Ingentive Microsoft Modern Work
Ingentive specialises in supporting organisations in modernising their work processes, fostering enhanced collaboration and communication. Our extensive experience enables us to assist clients in structuring digital workspaces and integrations to optimise functionality.
Additionally, we offer customised training sessions to ensure employees fully utilise available tools and maximise productivity
Features
- Collaboration Hubs: Tailored digital spaces for seamless teamwork.
- Workflow Automation: Streamlining tasks through automated processes.
- Integrated Communication: Real-time messaging, file sharing, and video conferencing.
- Document Management: Centralised storage and easy file access.
- Bespoke Training: Customised programmes to empower employees.
- Security Measures: Robust protection and compliance with regulations.
- Remote Work Solutions: Supporting remote teams with secure access&tools.
- Analytics Insights: Tracking usage patterns and productivity metrics.
- Mobile Compatibility: Accessing tools across devices and platforms.
- Ongoing Support: Continuous optimisation and troubleshooting assistance.
Benefits
- Improved Teamwork: Seamless collaboration across departments.
- Boosted Efficiency: Automated tasks save time.
- Effective Communication: Real-time messaging and file sharing.
- Centralised Access: Easy retrieval of documents.
- Empowered Staff: Training enhances productivity.
- Heightened Security: Protecting sensitive data.
- Remote Work Support: Secure access from anywhere.
- Insightful Analytics: Data-driven decision-making.
- Flexible Mobility: Accessible on various devices.
- Continuous Support: Ongoing optimisation and troubleshooting assistance.
Pricing
£0.00 a licence
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 8 1 7 6 6 1 7 5 2 6 9 5 3 9
Contact
INGENTIVE LIMITED
Hemraj Tatur
Telephone: 02081323255
Email: hemraj.tatur@ingentive.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
-
Our service seamlessly integrates with third-party software within the Microsoft Modern Work ecosystem, enhancing productivity and collaboration. For example, we integrate with Salesforce and Slack, streamlining data access and communication within Microsoft 365.
Our tools provide in-depth analytics for informed decision-making, maximising organisational efficiency. - Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
-
While our service is primarily focused on Microsoft products, we also collaborate with customers to address specific integration needs or compatibility issues. However, it's essential to discuss such requirements during the onboarding process for alignment & feasibility. We operate within predefined hours.
While we strive to provide timely assistance, urgent or critical issues may be addressed outside of these hours as part of our premium offerings.
Furthermore, it's worth noting that while we aim to resolve issues promptly, certain complex or unique challenges may require additional investigation. In such cases, we maintain transparent communication channels for informed progress and timelines. - System requirements
-
- Compatible with Microsoft 365 subscription for full functionality.
- Windows 10 or later operating system for desktop compatibility.
- MacOS 10.14 or later for Apple device compatibility.
- Android 6.0 or later for mobile device compatibility.
- IOS 12.0 or later for iPhone and iPad compatibility.
- Internet connection for cloud-based services and updates.
- Microsoft Defender Antivirus recommended for security.
- Regular updates for feature enhancements and bug fixes.
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
-
Ingentive can offer a flexible support service (Flexi, Plexi Plus and Complete). These have different features but all have an response SLA of:
- Major: 1hour
- Intermediate: 4hours
- Minor: 8hours - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
-
Microsoft assesses products using three accessibility standards:
Web Content Accessibility Guidelines (WCAG) are internationally adopted technical standards for making web content accessible. Each guideline has testable success criteria. Microsoft assesses products and services against WCAG levels A and AA criteria. The WCAG are developed and maintained by the Worldwide Web Consortium (W3C), an international organisation for the development of web standards.
US Section 508 guidelines were developed by the US Access Board for use by federal agencies in implementing Section 508 of the US Rehabilitation Act. Federal agencies use the Section 508 guidelines to develop, procure, maintain, and use accessible Information and Communication Technology (ICT). The guidelines contain scoping and technical considerations to facilitate accessibility for individuals with disabilities.
ETSI EN 301 549 is a European-developed accessibility standard for ICT products and services developed by the European Standards organisations CEN (European Committee for Standardization), CENELEC (European Committee for Electrotechnical Standardization), and ETSI (European Telecommunications Standards Institute). The standard contains accessibility criteria for ICT products and services and incorporates the WCAG standards for web accessibility. The standard was originally developed for purposes of public procurement in the European Union and is also referenced by jurisdictions outside of Europe. - Onsite support
- Yes, at extra cost
- Support levels
-
At Ingentive, we offer three support levels to suit different needs and budgets:
Basic Support:
- Essential support services, including general inquiries and basic troubleshooting.
