Skip to main content

Help us improve the Digital Marketplace - send your feedback

INGENTIVE LIMITED

Ingentive Microsoft Fabric

Ingentive empowers organisations with robust data visualisation and analytics with tailored solutions in data modelling, dashboard design, and development.

We unlock insights, drive decision-making, and extract maximum value from data assets. Our expert enable businesses to transform complex data into compelling visual narratives and empower strategic decisions.

Features

  • Service Discovery: Connect services easily within Fabric ecosystem
  • Security: Safeguard data with robust authentication measures
  • Orchestration: Coordinate complex data workflows between services
  • Microservices: Modular architecture for agility and maintenance ease
  • Scalability: Develop scalable applications with advanced analytics
  • Reliability: Ensure consistent performance and availability for critical tasks
  • Auto-scaling: Automatically adjust resources based on workload
  • Service Templates: Reusable templates for deploying new services
  • Hybrid Deployment: On-premises and cloud deployment flexibility.
  • Extensibility: Customise Fabric with plugins, integrations.

Benefits

  • Efficiency: Streamline development, deploy faster for market advantage.
  • Cost Savings: Optimise resources, reduce infrastructure expenses.
  • Scalability: Expand seamlessly without performance compromise.
  • Reliability: Deliver consistent, dependable services for user satisfaction.
  • Simplified Management: Centralise tasks, automate for increased productivity.
  • Innovation: Empower teams to experiment with new functionalities.
  • Resilience: Recover gracefully, maintain business continuity.
  • Competitive Edge: Utilise cutting-edge technologies for competitive advantage.
  • Ecosystem Integration: Seamlessly integrate with Microsoft services.
  • Compliance and Governance: Simplify compliance, meet regulatory requirements.

Pricing

£1.58 a licence

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at hemraj.tatur@ingentive.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

7 5 8 1 5 3 0 1 5 8 5 5 2 1 4

Contact

INGENTIVE LIMITED Hemraj Tatur
Telephone: 02081323255
Email: hemraj.tatur@ingentive.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
While our service is primarily focused on Microsoft products, we also collaborate with customers to address specific integration needs or compatibility issues. However, it's essential to discuss such requirements during the onboarding process for alignment & feasibility. We operate within predefined hours.

While we strive to provide timely assistance, urgent or critical issues may be addressed outside of these hours as part of our premium offerings.

Furthermore, it's worth noting that while we aim to resolve issues promptly, certain complex or unique challenges may require additional investigation. In such cases, we maintain transparent communication channels for informed progress and timelines.
System requirements
  • Compatible with Windows (Windows 7 SP1+) and macOS.
  • Requires a 1.6 GHz+ processor (64-bit dual-core+).
  • Recommended minimum of 2 GB.
  • 1GB+ available hard-disk space for installation.
  • Requires DirectX 10-compatible graphics card.
  • Minimum resolution of 1440x900 pixels.
  • Supports latest versions of major browsers.
  • Required for online features and updates.
  • .NET Framework: Requires .NET Framework 4.5 or later.
  • Users need a valid Fabric license for advanced features.

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Ingentive can offer a flexible support service (Flexi, Plexi Plus and Complete). These have different features but all have an response SLA of:
- Major: 1hour
- Intermediate: 4hours
- Minor: 8hours
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), 7 days a week
Web chat support
Yes, at an extra cost
Web chat support availability
9 to 5 (UK time), 7 days a week
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
Microsoft assesses products using three accessibility standards:

Web Content Accessibility Guidelines (WCAG) are internationally adopted technical standards for making web content accessible. Each guideline has testable success criteria. Microsoft assesses products and services against WCAG levels A and AA criteria. The WCAG are developed and maintained by the Worldwide Web Consortium (W3C), an international organisation for the development of web standards.

US Section 508 guidelines were developed by the US Access Board for use by federal agencies in implementing Section 508 of the US Rehabilitation Act. Federal agencies use the Section 508 guidelines to develop, procure, maintain, and use accessible Information and Communication Technology (ICT). The guidelines contain scoping and technical considerations to facilitate accessibility for individuals with disabilities.

