guidance, ensuring clients can navigate any challenges that arise during data extraction.
Upon successful data extraction, clients are encouraged to confirm the completeness and security of their retrieved data. This final step underscores the client's autonomy over their data, with our support ensuring a smooth transition, reaffirming our dedication to client data sovereignty and security throughout the contract lifecycle. - End-of-contract process
-
Clients are required to raise a cease request as per defined by Node4 Terms & Conditions.
Services will be shutdown as part of a consultative engagement to gracefully close down services, and extract data as defined in the Node4 off-boarding process.
Using the service
- Web browser interface
- Yes
- Using the web interface
-
Create and Manage Virtual Machines (VMs):
Can: Provision, configure, and manage VMs directly from the Azure portal.
Cannot: Perform advanced VM tasks without additional tools.
Deploy Web Apps:
Can: Create and host web applications using Azure Stack Hub.
Cannot: Handle complex app deployment scenarios solely within the interface.
Configure Networking:
Can: Set up virtual networks, load balancers, and network security groups.
Cannot: Tackle intricate network troubleshooting without additional tools.
Monitor and Analyze Resources:
Can: View performance metrics, set alerts, and analyze logs.
Cannot: Conduct deep analysis or custom monitoring without other tools.
Security and Compliance:
Can: Set up firewalls, manage security policies, and enforce compliance.
Cannot: Handle advanced security tasks solely within the interface.
Storage Management:
Can: Create storage accounts, manage blobs, and set up file shares.
Cannot: Configure complex storage options without additional tools.
In summary, the Azure Stack web interface provides essential capabilities, but users may need additional tools for specialized tasks. For more details, refer to the [official documentation](https://learn.microsoft.com/en-us/azure-stack/operator/azure-stack-overview?view=azs-2311). - Web interface accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web interface accessibility testing
- Standard testing with accessibility software
- API
- Yes
- What users can and can't do using the API
-
Automation and Management:
Can: Users can automate operations, such as creating virtual machines (VMs) or managing resources.
Cannot: Some advanced tasks may require additional tools or PowerShell scripts.
Security and Compliance:
Can: Implement security policies, control access, and prevent DOS attacks for externally available APIs.
Cannot: Handle all security intricacies solely within the API.
Hybrid Solutions:
Can: Extend Azure services to your datacenter or edge locations consistently.
Cannot: Achieve complex hybrid scenarios without additional tools.
Azure Stack Hub, HCI, and Edge:
Can: Build, deploy, and run cloud-native apps across diverse environments.
Cannot: Address all workloads exclusively through the API. - API automation tools
-
- Ansible
- Chef
- Terraform
- Puppet
- Other
- Other API automation tools
-
- Bicep
- Azure Resource Manager template
- API documentation
- Yes
- API documentation formats
-
- HTML
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- Using the command line interface
-
Resource Management:
Can: Create, update, and delete resources (e.g., virtual machines, storage accounts) using simple commands.
Cannot: Perform complex resource configurations solely through the CLI.
Networking and Security:
Can: Configure virtual networks, security groups, and firewalls.
Cannot: Handle intricate network troubleshooting or advanced security tasks exclusively within the CLI.
Deployment and Monitoring:
Can: Deploy applications, monitor performance metrics, and set up alerts.
Cannot: Conduct deep analysis or custom monitoring without additional tools.
Hybrid Scenarios:
Can: Extend Azure services to on-premises environments.
Cannot: Achieve all hybrid use cases solely through the CLI.
Scaling
- Scaling available
- No
- Independence of resources
- In our single-tenancy Azure Hybrid Cloud platform, we guarantee that users aren’t affected by others' demand through dedicated resources allocated exclusively to each client. This approach ensures that the performance and capacity available to a user are not influenced by the workload of another. We enhance this with tailored capacity planning and scalable resources, allowing for adjustments based on individual user demand. Advanced monitoring and management tools proactively identify and mitigate potential performance impacts. By employing dedicated environments, we ensure optimal performance, security, and compliance, providing users with a reliable and consistent experience.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Other
- Other metrics
-
- Predictive resource utilisation trends for proactive capacity planning
- System health and availability metrics for reliability monitoring
- Network latency and throughput metrics for network performance analysis
- Disk I/O operations and throughput for storage performance assessment
- Virtual machine performance metrics, including CPU steal time
- Application failure and restart counts for stability tracking
- User access patterns and activity logs for security auditing
- Cost analysis and optimisation recommendations for budget management
- Compliance status checks against industry standards and regulations
- Environmental impact metrics for sustainability reporting and improvement
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Virtual Machines
- Virtual Disk
- Backup controls
- Users control backups through a web interface
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Users schedule backups through a web interface
- Backup recovery
- Users can recover backups themselves, for example through a web interface
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- Other
- Other protection between networks
- If client requires secure (encrypted) networking facilities, Node4 has a number of security and networking services that can meet client specific requirements.
