Microsoft 365 Services
Technology Transformation Group assesses your organisation's software needs to develop a tailored Microsoft 365 Service strategy, leveraging the full potential of your licenses. We analyse existing licensing agreements, identifying cost-saving opportunities and offer guidance on product features such as Word, Excel, and Teams for enhanced productivity, security and team empowerment.
Features
- Cloud Services
- Integration Capabilities
- Security Features
- Productivity Tools
- Scalability
- Flexibility
- Compliance Assistance
- Training Resources
- Regular Updates
- Support Services
Benefits
- Cost Savings
- Increased Efficiency
- Strategic Alignment
- Enhanced Collaboration
- Improved Security
- Reliability
- Competitive Advantage
- Global Accessibility
- Scalability
- Comprehensive Support
Pricing
£5.10 a licence
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 8 6 5 4 7 2 2 6 0 2 5 3 3 5
Contact
TECHNOLOGY TRANSFORMATION GROUP LTD
Mehran Alborzpour
Telephone: 07949775566
Email: mehran.alborzpour@thettg.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
-
Microsoft Licenses could have the following the constraints:
Requires annual subscription renewal;
Version compatibility restrictions - System requirements
-
- Windows OS
- MacOS
- Linux
- Internet Connectivity
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We provide support 365 days a year. Typical First Response: 0-2 hours Typical Resolution Time: 30 mins - 4 hours
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 A
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 A
- Web chat accessibility testing
- We've conducted web chat testing sessions with assistive technology users to ensure our platform is accessible to all.
- Onsite support
- Yes, at extra cost
- Support levels
-
Generic Support:
This includes license activation, product registration, and general licensing questions.
Technical Support:
This includes troubleshooting software installation problems, resolving license activation errors, and diagnosing compatibility issues
Account Management:
We will always provide a dedicated account manager
Training and Consultation Services:
We provide training and consultation services to help clients maximise the value of their Microsoft licenses. For example, this could be training sessions on software usage and best practices,
Escalation Support:
In the event of complications or issues, TTG will escalate the issue to specialised support teams or directly to Microsoft for resolution. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We provide Onsite Training and Online Training:
We can provide onsite training sessions tailored to client requirements onsite or online training resources, such as webinars, video tutorials, and self-paced courses
Account Management:
Our account managers work closely with our clients to understand their unique requirements, provide personalised guidance on license procurement and management, and offer ongoing support to ensure they derive maximum value from our services.
Customer Support:
We assist users with any inquiries or issues they may encounter while using our services.
User Documentation:
We provide comprehensive user documentation, including user guides, FAQs, and knowledge base articles, to help users navigate our licensing services effectively. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- The client has full access to their data for extract, or they can ask us to extract the data for them.
- End-of-contract process
- The contract will terminate at end-of-contract. No extra costs associated with the end of contract. Once the contract with the client terminates, their Microsoft licenses will also terminate.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The user interface varies to accommodate different screen sizes and interaction methods
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 A
- Description of service interface
- There is a modern and accessible website.
- Accessibility standards
- WCAG 2.1 A
- Accessibility testing
- We've conducted testing sessions with assistive technology users to ensure our platform is accessible to all.
- API
- No
- Customisation available
- Yes
- Description of customisation
- The website allows the client to pick and choose the licenses that they require for their business. We can also provide white portals.
Scaling
- Independence of resources
- We do not control resource allocation for Microsoft 365, the platform's scalability ensures that high demand from other customers or users does not affect your service. Microsoft's cloud infrastructure is designed for scale, providing peace of mind through guaranteed uptime outlined in their Service Level Agreements (SLAs). Additionally, the inherent benefits of cloud technology, such as scalability and automatic resource allocation, are integral features of Microsoft 365, ensuring optimal performance and reliability for users. Through these measures, we prioritise delivering a seamless and uninterrupted experience to our customers, backed by the robust infrastructure and commitments of Microsoft's cloud platform.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We provide metrics on how many licenses are bought, when they were bought and are due to expire. There are also many other metrics related to Microsoft 365 usage
- Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Microsoft
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Client users can go to the website portal and download reports on the licenses they have bought.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
- Data import formats
-
- CSV
- ODF
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- While we can't directly guarantee uptime for Microsoft 365 services, Microsoft offers robust Service Level Agreements (SLAs) that outline their commitment to availability. These SLAs are publicly available on the Microsoft website and detail uptime targets exceeding 99.9% for core services like Exchange Online, SharePoint Online, and OneDrive. Should Microsoft fall below these thresholds, they're financially accountable, offering service credits or rebates. This provides a reliable cloud platform backed by strong performance guarantees.
- Approach to resilience
- Our Microsoft 365 service goes beyond licensing to build resilience for our customers. We offer expert guidance to ensure clients have the right plan with features that best suit their needs, allowing them to adapt to unforeseen challenges. User training and adoption programs empower our clients to leverage built-in functionalities like offline access and data backup, minimising disruption during potential service interruptions. Proactive communication regarding updates and potential disruptions from Microsoft keeps our clients informed, allowing us to prepare your clients for any contingencies.
