Skip to main content

Help us improve the Digital Marketplace - send your feedback

enCircle Solutions Ltd.

Amazon Web Services (AWS) Cloud Hosting Service for AWS Compute, Backup, Monitoring & Messaging

enCircle are AWS certified Public Sector Partners. Discovery, design, configuration, implementation, support and continuous improvement of Amazon AWS cloud services and technical support. We can support new or existing Amazon AWS services and wrap these with our industry best practice management and operational procedures. Amazon AWS EC2, containers, s3, etc...

Features

  • Amazon Elastic Compute Cloud (EC2): Resizable capacity in the cloud.
  • Amazon Simple Storage Service (S3): Sclable, secure, high availability storage.
  • Amazon Relational Database Service (RDS): Database service supporting various engines.
  • Amazon Virtual Private Cloud (VPC): Secure virtual network.
  • Amazon CloudFront: Fast content delivery network (CDN) with low latency.
  • Amazon Elastic Container Service (ECS): Scalable, high-performance Docker container orchestration.
  • AWS Identity Access Management (IAM): Securely manage access AWS services.
  • Amazon Lambda: Serverless computing to run code on AWS.
  • Amazon Athena: Analyze data in Amazon S3 using SQL.
  • Amazon CloudWatch: Monitoring actionable insights for AWS resources.

Benefits

  • Reliability: AWS provides a reliable and secure global computing infrastructure.
  • Flexibility: AWS offers ondemand infrastructure, allowing flexibility in usage.
  • Cost-effectiveness: AWS clients benefit from economies of scale.
  • Scalability and Elasticity: AWS clients easily scale their resources.
  • High Performance: AWS offers high performance for all applications.

Pricing

£22 a unit a day

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at gcloud@encircle.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

7 0 3 6 1 8 2 4 9 2 0 7 2 0 7

Contact

enCircle Solutions Ltd. Darren Woods
Telephone: 08449910109
Email: gcloud@encircle.co.uk

Service scope

Service constraints
AWS constraints include cost management complexities, as underestimating expenses and resource optimization can lead to unexpected charges. While AWS offers robust security features, customers bear ultimate responsibility for secure cloud use. Platform complexity necessitates a learning curve, while effective use often requires technical expertise. Reliance on internet connectivity can be problematic in areas with poor service. Finally, vendor lock-in may arise due to the challenge of migrating from AWS to other cloud providers.
System requirements
  • Internet Connectivity
  • Modern Browsers
  • Command Line Interface (CLI) if needed
  • Security Credentials & Protocols

User support

Email or online ticketing support
Email or online ticketing
Support response times
Immediately via Slack and always within 4 hours. Standard working hours: Monday-Friday 9:00 to 17:30.

- P1 Critical (Service unavailable, or >70% users affected and no workaround): Immediate response, 1hr fix.
- P2 Major (Service degraded >30% users affected, difficult or no workaround available) : 1hr response, 2hr fix.
- P3 Medium (Component or module malfunction, simple workaround available) : 2hr response, 2hr fix.
- P4 Minor (Service request, feature enhancement, how to): 4hr response, 8hr fix.