ETSI EN 301 549 is a European-developed accessibility standard for ICT products and services developed by the European Standards organisations CEN (European Committee for Standardization), CENELEC (European Committee for Electrotechnical Standardization), and ETSI (European Telecommunications Standards Institute). The standard contains accessibility criteria for ICT products and services and incorporates the WCAG standards for web accessibility. The standard was originally developed for purposes of public procurement in the European Union and is also referenced by jurisdictions outside of Europe.
Onsite support
Yes, at extra cost
Support levels
At Ingentive, we offer three support levels to suit different needs and budgets:
Basic Support:
- Essential support services, including general inquiries and basic troubleshooting.

Premium Support:
- Priority response times, extended support hours, and dedicated support agents.

Enterprise Support:
- Tailored for complex needs with personalised support from a technical account manager or cloud support engineer. At Premium and Enterprise levels, clients can work with a dedicated technical expert for personalised guidance and proactive assistance
Support available to third parties
No

Onboarding and offboarding

Getting started
To start using Microsoft Fabric, users should follow these steps:

License Allocation: Ensure users are assigned appropriate licenses, typically managed within the Microsoft 365 platform.

Accessing Fabric: Once licenses are allocated, users can access Fabric via the web interface, desktop application, or mobile app. They can sign in using their organisational credentials provided by their IT department.

Onboarding Resources: Microsoft offers a variety of onboarding resources, including tutorials, guides, and training modules accessible through the Fabric Help Centre. These resources help users familiarise themselves with the features and functionalities.

Training and Support: Users can access various training options, such as live webinars, virtual training sessions, and self-paced learning modules. Additionally, support is available through Microsoft's official channels, such as the Fabric Community forums and Microsoft Support.

Feedback Submission: Users are encouraged to provide feedback on their experience with Fabric. This feedback helps Microsoft identify areas for improvement and prioritise feature enhancements. Users can submit feedback through Fabric's BI interface or official Microsoft feedback channels.

By following these steps and leveraging the available resources, users can quickly integrate Microsoft Fabric into their workflow and maximise its benefits for data visualization, analysis, and reporting.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
When a contract ends, users may need to extract their data from Microsoft environment. Microsoft does not provide a direct mechanism for data extraction. Therefore, utilising a third-party tool is recommended to extract any data stored within the service.

Upon the termination or expiration of a paid subscription, Microsoft retains customer data stored for a limited period. Users can access and export their data during this time frame. However, the retention period may vary and is subject to Microsoft's data management policies.

If a subscription remains expired or terminated for an extended period, Microsoft may eventually disable the account and delete all customer data within it. It's essential for users to extract their data promptly to avoid data loss.

For assistance with data extraction or any questions regarding the end-of-contract process, users can reach out to Microsoft support or consult the Microsoft 365 Admin Centre for guidance.
End-of-contract process
At the end of a contract with Microsoft Fabric, users typically handle the cancellation process through the Microsoft 365 admin console within the platform. If the cancellation involves revoking one or all of the Microsoft Fabric licences for certain users, immediate action is taken to deactivate access to the service for those affected.

If the organisation still retains other licences, data associated with the service will remain accessible. However, if all licences are cancelled, data may be subject to expiration according to Microsoft's data retention policies.

It's important to note that for partners acting as administrators on behalf of a customer (AOBO), subscription cancellations may not reflect immediately in the admin centre. It can take up to 90 days for the system to update and reflect the change in subscription status.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
  • Other
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Interface: The user interface of the mobile service is optimised for smaller screens.

Feature Set: While both versions offer similar core functionality, there is some limitations of certain features.

Navigation: Patterns may differ between the mobile and desktop versions to accommodate the respective form factors.

Performance: Certain operations, such as data loading and rendering may vary.

Customisation: Depending on the platform and device, the level of customisation options available to users may differ.

Offline Access: Desktop versions may offer more robust offline access.

Integration: While both versions support integration, there may be differences in the integration capabilities and connectors.
Service interface
No
User support accessibility
WCAG 2.1 AA or EN 301 549
API
No
Customisation available
Yes
Description of customisation
Layout: Customise the layout of their dashboards by rearranging tiles, resizing visuals, and organising content for their preferences and viewing needs.

Visualisations: Customise visualisations by selecting different chart types, adjusting colours, adding filters, and configuring various settings to present data in the most meaningful way.

Data Connections: Customise data connections by connecting to different data sources, importing data, and defining relationships between datasets to create comprehensive reports and analyses.

Report Formatting: Customise report formatting by adding logos, changing themes, adjusting fonts, and applying styles to ensure consistency and branding alignment.

