Microsoft Power Platform Implementation Services including Dynamics 365
The Application Development Teams work in squads to develop next generation cloud-based applications. Specialising in integration with PaaS services, the team develop responsive and feature rich applications that utilise the best technologies the cloud has to offer. Including PowerApps, PowerPlatform supporting the common data platform Dynamics 365
Features
- Business solution development using PowerApps, PowerBI, PowerAutomate, CDS, Teams, SharePoint
- Desktop, browser and mobile applications from the same source
- Integration, Dedicated Team of Engineers, Architects, Testers, Product Managers
- IT skill up and co-development based on best practice.
- Power User development support
- PowerApps, Common Data Platform, Sales, Customer Services and Management
- Pragmatic advice: licensing, technology selection, consulting
- Options from knowledge transfer to hands-on development, enhancement, troubleshooting
- Rapid innovation, development and deployment;
- MVP (minimally viable product) delivery for Proof of Concept testing
Benefits
- Enables your existing data, content and processes
- Engage staff with useful applications that meet daily needs
- Deliver quick business benefit using Agile delivery methodology
- Enables the paperless office
- Transformational applications delivered on mobile and desktop
- Quickly create and deploy point solutions in days
- Extend and mobilise your business using no code/low code approaches.
- Automate processes easily, improving business efficiency
- Access to best practice, proven adoption approaches
- Deliver smaller-scale projects without diverting IT resources
Pricing
£980 a person
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
8 5 9 3 2 9 4 2 0 3 9 4 7 4 9
Contact
WR LOGIC LIMITED
Navneet Rojas
Telephone: 07414221313
Email: contact@wrlogic.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- No Specific constraints depending on architect agreed with customer.
- System requirements
-
- Microsoft Office 365 licences
- A platform capable of hosting Microsoft services
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Our support arrangements are tailored to your specific needs, as our experience shows that no 'one-size' fits all requirements. We will discuss services, service levels, response times, communication channels and reporting to agree your requirements specifically for the managed services you wish to procure.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- We would be pleased to discuss any requirements you may have and provide a service that meets those requirements.
- Onsite support
- Yes, at extra cost
- Support levels
- 24x7 Remote Support Standard SLA's can be negotiated and agreed Level 1 - Level 4 Engineer available Certified Microsoft and AWS Engineers Security Clearance up to DV Our Managed Service offering is driven by your requirements rather than a standard service catalogue, this allows you to tailor the right level of support for your needs. Our service can include the following: 1 Hour Response; Portal Setup; OS patching; 24 x 7 Proactive Monitoring; AV Management; 30 Day Managed Backup; Application Monitoring; Custom Restores; Service Management; Direct Access to 3rd Line Support; Problem Management; Service Levels and Service Credits; and Advanced Infrastructure Management.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide training options as standard as part of the offering for operations and end-users of the system
- Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
- Microsoft Word
- End-of-contract data extraction
- All data remains the property of the customer. WR do not create any bespoke data containers so data can be extracted using a variety of industry standard solutions or WR can offer services to perform migrations to a new system.
- End-of-contract process
- At the end of the contract, the customer owns all of the contracted deliverables. Any WR IP that is separately licenced reverts to WR and must cease to be used. WR licenced IP in the PowerApps space is used to accelerate on-going development for customer teams. The remaining products will continue to operate without this IP.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- No feature differences. Layouts will auto adapt dependent on screen configuration.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- Yes
- What users can and can't do using the API
- Standard Microsoft API's.
- API documentation
- No
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- The services are customisation services.
Scaling
- Independence of resources
- We deliver our off-premise services via the Microsoft Cloud (Azure/O365).
Analytics
- Service usage metrics
- Yes
- Metrics types
- Metrics will be provided via PowerApps Admin Analytics tools.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Data is kept in standard data formats and can be extracted at any time by the customer using standard Microsoft or other products.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- SQL Backpacks
- Other Database Export Formats
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- SQL Backpacks
- Other Database Formats
Data-in-transit protection
- Data protection between buyer and supplier networks
- Other
- Other protection between networks
- Customer own responsibility for the network all the way to the Microsoft Cloud.
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
There are no WR specific SLA's since all the services reside on customer infrastructure or the Customers Azure environment.
http://www.microsoftvolumelicensing.com/Downloader.aspx?DocumentId=13655 - Approach to resilience
- http://aka.ms/Office365DR
- Outage reporting
- Via the Service status portal.
Identity and authentication
- User authentication needed
- No
- Access restrictions in management interfaces and support channels
- We supply permissions based on the customers active directory.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
Our Services are delivered within the customer or Microsoft environments and we follow and comply with customer and Microsoft security policies.
FISMA/FedRamp, EU Model Clauses, HIPAA/HITECH, ISB 1596, ISO 27018, SASE16 SOC1 & SOC 2 - Information security policies and processes
-
Our Services are delivered within the customer or Microsoft environments and we follow and comply with customer and Microsoft security policies.
FISMA/FedRamp, EU Model Clauses, HIPAA/HITECH, ISB 1596, ISO 27018, SASE16 SOC1 & SOC 2
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Once created the environment is managed by the customer and WR do not apply any changes other than those requested by customer following their change control procedures.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- This runs in the Microsoft environment, the office 365 and Azure vulnerability management approach applies.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- This runs in the Microsoft environment O365 and Azure, these processes are applied.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Please see http://aka.ms/Office365SIM
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
WR Logic adopts a policy of "work from anywhere" with its employees. Remote work contributes to reducing emissions.
We also adopt a paperless approach and all our processes are handled digitally. This reduces our impact on forests, decreases the amount of waste that is dumped into landfills, cuts energy use and helps lessen the impact of climate change
Pricing
- Price
- £980 a person
- Discount for educational organisations
- Yes
- Free trial available
- No