Skip to main content

Help us improve the Digital Marketplace - send your feedback

Target Integration

SharePoint Online

We deliver SharePoint Online, empowering seamless collaboration, document management, and secure cloud storage, facilitating efficient teamwork from any location

Features

  • Modular Design: Tailored modules for comprehensive business management solutions.
  • Scalable Architecture: Easily adaptable to support business growth and expansion.
  • Real-time Reporting: Instant access to dynamic financial and operational insights.
  • Mobile Accessibility: Convenient access from any device for remote management.
  • Integration Capabilities: Seamlessly connects with third-party applications and systems.
  • Multi-User Support: Simultaneous access with role-based permissions for team collaboration.
  • Automated Workflows: Streamlined processes through automated task management and notifications.
  • Customisable Dashboards: Personalised dashboards for quick data visualisation and insights.
  • Data Security: Robust security measures ensure protection of sensitive information.
  • Cloud Hosting: Flexible cloud-based hosting ensures scalability, accessibility, and reliability.

Benefits

  • Cost-effective Operations: Optimises resources, reducing overheads for improved efficiency.
  • Streamlined Workflows: Enhances productivity and time management with efficient processes.
  • Seamless Integration: Connects effortlessly with existing systems for data synchronisation.
  • Instant Insights: Provides accurate data for informed decision-making.
  • Anywhere Access: Conveniently accessible from any location or device.
  • Tailored Solutions: Customisable modules meet specific business needs and requirements.
  • Automated Tasks: Simplifies operations through automated workflows and notifications.
  • Collaborative Environment: Facilitates team communication and collaboration for improved outcomes.

Pricing

£5 to £10.30 a user a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@targetintegration.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

7 1 5 0 9 1 0 8 2 9 1 4 6 4 8

Contact

Target Integration Rohit Thakral
Telephone: +44 121 285 5684
Email: tenders@targetintegration.com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
Our service does not have any constraints that buyers should be aware of. We ensure seamless operation with no limitations on hardware configurations or planned maintenance arrangements.
System requirements
  • CPU- Intel Core i5 or Ryzen 3
  • RAM-4GB or Higher
  • Windows 10
  • SSD- 80GB

User support

Email or online ticketing support
Email or online ticketing
Support response times
For Standard Support, weekdays' response times vary: High priority - 1 hour response, 2 hours resolution; Normal - 2 hours response, 4 hours resolution; Low - 4 hours response, 2 days resolution. Weekends and bank holidays adhere to the same response times, but support is available only from 0900 to 1300 hours.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Onsite support
Support levels
We offer three levels of support: Level 1 Support: Initial troubleshooting, issue identification, and escalation to Level 2 if needed. Regular updates provided to the customer. Level 2 Support: In-depth analysis, issue recreation, and resolution. Regular communication with Level 1 and the customer. Level 3 Support: Highest escalation point for complex technical issues. Resolution by specialised engineers. our support comes in a monthly package with the following prices 20 Hours per month Support - minimum contract 6 months- 1900 GBP 10 Hours per month Support - minimum contract 6 Months- 1000 GBP 5 Hours per month Support - Minimum Contract 6 Months- 550 GBP All support packages include a Technical Account Manager for personalised assistance. Contracts are a minimum of 6 months.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We assist users in starting to use our service by offering a variety of training options and comprehensive user documentation. This includes both onsite and online training sessions tailored to the user's preferences and requirements. Our experienced trainers provide hands-on guidance to ensure users are proficient in utilising the service effectively. Additionally, we offer extensive user documentation, including manuals, tutorials, and FAQs, accessible online for easy reference. This multi-faceted approach ensures that users have the resources and support they need to quickly and confidently start using our service.
Service documentation
Yes
Documentation formats
  • PDF
  • Other
Other documentation formats
Excel Sheets
End-of-contract data extraction
Users can easily extract their data when their contract ends. We provide a streamlined process for users to request their data, and upon request, we promptly compile and provide users with all their data in a format of their choice. This ensures a smooth transition and allows users to retain control over their data even after the contract ends.
End-of-contract process
Overall, our aim is to facilitate a seamless transition while ensuring users retain control over their data and the end of the contract is managed efficiently and professionally.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
The mobile service for Sharepoint offers convenient access on-the-go with a user-friendly interface optimised for smaller screens. It provides essential functionalities for task management and data access, albeit with some limitations compared to the desktop version, such as reduced functionality and customisation options. In contrast, the desktop service offers a more comprehensive user experience, with access to all features and advanced configuration options. It provides a larger workspace for detailed data analysis and seamless integration with other desktop applications. While the mobile service prioritises convenience, the desktop service offers a richer feature set for in-depth management needs.
Service interface
No
User support accessibility
WCAG 2.1 A
API
Yes
What users can and can't do using the API
Users can leverage Sharepoint's API to set up the service by programmatically configuring modules, creating records, and defining workflows. Through the API, users can make changes to data, such as updating records, adding new entries, or deleting existing ones. However, there are limitations to what users can do through the API. While most configuration tasks are possible, some advanced settings may require direct access to the Sharepoint user interface. Additionally, certain administrative actions, like installing new modules or modifying system-wide settings, may be restricted or require elevated permissions not available through the API.
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • ODF
  • PDF
  • Other
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Users can customise our service to meet their specific needs and preferences. This includes customising various aspects such as modules, workflows, fields, and user interfaces. Users can customise by accessing the configuration settings within the service's interface, where they can modify existing configurations or create new ones. Additionally, users with appropriate permissions can utilise development tools and APIs to implement more advanced customisations. Ultimately, anyone with the necessary authorisation, such as administrators or designated users, can customise the service to align with the buyer's requirements. We offer customisation services tailored to the buyer's requests, ensuring the service meets their unique needs effectively.