- Outage reporting
- We will provide email alerts and a public dashboard.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
-
We restrict access by the following means:
Role-Based Access Control (RBAC); Least Privilege Principle; Multi-Factor Authentication (MFA) and Access Controls and Permissions. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- British Assessment Bureau
- ISO/IEC 27001 accreditation date
- 11/03/2024
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
- ISO9001
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Risk Assessment and Management:
We regularly perform risk assessments to identify potential threats, vulnerabilities, and risks.
Access Control and User Management:
We implement access control policies and processes to regulate access to systems, applications, and data based on the principle of least privilege. We utilise multi-factor authentication (MFA), and regularly review user access rights to ensure they align with business needs and security requirements.
Encryption and Data Protection:
We protect data both at rest and in transit by encrypting sensitive data using strong encryption algorithms.
Supplier Risk Management:
We regularly assess the security of third-party suppliers and service providers, conducting due diligence assessments.
Security Awareness Training:
We conduct security awareness training and education programs to all employees, contractors, and third-party partners
Security Monitoring and Logging:
We employ security monitoring tools and solutions to continuously monitor network traffic, system activities, and user behaviour for signs of suspicious or malicious activity.
Continuous Improvement and Review:
We regularly review and update information security policies and processes to address emerging threats, technology advancements, and organisational changes.
Compliance to Regulatory Requirements:
We have developed policies and processes to ensure compliance with regulations such as GDPR.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
We adhere to A.12.1.1 in ISO/IEC 27001.
We do this by:
Policy and Procedures:
We document policies, procedures, and guidelines for managing changes to information systems, including hardware, software, networks, processes, and procedures.
Change Management Process:
We have implemented a change management process that includes steps for requesting, assessing, authorising, implementing, and reviewing changes.
Change Authorisation:
We have implemented mechanisms for authorising changes based on predefined criteria, such as risk assessments, impact analysis, and approval by designated authorities.
Change Review and Audits:
We conduct reviews and audits of the change management process to assess its effectiveness and areas for improvement. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
We adhere to A.12.1.1 in ISO/IEC 27001.
We do this by:
Risk Assessments:
We conduct regular risk assessments to identify potential vulnerabilities in information systems, networks, and applications.
Vulnerability Identification:
We implement processes for identifying and cataloguing vulnerabilities within our IT infrastructure, including hardware, software, and configurations.
Patch Management:
We implement patch management processes to ensure that security patches and updates are promptly applied to vulnerable systems and software.
Security Configuration Management:
We implement security configuration management practices to reduce the attack surface and minimise the likelihood of exploitation of vulnerabilities. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
We adhere to ISO/IEC 27001.
We do this by:
Monitoring Controls:
We implement monitoring controls to detect security incidents, unauthorised activities, and anomalies in real-time or near real-time.
Event Logging and Collection:
We have configured systems, applications, and network devices to generate detailed logs and audit trails of security-relevant events and activities.
Incident Detection and Response:
We have developed procedures for detecting, analysing, and responding to security incidents identified through monitoring activities.
Periodic Review and Analysis:
We conduct reviews and analysis of monitoring data to identify trends, patterns, and recurring security issues. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
We adhere to ISO/IEC 27001.
We do this by:
Incident Logging, Recording, Classification and Prioritisation:
We maintain detailed records of security incidents, including incident descriptions, timestamps, affected systems or assets, and initial assessment findings. We also classify and prioritise security incidents based on their severity, impact, and urgency.
Response Planning and Coordination:
We have developed incident response plans and procedures that outline roles, responsibilities, and actions to be taken in response to security incidents.
Root Cause Analysis:
We conduct thorough investigations and root cause analysis to determine the underlying causes and contributing factors of security incidents.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
We support environmental sustainability by promoting the use of digital solutions such as Microsoft's cloud services, which help reduce the carbon footprint associated with traditional on-premises infrastructure. This leads us to enabling organisations to optimise their IT resources, reduce energy consumption, and minimise the environmental impact of their operations.Covid-19 recovery
Our service plays a vital role in supporting COVID-19 recovery efforts by providing access to essential technology solutions for remote working, collaboration, and digital transformation. Furthermore, we encourage companies to leverage Microsoft's cloud-based productivity tools, communication platforms and collaboration software to enable flexible work arrangements, maintain continuity of operations and deliver essential servicesTackling economic inequality
We contribute to tackling economic inequality by providing cost-effective licensing solutions that enable public sector organisations to access Microsoft's software at competitive prices.
Through the flexible licensing options and tailored pricing models, we ensure that organisations of all sizes and budgets, including those with limited resources, can benefit from the latest innovations and productivity tools offered by Microsoft.Equal opportunity
We promote equal opportunity by giving the as much access to technology and digital skills training.Wellbeing
We prioritise employee wellbeing by fostering a supportive and inclusive work environment and promoting work-life balance. Through our partnership with Microsoft, we advocate the use of technology solutions that promote employee wellbeing, such as collaboration tools, mental health apps and wellness programs.
Pricing
- Price
- £5.10 a licence
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- We provide various Microsoft licenses that are available for trial, catering to both Azure and Office 365 platforms.