NOTE: Weekends, public holidays and out of hours support available at additional cost. Elapsed times based on working hours.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 A
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Yes, at an extra cost
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
Slack standard accessibility testing.
Onsite support
Yes, at extra cost
Support levels
We provide a standard service level, with the optional addition of 24/7 support at extra cost to be negotiated per service. Service owners have a direct line to their technical account manager who is highly skilled and able to diagnose problems and pass straight to third line support if needed. This limits the overhead on the client, and allows enCircle's support team to triage requests promptly and within the shortest time frames possible. We aim to delight our customers with our obsessive commitment to responsive and consistent support.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
AWS provides a variety of resources and tools to help users get started with their services:
-AWS offers a free tier that provides new users with free usage of certain AWS services for the first 12 months. This allows users to explore and learn about AWS services without incurring any costs.
-Documentation: AWS provides extensive documentation for each of its services, including getting started guides, API references, and developer guides.
-AWS Training and Certification: AWS offers a range of training and certification programs to help users learn about AWS services and best practices. These programs include online courses, instructor-led training, and certification exams.
-AWS Support: AWS provides 24/7 technical support to help users troubleshoot issues and answer questions about AWS services. Users can choose from a variety of support plans, including Basic, Developer, Business, and Enterprise.
-AWS Quick Start Guides: AWS provides Quick Start guides that provide step-by-step instructions for deploying popular solutions on AWS, such as web applications, data lakes, and machine learning workloads.
-AWS SDKs and Tools: AWS provides software development kits (SDKs) and command line tools that make it easy for developers to integrate AWS services into their applications and automate AWS resource management tasks.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
Encrypted file archives are provided via secure download link.
End-of-contract process
Here's what typically happens when a contract with us ends:
Service termination: When the contract ends, all client services associated with the account will be terminated, and the user will no longer have access to those services.
Data retention: We may retain customer data for a period of time after the contract ends, in accordance with data retention policies. Users may request deletion of their data by contacting enCircle support.
Final billing: We will issue a final bill for any outstanding charges or fees associated with the account. Users are responsible for paying all outstanding charges before the contract ends.
Service termination fees: Some AWS services may have early termination fees or minimum commitment periods. Users may be subject to these fees if they terminate the service before the minimum commitment period ends.
Data export: Users may want to export their data from AWS services before the contract ends. AWS provides tools and documentation to help users export their data, such as Amazon S3 data transfer tools and database export tools.
Account deletion: Users may choose to delete their AWS account after the contract ends. Deleting an AWS account will remove all data and resources associated with the account.

Using the service

Web browser interface
Yes
Using the web interface
The AWS Management Console is a web interface that provides a central location to manage your AWS cloud resources. Here are some key capabilities and limitations of the AWS Console:-

Capabilities:
-View and manage AWS resources, such as EC2 instances, S3 buckets, and RDS databases.
-Launch new AWS resources, such as EC2 instances, S3 buckets, and RDS databases.
-Create and manage AWS users and groups, and configure access permissions.
-Monitor and troubleshoot AWS resources using AWS CloudWatch.
-Configure and manage AWS services, such as Amazon CloudFront and Amazon Route 53.

Limitations:
-Some advanced configuration options may not be available in the AWS Console and may require using the AWS CLI or API.
-The AWS Console may not provide real-time updates for some resources, such as EC2 instances, and may require refreshing the page to see the latest information.
-The AWS Console may not be accessible during AWS service outages or disruptions.
-Some AWS services, such as AWS Lambda and AWS Elastic Beanstalk, may require using the AWS CLI or API for certain operations.

Overall, the AWS Console provides a user-friendly interface for managing AWS resources, but may have limitations for advanced configurations or real-time updates.
Web interface accessibility standard
WCAG 2.1 A
Web interface accessibility testing
Accessibility Conformance Reports (ACRs) for AWS products and services are now available on AWS Artifact, a self-service portal for AWS compliance-related information. ACRs are documents that demonstrate the accessibility of AWS services.

Through AWS Artifact, you can download ACRs on-demand to understand the accessibility of a specific AWS product or service. AWS ACRs utilize the ITI Voluntary Product Accessibility Templates (VPAT®) and reference various accessibility standards including: Section 508 (U.S.), EN 301 549 (EU), and Web Content Accessibility Guidelines (WCAG).
API
Yes
What users can and can't do using the API
The AWS API provides programmatic access to AWS services and resources, but there are some limitations to be aware of.

Capabilities:
-Create, read, update, and delete AWS resources programmatically.
-Make API requests to AWS services using AWS SDKs or the AWS CLI.
-Integrate AWS services into your applications or services.
-Automate AWS resource management tasks.

Limitations:
-AWS API throttling limits apply to API requests, which can vary by service and API operation. Exceeding the throttling limit will result in an error.
-Some AWS services may have different API request limits or may not support certain API operations.
-Some advanced configuration options may not be available through the AWS API and may require using the AWS Console.
-AWS API requests are subject to AWS service quotas and usage limits.

Overall, the AWS API provides powerful capabilities for managing AWS resources programmatically, but it's important to be aware of API throttling limits and service quotas when making API requests.
API automation tools
  • Ansible
  • Terraform
  • Other
Other API automation tools
  • AWS Lambda
  • AWS Step Functions
  • AWS Cloud Formation
  • AWS CLI
API documentation
Yes
API documentation formats
  • HTML
  • Other
Command line interface
Yes
Command line interface compatibility
  • Linux or Unix
  • Windows
  • MacOS
Using the command line interface
AWS Command Line Interface (CLI) is a unified tool to manage AWS services and resources from the command line. Here's what users can and can't do with the AWS CLI:

Capabilities:
-Interact with AWS services and manage resources through command line commands.
-Make API requests to AWS services using the AWS CLI.
Configure and manage AWS resources, such as EC2 instances, S3 buckets, and RDS databases.
-Automate AWS resource management tasks using shell scripts or other automation tools.
Install and use multiple versions of the AWS CLI on the same computer.