Premium Support:
- Priority response times, extended support hours, and dedicated support agents.
Enterprise Support:
- Tailored for complex needs with personalised support from a technical account manager or cloud support engineer. At Premium and Enterprise levels, clients can work with a dedicated technical expert for personalised guidance and proactive assistance - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
At Ingentive, we provide comprehensive support to ensure users can seamlessly start using our service:
In-Person Training: Tailored training sessions conducted at your location for hands-on learning.
Online Training: Interactive webinars and tutorials accessible remotely for convenient learning.
User Documentation: Extensive guides, manuals, and FAQs available online for self-paced learning.
Video Tutorials: Step-by-step video guides covering various features and functionalities.
Help Desk Support: Responsive support team available via email, chat, or phone for real-time assistance.
Onboarding Assistance: Dedicated onboarding specialists to guide users through initial setup and configuration.
Knowledge Base: Accessible repository of articles and troubleshooting resources for quick reference.
Community Forums: Online forums where users can connect, share experiences, and seek advice from peers.
Regular Updates: Continuous improvement through software updates and feature enhancements.
Customer Success Manager: Assigned manager to ensure successful implementation and user adoption. - Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
-
At the end of the contract, users can easily extract their data through the following process:
Data Export Tool: Ingentive provides a built-in data export tool within the platform, adhering to Microsoft's standard data export protocols.
Custom Data Extraction: Users can specify data parameters and format preferences for extraction, ensuring compatibility with Microsoft's data standards.
Secure Download: Once configured, users can securely download their data directly from the platform, meeting Microsoft's security requirements.
Data Formats: Data can be exported in commonly used formats such as CSV, Excel, or PDF, aligning with Microsoft's data compatibility standards.
API Integration: Advanced users can utilise our API for automated data extraction and integration with other systems, leveraging Microsoft's API guidelines.
Data Retention Policy: Ingentive ensures compliance with data protection regulations by offering options for data deletion or archival upon contract termination, following Microsoft's data retention best practices.
Support Assistance: Our support team is available to guide users through the data extraction process and address any queries or concerns, adhering to Microsoft's support standards.
Data Transfer Assistance: Ingentive can provide assistance in transferring extracted data to the user's preferred storage or destination, ensuring compliance with Microsoft's data transfer guidelines. - End-of-contract process
-
At the end of the contract, the following steps occur:
Data Extraction: Users can extract their data using Ingentive's export tools, ensuring a smooth transition.
Contract Review: Both parties review the contract terms and discuss renewal options or termination procedures.
Termination Procedures: If the contract is not renewed, access to the platform is terminated, and data handling procedures, including deletion or archival, are implemented as per agreement.
Support Continuity: Ingentive continues to provide support during the transition period to assist with data extraction and any related queries.
Included in the contract price:
Full access to the Ingentive platform, including all features and updates during the contract period.
Standard support services, including assistance with setup, troubleshooting, and basic user training.
Data storage and security features as outlined in the agreement.
Additional costs may include:
Customisation or integration services beyond the scope of the standard offering.
Advanced support packages for priority assistance or extended support hours.
Data migration services if transferring data from another platform.
Premium features or add-ons not included in the standard package.
All additional costs are communicated and agreed upon before implementation, ensuring transparency and budgetary control for users.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Other
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
Interface: The user interface of the mobile service is optimised for smaller screens.
Feature Set: While both versions offer similar core functionality, there is some limitations of certain features.
Navigation: Patterns may differ between the mobile and desktop versions to accommodate the respective form factors.
Performance: Certain operations, such as data loading and rendering may vary.
Customisation: Depending on the platform and device, the level of customisation options available to users may differ.
Offline Access: Desktop versions may offer more robust offline access.
Integration: While both versions support integration, there may be differences in the integration capabilities and connectors. - Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- No
- Customisation available
- Yes
- Description of customisation
-
Users can customise our service extensively to meet their specific needs:
What can be customised:
User interface: Adjust layouts, themes, and colour schemes.
