Skip to main content

Help us improve the Digital Marketplace - send your feedback

INGENTIVE LIMITED

Ingentive Windows 365

Ingentive offers comprehensive integration of Microsoft Windows 365, delivering a streamlined, secure, and cloud-based desktop solution. Designed to optimise productivity and adaptability for contemporary, dispersed teams, our service ensures a seamless user experience in the ever-evolving landscape of remote work.

Features

  • Personalised Cloud PC: Tailored Windows 365 experiences.
  • Anywhere Access: Windows 365 on any device.
  • Intune Integration: Efficient Windows 365 management.
  • Versatile Computing: Adaptable Windows 365 workloads.
  • Secure Streaming: Cloud to Windows 365 user securely.
  • Hybrid Work Solutions: Perfect for distributed teams.
  • Scalable Workforces: Flexibly adjusts to organisational needs.
  • Easy Deployment: Simplified Windows 365 setup.
  • Regulatory Compliance: Meets diverse standards seamlessly.
  • Efficient Cloud Management: Streamlines resource allocation.

Benefits

  • Efficient management across all Windows 365 devices.
  • Robust security via Microsoft's infrastructure.
  • Desktop access from anywhere, anytime.
  • Reduced hardware expenses with cloud-based operations.
  • Scalable solution suitable for businesses of any size.
  • Tailored Windows experience in the cloud.
  • Predictable expenditure with per-user pricing model.
  • Swift deployment of Windows 365 Cloud PCs.
  • Enhanced productivity with Microsoft 365 integration.
  • Constantly updated Windows environment for seamless operation.

Pricing

£0.00 a licence

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at hemraj.tatur@ingentive.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

6 7 8 1 6 5 3 7 2 6 0 9 3 3 9

Contact

INGENTIVE LIMITED Hemraj Tatur
Telephone: 02081323255
Email: hemraj.tatur@ingentive.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Hybrid cloud
Service constraints
While our service is primarily focused on Microsoft products, we also collaborate with customers to address specific integration needs or compatibility issues. However, it's essential to discuss such requirements during the onboarding process for alignment & feasibility. We operate within predefined hours.

While we strive to provide timely assistance, urgent or critical issues may be addressed outside of these hours as part of our premium offerings.

Furthermore, it's worth noting that while we aim to resolve issues promptly, certain complex or unique challenges may require additional investigation. In such cases, we maintain transparent communication channels for informed progress and timelines.
System requirements
  • Microsoft 365 subscription for full functionality and integration.
  • Windows Server 2012 or later for server deployment.
  • SharePoint Server license for on-premises installation.
  • Microsoft Edge, Chrome, or Firefox for modern browser support.
  • Microsoft Defender Antivirus for security compliance.
  • Active Directory for user authentication and access control.

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Ingentive can offer a flexible support service (Flexi, Plexi Plus and Complete). These have different features but all have an response SLA of:
- Major: 1hour
- Intermediate: 4hours
- Minor: 8hours
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), 7 days a week
Web chat support
Yes, at an extra cost
Web chat support availability
9 to 5 (UK time), 7 days a week
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
Microsoft assesses products using three accessibility standards:

Web Content Accessibility Guidelines (WCAG) are internationally adopted technical standards for making web content accessible. Each guideline has testable success criteria. Microsoft assesses products and services against WCAG levels A and AA criteria. The WCAG are developed and maintained by the Worldwide Web Consortium (W3C), an international organisation for the development of web standards.

US Section 508 guidelines were developed by the US Access Board for use by federal agencies in implementing Section 508 of the US Rehabilitation Act. Federal agencies use the Section 508 guidelines to develop, procure, maintain, and use accessible Information and Communication Technology (ICT). The guidelines contain scoping and technical considerations to facilitate accessibility for individuals with disabilities.

