Microsoft 365 E3
Cloud Productivity & Security. Licensing suite for Office 365 Enterprise E3, Enterprise & Mobility Suite E3 and Windows 10 Enterprise E3. bssgc
Features
- Office 365: Productivity, email, Teams, collaboration platform.
- Enterprise Mobility: MDM, cybersecurity solutions.
- Windows 10/11: Information protection, Windows Hello.
- Archive: Legal hold, data leakage protection.
- Compliance Tools: Rights management, information protection.
- Online Meetings: Web-conferencing, voice, video.
- Single Sign-On: Cloud access.
- Office applications: Word, Excel, PowerPoint, SharePoint.
- Compliance Support: Information protection, privacy, GDPR.
- Social Networking: Corporate engagement.
Benefits
- Office 365: Productivity, email, Teams, collaboration platform.
- Enterprise Mobility: MDM, cybersecurity solutions.
- Windows 10: Information protection, Windows Hello.
- Archive: Legal hold, data leakage protection.
- Compliance Tools: Rights management, information protection.
- Online Meetings: Web-conferencing, voice, video.
- Cloud App Protection: Visibility, control, security.
- Office applications: Word, Excel, PowerPoint, SharePoint.
- Compliance Support: Information protection, privacy, GDPR.
- Social Networking: Corporate engagement.
Pricing
£2.48 a user a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at tenders@bytes.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
6 2 7 0 9 5 9 8 2 9 7 0 0 2 6
Contact
Bytes Software Services
Chris Swani
Telephone: +44 (0) 7951 326815
Email: tenders@bytes.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- Microsoft admins can view the status of services and find out when maintenance is scheduled. Service health information is available at any time by signing in. https://learn.microsoft.com/en-us/office365/servicedescriptions/office-365-platform-service-description/service-health-and-continuity.
- System requirements
-
- Microsoft 365: Fully hosted, managed SaaS; no on-premises infrastructure needed.
- Cost-effective: Eliminates additional IT infrastructure for Onboarding system support.
- Accessibility: Use on any web-enabled device with modern internet browsers.
- Mobile Availability: Native apps for Android and iOS devices provided
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Response times vary based on support plan selected. For more information, visit: https://www.microsoft.com/en-us/microsoft-365/business/microsoft-365-for-business-support-options
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
-
"Microsoft is committed to developing technology that empowers everyone, including people with disabilities. Microsoft has a Disability Answer Desk where customers with disabilities get support with Microsoft Office, Windows, and other products. Microsoft also has Accessibility Conformance Reports (ACR) which describe how products and services support recognized global accessibility standards.
https://www.microsoft.com/en-us/Accessibility/disability-answer-desk
https://www.microsoft.com/en-us/accessibility/conformance-reports
https://learn.microsoft.com/en-us/windows/apps/design/accessibility/accessibility-testing " - Onsite support
- Yes, at extra cost
- Support levels
-
"Microsoft provides four (4) Modern Work support plan options. These include the following:
- STANDARD (included for all customers)
- BUSINESS ASSIST
- PROFESSIONAL DIRECT
- MICROSOFT UNIFIED
For more information, visit https://www.microsoft.com/en-us/microsoft-365/business/microsoft-365-for-business-support-options
" - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
"Microsoft provides all Modern Work customers with 24/7 self-help resources, including Microsoft Learn, training documentation, templates, and community support. For more information, visit:
- https://learn.microsoft.com/en-us/microsoft-365/
- https://support.microsoft.com/en-us/training
- https://adoption.microsoft.com/en-us/customer-hub/
- https://support.microsoft.com/en-us/modernworkplace" - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
-
"When the contract ends, your access to Modern Work services, applications, and customer data go through multiple stages before the subscription is fully turned off, or deleted:
1. Expired Stage (30 days): Users have normal access to Modern Work applications and files.
2. Disabled Stage (90 days): Data is accessible to admins only. Users can’t access applications. Admins can access the admin centre to buy and manage other subscriptions.