Workflows: Create custom workflows to automate tasks.
Permissions: Define user roles and access levels.
Integrations: Add or remove third-party app integrations.
Notifications: Configure alerts and notifications based on preferences.
Dashboards: Personalise dashboards with widgets and data displays.
Reports: Customise report templates and data visualisations.
Templates: Create and modify templates for documents, emails, and tasks.
How users can customise:
Users can access customisation options through the service's settings menu or administration panel. They can use drag-and-drop interfaces, configuration wizards, and form-based editors to make adjustments. Some customisations may require administrative privileges.
Who can customise:
Customisation privileges can be assigned to designated administrators or users with appropriate permissions. Administrators have full access to customisation features, while standard users may have limited options based on their assigned roles and permissions.
Scaling
- Independence of resources
-
We ensure resource independence by:
Scalable Infrastructure: Dynamic resource allocation based on demand.
Resource Isolation: Preventing one user's activity from impacting others.
Load Balancing: Evenly distributing traffic to maintain performance.
Monitoring: Constantly monitoring and adjusting resources.
SLAs: Service level agreements guaranteeing performance standards.
Redundancy: Backup systems to mitigate potential failures.
Throttling: Regulating resource usage during peak periods.
Priority Access: Offering dedicated resources for critical workloads.
Optimisation: Regularly improving resource allocation efficiency.
Transparency: Providing visibility into resource usage for users.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
We provide comprehensive service metrics including:
Usage Statistics: Track platform usage, user activity, and engagement metrics.
Performance Monitoring: Monitor uptime, response times, and system performance.
Data Security: Measure compliance with data protection standards and security protocols.
Customer Satisfaction: Gather feedback through surveys and evaluate satisfaction levels.
Support Response Time: Measure the speed and effectiveness of support responses.
Feature Adoption: Track the adoption rates of new features and updates.
Availability: Monitor platform availability and downtime occurrences.
Customised Reporting: Generate custom reports tailored to specific metrics and requirements.
SLA Compliance: Measure adherence to service level agreements (SLAs) for uptime and support. - Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Microsoft
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
-
Users export data seamlessly via:
In-Platform Tools: Access intuitive export features.
Customisable Parameters: Define date range, format, and categories.
Export Formats: Choose CSV, Excel, or PDF for compatibility.
Secure Download: Retrieve data securely from the platform.
Scheduled Export: Automate exports for convenience.
API Integration: Integrate with external systems effortlessly.
Support: Get assistance from our support team as needed. - Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- IPsec or TLS VPN gateway
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Microsoft 365 prioritises availability, ensuring uninterrupted access to its services. Here’s how it achieves this:
Service Health and Continuity:
- Admins can monitor service status and scheduled maintenance.
- Service health provides real-time updates on disruptions and outages.
- Planned maintenance is communicated in advance through the Message Center.
- Unplanned downtime notifications address unexpected service unavailability .
Recent Worldwide Uptime:
- Microsoft maintains transparency. Recent uptime data (excluding U.S.
- Government DoD and GCC High) shows:
> 2023: 99.98% (Q1), 99.99% (Q2), 99.99% (Q3), 99.996% (Q4).
> 2022: 99.98% (Q1-Q3), 99.99% (Q4).
> 2021: 99.97% (Q1), 99.98% (Q2-Q4) .
Notification Policy:
- Timely communication during service incidents is crucial.
- Microsoft aims for accuracy and transparency in notifications
In summary, Microsoft 365 maintains high availability, empowering users with reliable and secure services. - Approach to resilience
-
Microsoft's approach to M365 resilience is multi-faceted and involves several layers of protection to ensure the availability and reliability of the service. Some of the key measures include:
- Datacenter redundancy: Microsoft has multiple datacenters in different regions, ensuring that if one datacenter experiences an outage, the service can failover to another datacenter with minimal disruption.
- Network resilience: Microsoft's network infrastructure is designed to be highly resilient, with multiple redundant paths and automatic failover mechanisms.
- Data backup and recovery: Microsoft has robust data backup and recovery processes in place to ensure that customer data is protected and can be restored in the event of a disaster.
- Monitoring and incident response: Microsoft continuously monitors the M365 service for any issues and has a dedicated incident response team to quickly address and resolve any problems that arise.