ETSI EN 301 549 is a European-developed accessibility standard for ICT products and services developed by the European Standards organisations CEN (European Committee for Standardization), CENELEC (European Committee for Electrotechnical Standardization), and ETSI (European Telecommunications Standards Institute). The standard contains accessibility criteria for ICT products and services and incorporates the WCAG standards for web accessibility. The standard was originally developed for purposes of public procurement in the European Union and is also referenced by jurisdictions outside of Europe.
Onsite support
Yes, at extra cost
Support levels
At Ingentive, we offer three support levels to suit different needs and budgets:
Basic Support:
- Essential support services, including general inquiries and basic troubleshooting.

Premium Support:
- Priority response times, extended support hours, and dedicated support agents.

Enterprise Support:
- Tailored for complex needs with personalised support from a technical account manager or cloud support engineer. At Premium and Enterprise levels, clients can work with a dedicated technical expert for personalised guidance and proactive assistance
Support available to third parties
No

Onboarding and offboarding

Getting started
At Ingentive, we provide comprehensive support to ensure users can seamlessly start using our service:

In-Person Training: Tailored training sessions conducted at your location for hands-on learning.

Online Training: Interactive webinars and tutorials accessible remotely for convenient learning.

User Documentation: Extensive guides, manuals, and FAQs available online for self-paced learning.

Video Tutorials: Step-by-step video guides covering various features and functionalities.

Help Desk Support: Responsive support team available via email, chat, or phone for real-time assistance.

Onboarding Assistance: Dedicated onboarding specialists to guide users through initial setup and configuration.

Knowledge Base: Accessible repository of articles and troubleshooting resources for quick reference.

Community Forums: Online forums where users can connect, share experiences, and seek advice from peers.

Regular Updates: Continuous improvement through software updates and feature enhancements.

Customer Success Manager: Assigned manager to ensure successful implementation and user adoption.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
At the end of the contract, users can easily extract their data through the following process:

Data Export Tool: Ingentive provides a built-in data export tool within the platform, adhering to Microsoft's standard data export protocols.

Custom Data Extraction: Users can specify data parameters and format preferences for extraction, ensuring compatibility with Microsoft's data standards.

Secure Download: Once configured, users can securely download their data directly from the platform, meeting Microsoft's security requirements.

Data Formats: Data can be exported in commonly used formats such as CSV, Excel, or PDF, aligning with Microsoft's data compatibility standards.

API Integration: Advanced users can utilise our API for automated data extraction and integration with other systems, leveraging Microsoft's API guidelines.

Data Retention Policy: Ingentive ensures compliance with data protection regulations by offering options for data deletion or archival upon contract termination, following Microsoft's data retention best practices.

Support Assistance: Our support team is available to guide users through the data extraction process and address any queries or concerns, adhering to Microsoft's support standards.

Data Transfer Assistance: Ingentive can provide assistance in transferring extracted data to the user's preferred storage or destination, ensuring compliance with Microsoft's data transfer guidelines.
End-of-contract process
At the end of the contract, the following steps occur:

Data Extraction: Users can extract their data using Ingentive's export tools, ensuring a smooth transition.

Contract Review: Both parties review the contract terms and discuss renewal options or termination procedures.

Termination Procedures: If the contract is not renewed, access to the platform is terminated, and data handling procedures, including deletion or archival, are implemented as per agreement.

Support Continuity: Ingentive continues to provide support during the transition period to assist with data extraction and any related queries.

Included in the contract price:
Full access to the Ingentive platform, including all features and updates during the contract period.

Standard support services, including assistance with setup, troubleshooting, and basic user training.

Data storage and security features as outlined in the agreement.

Additional costs may include:
Customisation or integration services beyond the scope of the standard offering.

Advanced support packages for priority assistance or extended support hours.

Data migration services if transferring data from another platform.

Premium features or add-ons not included in the standard package.

All additional costs are communicated and agreed upon before implementation, ensuring transparency and budgetary control for users.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • MacOS
  • Windows
  • Windows Phone
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Windows 365 Cloud PCs can be accessed through the Windows App on Windows 10/11 devices, alternatively the standard Windows Remote Desktops application. Microsoft Remote Desktops is available for mobile devices.
Service interface
No
User support accessibility
WCAG 2.1 AA or EN 301 549
API
No
Customisation available
Yes
Description of customisation
Ingentive provide consultancy services in addition to reselling the Windows 365 service. Through these consulting services Ingentive are able to provide recommendations on how best to deploy Windows 365 and customise the authentication and network access options for the service.