Interactivity: Customise interactivity by adding interactive features such as slicers, filters, drill-throughs, and bookmarks to enhance user engagement and exploration of data insights.

Data Refresh: Customise data refresh schedules, intervals, and sources to ensure that reports and dashboards are up to date with the latest information.

Permissions: Depending on their role and permissions, users can customise access levels, sharing settings, and collaboration features to control who can view, edit, or share reports and dashboards.

Users can customise with intuitive drag-and-drop interfaces, interactive menus, and configuration settings within Fabric's platform. These are available to all users with appropriate permissions, including report creators, analysts, administrators, and end-users.

Scaling

Independence of resources
To ensure users aren't affected by demand on our Fabric service, we implement:

Resource Allocation: Allocate ample computing resources for smooth performance.

Load Balancing: Employ techniques to evenly distribute workloads across servers, maintaining consistent performance.

Scalability: Dynamically scale infrastructure based on demand fluctuations for seamless user experience.

Isolation: Maintain resource isolation for uninterrupted service.

Performance Monitoring: Continuously monitor system performance for optimal user experience.

SLAs: Offer guarantees of service availability and performance for reliability

Analytics

Service usage metrics
Yes
Metrics types
Service metrics for Microsoft Fabric cover key areas:

Usage Metrics: Track active users, report views, dataset refreshes, and query executions.

Performance Metrics: Monitor report loading times, dataset refresh durations, and service availability.

Adoption and Engagement: Measure adoption rates, feature utilisation, and user feedback.

Content Metrics: Assess published reports, dashboards, datasets, and content updates.

Data Governance: Track data quality, compliance, and access controls.

Cost Metrics: Analyse subscription costs, usage charges, and resource utilisation.

These metrics enable organisations to optimise Fabric usage, governance, and costs

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Microsoft

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Users can export their Fabric data through:

Built-in Export Options: Native export options for exporting datasets, reports, and dashboards in various formats such as Excel, CSV, and PDF.

Export to PowerPoint: Users can export Fabric reports directly to PowerPoint.

Fabric Service: Users can export export visuals or entire reports to different formats.

Fabric Desktop: Users can export data to external sources or files for further analysis or sharing.

Fabric API: Advanced users and developers can programmatically export data using Fabric's API, allowing for custom automation and integration with other systems.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
IPsec or TLS VPN gateway
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Microsoft 365 prioritises availability, ensuring uninterrupted access to its services. Here’s how it achieves this:

Service Health and Continuity:
- Admins can monitor service status and scheduled maintenance.
- Service health provides real-time updates on disruptions and outages.
- Planned maintenance is communicated in advance through the Message Center.
- Unplanned downtime notifications address unexpected service unavailability .

Recent Worldwide Uptime:
- Microsoft maintains transparency. Recent uptime data (excluding U.S.
- Government DoD and GCC High) shows:
> 2023: 99.98% (Q1), 99.99% (Q2), 99.99% (Q3), 99.996% (Q4).
> 2022: 99.98% (Q1-Q3), 99.99% (Q4).
> 2021: 99.97% (Q1), 99.98% (Q2-Q4) .

Notification Policy:
- Timely communication during service incidents is crucial.
- Microsoft aims for accuracy and transparency in notifications

In summary, Microsoft 365 maintains high availability, empowering users with reliable and secure services.
Approach to resilience
Microsoft's approach to M365 resilience is multi-faceted and involves several layers of protection to ensure the availability and reliability of the service. Some of the key measures include:

- Datacenter redundancy: Microsoft has multiple datacenters in different regions, ensuring that if one datacenter experiences an outage, the service can failover to another datacenter with minimal disruption.

- Network resilience: Microsoft's network infrastructure is designed to be highly resilient, with multiple redundant paths and automatic failover mechanisms.

- Data backup and recovery: Microsoft has robust data backup and recovery processes in place to ensure that customer data is protected and can be restored in the event of a disaster.

- Monitoring and incident response: Microsoft continuously monitors the M365 service for any issues and has a dedicated incident response team to quickly address and resolve any problems that arise.
Overall, Microsoft's approach to M365 resilience is focused on providing a highly available and reliable service to its customers.
Outage reporting
Microsoft reports on Microsoft 365 outages through the Service Health Dashboard and the Microsoft 365 Admin Center.