Scaling

Independence of resources
We ensure the independence of resources by implementing robust resource management and allocation strategies. This includes allocating dedicated resources to each user or group of users, ensuring that their performance is not impacted by the demand placed on the service by other users. Additionally, we employ load balancing techniques to distribute incoming requests evenly across available resources, preventing any single user or group from monopolising resources and affecting others' experience. Continuous monitoring and scaling of resources also allow us to adapt to changing demand levels, ensuring consistent performance and reliability for all users.

Analytics

Service usage metrics
Yes
Metrics types
The service metrics are provided as reports in the user interface
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
SharePoint

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users can export their data easily through our platform. We provide a user-friendly interface where users can select the data they wish to export and choose the desired format. Once selected, the system initiates the export process, and users receive a download link via email or directly from the platform. This streamlined process ensures that users can quickly and securely export their data whenever needed.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection between networks
Encryption while the data is being transferred from buyer's network to our network.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection within supplier network
Encryption while the data is being transferred within our Network

Availability and resilience

Guaranteed availability
The Service Provider’s customer support will normally be available from 0900 to 1730hrs Irish standard time, Monday through Friday, except Bank Holidays and Public Holidays. During this period the team members for your project may not be available, however we do have exceptional support 24 hours a day, 7 days per week where someone will be available to support you. Out of business hours support requests can be submitted online or by e-mail 24x7x365 via your project support email.

In the following table you can see a detailed level of Support depending on the Business Criticality of the issue.

Standard Support

Mon-Fri 0900hrs -1730hrs

Weekends & Bank Holidays 0900hrs - 1300hrs
SLA Response and Recovery Times are as follows:
For Standard Support, weekdays' response times vary: High priority - 1 hour response, 2 hours resolution; Normal - 2 hours response, 4 hours resolution; Low - 4 hours response, 2 days resolution. Weekends and bank holidays adhere to the same response times, but support is available only from 0900 to 1300 hours.
Approach to resilience
Our service is meticulously designed to ensure resilience in the face of disruptions. We employ redundant infrastructure, including failover systems and data replication, to mitigate the impact of hardware failures or outages. Our datacentre setup adheres to industry best practices for resilience, with details available upon request. Additionally, we conduct regular disaster recovery drills and risk assessments to identify and address potential vulnerabilities. By prioritising redundancy, redundancy, and robust infrastructure, we ensure continuous service availability and data integrity, aligning with government cloud security principles for asset protection and resilience.
Outage reporting
We report outages primarily through email alerts, promptly notifying users of any disruptions to our service. While we do not currently offer a public dashboard or API for outage reporting, our email alerts provide timely updates on the status of the service and any ongoing incidents. Users can rely on these email alerts to stay informed about outages and receive updates on resolution efforts.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
We implement a system where buyers are provided with a specific number of licences. These licences are then assigned by the buyer to their respective users. Each user is given their own unique username and password to use for logging in.