3. Deleted Stage: After the 90-day retention period ends, Microsoft disables the account and deletes the customer data.
During the term of an active subscription, a subscriber can access, extract, or delete customer data stored in Modern Work apps. For more information, visit https://learn.microsoft.com/en-us/microsoft-365/commerce/subscriptions/what-if-my-subscription-expires" - End-of-contract process
-
"Microsoft is governed by strict standards and follows specific processes for removing cloud customer data from systems under our control, overwriting storage resources before reuse, and purging or destroying decommissioned hardware. In our Online Service Terms, Microsoft contractually commits to specific processes when a customer leaves a cloud service or the subscription expires. This includes deleting customer data from systems under our control.
Please see Data Protection Addendum for full and up to date details about how Microsoft manages your data. https://www.microsoft.com/licensing/docs/view/Microsoft-Products-and-Services-Data-Protection-Addendum-DPA?lang=1
https://learn.microsoft.com/en-us/microsoft-365/commerce/subscriptions/what-if-my-subscription-expires?view=o365-worldwide"
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Microsoft offers distinct experiences on mobile and desktop devices for Microsoft 365. On desktop, users access the full suite of features, while the mobile app provides a streamlined interface for essential tasks and allows for offline working when there isn't network connectivity.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- Microsoft 365 can be managed via the M365 admin centre: https://learn.microsoft.com/en-us/microsoft-365/admin/?view=o365-worldwide
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
-
"Microsoft is committed to developing technology that empowers everyone, including people with disabilities. Microsoft has a Disability Answer Desk where customers with disabilities get support with Microsoft Office, Windows, and other products. Microsoft also has Accessibility Conformance Reports (ACR) which describe how products and services support recognized global accessibility standards.
https://www.microsoft.com/en-us/Accessibility/disability-answer-desk
https://www.microsoft.com/en-us/accessibility/conformance-reports
https://learn.microsoft.com/en-us/windows/apps/design/accessibility/accessibility-testing " - API
- Yes
- What users can and can't do using the API
-
"The Microsoft Graph API enables you to access data, intelligence, and insights from Microsoft applications. By integrating Modern Work with Graph API, developers can tap into user data and organizational information to enhance context-aware assistance from applications like Word, Excel, Teams, etc. Starting with users and groups at the core, Microsoft Graph forms a network of Modern Work services and features that manage, protect, and extract data to support a wide range of scenarios. Microsoft Graph lets you access this wealth of user data while always respecting proper authorization. For more information on Microsoft Graph's capabilities, services, and features, visit:
- https://learn.microsoft.com/en-us/graph/overview
- https://learn.microsoft.com/en-us/graph/overview-major-services
For information on Microsoft Graph limitations (throttling limits, service-specific limits, connection limits, schema limits, and availability), visit:
- https://learn.microsoft.com/en-us/graph/throttling-limits
- https://learn.microsoft.com/en-us/graph/connecting-external-content-api-limits
- https://learn.microsoft.com/en-us/graph/metered-api-overview
Microsoft Azure OpenAI also offers a suite of artificial intelligence (AI) services that can be seamlessly integrated with Modern Work to enhance its functionality. By leveraging services such as Azure Cognitive Services and Azure Machine Learning, developers can extend capabilities in areas such as code summarization, sentiment analysis of code reviews, and even predictive coding assistance based on historical patterns." - API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
"Modern Work customers can customize their services in various ways:
- The Microsoft 365 Admin Centre is a web-based portal where administrators can manage user accounts and settings for their organization. They can add or remove users, manage billing, reset passwords, and more.
- The Office Customization Tool allows administrators to customize the installation of Office by choosing which applications and languages are installed, how those applications should be updated, and application preferences.
- Users can personalize their Microsoft 365 experience by changing the theme, notifications, and other settings.