These tools provide real-time information on the status of the service, including any current or recent outages. Administrators can view the details of the outage, including the cause, impact, and estimated time of resolution.

Microsoft also provides regular updates on the progress of resolving the issue. Additionally, Microsoft may send email notifications to administrators to alert them of any service disruptions.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
To restrict access in management interfaces and support channels, Microsoft employs:

Role-Based Access Control (RBAC): Administrators assign roles and permissions based on user responsibilities.

Multi-Factor Authentication (MFA): Extra verification layers prevent unauthorised access.

Conditional Access Policies: Control access based on conditions like location or device compliance.

Audit Logging: Tracks and reviews access events for security.

Restricted Admin Mode: Limits access to essential administrative tasks.

Encryption and Data Protection: Secures data transmission and sensitive information storage.

These measures ensure restricted access to management interfaces and support channels, enhancing security and protecting sensitive information
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
Between 6 months and 12 months
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • CSA CCM version 3.0
  • ISO/IEC 27001
Information security policies and processes
Microsoft follows a wide range of information security policies and processes to protect its customers' data and ensure the security of its products and services. Some of these include:

- Risk management: Microsoft has a comprehensive risk management program that identifies, assesses, and mitigates potential security risks.

- Compliance: Microsoft complies with various industry standards and regulations, such as ISO 27001, SOC 2, and GDPR.

- Data protection: Microsoft uses encryption, access controls, and other security measures to protect customer data.

- Incident response: Microsoft has a dedicated security response team that handles security incidents and works to prevent future occurrences.

- Employee training: Microsoft provides regular security training to its employees to ensure they are aware of the latest threats and best practices for protecting customer data.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Lifecycle Tracking: We meticulously track each component's lifecycle within Microsoft Fabric, ensuring accurate records from deployment to retirement.

Security Impact Assessment: Proposed changes undergo a thorough assessment for security impact, evaluating scope, vulnerabilities, and risks specific to Fabric's environment.

Release Strategy: Fabric considers various options, assessing changes' impact on availability, performance, and security. This includes stakeholder coordination and testing tailored to features and functionalities.

Communication Channels: Planned changes are communicated via formal channels such as service notifications and release notes. Unplanned changes, particularly security updates, receive immediate communication through emergency notifications to keep users informed.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Microsoft online services use machine state scanning to make sure the machines comprising our infrastructure are up to date with the latest patches and that their base configurations correctly align with relevant frameworks.

Machine state scanning uses patching, anti-malware, vulnerability scanning, and configuration scanning (PAVC). Microsoft online services apply effective PAVC by installing a custom security agent on each asset during deployment. This security agent enables machine state scanning and reports results to our service teams.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Protective Monitoring Processes for Microsoft Fabric:

Identification of Potential Compromises: We employ monitoring tools to detect abnormal behaviour or security anomalies.

Response to Potential Compromises: Our incident response team initiates immediate investigation and containment procedures, followed by remediation measures.

Incident Response Time: We prioritise rapid response to security incidents within minutes of detection, ensuring data integrity and user confidence.

Our protective monitoring ensures the security and reliability, providing users with a trusted environment
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Microsoft online services security teams and service teams take the same approach to security incidents, which is based on the NIST 800-61:

Preparation: Organisational preparation that is needed to be able to respond, including tools, processes, competencies, and readiness.

Detection & analysis: Activity to detect a security incident in the environment and to analyse all events to confirm the authenticity of the security incident.

Containment-eradication-recovery: Required and appropriate actions taken to contain the security incident based on the analysis.

Post-incident activity: Post-mortem analysis performed after the recovery of a security incident.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
Yes
Connected networks
  • Public Services Network (PSN)
  • Police National Network (PNN)
  • NHS Network (N3)
  • Joint Academic Network (JANET)
  • Scottish Wide Area Network (SWAN)
  • Health and Social Care Network (HSCN)

Social Value

Social Value

Social Value

  • Fighting climate change
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Ingentive is committed to delivering services sustainably, supported by our annually updated environmental policy, dynamic roadmap of environmental initiatives, and a scorecard.

Under the leadership of Ingentive’s CFO, our Greening Committee (GC) drives environmental & sustainability initiatives with set targets. The GC includes representation from every department, ensuring innovation and participation across the organisation through annual member rotations. The GC meets quarterly & sets the agenda for driving environmental policy improvements. Market research responsibility revolves through GC members and feedback on environmental impacts and benefits form part of the quarterly agenda and are presented back to the GC for further action and consideration.