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Other
- Other protection within supplier network
- Node4 can, however, provide customer specific solutions which use IPSec encryption through encrypted MPLS (Cisco DMVPN for example) or SD WAN type services.
Availability and resilience
- Guaranteed availability
-
The component is considered available if all Hypervisor hosts hosting the Customer Virtual Machines are operating in a normal state.
If a Hypervisor node fails, and the Virtual Machines are migrated to another node, then downtime shall be considered as the time between a) the time the Hypervisor node is detected as no longer functioning and b) the time the Virtual Machines start to power on another host.
Availability levels apply to the Hypervisor platform and are not measured per virtual machine.
The following equation will be used to calculate the Compute Resource (Shared) availability.
References to hours are to the number of hours in the applicable Monthly Review Period:
((Total minutes – Total minutes Unavailable)/Total minutes) x 100
Node4 will provide the Customer with service credits, as set out in the T&C's. - Approach to resilience
-
Node4 operate fully resilient Datacentres, core DWDM network and our Cloud platforms use our own buildings and assets.
Detail on how we so this is sensitive and therefore information is only available on request. - Outage reporting
-
Node4 may raise faults against alarms on the Node4 infrastructure affecting the Azure Hybrid Cloud service. If a fault affects your services then we will use reasonable endeavours to promptly inform the named contact(s) via our helpdesk system primarily, or by telephone in circumstances where the fault means that that they would not receive email.
The start time of a fault is the time it is detected by Node4 and a Service Ticket number is allocated. For services affecting multiple customers we will post updates on www.n4status.com
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Access is only granted to those that require access. Access can only be provided by those with the correct permission to authenticate. Management networks are isolated.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Dedicated device on a government network (for example PSN)
- Dedicated device over multiple services or networks
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Alcumus ISOQAR
- ISO/IEC 27001 accreditation date
- 29/03/2022
- What the ISO/IEC 27001 doesn’t cover
- All aspects are covered.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- ClaraNet Ltd
- PCI DSS accreditation date
- 12/08/2023
- What the PCI DSS doesn’t cover
- PCI controls 2d, 2e, 3, 4, 5, 6, 7, 8, 10, 11
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Node4 operates an Information Security Management System (ISMS) which conforms to ISO27001. The purpose of the ISMS is to assess and manage risk and to protect the organisation’s information assets from all threats, whether internal or external, deliberate or accidental. The CEO has approved the information security policy. The Information Security Objectives of Node4 are to: -
Protect information against unauthorised access
Assure the confidentiality of information
Maintain the integrity of the information
Ensure the availability of information as required by the business processes
Meet all regulatory and legislative requirements
Implement, maintain and test DR / BC plans in line with the security policy
Train all staff on information security
Continually review and improve the ISMS
Additional policies and procedures exist to support the Information Security Policy. These include, but are not limited to, physical and logical access controls, network security, malware controls, vulnerability management and business continuity.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- All changes are assessed for their potential security impact through the Change Advisory Board. A Low-Risk change is one which has a possibility of causing up to a Priority 3 or 4 Incident. A High-Risk change is one which has a possibility of causing a Priority 1 or 2 Incident or a large amount of Priority 3 and 4 Incidents for multiple customers.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Vulnerability testing is performed monthly using internal and external tool sets. Vulnerabilities are assessed and remediation actions performed depending on risk. Information about potential threats is provided by the vulnerability scanning tools.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- Protective monitoring is performed by the SIEM tool and monitored by the Security Operations Centre. The SIEM provides realtime alerts of any potential compromises and a process of detect, analyse and response is followed with 1 hour.