- The Microsoft 365 Developer Program provides a sandbox environment where developers can learn and experiment with Modern Work technologies.
- Developers can use the Microsoft Graph API to interact with data in Modern Work and build apps that integrate with Microsoft 365.
For more information, visit:
- https://learn.microsoft.com/en-us/deployoffice/admincenter/overview-office-customization-tool
- https://learn.microsoft.com/en-us/microsoft-365/admin/setup/customize-your-organization-theme
- https://support.microsoft.com/en-us/office/personalize-your-microsoft-365-experience-eb34a21b-52fa-4fbf-a8d5-146132242985"
Scaling
- Independence of resources
-
"Microsoft employs a combination of proactive monitoring and efficient management practices to mitigate the impact of demand fluctuations on Modern Work services. Microsoft focuses on several areas of service management to minimize the affect on Modern Work users by demands placed on the service:
- Monitoring and Major Incident Management: knowing if users are impacted (regardless of root cause) and ensuring that the appropriate remediation occurs when users are impacted
- Evergreen Management: being prepared to absorb changes and derive business value from the ever-evolving service
- Service Desk and Normal Incident Management: supporting end-users, leveraging automation investments
Analytics
- Service usage metrics
- Yes
- Metrics types
-
"You can use dashboards in the Microsoft 365 admin centre to monitor the health of various Microsoft services for your organization's Modern Work subscription. Microsoft 365 Monitoring increases observability and minimizes downtime through providing near real-time user telemetry data with enriched alerts in the Microsoft 365 admin centre's Service Health dashboard.
Additionally, Microsoft 365 usage analytics gives you access to a prebuilt dashboard that provides a cross-product view of the last 12 months and contains many prebuilt reports. Each report provides you with specific usage insights. User-specific information is available for the last full calendar month. - Reporting types
-
- API access
- Real-time dashboards
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Microsoft
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Other
- Other data at rest protection approach
-
"Microsoft hosts its online services, including Modern Work, in globally distributed datacenters. These datacenters prioritize high reliability, operational excellence, cost-effectiveness, environmental sustainability, and a trustworthy online experience.
Access to physical datacenter facilities is tightly controlled:
- Outer and Inner Perimeters: Security layers include perimeter fencing, security officers, and locked server racks.
- Multi-Factor Access Control: Only authorized personnel can access datacenters.
- Video Surveillance: Around-the-clock video surveillance monitors datacenter sites.
All Microsoft 365 datacenters employ biometric access controls, with most requiring palm prints for physical access. Regular internal and third-party audits ensure datacenter security compliance with certifications. - Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
"Modern Work applications enable users to export their data in numerous ways.
For information on how Outlook users can export their data, visit https://support.microsoft.com/en-us/office/export-emails-contacts-and-calendar-items-to-outlook-using-a-pst-file-14252b52-3075-4e9b-be4e-ff9ef1068f91
For information on how Teams users can export their data, visit https://answers.microsoft.com/en-us/msteams/forum/all/how-to-download-data-and-activities-carried-out-on/0e21a9e5-71c8-4cdd-b817-a019dcd54592" - Data export formats
-
- CSV
- Other
- Other data export formats
-
- Microsoft Excel (as a workbook or PivotTable report)
- Text-only (tab delimited)
- Extensible Markup Language (XML)
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- Modern Work allows network upload of PST files
- Word, Excel, PPT, PDF, image, video, and audio
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection between networks
-
"Microsoft uses encryption technologies to protect customer data in transit. Inter-data centre communications between Microsoft servers take place over TLS or IPsec, and all customer-facing servers negotiate a secure session using TLS with client machines.
For more information about encryption in transit for Modern Work solutions, please see: https://learn.microsoft.com/en-us/compliance/assurance/assurance-encryption-in-transit" - Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
- Modern Work is a highly secure environment that offers extensive protection in multiple layers: physical datacenter security, network security, access security, application security, and data security. Encryption at rest includes two components: BitLocker disk-level encryption (volume-level) and per-file encryption (file-level) of customer content.