Aligned with Microsoft’s commitment, Ingentive provides services focused on being carbon-negative, water-positive, and zero waste by 2030, in line with the government's 25-year plan objectives. Our research efforts encompass:

Clean Air: Researching technologies like virtualisation and cloud computing to promote clean air & aligning with Microsoft’s air quality policies.

Clean and Plentiful Water: Researching water-efficient data centre design, recycling & engaging with Microsoft stakeholders on water-related challenges in IT services.

Reducing Risks of Harm: Analysing environmental hazards in IT operations such as electronic waste, hazardous components & pollution.

Using Resources Sustainably: Investigating resource-efficient IT infrastructure technologies, collaborating with suppliers & partners to optimise IT services lifecycle.

Mitigating Climate Change: Researching climate mitigation strategies like carbon offsetting and renewable energy adoption & collaborating with Microsoft to deploy climate-resilient IT solutions.

Minimising Waste: Researching waste minimisation services & sustainable product design & partnering with waste & recycling facilities for optimised waste recovery & disposal processes.

Tackling economic inequality

At Ingentive, we're deeply committed to tackling economic inequality and promoting social equity. We recognise that economic disparities disproportionately affect marginalised groups. To drive positive change, we're taking proactive steps through various initiatives:

Diversity and Inclusion: Prioritising diversity in hiring, procurement, and vendor selection.

Equal Pay and Benefits: Ensuring fair compensation and benefits for all employees.

Supplier Diversity: Supporting minority-owned and women-owned businesses.

Community Investments: Investing in community development and workforce training.

Mentorship and Skills Development: Offering mentorship programs and skills workshops.

Advocacy and Policy Engagement: Advocating for equitable policies and initiatives.

Community Partnerships: Collaborating with non-profits agencies.

Transparency and Accountability: Maintaining transparency in our efforts.

Through these initiatives, we're working towards a more inclusive and prosperous future for all.

Equal opportunity

At Ingentive, we are dedicated to fostering an inclusive and diverse work environment. We believe in equal opportunity employment practices, where decisions regarding hiring, promotion, discipline, or dismissal are made solely on the basis of merit, competence, performance, and business needs. We actively promote diversity and do not discriminate against individuals based on race, colour, religion, marital status, age, national origin, ancestry, physical or mental disability, medical condition, pregnancy, genetic information, gender, sexual orientation, gender identity or expression, or any other legally protected status.

Our commitment extends beyond our own organisation to our supply chain partners. We ensure that all organisations within our supply chain share our values and principles of equal opportunity employment.

Through collaboration and engagement, we work with our partners to uphold these standards and create a culture of inclusivity across all aspects of our business operations.

Wellbeing

At Ingentive, we prioritise the health and wellbeing of our employees. We believe that fostering a supportive and nurturing work environment is essential for individual and collective success.

Our commitment to employee wellbeing includes:

Comprehensive Health Benefits: We provide robust health insurance coverage, including medical and dental plans, to ensure that our employees have access to quality healthcare services.

Mental Health Support: We offer resources and programs to support mental health, including counselling services, employee assistance programs, and mindfulness workshops.

Work-Life Balance: We promote work-life balance by offering flexible work arrangements and remote work options.

Ergonomic Workspaces: We prioritise ergonomic design in our workspaces to promote comfort and reduce the risk of injury or strain.

Employee Assistance: We provide access to confidential support services for employees facing personal or professional challenges.

Training and Development: We invest in employee training and development programs to enhance skills, promote career growth, and foster a sense of fulfilment and accomplishment.

Recognition and Appreciation: We recognise and celebrate the contributions of our employees through various recognition programs, rewards, and incentives.

Open Communication: We maintain open and transparent communication channels to encourage feedback, address concerns, and foster a culture of trust and collaboration.

Community Engagement: We encourage employees to participate in community service and volunteer activities to give back to society and promote social connectedness.

Through these initiatives, we strive to create a workplace where every employee feels valued, supported, and empowered to thrive personally and professionally.

Pricing

Price
£1.58 a licence
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at hemraj.tatur@ingentive.com. Tell them what format you need. It will help if you say what assistive technology you use.