- Incident management type
- Undisclosed
- Incident management approach
-
The following approach in used for incident management to ensure the objectives are achieved
Incident Resolution is achieved in the most effective manner
All Incidents are identified promptly and correctly
All Incidents are evaluated, categorised, and prioritised correctly
Communication is maintained with all Stakeholders throughout the lifecycle of all Incidents
All Incidents are constantly monitored throughout their lifecycle
Incidents are handled as outlined in the Incident Management Schedule Document here: -
https://node4.co.uk/app/uploads/2022/07/Schedule-Incident-Management-07.04.2021-release.pdf
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- Other
- Other virtualisation technology used
- Microsoft Azure Stack HCI
- How shared infrastructure is kept separate
-
Compute separation is provided by a hypervisor.
Network and storage virtualisation techniques are also employed.
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
In our commitment to fighting climate change, we take a holistic approach that encompasses reducing carbon emissions, enhancing energy efficiency, and promoting sustainable practices in the delivery of our cloud hosting and software services. Our strategies include:
Energy Efficiency: We optimise our datacentres and cloud infrastructure to be as energy-efficient as possible, employing the latest in green technology and design principles. This reduces our overall energy consumption and minimises our carbon footprint.
Renewable Energy: Where feasible, we power our operations with renewable energy sources, such as solar and wind, to reduce reliance on fossil fuels. This commitment extends to encouraging our suppliers and partners to also adopt renewable energy.
Carbon Offsetting: We invest in carbon offset projects, including reforestation and renewable energy projects, to compensate for our unavoidable emissions. These efforts contribute to global carbon reduction initiatives.
Sustainable Practices: We advocate for and implement sustainable practices within our organisation, including reducing waste, promoting recycling, and encouraging the digitalisation of processes to minimise paper use.
Client Engagement: We work with our clients to understand and minimise the environmental impact of their cloud and software service choices. This includes offering guidance on how to use cloud resources more efficiently and sustainably.
Innovation: We continuously explore innovative ways to reduce the environmental impact of our services, including the development of more energy-efficient software and the utilisation of AI to optimise resource usage.
Our aim is to lead by example in the fight against climate change, demonstrating that it is possible to deliver high-quality cloud services while also making a positive impact on the environment. Through these actions, we not only contribute to the sustainability of our planet but also offer our clients the opportunity to engage with a provider that aligns with their values on environmental responsibility.Covid-19 recovery
In our efforts to support COVID-19 recovery, we're committed to leveraging our cloud hosting and software services to aid businesses, communities, and public sector organisations in navigating the challenges posed by the pandemic and its aftermath. Our strategies include:
Remote Work Solutions: We provide robust cloud solutions that enable seamless remote work, ensuring that organisations can continue their operations without interruption. This includes secure access to critical applications, collaboration tools, and data storage solutions, facilitating productivity and connectivity among dispersed teams.
Digital Transformation Acceleration: Recognising the increased need for digital services, we assist organisations in accelerating their digital transformation journeys. This involves migrating traditional services to the cloud, enabling them to offer their own customers more flexible and resilient services.
Educational Support: To address the surge in demand for online learning, we offer cloud-based learning platforms and tools that educational institutions can leverage to deliver high-quality education remotely. This includes solutions for virtual classrooms, online assessments, and resource sharing.
Healthcare Support: We support healthcare providers by offering cloud solutions that enhance their ability to deliver telehealth services, manage patient data securely, and scale their resources in response to fluctuating demands.
Economic Resilience: We're committed to supporting economic resilience by offering flexible pricing models and financial assistance programs for businesses affected by the pandemic, helping them to maintain their cloud services without financial strain.
Community Engagement: We engage with communities and non-profit organisations, providing technology resources and expertise to support recovery efforts, including initiatives aimed at bridging the digital divide and supporting vulnerable populations.
Our goal is to be a proactive partner in COVID-19 recovery, providing technology solutions that not only help organisations adapt to the new normal but also contribute to building a more resilient and inclusive future.Tackling economic inequality
In addressing economic inequality, we are committed to leveraging our cloud hosting and software services as tools for empowerment and opportunity creation. Our approach is centered on making technology accessible and beneficial for all segments of society, particularly those who are most vulnerable or have been traditionally underserved. Here’s how we contribute:
Accessibility and Affordability: We strive to ensure our services are accessible and affordable, offering scalable solutions that cater to the needs of small and medium-sized enterprises (SMEs), non-profits, and educational institutions. This includes flexible pricing models for qualifying organisations, enabling them to leverage technology to drive their missions forward.