Availability and resilience
- Guaranteed availability
-
"Please note that the following links are collectively a high-level overview, and the actual terms can be found in the specific SLA and refund policy documents.
• https://www.microsoft.com/licensing/docs/view/Service-Level-Agreements-SLA-for-Online-Services?lang=1&year=2023
• https://www.microsoft.com/licensing/docs/view/Service-Level-Agreements-SLA-for-Online-Services
• https://support.microsoft.com/en-us/account-billing/how-to-get-a-refund-on-a-microsoft-subscription-67dca30b-b323-44d5-acc2-e02f9902c472
• https://www.microsoft.com/en-us/store/b/returns
• https://learn.microsoft.com/en-us/answers/questions/1275102/ms-365-business-premium-service-level-agreement?page=1
• https://learn.microsoft.com/en-us/dynamics365/customer-service/use/overview-service-level-agreements
• https://learn.microsoft.com/en-us/training/modules/service-level-agreements/
• https://www.microsoft.com/licensing/servicelevelagreements%29" - Approach to resilience
-
"Microsoft's datacentre setup is designed to be resilient and align with the UK Government's 2nd Cloud Security Principle ""Asset Protection and Resilience"".
* Redundant Architecture: Microsoft online services achieve service resilience through redundant architecture, which involves deploying multiple instances of a service on geographically and physically separate hardware. This provides increased fault-tolerance for Microsoft online services.
* Data Replication and Automated Integrity Checking: Data replication and automated integrity checking are also part of Microsoft's strategy to ensure service resilience.
* Compliance with UK G-Cloud: Every year, Microsoft prepares documentation and submits evidence to attest that its in-scope enterprise cloud services comply with the 14 Cloud Security Principles of G-Cloud. This gives potential G-Cloud customers an overview of its risk environment.
* ISO/IEC 27001 Certification: The compliance process relies on the ISO/IEC 27001 certification. A Government Digital Service (GDS) accreditor then performs several random checks on the Microsoft assertion statement, samples the evidence, and makes a determination of compliance.
* UK OFFICIAL Data: The appointment of Microsoft services to the Digital Marketplace means that UK government agencies and partners can use in-scope services to store and process UK OFFICIAL government data.
Please also see:
• https://learn.microsoft.com/en-us/compliance/assurance/assurance-resiliency-and-continuity
• https://learn.microsoft.com/en-us/compliance/regulatory/offering-g-cloud-uk
• https://learn.microsoft.com/en-us/azure/compliance/offerings/offering-uk-g-cloud - Outage reporting
-
"Microsoft provides several ways to report service outages for BizApps and Azure Cloud:
*Public Dashboard: Microsoft provides a public dashboard where users can view the health of their Microsoft services, including BizApps and Azure. The dashboard indicates whether there is an active service issue and links to the detailed Service Health page.
*API: Microsoft offers the Service Communications API in Microsoft Graph, which allows users to access the health status and message centre posts about Microsoft cloud services. For Azure, users can get information about outage-impacted resources programmatically by using the Events API.
*Email Alerts: Users can sign up for email notifications of new incidents that affect their tenant and status changes for an active incident. Azure Service Health also allows users to set up Service Health alerts to be automatically notified about service issues by email.
In addition to the public dashboard, API, and email alerts, Microsoft provides a few more methods for service outage notifications:
*Mobile Push Notifications: For urgent issues, Microsoft recommends configuring Service Health alerts to send mobile push notifications through the Azure mobile app.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Other
- Other user authentication
-
"Modern Work uses Modern Authentication, a method of identity management that includes authentication methods like Multifactor Authentication (MFA), smart card authentication, and client certificate-based authentication. Authorization methods include Microsoft’s implementation of Open Authorization (OAuth) and Conditional Access policies. Modern Work gives you the option to use security defaults or Conditional Access policies to turn on MFA for your admins and user accounts.
