SharePoint Online
We deliver SharePoint Online, empowering seamless collaboration, document management, and secure cloud storage, facilitating efficient teamwork from any location
Features
- Modular Design: Tailored modules for comprehensive business management solutions.
- Scalable Architecture: Easily adaptable to support business growth and expansion.
- Real-time Reporting: Instant access to dynamic financial and operational insights.
- Mobile Accessibility: Convenient access from any device for remote management.
- Integration Capabilities: Seamlessly connects with third-party applications and systems.
- Multi-User Support: Simultaneous access with role-based permissions for team collaboration.
- Automated Workflows: Streamlined processes through automated task management and notifications.
- Customisable Dashboards: Personalised dashboards for quick data visualisation and insights.
- Data Security: Robust security measures ensure protection of sensitive information.
- Cloud Hosting: Flexible cloud-based hosting ensures scalability, accessibility, and reliability.
Benefits
- Cost-effective Operations: Optimises resources, reducing overheads for improved efficiency.
- Streamlined Workflows: Enhances productivity and time management with efficient processes.
- Seamless Integration: Connects effortlessly with existing systems for data synchronisation.
- Instant Insights: Provides accurate data for informed decision-making.
- Anywhere Access: Conveniently accessible from any location or device.
- Tailored Solutions: Customisable modules meet specific business needs and requirements.
- Automated Tasks: Simplifies operations through automated workflows and notifications.
- Collaborative Environment: Facilitates team communication and collaboration for improved outcomes.
Pricing
£5 to £10.30 a user a month
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 1 5 0 9 1 0 8 2 9 1 4 6 4 8
Contact
Target Integration
Rohit Thakral
Telephone: +44 121 285 5684
Email: tenders@targetintegration.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- Our service does not have any constraints that buyers should be aware of. We ensure seamless operation with no limitations on hardware configurations or planned maintenance arrangements.
- System requirements
-
- CPU- Intel Core i5 or Ryzen 3
- RAM-4GB or Higher
- Windows 10
- SSD- 80GB
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- For Standard Support, weekdays' response times vary: High priority - 1 hour response, 2 hours resolution; Normal - 2 hours response, 4 hours resolution; Low - 4 hours response, 2 days resolution. Weekends and bank holidays adhere to the same response times, but support is available only from 0900 to 1300 hours.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
- We offer three levels of support: Level 1 Support: Initial troubleshooting, issue identification, and escalation to Level 2 if needed. Regular updates provided to the customer. Level 2 Support: In-depth analysis, issue recreation, and resolution. Regular communication with Level 1 and the customer. Level 3 Support: Highest escalation point for complex technical issues. Resolution by specialised engineers. our support comes in a monthly package with the following prices 20 Hours per month Support - minimum contract 6 months- 1900 GBP 10 Hours per month Support - minimum contract 6 Months- 1000 GBP 5 Hours per month Support - Minimum Contract 6 Months- 550 GBP All support packages include a Technical Account Manager for personalised assistance. Contracts are a minimum of 6 months.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We assist users in starting to use our service by offering a variety of training options and comprehensive user documentation. This includes both onsite and online training sessions tailored to the user's preferences and requirements. Our experienced trainers provide hands-on guidance to ensure users are proficient in utilising the service effectively. Additionally, we offer extensive user documentation, including manuals, tutorials, and FAQs, accessible online for easy reference. This multi-faceted approach ensures that users have the resources and support they need to quickly and confidently start using our service.
- Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
- Excel Sheets
- End-of-contract data extraction
- Users can easily extract their data when their contract ends. We provide a streamlined process for users to request their data, and upon request, we promptly compile and provide users with all their data in a format of their choice. This ensures a smooth transition and allows users to retain control over their data even after the contract ends.
- End-of-contract process
- Overall, our aim is to facilitate a seamless transition while ensuring users retain control over their data and the end of the contract is managed efficiently and professionally.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The mobile service for Sharepoint offers convenient access on-the-go with a user-friendly interface optimised for smaller screens. It provides essential functionalities for task management and data access, albeit with some limitations compared to the desktop version, such as reduced functionality and customisation options. In contrast, the desktop service offers a more comprehensive user experience, with access to all features and advanced configuration options. It provides a larger workspace for detailed data analysis and seamless integration with other desktop applications. While the mobile service prioritises convenience, the desktop service offers a richer feature set for in-depth management needs.