Overall, Microsoft's approach to M365 resilience is focused on providing a highly available and reliable service to its customers. - Outage reporting
-
Microsoft reports on Microsoft 365 outages through the Service Health Dashboard and the Microsoft 365 Admin Center.
These tools provide real-time information on the status of the service, including any current or recent outages. Administrators can view the details of the outage, including the cause, impact, and estimated time of resolution.
Microsoft also provides regular updates on the progress of resolving the issue. Additionally, Microsoft may send email notifications to administrators to alert them of any service disruptions.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
-
To restrict access in management interfaces and support channels, Microsoft employs:
Role-Based Access Control (RBAC): Administrators assign roles and permissions based on user responsibilities.
Multi-Factor Authentication (MFA): Extra verification layers prevent unauthorised access.
Conditional Access Policies: Control access based on conditions like location or device compliance.
Audit Logging: Tracks and reviews access events for security.
Restricted Admin Mode: Limits access to essential administrative tasks.
Encryption and Data Protection: Secures data transmission and sensitive information storage.
These measures ensure restricted access to management interfaces and support channels, enhancing security and protecting sensitive information - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- ISO/IEC 27001
- Information security policies and processes
-
Microsoft follows a wide range of information security policies and processes to protect its customers' data and ensure the security of its products and services. Some of these include:
- Risk management: Microsoft has a comprehensive risk management program that identifies, assesses, and mitigates potential security risks.
- Compliance: Microsoft complies with various industry standards and regulations, such as ISO 27001, SOC 2, and GDPR.
- Data protection: Microsoft uses encryption, access controls, and other security measures to protect customer data.
- Incident response: Microsoft has a dedicated security response team that handles security incidents and works to prevent future occurrences.
- Employee training: Microsoft provides regular security training to its employees to ensure they are aware of the latest threats and best practices for protecting customer data.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Lifecycle Tracking: We meticulously track each component's lifecycle within Microsoft, ensuring accurate records from deployment to retirement.
Security Impact Assessment: Proposed changes undergo a thorough assessment for security impact, evaluating scope, vulnerabilities, and risks specific to Microsoft's environment.
Release Strategy: Modern Work considers various options, assessing changes' impact on availability, performance, and security. This includes stakeholder coordination and testing tailored to features and functionalities.
Communication Channels: Planned changes are communicated via formal channels such as service notifications and release notes. Unplanned changes, particularly security updates, receive immediate communication through emergency notifications to keep users informed. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Microsoft online services use machine state scanning to make sure the machines comprising our infrastructure are up to date with the latest patches and that their base configurations correctly align with relevant frameworks.
Machine state scanning uses patching, anti-malware, vulnerability scanning, and configuration scanning (PAVC). Microsoft online services apply effective PAVC by installing a custom security agent on each asset during deployment. This security agent enables machine state scanning and reports results to our service teams. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Protective Monitoring Processes for Microsoft:
Identification of Potential Compromises: We employ monitoring tools to detect abnormal behaviour or security anomalies.
Response to Potential Compromises: Our incident response team initiates immediate investigation and containment procedures, followed by remediation measures.
Incident Response Time: We prioritise rapid response to security incidents within minutes of detection, ensuring data integrity and user confidence.
Our protective monitoring ensures the security and reliability, providing users with a trusted environment - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Microsoft online services security teams and service teams take the same approach to security incidents, which is based on the NIST 800-61:
Preparation: Organisational preparation that is needed to be able to respond, including tools, processes, competencies, and readiness.
Detection & analysis: Activity to detect a security incident in the environment and to analyse all events to confirm the authenticity of the security incident.
Containment-eradication-recovery: Required and appropriate actions taken to contain the security incident based on the analysis.
Post-incident activity: Post-mortem analysis performed after the recovery of a security incident.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- Public Services Network (PSN)
- Police National Network (PNN)
- NHS Network (N3)
- Joint Academic Network (JANET)
- Scottish Wide Area Network (SWAN)
- Health and Social Care Network (HSCN)
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Ingentive is committed to delivering services sustainably, supported by our annually updated environmental policy, dynamic roadmap of environmental initiatives, and a scorecard.
