Business Cloud Integration Ltd.

Casper365

Casper365 is a unique cloud provisioning platform that completely automates your SharePoint deployments without the need for code or expensive development work. Migrate your data, Create your sites, Delegate ownership, and Govern your SharePoint and Teams solutions all in one place.

Features

  • SharePoint Online Site Provisioning
  • Microsoft Teams Provisioning
  • SharePoint Online Migrations
  • SharePoint Online Governance
  • SharePoint Online Reporting
  • Migrating to the cloud

Benefits

  • Automated provisioning
  • Governance centric
  • Scheduled managed migrations
  • Customisable templates
  • Delegated access
  • User empowering

Pricing

£4,000 an instance a quarter

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ssumner@businesscloudintegration.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

8 2 5 3 0 9 7 6 9 4 4 8 5 0 5

Contact

Business Cloud Integration Ltd. Sharon Sumner
Telephone: 01223772365
Email: ssumner@businesscloudintegration.co.uk

Service scope

Software add-on or extension
Yes
What software services is the service an extension to
Office 365
Cloud deployment model
Private cloud
Service constraints
Requires authorisation on organisations tenancy to use.
System requirements
Office 365 Subscription incl SharePoint

User support

Email or online ticketing support
Email or online ticketing
Support response times
Standard business hours apply (not including weekends)
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Onsite support
Support levels
Direct organisation and user support through a helpdesk, tickets allocated to support agent within an hour, and allocated priority and severity. Tickets can be resolved through the helpdesk directly or via a support call with an allocated agent. All ticket priorities have internal SLA's and reports of support usage can be provided to the client each month.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide onsite or online training in addition to user documentation as and when detailed as part of scope.
Service documentation
Yes
Documentation formats
  • PDF
  • Other
Other documentation formats
  • Microsoft PowerPoint
  • Microsoft Excel
  • Microsoft Word
End-of-contract data extraction
Their data always resides with them on their tenancy. We never hold their data - they are the custodians.
End-of-contract process
We offer solutions that are either priced on a time and materials basis or a fixed price. The scope varies with each client.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
No
Service interface
No
User support accessibility
None or don’t know
API
No
Customisation available
Yes
Description of customisation
Customisable SharePoint and Microsoft Teams templates, submission forms, approvals, and data views with a built-in interface.

Scaling

Independence of resources
By resource planning

Analytics

Service usage metrics
Yes
Metrics types
Details on client support are provided as and when requested which will usually include no. of support calls , hours used etc.
Reporting types
Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
Never
Protecting data at rest
Other
Other data at rest protection approach
We do not hold or process any client data. All Client data remains in their environment, we can update on certain engagements, their data on their environment using the Microsoft tool created within their environment. However no data is processed, handled or updated without the clients advanced agreement.
Data sanitisation process
No
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
They can upload and download within their environment based on the permissions set by their own IT department. We are not custodians of the data.
Data export formats
  • CSV
  • Other
Other data export formats
Skilled users could export SharePoint data into Power BI
Data import formats
  • CSV
  • Other
Other data import formats
  • Many other formats (but preview maybe unavailable)
  • All Microsoft Formats

Data-in-transit protection

Data protection between buyer and supplier networks
Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Target resolution depending on severity is 4 hours to 10 days.
Approach to resilience
Available on request
Outage reporting
The only time this is pertinent is when there is a Microsoft outage that affects clients accessing the tools we have built the solution upon i.e. Microsoft SharePoint, Power app etc. When this happens and we are notified, either via Microsoft or a client issue we raised to Microsoft, we then send out using email alerts to all clients informing of the issue and outage details as provided to us by Microsoft. With regards to outage of our own service Casper 365, we would use the same method to contact clients that use Casper 365 to let them know.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
  • Other
Other user authentication
All users are authenticated with external trusted identity providers and we do not hold user names with passwords.
Access restrictions in management interfaces and support channels
Data is held on client environment not ours .
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
  • Other
Description of management access authentication
All users are authenticated with external trusted identity providers and we do not hold user names with passwords.

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
We follow recognised best practices such as OWASP.
Information security policies and processes
All paperwork must be cleared away at the end of each day. Paperwork containing “Personal Data” as defined in the Data Handling Policy, must be locked away securely when you are not at your desk. Any documents containing “Sensitive Data”, must be obscured from view when you are away from your desk and only authorised employees can see this. Any documents no longer required should be shredded. Shredding should be given to the Office Manager to complete. Whiteboards should not be left with information on, please take a photo to store on Office 365 and cleaned. Locking your screen whenever you are out of sight of your desk is compulsory. Employees should make sure that any Personal or Sensitive Data is obscured from view of any unauthorised employees or visitors while sat at or passing your desk. Office 365 should be used for the storage of all documentation and printed only if completely necessary. If you have keys for both doors you are a "key-holder" and are expected to respond to any emergency calls if you are the nearest available person. If you are the last key-holder to leave you must lock both the internal door and the main door.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We follow Azure CI/CD DevOps practices.
Vulnerability management type
Undisclosed
Vulnerability management approach
All potential threats are implemented using Microsoft Azure Threat Protection and threats are terminated outside our service. Our infrastructure and services are assessed by the Azure Compliance Services and are patched as soon as we receive a potential threat, and as such this is where we get our information from.
Protective monitoring type
Undisclosed
Protective monitoring approach
We rely on Microsoft Azure Security systems and respond immediately to any and all threats.
Incident management type
Undisclosed
Incident management approach
Unknown

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Equal opportunity

Equal opportunity

This statement, made under section 54(1) of the Modern Slavery Act 2015, sets out the voluntary stance taken by Business Cloud Integration Ltd regarding possible modern slavery risks associated to its business and actions undertaken to alleviate such risks during the financial year ending 31 December 2022.

Business Cloud Integration is a specialised SharePoint & Office 365 service provider specialising in helping businesses fully leverage their cloud investment using its Office 365 and SharePoint Automation Saas Platform: Casper365.

Business Cloud Integration is a Microsoft SharePoint Business Applications Charter & Content Services partner known for its expertise in SharePoint and the Power Platform.

Business Cloud Integration owns the Casper365 platform.

Business Cloud Integration Ltd is located in Cambridge, UK and employs approx. 18 people. As a consultancy, Business Cloud Integration doesn't have a long/intricate supply chain. Business Cloud Integrations supply chain consists predominantly of suppliers of cloud IT infrastructure / services, software and hardware, stationary supplies, and equipment.
Business Cloud Integration strives to meet strong ethical and professional requirements, submitting to all applicable local laws. Business Cloud Integrations Board has a zero tolerance on slavery and human trafficking and entails that Business Cloud Integrations management implements correct actions to guarantee that Business Cloud Integration and any company connected to it submits with requirements under the Modern Slavery Act 2015.
The Board has judged the possible risk posed to Business Cloud Integration by modern slavery and human trafficking and trusts the make-up of Business Cloud Integrations business (together with its attitude to high standards of governance and behaviour), not to mention it does not work in high-risk sectors or locations, means that the risk in Business Cloud Integrations business and supply chains is low. Business Cloud Integration will make sure to review its policies and procedures, ensuring they remain correct and efficient.

Pricing

Price
£4,000 an instance a quarter
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Free trial of Casper 365 - bespoke to client evaluation process

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ssumner@businesscloudintegration.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.