For more information, visit:
- https://learn.microsoft.com/en-us/microsoft-365/admin/security-and-compliance/set-up-multi-factor-authentication?view=o365-worldwide
- https://learn.microsoft.com/en-us/microsoft-365/enterprise/hybrid-modern-auth-overview?view=o365-worldwide" - Access restrictions in management interfaces and support channels
- "Using Microsoft Entra, Modern Work allows you to create or update dynamic groups based on defined rules. These groups automatically adjust their membership based on specified criteria. You can implement multifactor authentication and control device access based on group, team, or site sensitivity, as well as use sensitivity labels to protect content in Microsoft Teams, Microsoft 365 groups, and SharePoint sites. You can manage sharing from specified domains, restrict sharing of content, and control team or group membership from specific domains. You can also prevent anonymous sharing and limit external sharing to specific people.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Other
- Description of management access authentication
-
"The identity and access management features that are built into Azure products and services help protect your organizational and personal information from unauthorized access while making it available to legitimate users whenever and wherever they need it. These features enable you to manage user identities, credentials, and access rights from creation through retirement, and help automate and centralize the identity lifecycle processes. Microsoft uses multiple security practices and technologies across its products and services to manage identity and access:
- Multifactor authentication using Microsoft Active Directory allows users to use multiple methods for access, on-premises and in the cloud.
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Schellman & Company, LLC
- ISO/IEC 27001 accreditation date
- 28/11/2023
- What the ISO/IEC 27001 doesn’t cover
- N/a
- ISO 28000:2007 certification
- No
- CSA STAR certification
- Yes
- CSA STAR accreditation date
- 02/12/2013
- CSA STAR certification level
- Level 2: CSA STAR Attestation
- What the CSA STAR doesn’t cover
- N/a
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- Coalfire
- PCI DSS accreditation date
- 15/3/2021
- What the PCI DSS doesn’t cover
- N/a
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- ENISA IAF
- EU Model Clauses
- EU-U.S. Privacy Shield
- ISO 27001, ISO 27018, SOC 1, SOC 2
- FEDRAMP
- FIPS 140-2
- NIST 800-171
- HIPAA/HITECH
- ISB 1596
- CCSL (IRAP), Cyber Essentials Plus
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- ISO/IEC 27001
- Other
- Other security governance standards
-
"Microsoft adheres to numerous, rigorous security and compliance standards, including CSA CCM version 3.0, ISO 27001, ISO 27018, SOC 1, SOC 2, SOC 3, FedRAMP, and HITRUST, among others. For more on specific compliance, visit:
- https://learn.microsoft.com/en-us/compliance/assurance/assurance-governance
- https://learn.microsoft.com/en-us/microsoft-365/community/microsoft365-maturity-model--governance-and-compliance
- https://servicetrust.microsoft.com/" - Information security policies and processes
-
"Microsoft follows a comprehensive approach to information security policies and processes for its internal operations. Here's an overview:
*Microsoft Security Policy (MSP): Microsoft implements a comprehensive security governance program as part of the Microsoft Policy Framework. The MSP organizes Microsoft's security policies, standards, and requirements so they can be implemented across all Microsoft engineering groups and business units.
*Business Unit Responsibility: Individual business units are responsible for specific implementations of Microsoft security policies. For example, Microsoft 365 documents its security implementations in the Microsoft 365 Information Security Policy and the related Microsoft 365 Control Framework. Azure and Dynamics 365 document their security implementations in the Standard Operating Procedures (SOPs) and the Azure Control Framework.
*Alignment with Regulatory and Compliance Frameworks: Microsoft's security governance program is informed by and aligns with various regulatory and compliance frameworks. Security requirements are constantly evolving to account for new technologies, regulatory and compliance requirements, and security threats.