Limitations:
-Some advanced configuration options may not be available through the AWS CLI and may require using the AWS Console or API.
-The AWS CLI may not provide real-time updates for some resources, such as EC2 instances, and may require refreshing the command line to see the latest information.
-The AWS CLI is subject to AWS service quotas and usage limits.
-Some AWS services, such as AWS CloudFormation and AWS Elastic Beanstalk, may require using the AWS Console or API for certain operations.
-Overall, the AWS CLI provides a powerful tool for managing AWS resources from the command line, but may have limitations for advanced configurations or real-time updates.

Scaling

Scaling available
Yes
Scaling type
  • Automatic
  • Manual
Independence of resources
Resource isolation: AWS uses virtualization and containerization technologies to isolate user resources from each other, ensuring that one user's resource usage does not impact other users.
Scaling: AWS services are designed to scale automatically in response to demand, ensuring that users have the resources they need when they need them.
Service Level Agreements (SLAs): AWS provides SLAs that guarantee a certain level of uptime and availability for its services. If AWS fails to meet these SLAs, users may be eligible for service credits or other remedies.
Usage notifications
Yes
Usage reporting
Email

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Amazon Web Services (AWS)

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • Databases
  • File System
  • Virtual Machine Snapshots
Backup controls
We agree a backup schedule and data retention policy for each service procured. This is then implemented as part of the manages service procedures and operations manual. Data retention policies for backups is also determined by the client, depending on the service in question.
Datacentre setup
  • Multiple datacentres with disaster recovery
  • Multiple datacentres
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
  • Users can recover backups themselves, for example through a web interface
  • Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Uptime guarantee: We offer availability guarantees of 99%, 99.98% and 99.99%, depending on customer requirements.
Service credits: If we fail to meet the uptime guarantee, our customers may be eligible for service credits, which are typically a percentage of the monthly service fees.
Maintenance windows: We may reserve certain maintenance windows, such as weekends or off-peak hours, during which the service may be temporarily unavailable.
Exclusions: We exclude certain events, such as force majeure events or user-caused issues, as these are out of our control.
Reporting: We provide regular reports on service availability and performance to our customers, as part of regular service level reviews.
Approach to resilience
Fault-tolerant architecture: AWS services are designed to be fault-tolerant, meaning that they can continue to operate even if individual components fail. AWS uses techniques such as replication, redundancy, and automated failover to ensure that services are resilient to component failures.
Multi-AZ deployment: AWS services can be deployed across multiple Availability Zones (AZs), which are physically separate datacenters within a single region. This ensures that services are resilient to failures within a single AZ.
Backup and recovery: AWS provides backup and recovery services, such as Amazon S3 and Amazon Glacier, that allow users to backup and restore their data in case of data loss or corruption.
Network security: AWS provides network security features, such as Virtual Private Clouds (VPCs), security groups, and network access control lists (ACLs), that allow users to control access to their services and data.
Outage reporting
We offer a service availability dashboard to our customers, along with email and Slack notifications of outage events. After a service interruption, we may also conduct a post-mortem analysis to identify the root cause of the issue and develop strategies to prevent similar issues in the future. The results of these analyses are shared with our customers through debrief sessions and service level review meetings.