Scaling

Independence of resources
We ensure resource independence by:

Scalable Infrastructure: Dynamic resource allocation based on demand.

Resource Isolation: Preventing one user's activity from impacting others.

Load Balancing: Evenly distributing traffic to maintain performance.

Monitoring: Constantly monitoring and adjusting resources.

SLAs: Service level agreements guaranteeing performance standards.

Redundancy: Backup systems to mitigate potential failures.

Throttling: Regulating resource usage during peak periods.

Priority Access: Offering dedicated resources for critical workloads.

Optimisation: Regularly improving resource allocation efficiency.

Transparency: Providing visibility into resource usage for users.

Analytics

Service usage metrics
Yes
Metrics types
We provide comprehensive service metrics including:

Usage Statistics: Track platform usage, user activity, and engagement metrics.

Performance Monitoring: Monitor uptime, response times, and system performance.

Data Security: Measure compliance with data protection standards and security protocols.

Customer Satisfaction: Gather feedback through surveys and evaluate satisfaction levels.

Support Response Time: Measure the speed and effectiveness of support responses.

Feature Adoption: Track the adoption rates of new features and updates.

Availability: Monitor platform availability and downtime occurrences.

Customised Reporting: Generate custom reports tailored to specific metrics and requirements.

SLA Compliance: Measure adherence to service level agreements (SLAs) for uptime and support.
Reporting types
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Microsoft

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Data held on the service disks of the Windows 365 Cloud PCs has to be transferred to an accessible network location.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
IPsec or TLS VPN gateway
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Microsoft prioritises availability, ensuring uninterrupted access to its services. Here’s how it achieves this:

Service Health and Continuity:
- Admins can monitor service status and scheduled maintenance.
- Service health provides real-time updates on disruptions and outages.
- Planned maintenance is communicated in advance through the Message Center.
- Unplanned downtime notifications address unexpected service unavailability .

Recent Worldwide Uptime:
- Microsoft maintains transparency. Recent uptime data (excluding U.S.
- Government DoD and GCC High) shows:
> 2023: 99.98% (Q1), 99.99% (Q2), 99.99% (Q3), 99.996% (Q4).
> 2022: 99.98% (Q1-Q3), 99.99% (Q4).
> 2021: 99.97% (Q1), 99.98% (Q2-Q4) .

Notification Policy:
- Timely communication during service incidents is crucial.
- Microsoft aims for accuracy and transparency in notifications

In summary, Microsoft maintains high availability, empowering users with reliable and secure services.
Approach to resilience
Microsoft's approach to M365 resilience is multi-faceted and involves several layers of protection to ensure the availability and reliability of the service. Some of the key measures include:

- Datacenter redundancy: Microsoft has multiple datacenters in different regions, ensuring that if one datacenter experiences an outage, the service can failover to another datacenter with minimal disruption.

- Network resilience: Microsoft's network infrastructure is designed to be highly resilient, with multiple redundant paths and automatic failover mechanisms.

- Data backup and recovery: Microsoft has robust data backup and recovery processes in place to ensure that customer data is protected and can be restored in the event of a disaster.

- Monitoring and incident response: Microsoft continuously monitors the M365 service for any issues and has a dedicated incident response team to quickly address and resolve any problems that arise.
Overall, Microsoft's approach to M365 resilience is focused on providing a highly available and reliable service to its customers.
Outage reporting
Microsoft reports on Microsoft 365 outages through the Service Health Dashboard and the Microsoft 365 Admin Center.

These tools provide real-time information on the status of the service, including any current or recent outages. Administrators can view the details of the outage, including the cause, impact, and estimated time of resolution.

Microsoft also provides regular updates on the progress of resolving the issue. Additionally, Microsoft may send email notifications to administrators to alert them of any service disruptions.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
To restrict access in management interfaces and support channels, Microsoft employs:

Role-Based Access Control (RBAC): Administrators assign roles and permissions based on user responsibilities.