*Policy Updates: Microsoft regularly updates its security policies and supporting documents to protect Microsoft systems and customers, meet commitments, and maintain customer trust.
*Operational Security Practices: Microsoft Operational Security Assurance Practices provide a set of practices that aim to improve software security in a cloud-based infrastructure.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
"Modern Work enforces change management procedures for both code and non-code changes to maintain its security posture. Once an information system within Modern Work is deployed with a robust security posture, detailed change management processes are enforced to maintain system integrity.
Service teams utilize ticketing or source control tools to document evidence of approval and track all changes. Changes are deployed through Microsoft’s Secure Development Lifecycle (SDL), which includes specific security considerations related to code reviews, tests, and approvals before systematically releasing code into the Modern Work environment. Critical security review and approval checkpoints are part of the SDL. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
"Assessing Potential Threats
Microsoft uses a variety of methods to assess potential threats to its services. The Microsoft Detection and Response Team (DART) actively looks for cyberthreats that have penetrated an environment, looking beyond known alerts or malicious threats to discover new potential threats and vulnerabilities. They use a tiered data collection model and start by collecting a snapshot of the densest, most indicator-rich data they can from every object and endpoint they can reach. This data provides information about any known threats, known attack patterns, and many indicators of suspicious or anomalous activity. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
"Azure security has defined requirements for active monitoring. Service teams configure active monitoring tools in accordance with these requirements. Active monitoring tools include the Microsoft Monitoring Agent (MMA) and System Centre Operations Manager. These tools are configured to provide time alerts to Azure security personnel in situations that require immediate action.
Azure continuously monitors and detects risk in your organization, even when devices aren’t connected to the corporate network. Azure uses adaptive machine learning (ML) algorithms and heuristics to detect anomalies and risk detections that indicate that an identity has been compromised. Azure security has defined requirements for active monitoring. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- "To effectively respond to security incidents, Microsoft employs a federated security incident response model. Each major online service team adheres to a shared incident management process, shared definitions, and shared training to provide consistency across all online services. The Microsoft 365 (Modern Work) Security Response team provides service teams with centralized security expertise and incident response guidance as part of our federated security response model. Depending on the nature of the incident, the Microsoft 365 Security Response team and service teams may engage security partners and subject matter experts from other organizations within Microsoft for investigative assistance.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
We take our environmental management and the impact we have on the environment very seriously. We have environmental policies in place and hold the ISO14001 accreditation. Our environmental assessments are conducted annually by an external Lead ESOS Assessor; they are signed-off by the board and compliance reported to the regulator (the Environment Agency). Our environmental policy is published on our website at https://www.bytes.co.uk/company/sustainability/environmental.
Bytes achieved carbon net zero in March 2022 through approved carbon offsetting schemes. We are always seeking to reduce our impact on the environment. We aim to minimise waste, reduce pollutants and use renewable materials. Our offices have recycling facilities for cans, plastic and paper. We aim to reduce our office printing to zero within the next few years.
An Environmental Steering Committee has been established to coordinate environmental activities and drive change.
To drastically reduce our emissions, we have switched to renewable energy. Our Head Office has reached our first milestone of using a specialist 100% renewable electricity provider. We are also exploring options to install solar panels on our Headquarters building.
Other environmental initiatives include installing electric vehicle charging points and encouraging staff to commute to work without the car (setting up a car share network and installing secure cycle parking).
We produce a SECR (Streamlined Energy and Carbon Reporting) report that details the companies energy consumption and carbon emissions. This report is produced annually by an independent assessor.
This report provides details of our emissions in Scope 1, 2 and 3 categories. It details the activities previously taken to reduce emissions and also recommendations for further improvements.
For scope 1,2 and 3 emissions we aim to reduce these by 50% by 2025-2026 from our 2021 baseline.
We aim to be Net Zero by 2040, covering our own operational emissions.
Pricing
- Price
- £2.48 a user a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- 30 day trial
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at tenders@bytes.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.