Workspace-IT
Citrix Cloud - Proof of Concept
Workspace IT offers an easy, fully managed way to discover how Citrix can benefit your environment.
Features
- Remote Access
- Remote Applications
- Access from Anywhere, any device
- Secure
- Hybrid Cloud
- Virtual Desktops (VDI)
- Teams Optimization
- Web-based administration
- Desktop as a Service
Benefits
- Access systems securely from anywhere
- Provision resources to meet demand
- No data leaves internal servers
- Secure multi-factor access
- Consistent experience in and out of the office
Pricing
£3,000.00 to £10,000.00 a unit
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at dan.ogilvie@workspace-it.com.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
8 8 3 5 0 9 3 9 5 9 8 9 8 7 6
Contact
Workspace-IT
Dan Ogilvie
Telephone: 01184320017
Email: dan.ogilvie@workspace-it.com
Service scope
- Service constraints
- None
- System requirements
-
- 1 x Windows Server (2 vCPU, 8Gb RAM)
- 1 x Windows Server (8 vCPU, 32Gb RAM)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Same day (or quicker) during UK office hours
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Chat will connect you to the next available technician
- Web chat accessibility testing
- N/a
- Onsite support
- Yes, at extra cost
- Support levels
- Full support is offered for the duration of the Proof of Concept. Ongoing support post-implementation is discussed on an individual. Standard support is provided during UK office hours.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- The Citrix Cloud PoC is fully managed, Workspace IT will drive the tenant provisioning and access for relevant users.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- No user or customer data is stored during the Proof of Concept
- End-of-contract process
-
At the end of the Proof of Concept the trial Citrix tenant will expire and all accounts used to access it will no longer work.
The internal infrastructure will be left in place for decommissioning, or can be decommissioned (deleted) by Workspace IT no extra cost assuming sufficient permissions are available.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Citrix Cloud (DaaS) has a full web-based management platform.
- Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- https://citrix.cloud.com
- Web interface accessibility testing
- Citrix is committed to making technology accessible to everyone. We are currently engaged in high-priority initiatives to design and engineer products with a focus on improved usability and accessibility for all customers, with or without a disability. Citrix is committed to supporting well known accessibility standards including Section 508 compliance and WCAG 2.0.
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- The platform uses auto-scale technology to expand as demand increases
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- Memory
- Network
- Number of active instances
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Microsoft, Citrix, IGEL
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Other
- Other data at rest protection approach
- N/a the service does not touch client data
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Backup and recovery
- Backup and recovery
- No
Data-in-transit protection
- Data protection between buyer and supplier networks
- Other
- Other protection between networks
- N/a - no access between the customers network and our network is required
- Data protection within supplier network
- Other
- Other protection within supplier network
- N/a - our network is not required for the service
Availability and resilience
- Guaranteed availability
- https://docs.citrix.com/en-us/citrix-cloud/overview/service-level-agreement.html
- Approach to resilience
- https://docs.citrix.com/en-us/citrix-cloud/overview/service-level-agreement.html
- Outage reporting
- https://status.cloud.com/
Identity and authentication
- User authentication
- 2-factor authentication
- Access restrictions in management interfaces and support channels
- Citrix Cloud services fully supports two-factor authentication.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- 2-factor authentication
- Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
Workspace IT take security, integrity and compliance very seriously. We have several customers whose business operates in a secure environment and are used to complying with the strictest of rules. We are happy to adhere to standards or compliancy stipulations that the client requires.
All of Workspace IT consultants are UK based and qualified to work in the UK.
All Workspace IT employees and contractors are checked at the commencement of their employment against BPSS to verify their identity, employment history, right to work and criminal record. - Information security policies and processes
-
Workspace IT take security, integrity and compliance very seriously. We have defined internal policies for information and data security which are available on request.
Note - this service does not require access to any customer data.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Workspace IT has templates for change management for all the processes required for the service. These are applied to the clients own change management systems and processes.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- We are not a security company, however we are very aware of our place in identify threat and taking action. Workspace IT constantly monitors a number of security feed from organizations such as CISA.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
-
- monitor news feeds for security incidents e.g. CISA
- Regularly update Windows and key applications
- Critical vulnerabilities are assessed the same day and fix or patch issued for deployment as quickly as is practical - Incident management type
- Undisclosed
- Incident management approach
- We have an online reporting tool via our website. Customers are provided a monthly report detailing incidents logged.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Workspace IT are proud signatories to Techie Go Green - https://www.techiesgogreen.com/. The environmental impact of IT is at the heart of every piece of work that we undertake and we will always engage with our customers to try an reduce the impact of IT transformation on the environment.
Pricing
- Price
- £3,000.00 to £10,000.00 a unit
- Discount for educational organisations
- No
- Free trial available
- No
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at dan.ogilvie@workspace-it.com.
Tell them what format you need. It will help if you say what assistive technology you use.