Sterling Microsoft
Our service provides essential Microsoft products like Microsoft 365, GitHub, Windows, MS SQL, and Microsoft Teams, fostering communication, collaboration, and productivity. With robust security and seamless integration, we streamline workflows for businesses and individuals, empowering them to achieve their goals effectively.
Features
- Microsoft 365
- CoPilot
- Git Hub Licences
- Windows Licences
- MS SQL
- Microsoft Teams
Benefits
- Enhanced collaboration
- AI/ML
- SaaS productivity suite
- Development environment
- Dev/test environment
- Improved Productivity
- East Management
Pricing
£51.55 a user
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 7 4 4 6 8 8 0 6 7 2 1 9 5 4
Contact
Sterling Computers Corporation
Luke Flanagan
Telephone: +447557400401
Email: luke.flanagan@sterling.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- N/A
- System requirements
-
- Subscription Licences
- Requires Windows OS
User support
- Email or online ticketing support
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Requires filling out
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- User Documentation: We provide comprehensive user documentation that covers all aspects of our service, from basic functionalities to advanced features. This documentation is easily accessible through our website or within the application itself. It includes step-by-step guides, FAQs, troubleshooting tips, and best practices. Online Training Resources: We offer online training sessions through webinars, video tutorials, and interactive courses. These resources cater to different learning preferences and skill levels, allowing users to grasp concepts at their own pace. We also provide live Q&A sessions during webinars to address any queries or concerns users may have. Onsite Training (Optional): For organisations or teams that prefer personalised assistance, we offer onsite training sessions conducted by our experienced trainers. These sessions can be tailored to the specific needs and workflows of the users, ensuring maximum productivity and efficiency.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Ensuring a smooth transition at the end of the contract is crucial. For Microsoft 365, users can export their data using tools within the Microsoft 365 Admin Center or third-party migration options. GitHub provides various methods, including repository archiving and Git repository cloning, while Windows licenses require users to retain records of their license keys or subscription details. Microsoft SQL Server offers backup and export functionalities through SQL Server Management Studio or Azure cloud-based solutions. For Microsoft Teams, data can be exported using the Microsoft 365 Compliance Center's Content Search feature. Our team provides guidance and support throughout the process, ensuring users can seamlessly extract their data and maintain productivity beyond the contract period.
- End-of-contract process
- At the conclusion of the contract, users undergo a transition process facilitated by our team. This entails assessing their data extraction needs across Microsoft products like Microsoft 365, GitHub licenses, Windows licenses, MS SQL, and Microsoft Teams. Utilizing platform-specific tools and methodologies, users extract their data, ensuring continuity and accessibility beyond the contract period. Throughout this process, our team provides comprehensive support, ensuring a seamless transition and enabling users to maintain productivity without interruption.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- MacOS
- Windows
- Windows Phone
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Available through the App store
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Customers can access their product via the web interface
- Accessibility standards
- None or don’t know
- Description of accessibility
- Via the web interface
- Accessibility testing
- N/A
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- To ensure users remain unaffected by demand from others on our service, we employ a range of strategies. Our infrastructure dynamically scales to accommodate increased demand, supported by load balancing techniques that evenly distribute traffic across resources. We isolate resources to prevent contention, monitor performance in real-time, and implement quality of service policies to prioritize critical workloads during peak times. Additionally, regular capacity planning ensures our infrastructure can sustain growth without sacrificing performance or reliability, collectively ensuring consistent service quality for all users.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We provide comprehensive service usage metrics to help users track and optimise their usage of our products. These metrics typically include data on user activity, such as the number of logins, file uploads/downloads, emails sent/received, code commits, database queries, and collaboration interactions within Microsoft Teams. Additionally, we offer insights into system performance metrics like uptime, latency, and error rates to ensure users understand their service utilization and performance entirely. These metrics empower users to make data-driven decisions, optimise their workflows, and maximise the value they derive from our services.
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Microsoft
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- Never
- Protecting data at rest
-
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Users export their data through platform-specific tools and methodologies tailored to each Microsoft product. For Microsoft 365, they utilize features within the Microsoft 365 Admin Center or third-party migration options. GitHub provides methods like repository archiving and Git repository cloning. Windows license data requires users to retain records of their license keys or subscription details. Microsoft SQL Server offers backup and export functionalities via SQL Server Management Studio or Azure cloud-based solutions. Lastly, Microsoft Teams data can be exported using the Microsoft 365 Compliance Center's Content Search feature. Our team provides guidance and support to ensure a seamless extraction experience.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- PST (M365)
- JSON (M SQL)
- XML (M SQL)
- Data import formats
-
- CSV
- ODF
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
We guarantee high availability across our Microsoft product offerings, including Microsoft 365, GitHub, Windows, MS SQL, and Microsoft Teams. Our service level agreements (SLAs) for availability are outlined in detail, specifying uptime percentages and response times for resolving service interruptions. These SLAs typically include commitments to uptime percentages exceeding 99.9%, ensuring minimal downtime and uninterrupted access to essential services for our users.