Multi-Factor Authentication (MFA): Extra verification layers prevent unauthorised access.

Conditional Access Policies: Control access based on conditions like location or device compliance.

Audit Logging: Tracks and reviews access events for security.

Restricted Admin Mode: Limits access to essential administrative tasks.

Encryption and Data Protection: Secures data transmission and sensitive information storage.

These measures ensure restricted access to management interfaces and support channels, enhancing security and protecting sensitive information
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
Between 6 months and 12 months
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • CSA CCM version 3.0
  • ISO/IEC 27001
Information security policies and processes
Microsoft follows a wide range of information security policies and processes to protect its customers' data and ensure the security of its products and services. Some of these include:

- Risk management: Microsoft has a comprehensive risk management program that identifies, assesses, and mitigates potential security risks.

- Compliance: Microsoft complies with various industry standards and regulations, such as ISO 27001, SOC 2, and GDPR.

- Data protection: Microsoft uses encryption, access controls, and other security measures to protect customer data.

- Incident response: Microsoft has a dedicated security response team that handles security incidents and works to prevent future occurrences.

- Employee training: Microsoft provides regular security training to its employees to ensure they are aware of the latest threats and best practices for protecting customer data.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Lifecycle Tracking: We meticulously track each component's lifecycle within Microsoft, ensuring accurate records from deployment to retirement.

Security Impact Assessment: Proposed changes undergo a thorough assessment for security impact, evaluating scope, vulnerabilities, and risks specific to Microsoft's environment.

Release Strategy: Modern Work considers various options, assessing changes' impact on availability, performance, and security. This includes stakeholder coordination and testing tailored to features and functionalities.

Communication Channels: Planned changes are communicated via formal channels such as service notifications and release notes. Unplanned changes, particularly security updates, receive immediate communication through emergency notifications to keep users informed.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Microsoft online services use machine state scanning to make sure the machines comprising our infrastructure are up to date with the latest patches and that their base configurations correctly align with relevant frameworks.

Machine state scanning uses patching, anti-malware, vulnerability scanning, and configuration scanning (PAVC). Microsoft online services apply effective PAVC by installing a custom security agent on each asset during deployment. This security agent enables machine state scanning and reports results to our service teams.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Protective Monitoring Processes for Microsoft:

Identification of Potential Compromises: We employ monitoring tools to detect abnormal behaviour or security anomalies.

Response to Potential Compromises: Our incident response team initiates immediate investigation and containment procedures, followed by remediation measures.

Incident Response Time: We prioritise rapid response to security incidents within minutes of detection, ensuring data integrity and user confidence.

Our protective monitoring ensures the security and reliability, providing users with a trusted environment.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Microsoft online services security teams and service teams take the same approach to security incidents, which is based on the NIST 800-61:

Preparation: Organisational preparation that is needed to be able to respond, including tools, processes, competencies, and readiness.

Detection & analysis: Activity to detect a security incident in the environment and to analyse all events to confirm the authenticity of the security incident.

Containment-eradication-recovery: Required and appropriate actions taken to contain the security incident based on the analysis.

Post-incident activity: Post-mortem analysis performed after the recovery of a security incident.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
Yes
Connected networks
  • Public Services Network (PSN)
  • Police National Network (PNN)
  • NHS Network (N3)
  • Joint Academic Network (JANET)
  • Scottish Wide Area Network (SWAN)
  • Health and Social Care Network (HSCN)

Social Value

Social Value

Social Value

  • Fighting climate change
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Ingentive is committed to delivering services sustainably, supported by our annually updated environmental policy, dynamic roadmap of environmental initiatives, and a scorecard.

Under the leadership of Ingentive’s CFO, our Greening Committee (GC) drives environmental & sustainability initiatives with set targets. The GC includes representation from every department, ensuring innovation and participation across the organisation through annual member rotations. The GC meets quarterly & sets the agenda for driving environmental policy improvements. Market research responsibility revolves through GC members and feedback on environmental impacts and benefits form part of the quarterly agenda and are presented back to the GC for further action and consideration.

