Skip to main content

Help us improve the Digital Marketplace - send your feedback

Bytes Software Services

Verto 365

Verto 365 is the work collaboration platform designed for everyone. It manages everything from simple tasks through to major projects and programmes for over 160,000 public sector users. It's fully integrated with Microsoft Teams, M365 and Browsers. Verto365 is entirely user configurable supporting multiple business processes across the organisation. bssgc

Features

  • MS Teams and M365 integration
  • Microsoft Teams App, Appsource and Azure marketplace
  • Work collaboration, Kanban Boards and file sharing
  • Portfolio, project and programme management
  • PMO management
  • Governance, Risk and Compliance
  • Approvals, tasks and milestones
  • Benefit management
  • Resource management
  • Project Dashboards and Dependency Visualisation

Benefits

  • Browser and MS Teams access with single sign on
  • Control and governance
  • Combines work collaboration with project management
  • Supports mobile, and Hybrid working
  • Significant cost and time saving
  • Real time management information
  • Links project outputs to performance outcomes
  • Automated reports
  • Fully configurable dashboards
  • Prevents data duplication (enter once use many)

Pricing

£5.00 a user a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@bytes.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

7 7 1 0 6 1 5 1 2 9 0 7 6 4 1

Contact

Bytes Software Services Chris Swani
Telephone: +44 (0) 7951 326815
Email: tenders@bytes.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
None
System requirements
  • Browsers: Vendor Supported Versions of Edge, Chrome & Safari
  • MS Teams: Vendor Supported Releases

User support

Email or online ticketing support
Email or online ticketing
Support response times
Monday to Friday 8:30am to 5:30pm
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Customers can access support using the online knowledge hub, or telephone and email. All customers have a dedicated Client Success Manager who they can access during business hours.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Onsite training , Online training using MS Teams and a comprehensive online knowledge hub are all provided to help users start using the service.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
A full database backup which will contain ALL user data will be supplied at the the end of contract.
End-of-contract process
A full Database backup of the customers data will be made available for secure download. All data will be removed from our servers. Additional bespoke extracts of portions of data may be chargeable.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
The product is accessible using Teams on mobile devices, the user experience matches that of the desktop service.
Service interface
No
User support accessibility
WCAG 2.1 AA or EN 301 549
API
Yes
What users can and can't do using the API
An Open Data (OData) API allows you to access Verto 365 data to facilitate the connection from 3rd party systems, In addition this interface can be used to extract real time data for reporting purposes into3rd party tools that support Data. Some limited data can be uploaded using the API.
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
Users with the correct level of privileges can customise almost all elements of the system. These include but are not limited to: Dashboards Forms Field Names Approvals Governance Reports Workflow Notifications Colours Customer Specific Help

Scaling

Independence of resources
All customers have their own database providing independent resource for their data. The web tier platform auto scales based on end user demand using a fully scalable public cloud infrastructure

Analytics

Service usage metrics
Yes
Metrics types
We can provide metrics showing number of logins attempts successful logins unsuccessful logins In all cases the IP address, browser type and device type is also stored.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller (no extras)
Organisation whose services are being resold
Verto

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users can export their data in a number of ways, directly from any data tables displayed on screen, by using a tool that can connect to our OData API interface or by using our reporting engine. All reports can be exported in Word, Powerpoint, Excel, CSV & XML. This allows us to provide a report that can be run many times with differing parameters to facilitate extracts of data.
Data export formats
  • CSV
  • Other
Other data export formats
  • Word
  • Excel
  • PDF
  • Powerpoint
  • XML
Data import formats
  • CSV
  • Other
Other data import formats
  • Word
  • Excel
  • PDF
  • Powerpoint
  • XML

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
"
System availability is 99.99% during core business hours (08:30 a.m. - 5:30 p.m. Monday to Friday). Help Desk operational – 08:30 a.m. – 5:30 p.m. Monday – Friday Faults/Issues can be reported via email or phone. All calls or emails that cannot be immediately resolved are logged in to our service desk system which allocates a unique reference and records the customer and individual raising the fault in addition to the description of the fault, etc. Faults (System Unavailable) are given the highest priority and are aimed to be fixed within 60 minutes where possible. Full details are provided within the enclosed SLA"
Approach to resilience
The services hosted in fully resilient public cloud infrastructure. More detailed Information is available on request.
Outage reporting
Email alerts to Administrative Users. These users are typically the Admin contacts for each of our customers.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Access to management interfaces is restricted to authorised staff who MUST access the platform using a VPN connection. No generic accounts are used for management or support tasks and all activities are logged
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
01/03/2023
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
As an ISO27001 certified organisation we maintain an Information Security Management System (ISMS) which details all of our processes. We are audited for compliance against our iSMS by the BSI on an annual basis.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Source control is used to manage both the code and the basic application configuration of all customers. Any changes to LIVE services (software or server configuration) must go through our change control process which includes a Change Assessment Board. All changes must be documented and approved by the board prior to entering production.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We use automated tools to constantly assess our platform for vulnerabilities. Our Teams are alerted as soon as any vulnerability are found. These tools include scanning for zero day vulnerabilities and our platform is scanned as soon as any new threats are identified automatically. In addition we have automated tools that highlight vulnerabilities in our source code at the point of execution which we use in test/dev environments.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
"
We use a Security Information and Event Management (SIEM) tool that alerts immediately when suspicious behaviour is identified on our platform. In addition we use tools provided by our Cloud Infrastructure hosting provider. Incidents of this type are treated as P1 by our helpdesk."
Incident management type
Supplier-defined controls
Incident management approach
We have a prescribed incident management process that covers all common incident type raised by our customers and is clearly defined as part of our ISO27001 Information Security Management System. Users can report incidents to our helpdesk by phone or email. Alternatively the have the direct contact details of their account manager who can also start the incident management process. Reporting on incidents will depend on it's severity. Minor incidents will simply be reported in the closure text of an incident. Major incidents involving any significant outages or security compromise will result in a Major Incident report.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

We take our environmental management and the impact we have on the environment very seriously. We have environmental policies in place and hold the ISO14001 accreditation. Our environmental assessments are conducted annually by an external Lead ESOS Assessor; they are signed-off by the board and compliance reported to the regulator (the Environment Agency). Our environmental policy is published on our website at https://www.bytes.co.uk/company/sustainability/environmental.
Bytes achieved carbon net zero in March 2022 through approved carbon offsetting schemes. We are always seeking to reduce our impact on the environment. We aim to minimise waste, reduce pollutants and use renewable materials. Our offices have recycling facilities for cans, plastic and paper. We aim to reduce our office printing to zero within the next few years.
An Environmental Steering Committee has been established to coordinate environmental activities and drive change.
To drastically reduce our emissions, we have switched to renewable energy. Our Head Office has reached our first milestone of using a specialist 100% renewable electricity provider. We are also exploring options to install solar panels on our Headquarters building.
Other environmental initiatives include installing electric vehicle charging points and encouraging staff to commute to work without the car (setting up a car share network and installing secure cycle parking).
We produce a SECR (Streamlined Energy and Carbon Reporting) report that details the companies energy consumption and carbon emissions. This report is produced annually by an independent assessor.
This report provides details of our emissions in Scope 1, 2 and 3 categories. It details the activities previously taken to reduce emissions and also recommendations for further improvements.
For scope 1,2 and 3 emissions we aim to reduce these by 50% by 2025-2026 from our 2021 baseline.
We aim to be Net Zero by 2040, covering our own operational emissions.

Pricing

Price
£5.00 a user a month
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
Details on Application
Link to free trial
https://vertocloud.co.uk/free-trial/

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@bytes.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.