If we fail to meet our guaranteed levels of availability as stipulated in the SLAs, we have a structured refund policy to compensate affected users. This policy outlines the process for users to claim refunds based on the duration and severity of the service disruption. Refunds are typically issued as service credits or monetary reimbursements, depending on the SLAs' terms and the outage's severity. We aim to ensure that users receive fair compensation for any inconvenience caused by service interruptions while maintaining transparency and accountability in our service delivery. - Approach to resilience
- Our service is designed for maximum resilience, particularly in our data center setup. We deploy geographically dispersed data centers interconnected with redundant networking to minimize localized disruptions. Within each data center, redundancy is built into power, networking, and hardware systems, while RAID configurations and distributed storage ensure data integrity. Automated monitoring allows for proactive issue detection and resolution, ensuring uninterrupted service for our users.
- Outage reporting
- Our service promptly reports any outages through multiple channels to ensure transparency and timely communication with our users. We offer a public dashboard that provides real-time status updates, allowing users to monitor the service health and track any ongoing issues. Additionally, we provide an API that enables automated access to outage information, facilitating integration with users' monitoring systems or custom dashboards. Furthermore, users can subscribe to email alerts for outage notifications, ensuring they receive timely updates directly to their inbox. This multi-channel approach ensures that users are promptly informed about any service disruptions, empowering them to take appropriate actions and stay informed about the status of our services.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Role Based Access Control (RBAC)
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users receive audit information on a regular basis
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- ISO 9001
- ISO 14001
- CMMC
- NIST 800-171
Security governance
- Named board-level person responsible for service security
- No
- Security governance certified
- No
- Security governance approach
- We are going through our ISO 27001 audit and will be awarded in Q3 2024. As an organisation, we currently adhere to and apply the ISO standards.
- Information security policies and processes
- As an organisation, we currently adhere to and apply the ISO standards.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Our configuration and change management processes ensure the stability and security of our services. Components are meticulously tracked throughout their lifecycle using version control systems, configuration management databases, and change-tracking tools. Changes undergo thorough security assessments by our dedicated team, evaluating potential vulnerabilities and ensuring compliance with security policies and industry standards. Risk assessments are conducted to mitigate security risks, and changes are subject to approval workflows and documentation requirements. These processes enable us to manage changes effectively, minimise security risks, and maintain the integrity of our systems.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We maintain a proactive vulnerability management process by continuously monitoring various sources for potential threats. Upon identifying a vulnerability, we swiftly assess its impact and prioritise patches based on severity. Our deployment process is rapid yet thorough, ensuring patches are tested for compatibility before deployment to minimise disruption. Additionally, regular vulnerability scans and penetration tests help identify and remediate weaknesses in our systems. This comprehensive approach allows us to effectively mitigate security risks and maintain the robustness of our services.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Our protective monitoring processes are geared towards promptly identifying and responding to potential compromises to ensure the security of our services. We use advanced monitoring tools and techniques to detect anomalies/suspicious activities within our systems, triggering an immediate investigation by our incident response team upon detection. Our response is swift and decisive, with predefined protocols guiding containment measures and forensic analysis to determine the extent of the compromise. Communication channels are kept open with stakeholders, providing regular updates on remedial actions taken. Through continuous refinement, we aim to maintain agility and effectiveness in addressing evolving threats.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Our incident management processes are structured with pre-defined protocols for common events, ensuring swift resolution and minimal disruption. Users report incidents through designated channels, including a dedicated support portal or hotline. Upon receipt of an incident report, our team initiates immediate investigation and response, leveraging real-time monitoring tools and expertise. Incident reports are promptly communicated to stakeholders via email or an online dashboard, detailing the nature of the incident, actions taken, and any follow-up steps. Continuous review and refinement ensure our incident management remains agile and effective in mitigating risks and maintaining service integrity.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- Public Services Network (PSN)
- Police National Network (PNN)
- NHS Network (N3)
- Joint Academic Network (JANET)
- Scottish Wide Area Network (SWAN)
- Health and Social Care Network (HSCN)
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
Fighting climate change