When a user attempts to access the service, they are required to enter their assigned username and password. These credentials are then verified against our database to ensure that they match the information provided by the buyer during the licence assignment process. If the credentials are valid, the user is granted access to the service.
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
CDL Group Limited
ISO/IEC 27001 accreditation date
9/18/2023
What the ISO/IEC 27001 doesn’t cover
Our ISO/IEC 27001 certification specifically covers the provision of consultancy, implementation, and development services related to software systems. Other activities or services not directly related to these areas are not covered by our ISO/IEC 27001 certification.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
We adhere to ISO 27001 information security policies and procedures to ensure robust data protection. Our reporting structure includes designated security officers overseeing policy implementation and enforcement. Regular audits and compliance checks verify adherence. Employee training on security protocols is mandatory, with strict access controls and encryption measures in place. Incident response plans address security breaches promptly. We continuously update our security measures to align with evolving threats and regulatory standards, ensuring comprehensive data protection for our users.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
We employ a robust configuration and change management framework, tracking service components throughout their lifecycle via our proprietary project management tool. Each component is meticulously documented, including versioning and modifications. Changes undergo stringent security impact assessments, analysing potential vulnerabilities and risks. Our dedicated security team evaluates each change, implementing necessary mitigation measures to safeguard against security threats. These changes are thoroughly tested and validated before deployment. Our comprehensive documentation and communication channels ensure transparency and accountability throughout the process, maintaining the integrity and security of our services.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
We assess threats through scanning tools and threat intelligence. Patches for identified vulnerabilities are deployed promptly, prioritising critical issues. Information sources include vendor advisories, threat feeds, and security research.
We continuously assess threats through scanning tools, manual reviews, and threat intelligence. Identified vulnerabilities prompt swift patch deployment, prioritising critical issues. Information sources include vendor advisories, threat feeds, and security research, ensuring timely threat detection.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Our protective monitoring processes swiftly identify potential compromises through continuous monitoring of system logs, network traffic, and anomaly detection. Upon detection, we respond promptly, isolating affected systems, investigating the root cause, and implementing necessary remediation measures. Our response time to incidents is rapid, with immediate escalation to our dedicated incident response team for resolution. This proactive approach ensures timely detection and response to security incidents, minimizing the impact and ensuring the integrity of our services.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Our incident management processes are robust and structured: Pre-defined Processes: We have pre-defined processes for common events, outlining steps for incident detection, analysis, and resolution. These processes ensure consistency and efficiency in handling incidents. Reporting Incidents: Users can report incidents through various channels, including dedicated support portals, email, or phone. Our support team promptly acknowledges and logs all reported incidents for investigation. Incident Reports: After resolving an incident, we provide detailed incident reports to affected users, outlining the cause, impact, and resolution steps taken. These reports ensure transparency and enable users to understand the incident's implications and resolution measures.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

We partner with hosting providers who are committed to environmental sustainability. These providers implement eco-friendly practices, such as using renewable energy sources and implementing energy-efficient infrastructure. By aligning with hosting providers that comply with fighting climate change, our services contribute to reducing carbon emissions and promoting a greener IT ecosystem.

Covid-19 recovery

Our cloud-based solutions play a crucial role in supporting Covid-19 recovery efforts by enabling remote work, virtual collaboration, and digital transformation. In times of crisis, such as the Covid-19 pandemic, organisations need resilient and flexible IT solutions to maintain operations and adapt to new challenges. By facilitating remote work and digital communication, our services empower organisations to navigate through recovery phases more effectively, ensuring business continuity and supporting economic resilience.

Tackling economic inequality

Our cost-effective cloud solutions level the playing field for organisations of all sizes, including small and medium-sized enterprises (SMEs) and public sector bodies with limited budgets. By providing access to affordable and scalable technology, we support economic inclusivity and help bridge the digital divide.

Equal opportunity

Accessibility is a fundamental aspect of our service design. We ensure that our solutions comply with accessibility standards and guidelines, making them usable by individuals with disabilities. By promoting equal access to technology, we contribute to creating a more inclusive and equitable society.

Wellbeing

Remote work enabled by our cloud services offers numerous benefits for employee wellbeing. It reduces the need for commuting, which can alleviate stress and improve work-life balance. Additionally, cloud-based collaboration tools enhance communication and flexibility, fostering a healthier and more productive work environment.

Pricing

Price
£5 to £10.30 a user a month
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@targetintegration.com. Tell them what format you need. It will help if you say what assistive technology you use.