Aligned with Microsoft’s commitment, Ingentive provides services focused on being carbon-negative, water-positive, and zero waste by 2030, in line with the government's 25-year plan objectives. Our research efforts encompass:

Clean Air: Researching technologies like virtualisation and cloud computing to promote clean air & aligning with Microsoft’s air quality policies.

Clean and Plentiful Water: Researching water-efficient data centre design, recycling & engaging with Microsoft stakeholders on water-related challenges in IT services.

Reducing Risks of Harm: Analysing environmental hazards in IT operations such as electronic waste, hazardous components & pollution.

Using Resources Sustainably: Investigating resource-efficient IT infrastructure technologies, collaborating with suppliers & partners to optimise IT services lifecycle.

Mitigating Climate Change: Researching climate mitigation strategies like carbon offsetting and renewable energy adoption & collaborating with Microsoft to deploy climate-resilient IT solutions.

Minimising Waste: Researching waste minimisation services & sustainable product design & partnering with waste & recycling facilities for optimised waste recovery & disposal processes.

Tackling economic inequality

At Ingentive, we're deeply committed to tackling economic inequality and promoting social equity. We recognise that economic disparities disproportionately affect marginalised groups. To drive positive change, we're taking proactive steps through various initiatives:

Diversity and Inclusion: Prioritising diversity in hiring, procurement, and vendor selection.

Equal Pay and Benefits: Ensuring fair compensation and benefits for all employees.

Supplier Diversity: Supporting minority-owned and women-owned businesses.

Community Investments: Investing in community development and workforce training.

Mentorship and Skills Development: Offering mentorship programs and skills workshops.

Advocacy and Policy Engagement: Advocating for equitable policies and initiatives.

Community Partnerships: Collaborating with non-profits agencies.

Transparency and Accountability: Maintaining transparency in our efforts.

Through these initiatives, we're working towards a more inclusive and prosperous future for all.

Equal opportunity

At Ingentive, we are dedicated to fostering an inclusive and diverse work environment. We believe in equal opportunity employment practices, where decisions regarding hiring, promotion, discipline, or dismissal are made solely on the basis of merit, competence, performance, and business needs. We actively promote diversity and do not discriminate against individuals based on race, colour, religion, marital status, age, national origin, ancestry, physical or mental disability, medical condition, pregnancy, genetic information, gender, sexual orientation, gender identity or expression, or any other legally protected status.

Our commitment extends beyond our own organisation to our supply chain partners. We ensure that all organisations within our supply chain share our values and principles of equal opportunity employment.

Through collaboration and engagement, we work with our partners to uphold these standards and create a culture of inclusivity across all aspects of our business operations.

Wellbeing

At Ingentive, we prioritise the health and wellbeing of our employees. We believe that fostering a supportive and nurturing work environment is essential for individual and collective success.

Our commitment to employee wellbeing includes:

Comprehensive Health Benefits: We provide robust health insurance coverage, including medical and dental plans, to ensure that our employees have access to quality healthcare services.

Mental Health Support: We offer resources and programs to support mental health, including counselling services, employee assistance programs, and mindfulness workshops.

Work-Life Balance: We promote work-life balance by offering flexible work arrangements and remote work options.

Ergonomic Workspaces: We prioritise ergonomic design in our workspaces to promote comfort and reduce the risk of injury or strain.

Employee Assistance: We provide access to confidential support services for employees facing personal or professional challenges.

Training and Development: We invest in employee training and development programs to enhance skills, promote career growth, and foster a sense of fulfilment and accomplishment.

Recognition and Appreciation: We recognise and celebrate the contributions of our employees through various recognition programs, rewards, and incentives.

Open Communication: We maintain open and transparent communication channels to encourage feedback, address concerns, and foster a culture of trust and collaboration.

Community Engagement: We encourage employees to participate in community service and volunteer activities to give back to society and promote social connectedness.

Through these initiatives, we strive to create a workplace where every employee feels valued, supported, and empowered to thrive personally and professionally.

Pricing

Price
£0.00 a licence
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at hemraj.tatur@ingentive.com. Tell them what format you need. It will help if you say what assistive technology you use.