Identity and authentication

User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google apps)
  • Limited access network (for example PSN)
Access restrictions in management interfaces and support channels
We grant users the minimum level of access necessary to perform their job functions. This is achieved through role-based access control (RBAC), which assigns users to specific roles with predefined access levels.
We require users to provide multiple forms of authentication, such as a password and a security token, to access management interfaces and support channels. We segment networks into different zones, such as production, development, and management, and restrict access between zones to prevent unauthorized access to management interfaces. We use encryption to protect sensitive data, such as login credentials and support tickets, in transit and at rest.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device on a government network (for example PSN)
  • Dedicated device over multiple services or networks
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
CFE Certification Ltd.
ISO/IEC 27001 accreditation date
01/09/2024
What the ISO/IEC 27001 doesn’t cover
A11.1.6 - Delivery and loading areas (Remote organisation with no owned office space)
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Security Policies: We maintain a comprehensive set of security policies that define our approach to information security. These policies cover areas such as data protection, access management, incident response, and risk management. We are certified to a number of compliance standards and frameworks, including ISO 27001, Cyber Essentials and Cyber Essentials Plus. We provide security awareness and training programs to our employees to ensure that they understand and comply with our security policies.
We have a robust incident response process that is designed to identify, respond to, and mitigate security incidents. The process includes procedures for incident reporting, investigation, containment, and recovery.
We conduct regular audits and compliance monitoring activities to ensure that our security policies and processes are being followed and that our services meet the highest standards of security and compliance.
We have a small but dedicated team that reports directly to our Technical Director who is ultimately responsible for information security.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We maintain a CMDB that tracks the configuration and status of all IT assets, including hardware, software, and network components. We follow a formal change management process. Changes are submitted through a formal change request process, which includes a description of the change, the business justification, and an impact analysis. Changes are reviewed and approved by a change advisory board (CAB) that includes representatives from security. Approved changes are implemented using automated tools and processes where possible to ensure consistency and reduce the risk of errors.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We regularly scan all systems and applications for vulnerabilities using automated tools and manual testing. We stay up to date on the latest threats and vulnerabilities by subscribing to threat intelligence feeds and vulnerability databases such as the Common Vulnerabilities and Exposures (CVE), and the Open Web Application Security Project (OWASP). We assess the potential impact and likelihood of each vulnerability to determine the level of risk it poses to the service. We monitor systems and applications for vulnerabilities and track patch deployment to ensure that all systems are up to date. Zero day patches are applied immediately where appropriate,
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We continuously monitor systems, networks, and applications to detect potential security incidents. This can include monitoring system logs, network traffic, and user activity. We deploy IDS/IPS systems to detect and prevent intrusions and attacks. We use a SIEM system to collect, analyze, and correlate security events from multiple sources.
We have a formal incident response process that includes detection, containment, eradication and recovery.
We conduct a post-incident analysis to identify lessons learned and improve the incident response process.
We respond to security incidents as quickly as possible to minimize the impact, ideally within 24 hours of detection.
Incident management type
Supplier-defined controls
Incident management approach
We have a clear incident management policy that outlines roles and responsibilities, escalation paths, and communication procedures. We classify incidents based on their severity, impact, and urgency to determine the appropriate response and escalation path. We have established pre-defined procedures for common incident types to ensure a consistent and efficient response. We provide clear guidelines for how clients should report incidents, including what information to provide and how to submit a report. We provide regular incident reports to stakeholders and management to keep them informed of incident status and resolution, including metrics such as time, volume and severity.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Third-party
Third-party virtualisation provider
Amazon AWS
How shared infrastructure is kept separate
AWS use virtualization technologies, such as Xen and KVM, to create isolated virtual machines (VMs) for each user. Each VM is allocated its own CPU, memory, and storage resources and is logically isolated from other VMs on the same physical server.
AWS also uses network isolation technologies, such as VPCs and security groups, to ensure that each user's network traffic is isolated from other users. AWS uses storage isolation technologies, such as Amazon Elastic Block Store (EBS) and Amazon S3. Each user's data is encrypted and stored on separate physical storage devices to prevent data leakage between users.

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
AWS is committed to energy efficiency and has implemented a number of measures to reduce energy consumption in its datacenters.
AWS participates in the EU Code of Conduct for Energy Efficiency in Data Centres program and has committed to following the program's best practices for energy efficiency.
AWS datacenters use energy-efficient technologies, such as high-efficiency power supplies, variable-speed fans, and energy-efficient lighting.
AWS has implemented a number of measures to reduce energy consumption in its datacenters, such as server virtualization, efficient cooling systems, and advanced power management techniques.
AWS regularly monitors and reports on its energy consumption and has set ambitious goals for reducing its energy usage and carbon footprint.
Overall, AWS is committed to adhering to the EU Code of Conduct for Energy Efficient datacenters and is taking steps to reduce energy consumption and improve energy efficiency in its datacenters.

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

We are founded on the core ethic of Earth Care. All decisions are considered through the lense of climate change and how we can help increase biodiversity and reduce emissions.