Skills Development and Training: Recognising the importance of digital literacy in the modern economy, we offer training programs and resources aimed at developing the digital skills of individuals from disadvantaged backgrounds. By partnering with educational institutions and community organisations, we aim to close the skills gap and open up new opportunities for employment and entrepreneurship in the tech industry.
Supporting Social Enterprises: We actively support social enterprises and organisations working to tackle economic inequality through preferential access to our cloud and software services. This support extends to collaboration on projects that leverage technology to address social issues, such as unemployment, education, and access to healthcare.
Innovation for Inclusion: We invest in developing innovative solutions that address barriers to economic participation. This includes technologies that enhance financial inclusion, support remote work and education, and enable access to essential services for underserved populations.
Economic Opportunity Creation: Through our ecosystem of partners, customers, and suppliers, we seek to create economic opportunities by prioritising diversity and inclusion in our procurement processes and by fostering an environment where small and diverse businesses can thrive.Equal opportunity
Our dedication to promoting equal opportunity is woven into the fabric of our operations, services, and community engagements. We believe that technology has the power to level the playing field, providing access to information, resources, and opportunities that can transform lives regardless of background, location, or circumstance. Here’s our approach:
Diverse and Inclusive Hiring Practices: We are committed to fostering a diverse and inclusive workforce by implementing fair hiring practices that actively seek out and welcome candidates from a variety of backgrounds, including underrepresented groups. This diversity enriches our team with a wide range of perspectives and ideas, driving innovation and understanding of the diverse needs of our clients.
Workplace Equality: We ensure that all employees have equal access to opportunities for growth, development, and advancement. This includes creating a supportive work environment that respects and values each individual's contributions, and implementing policies that promote work-life balance, fair compensation, and professional development.
Technology Accessibility: Our cloud hosting and software services are designed with accessibility in mind, ensuring that individuals with disabilities have equal access to our technologies. This includes adherence to accessibility standards and guidelines, and providing tools and features that enhance usability for all users.
Community Programmes and Partnerships: We engage in community programmes and partnerships aimed at promoting equal opportunity in the technology sector and beyond. This includes supporting educational initiatives that provide technology access and digital literacy training to underserved communities, and collaborating with organisations that work towards social inclusion.
Supplier Diversity: We are committed to supplier diversity by ensuring that small and minority-owned businesses are given fair opportunities to participate in our procurement processes. This not only supports economic inclusion but also enriches our supply chain with a diversity of ideas and products.Wellbeing
In addressing wellbeing, we recognise the critical importance of mental and physical health, particularly in today’s fast-paced and often stressful work environments. Our approach to wellbeing is holistic, focusing on creating a supportive and healthy work culture for our employees, and extending this ethos to our clients and the communities we serve. Here’s how we contribute:
Employee Wellbeing Programmes: We implement comprehensive wellbeing programmes that support the mental, physical, and emotional health of our employees. These include access to mental health resources, such as counselling services and stress management workshops, as well as initiatives promoting physical health, like fitness classes and ergonomic workplace assessments. We believe that a healthy team is more engaged, productive, and innovative.
Flexible Working Arrangements: Recognising the diverse needs of our workforce, we offer flexible working arrangements to help employees balance their professional and personal lives. This flexibility includes options for remote work, flexible hours, and the provision for necessary breaks to recharge, contributing to a more sustainable work-life balance.
Healthy Work Environment: We strive to create a work environment that promotes wellbeing, including safe and comfortable physical spaces, a positive and inclusive culture, and opportunities for social connection and community building among employees.
Client and Community Support: Beyond our internal initiatives, we extend our commitment to wellbeing through the services and support we provide to clients and the wider community. This includes offering products and services that encourage healthy work practices and partnering with organisations focused on mental health and wellbeing.
Continuous Learning and Development: We believe in the wellbeing benefits of lifelong learning and professional development. Our programmes are designed to support continuous growth and development, reducing the risk of burnout and increasing job satisfaction by providing meaningful opportunities for advancement and skill enhancement.
Pricing
- Price
- £0.03 to £15,500.00 a unit a month
- Discount for educational organisations
- No
- Free trial available
- No