- Service interface
- No
- User support accessibility
- WCAG 2.1 A
- API
- Yes
- What users can and can't do using the API
- Users can leverage Sharepoint's API to set up the service by programmatically configuring modules, creating records, and defining workflows. Through the API, users can make changes to data, such as updating records, adding new entries, or deleting existing ones. However, there are limitations to what users can do through the API. While most configuration tasks are possible, some advanced settings may require direct access to the Sharepoint user interface. Additionally, certain administrative actions, like installing new modules or modifying system-wide settings, may be restricted or require elevated permissions not available through the API.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- ODF
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Users can customise our service to meet their specific needs and preferences. This includes customising various aspects such as modules, workflows, fields, and user interfaces. Users can customise by accessing the configuration settings within the service's interface, where they can modify existing configurations or create new ones. Additionally, users with appropriate permissions can utilise development tools and APIs to implement more advanced customisations. Ultimately, anyone with the necessary authorisation, such as administrators or designated users, can customise the service to align with the buyer's requirements. We offer customisation services tailored to the buyer's requests, ensuring the service meets their unique needs effectively.
Scaling
- Independence of resources
- We ensure the independence of resources by implementing robust resource management and allocation strategies. This includes allocating dedicated resources to each user or group of users, ensuring that their performance is not impacted by the demand placed on the service by other users. Additionally, we employ load balancing techniques to distribute incoming requests evenly across available resources, preventing any single user or group from monopolising resources and affecting others' experience. Continuous monitoring and scaling of resources also allow us to adapt to changing demand levels, ensuring consistent performance and reliability for all users.
Analytics
- Service usage metrics
- Yes
- Metrics types
- The service metrics are provided as reports in the user interface
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- SharePoint
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Users can export their data easily through our platform. We provide a user-friendly interface where users can select the data they wish to export and choose the desired format. Once selected, the system initiates the export process, and users receive a download link via email or directly from the platform. This streamlined process ensures that users can quickly and securely export their data whenever needed.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Other
- Other protection between networks
- Encryption while the data is being transferred from buyer's network to our network.
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Other
- Other protection within supplier network
- Encryption while the data is being transferred within our Network
Availability and resilience
- Guaranteed availability
-
The Service Provider’s customer support will normally be available from 0900 to 1730hrs Irish standard time, Monday through Friday, except Bank Holidays and Public Holidays. During this period the team members for your project may not be available, however we do have exceptional support 24 hours a day, 7 days per week where someone will be available to support you. Out of business hours support requests can be submitted online or by e-mail 24x7x365 via your project support email.
In the following table you can see a detailed level of Support depending on the Business Criticality of the issue.
Standard Support
Mon-Fri 0900hrs -1730hrs
Weekends & Bank Holidays 0900hrs - 1300hrs
SLA Response and Recovery Times are as follows:
For Standard Support, weekdays' response times vary: High priority - 1 hour response, 2 hours resolution; Normal - 2 hours response, 4 hours resolution; Low - 4 hours response, 2 days resolution. Weekends and bank holidays adhere to the same response times, but support is available only from 0900 to 1300 hours. - Approach to resilience
- Our service is meticulously designed to ensure resilience in the face of disruptions. We employ redundant infrastructure, including failover systems and data replication, to mitigate the impact of hardware failures or outages. Our datacentre setup adheres to industry best practices for resilience, with details available upon request. Additionally, we conduct regular disaster recovery drills and risk assessments to identify and address potential vulnerabilities. By prioritising redundancy, redundancy, and robust infrastructure, we ensure continuous service availability and data integrity, aligning with government cloud security principles for asset protection and resilience.
- Outage reporting
- We report outages primarily through email alerts, promptly notifying users of any disruptions to our service. While we do not currently offer a public dashboard or API for outage reporting, our email alerts provide timely updates on the status of the service and any ongoing incidents. Users can rely on these email alerts to stay informed about outages and receive updates on resolution efforts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
-
We implement a system where buyers are provided with a specific number of licences. These licences are then assigned by the buyer to their respective users. Each user is given their own unique username and password to use for logging in.
