Casper365
Casper365 is a unique cloud provisioning platform that completely automates your SharePoint deployments without the need for code or expensive development work. Migrate your data, Create your sites, Delegate ownership, and Govern your SharePoint and Teams solutions all in one place.
Features
- SharePoint Online Site Provisioning
- Microsoft Teams Provisioning
- SharePoint Online Migrations
- SharePoint Online Governance
- SharePoint Online Reporting
- Migrating to the cloud
Benefits
- Automated provisioning
- Governance centric
- Scheduled managed migrations
- Customisable templates
- Delegated access
- User empowering
Pricing
£4,000 an instance a quarter
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
8 2 5 3 0 9 7 6 9 4 4 8 5 0 5
Contact
Business Cloud Integration Ltd.
Sharon Sumner
Telephone: 01223772365
Email: ssumner@businesscloudintegration.co.uk
Service scope
- Software add-on or extension
- Yes
- What software services is the service an extension to
- Office 365
- Cloud deployment model
- Private cloud
- Service constraints
- Requires authorisation on organisations tenancy to use.
- System requirements
- Office 365 Subscription incl SharePoint
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Standard business hours apply (not including weekends)
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
- Direct organisation and user support through a helpdesk, tickets allocated to support agent within an hour, and allocated priority and severity. Tickets can be resolved through the helpdesk directly or via a support call with an allocated agent. All ticket priorities have internal SLA's and reports of support usage can be provided to the client each month.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide onsite or online training in addition to user documentation as and when detailed as part of scope.
- Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
-
- Microsoft PowerPoint
- Microsoft Excel
- Microsoft Word
- End-of-contract data extraction
- Their data always resides with them on their tenancy. We never hold their data - they are the custodians.
- End-of-contract process
- We offer solutions that are either priced on a time and materials basis or a fixed price. The scope varies with each client.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- Yes
- Description of customisation
- Customisable SharePoint and Microsoft Teams templates, submission forms, approvals, and data views with a built-in interface.
Scaling
- Independence of resources
- By resource planning
Analytics
- Service usage metrics
- Yes
- Metrics types
- Details on client support are provided as and when requested which will usually include no. of support calls , hours used etc.
- Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- Never
- Protecting data at rest
- Other
- Other data at rest protection approach
- We do not hold or process any client data. All Client data remains in their environment, we can update on certain engagements, their data on their environment using the Microsoft tool created within their environment. However no data is processed, handled or updated without the clients advanced agreement.
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- They can upload and download within their environment based on the permissions set by their own IT department. We are not custodians of the data.
- Data export formats
-
- CSV
- Other
- Other data export formats
- Skilled users could export SharePoint data into Power BI
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- Many other formats (but preview maybe unavailable)
- All Microsoft Formats
Data-in-transit protection
- Data protection between buyer and supplier networks
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Target resolution depending on severity is 4 hours to 10 days.
- Approach to resilience
- Available on request
- Outage reporting
- The only time this is pertinent is when there is a Microsoft outage that affects clients accessing the tools we have built the solution upon i.e. Microsoft SharePoint, Power app etc. When this happens and we are notified, either via Microsoft or a client issue we raised to Microsoft, we then send out using email alerts to all clients informing of the issue and outage details as provided to us by Microsoft. With regards to outage of our own service Casper 365, we would use the same method to contact clients that use Casper 365 to let them know.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Other
- Other user authentication
- All users are authenticated with external trusted identity providers and we do not hold user names with passwords.
- Access restrictions in management interfaces and support channels
- Data is held on client environment not ours .
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Other
- Description of management access authentication
- All users are authenticated with external trusted identity providers and we do not hold user names with passwords.
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We follow recognised best practices such as OWASP.
- Information security policies and processes
- All paperwork must be cleared away at the end of each day. Paperwork containing “Personal Data” as defined in the Data Handling Policy, must be locked away securely when you are not at your desk. Any documents containing “Sensitive Data”, must be obscured from view when you are away from your desk and only authorised employees can see this. Any documents no longer required should be shredded. Shredding should be given to the Office Manager to complete. Whiteboards should not be left with information on, please take a photo to store on Office 365 and cleaned. Locking your screen whenever you are out of sight of your desk is compulsory. Employees should make sure that any Personal or Sensitive Data is obscured from view of any unauthorised employees or visitors while sat at or passing your desk. Office 365 should be used for the storage of all documentation and printed only if completely necessary. If you have keys for both doors you are a "key-holder" and are expected to respond to any emergency calls if you are the nearest available person. If you are the last key-holder to leave you must lock both the internal door and the main door.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- We follow Azure CI/CD DevOps practices.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- All potential threats are implemented using Microsoft Azure Threat Protection and threats are terminated outside our service. Our infrastructure and services are assessed by the Azure Compliance Services and are patched as soon as we receive a potential threat, and as such this is where we get our information from.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- We rely on Microsoft Azure Security systems and respond immediately to any and all threats.
- Incident management type
- Undisclosed
- Incident management approach
- Unknown
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Equal opportunity
-
Equal opportunity
This statement, made under section 54(1) of the Modern Slavery Act 2015, sets out the voluntary stance taken by Business Cloud Integration Ltd regarding possible modern slavery risks associated to its business and actions undertaken to alleviate such risks during the financial year ending 31 December 2022.
Business Cloud Integration is a specialised SharePoint & Office 365 service provider specialising in helping businesses fully leverage their cloud investment using its Office 365 and SharePoint Automation Saas Platform: Casper365.
Business Cloud Integration is a Microsoft SharePoint Business Applications Charter & Content Services partner known for its expertise in SharePoint and the Power Platform.
Business Cloud Integration owns the Casper365 platform.
Business Cloud Integration Ltd is located in Cambridge, UK and employs approx. 18 people. As a consultancy, Business Cloud Integration doesn't have a long/intricate supply chain. Business Cloud Integrations supply chain consists predominantly of suppliers of cloud IT infrastructure / services, software and hardware, stationary supplies, and equipment.
Business Cloud Integration strives to meet strong ethical and professional requirements, submitting to all applicable local laws. Business Cloud Integrations Board has a zero tolerance on slavery and human trafficking and entails that Business Cloud Integrations management implements correct actions to guarantee that Business Cloud Integration and any company connected to it submits with requirements under the Modern Slavery Act 2015.
The Board has judged the possible risk posed to Business Cloud Integration by modern slavery and human trafficking and trusts the make-up of Business Cloud Integrations business (together with its attitude to high standards of governance and behaviour), not to mention it does not work in high-risk sectors or locations, means that the risk in Business Cloud Integrations business and supply chains is low. Business Cloud Integration will make sure to review its policies and procedures, ensuring they remain correct and efficient.
Pricing
- Price
- £4,000 an instance a quarter
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Free trial of Casper 365 - bespoke to client evaluation process