The following initiatives demonstrate Sterling’s commitment to environmental stewardship and sustainability. • Renewable Energy: Sterling partners with a power provider that uses renewable energy sources, minimising its carbon footprint. • Tree Planting: The company actively contributes to reforestation efforts by planting trees, promoting biodiversity, and sequestering carbon. • Water Dispensers: Sterling’s headquarters prioritise sustainability by installing water dispensers, reducing single-use plastic waste. • Recycling: At every facility, recycling programs are in place, diverting waste from landfills and promoting circular economy practices. • Flexible Work Arrangements: Employees benefit from work-from-home days, fostering work-life balance and reducing commuting-related emissions. where vendor packaging is unsuitable for shipping, we re-box products using recycled cardboard, paper, and glue tape. Additionally, vendors utilise various pallets and skids in their supply chains, including plastic options, over which we have limited influence. However, when re-palletising is necessary, we prioritise using the most appropriate pallets for specific goods and destinations, considering customer requirements. We have focused on reducing any additional packaging added during the process. Moreover, we have established robust pallet recycling practices, wherein all pallet and wood waste generated on-site is collected and recycled. Our suppliers reuse intact pallets, repair damaged ones, and recycle any remaining waste by chipping it for reuse. Additionally, we provide pallets to carrier companies for reuse, further contributing to sustainability efforts.Covid-19 recovery
We are committed to expanding our capacity to offer skills opportunities directly, particularly in response to the economic recovery following COVID-19. Our commitment aims at addressing the diverse needs of our workforce and the wider community. We recognise the importance of offering training programs that encompass a wide range of skills, including leadership, communication, teamwork, and practical skills relevant to our industry. In practical terms, our approach involves collaborating with accredited training providers to develop tailored programs that meet the evolving needs of our workforce. These programs will be overseen by Sterling’s Framework Agreement Manager and Project Manager, who will ensure that training objectives are aligned with our business goals and the requirements of the Public Services (Social Value) Act 2012. Regular monitoring and evaluation processes will be implemented to track the effectiveness of these programs and make necessary adjustments to optimise outcomes.Tackling economic inequality
Sterling actively supports educational establishments, the wider public sector, and local communities through various initiatives. One notable involvement is as an ambassador for the STEM Learning programme, where Sterling collaborates to improve the educational outcomes of young people in STEM education. This partnership aims to foster collaboration and support within the STEM education ecosystem, ensuring that young learners can access quality educational resources and opportunities. Furthermore, Sterling has extended its support to local schools and universities, such as Lancaster and Manchester. This assistance primarily involves participation in learning events hosted by these universities at the Manchester DiSH office, where Sterling is situated. Manchester DiSH has supported over 4000 youngsters with online safety, accredited female lead VCSEs with Cyber essentials, hosted MPs and supported countless businesses with cyber awareness. An example of Sterling’s involvement, is we actively participated in a 'Dragons Den' event organised for local schools, held at the Manchester DiSH office, hosted by Barclays Eagle Labs. During this event, Sterling engaged with young entrepreneurs, listened to their business ideas, provided valuable feedback, and offered guidance and support to their educational business studies. Sterling is also actively helping with Elective Home Education (EHE), where children between the ages of eight and fifteen come into the office to learn subjects such as Robotics, Cyber Security, and Money Management.Equal opportunity
Sterling is committed to providing free-of-charge skill provision to our Members and Wider Public Sector Contracting Authorities accessing this Framework Agreement. Our aim is to offer a range of workshops, seminars, and online training sessions that are tailored to meet the specific needs of our stakeholders. These sessions will cover a diverse array of topics, including technical skills relevant to our industry and broader soft skills essential for professional development. We will work closely with our partners and stakeholders to identify areas of need and tailor our training offerings accordingly. Sterling proudly hosts a dynamic paid internship program renowned for its enriching experiences. Each summer, interns at Sterling delve into various facets of our operations, honing essential Sales, Accounting, and Operations skills. Moreover, participants enjoy various benefits, including mentorship from seasoned professionals, exposure to real-world projects, and networking opportunities within our vibrant corporate culture. Designed for college students, our internship program is a launching pad for aspiring professionals. It offers invaluable insights and hands-on training that complement academic learning. As a testament to its success, many of our interns seamlessly transition into full-time roles upon graduation, leveraging their internship experience to hit the ground running in their careers. At Sterling, we're committed to nurturing talent and empowering the next generation of leaders. Join us this summer and embark on a journey of growth, learning, and endless possibilities. Sterling currently offers this program globally and will endeavor to extend this opportunity to participants once we are brought on to the framework. This internship program serves as an essential avenue for developing talent and fostering future leaders in our industry. A proactive and collaborative.
Pricing
- Price
- £51.55 a user
- Discount for educational organisations
- Yes
- Free trial available
- No