When a user attempts to access the service, they are required to enter their assigned username and password. These credentials are then verified against our database to ensure that they match the information provided by the buyer during the licence assignment process. If the credentials are valid, the user is granted access to the service. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- CDL Group Limited
- ISO/IEC 27001 accreditation date
- 9/18/2023
- What the ISO/IEC 27001 doesn’t cover
- Our ISO/IEC 27001 certification specifically covers the provision of consultancy, implementation, and development services related to software systems. Other activities or services not directly related to these areas are not covered by our ISO/IEC 27001 certification.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- We adhere to ISO 27001 information security policies and procedures to ensure robust data protection. Our reporting structure includes designated security officers overseeing policy implementation and enforcement. Regular audits and compliance checks verify adherence. Employee training on security protocols is mandatory, with strict access controls and encryption measures in place. Incident response plans address security breaches promptly. We continuously update our security measures to align with evolving threats and regulatory standards, ensuring comprehensive data protection for our users.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- We employ a robust configuration and change management framework, tracking service components throughout their lifecycle via our proprietary project management tool. Each component is meticulously documented, including versioning and modifications. Changes undergo stringent security impact assessments, analysing potential vulnerabilities and risks. Our dedicated security team evaluates each change, implementing necessary mitigation measures to safeguard against security threats. These changes are thoroughly tested and validated before deployment. Our comprehensive documentation and communication channels ensure transparency and accountability throughout the process, maintaining the integrity and security of our services.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
We assess threats through scanning tools and threat intelligence. Patches for identified vulnerabilities are deployed promptly, prioritising critical issues. Information sources include vendor advisories, threat feeds, and security research.
We continuously assess threats through scanning tools, manual reviews, and threat intelligence. Identified vulnerabilities prompt swift patch deployment, prioritising critical issues. Information sources include vendor advisories, threat feeds, and security research, ensuring timely threat detection. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Our protective monitoring processes swiftly identify potential compromises through continuous monitoring of system logs, network traffic, and anomaly detection. Upon detection, we respond promptly, isolating affected systems, investigating the root cause, and implementing necessary remediation measures. Our response time to incidents is rapid, with immediate escalation to our dedicated incident response team for resolution. This proactive approach ensures timely detection and response to security incidents, minimizing the impact and ensuring the integrity of our services.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Our incident management processes are robust and structured: Pre-defined Processes: We have pre-defined processes for common events, outlining steps for incident detection, analysis, and resolution. These processes ensure consistency and efficiency in handling incidents. Reporting Incidents: Users can report incidents through various channels, including dedicated support portals, email, or phone. Our support team promptly acknowledges and logs all reported incidents for investigation. Incident Reports: After resolving an incident, we provide detailed incident reports to affected users, outlining the cause, impact, and resolution steps taken. These reports ensure transparency and enable users to understand the incident's implications and resolution measures.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
We partner with hosting providers who are committed to environmental sustainability. These providers implement eco-friendly practices, such as using renewable energy sources and implementing energy-efficient infrastructure. By aligning with hosting providers that comply with fighting climate change, our services contribute to reducing carbon emissions and promoting a greener IT ecosystem.Covid-19 recovery
Our cloud-based solutions play a crucial role in supporting Covid-19 recovery efforts by enabling remote work, virtual collaboration, and digital transformation. In times of crisis, such as the Covid-19 pandemic, organisations need resilient and flexible IT solutions to maintain operations and adapt to new challenges. By facilitating remote work and digital communication, our services empower organisations to navigate through recovery phases more effectively, ensuring business continuity and supporting economic resilience.Tackling economic inequality
Our cost-effective cloud solutions level the playing field for organisations of all sizes, including small and medium-sized enterprises (SMEs) and public sector bodies with limited budgets. By providing access to affordable and scalable technology, we support economic inclusivity and help bridge the digital divide.Equal opportunity
Accessibility is a fundamental aspect of our service design. We ensure that our solutions comply with accessibility standards and guidelines, making them usable by individuals with disabilities. By promoting equal access to technology, we contribute to creating a more inclusive and equitable society.Wellbeing
Remote work enabled by our cloud services offers numerous benefits for employee wellbeing. It reduces the need for commuting, which can alleviate stress and improve work-life balance. Additionally, cloud-based collaboration tools enhance communication and flexibility, fostering a healthier and more productive work environment.
Pricing
- Price
- £5 to £10.30 a user a month
- Discount for educational organisations
- No
- Free trial available
- No