Under the leadership of Ingentive’s CFO, our Greening Committee (GC) drives environmental & sustainability initiatives with set targets. The GC includes representation from every department, ensuring innovation and participation across the organisation through annual member rotations. The GC meets quarterly & sets the agenda for driving environmental policy improvements. Market research responsibility revolves through GC members and feedback on environmental impacts and benefits form part of the quarterly agenda and are presented back to the GC for further action and consideration.
Aligned with Microsoft’s commitment, Ingentive provides services focused on being carbon-negative, water-positive, and zero waste by 2030, in line with the government's 25-year plan objectives. Our research efforts encompass:
Clean Air: Researching technologies like virtualisation and cloud computing to promote clean air & aligning with Microsoft’s air quality policies.
Clean and Plentiful Water: Researching water-efficient data centre design, recycling & engaging with Microsoft stakeholders on water-related challenges in IT services.
Reducing Risks of Harm: Analysing environmental hazards in IT operations such as electronic waste, hazardous components & pollution.
Using Resources Sustainably: Investigating resource-efficient IT infrastructure technologies, collaborating with suppliers & partners to optimise IT services lifecycle.
Mitigating Climate Change: Researching climate mitigation strategies like carbon offsetting and renewable energy adoption & collaborating with Microsoft to deploy climate-resilient IT solutions.
Minimising Waste: Researching waste minimisation services & sustainable product design & partnering with waste & recycling facilities for optimised waste recovery & disposal processes.Tackling economic inequality
At Ingentive, we're deeply committed to tackling economic inequality and promoting social equity. We recognise that economic disparities disproportionately affect marginalised groups. To drive positive change, we're taking proactive steps through various initiatives:
Diversity and Inclusion: Prioritising diversity in hiring, procurement, and vendor selection.
Equal Pay and Benefits: Ensuring fair compensation and benefits for all employees.
Supplier Diversity: Supporting minority-owned and women-owned businesses.
Community Investments: Investing in community development and workforce training.
Mentorship and Skills Development: Offering mentorship programs and skills workshops.
Advocacy and Policy Engagement: Advocating for equitable policies and initiatives.
Community Partnerships: Collaborating with non-profits agencies.
Transparency and Accountability: Maintaining transparency in our efforts.
Through these initiatives, we're working towards a more inclusive and prosperous future for all.Equal opportunity
At Ingentive, we are dedicated to fostering an inclusive and diverse work environment. We believe in equal opportunity employment practices, where decisions regarding hiring, promotion, discipline, or dismissal are made solely on the basis of merit, competence, performance, and business needs. We actively promote diversity and do not discriminate against individuals based on race, colour, religion, marital status, age, national origin, ancestry, physical or mental disability, medical condition, pregnancy, genetic information, gender, sexual orientation, gender identity or expression, or any other legally protected status.
Our commitment extends beyond our own organisation to our supply chain partners. We ensure that all organisations within our supply chain share our values and principles of equal opportunity employment.
Through collaboration and engagement, we work with our partners to uphold these standards and create a culture of inclusivity across all aspects of our business operations.Wellbeing
At Ingentive, we prioritise the health and wellbeing of our employees. We believe that fostering a supportive and nurturing work environment is essential for individual and collective success.
Our commitment to employee wellbeing includes:
Comprehensive Health Benefits: We provide robust health insurance coverage, including medical and dental plans, to ensure that our employees have access to quality healthcare services.
Mental Health Support: We offer resources and programs to support mental health, including counselling services, employee assistance programs, and mindfulness workshops.
Work-Life Balance: We promote work-life balance by offering flexible work arrangements and remote work options.
Ergonomic Workspaces: We prioritise ergonomic design in our workspaces to promote comfort and reduce the risk of injury or strain.
Employee Assistance: We provide access to confidential support services for employees facing personal or professional challenges.
Training and Development: We invest in employee training and development programs to enhance skills, promote career growth, and foster a sense of fulfilment and accomplishment.
Recognition and Appreciation: We recognise and celebrate the contributions of our employees through various recognition programs, rewards, and incentives.
Open Communication: We maintain open and transparent communication channels to encourage feedback, address concerns, and foster a culture of trust and collaboration.
Community Engagement: We encourage employees to participate in community service and volunteer activities to give back to society and promote social connectedness.
Through these initiatives, we strive to create a workplace where every employee feels valued, supported, and empowered to thrive personally and professionally.
Pricing
- Price
- £0.00 a licence
- Discount for educational organisations
- Yes
- Free trial available
- No