We have recently published our Carbon Reduction Plan which crystalises the efforts we have been taking over the past 20 years to support climate action: https://www.encircle.co.uk/our-net-zero-commitment-and-carbon-reduction-plan/

One of our core ESGs is to support the Permaculture Association of Britain, who are a registered charity promoting education and networking between local groups, supporting a groundswell of change within society.

Covid-19 recovery

enCircle understands that the Covid-19 pandemic has exacerbated existing economic and social challenges and created many new ones. We will work to aid the recovery of our local community and economy, especially through volunteering and work opportunities, community support and by developing new ways of working.

We are looking to recruit a new apprentice to work on our service desk, as our most recent apprentice has recently moved onto a new role within the company. We will signpost this opportunity for someone that has lost their job throughout Covid-19, where possible.

We offer our staff paid leave on top of their existing holiday allowance, to support volunteering within their local communities.

As a contingency measure, and as part of DevSecOps best practice, employees will be cross trained in various functions to ensure that adequate cover is provided in different roles.

To build the resilience of local SMEs, we will purchase supplies and services from them such as IT equipment and consumables where possible.

We will continue to provide discounted services to charities and non-profits which provide mental health and social value such as the UK Permaculture Association and mindfulness and meditation organisations such as RIGPA.

Tackling economic inequality

We have always strived to provide opportunities to young people via work experience and apprenticeships. Our most recent member of the enCircle team came to the UK as a refugee at the age of 11, speaking no English.
We will continue to positively discriminate and recruit young people from least privileged backgrounds to address the imbalance in our society and help tackle economic inequality.

Equal opportunity

Although an SME, we pride ourselves on our diverse workforce and strive to nurture our team. We maintain an Equality and Diversity Policy to promote the equality of opportunity within our company and all business activities, reviewed annually to ensure compliance with best practice.

The policy outlines the Directors’ responsibilities, our recognition of the protected characteristics as per the Equality Act 2010 and our commitments as an organisation to eliminating direct or indirect discrimination, harassment of victimisation.

enCircle implement our policy and procedures by:
Monitoring and auditing data. This is a longer-term measure involving the collection of data about existing employees, job applicants, job offers, etc. to assess whether or not our policy is working. This data will be collected via an equality monitoring form, provided during the recruitment process.
The training of staff. A comprehensive training programme will be delivered so enCircle employees understand their responsibilities under the policy. Equal opportunities training will be provided in a variety of ways which may include sessions at induction, e-learning and vocational training. Regular refresher training sessions will be provided to reflect any changes in legislation.
Working closely with our employees to ensure that they feel comfortable within their working environment. We will make reasonable adjustments to working practices, equipment and premises, where appropriate.

All employees will be provided help and encouragement to develop their full potential and utilise their unique talents. Staff are encouraged to discuss their development and training needs through a process of regular support and annual appraisals. All staff are encouraged to pursue areas for development, including through internal promotion.

Wellbeing

We work in line with all UK HR regulations including The Age Discrimination and Employment Act, The Occupational Safety and Health Act and Equal Employment Opportunity laws, to name a few.

enCircle are currently developing a ‘People and Culture Policy’ that will help develop and integrate our people and culture strategy, which delivers a productive, engaged, and harmonious workplace. This strategy includes:
Defining core organisational values (Earth Care, People Care and Fair Share)
Identifying people priorities (Mental health, family, and community)
Prioritising equality, diversity, and inclusion
Developing values-based recruitment processes
Focussing on health, wellbeing, and resilience
Developing and embedding values-based leadership competencies
Promoting a no-blame culture and embedding a ‘Resolution Policy’ to replace our discipline and grievance processes

We also implement the following wellbeing initiatives, and ensure they are a pillar of our overall employee engagement and benefit strategy:
We offer flexible working to ensure a healthy work life balance.
Meditation and Mindfulness resources, providing employees with tools and resources such as Online Mindfulness-Based Stress Reduction (MBSR) to support themselves.
Tangible rewards and memorable experiences such as instant recognition/feedback, mentoring programmes, training schemes, etc.
Regular continuous professional development (CPD) and personal development review (PDR) meetings will act as an opportunity for staff to highlight any challenges they are facing and for enCircle to implement the appropriate support or to signpost the member of staff to the appropriate mental health services, where necessary.

Pricing

Price
£22 a unit a day
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
We offer free trials of our services to customer who qualify. These are full feature trials, limited by number of users and time, depending on client requirements.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at gcloud@encircle.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.