Skip to main content

Help us improve the Digital Marketplace - send your feedback

Workspace-IT

Citrix Cloud - Proof of Concept

Workspace IT offers an easy, fully managed way to discover how Citrix can benefit your environment.

Features

  • Remote Access
  • Remote Applications
  • Access from Anywhere, any device
  • Secure
  • Hybrid Cloud
  • Virtual Desktops (VDI)
  • Teams Optimization
  • Web-based administration
  • Desktop as a Service

Benefits

  • Access systems securely from anywhere
  • Provision resources to meet demand
  • No data leaves internal servers
  • Secure multi-factor access
  • Consistent experience in and out of the office

Pricing

£3,000.00 to £10,000.00 a unit

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at dan.ogilvie@workspace-it.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

8 8 3 5 0 9 3 9 5 9 8 9 8 7 6

Contact

Workspace-IT Dan Ogilvie
Telephone: 01184320017
Email: dan.ogilvie@workspace-it.com

Service scope

Service constraints
None
System requirements
  • 1 x Windows Server (2 vCPU, 8Gb RAM)
  • 1 x Windows Server (8 vCPU, 32Gb RAM)

User support

Email or online ticketing support
Email or online ticketing
Support response times
Same day (or quicker) during UK office hours
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Chat will connect you to the next available technician
Web chat accessibility testing
N/a
Onsite support
Yes, at extra cost
Support levels
Full support is offered for the duration of the Proof of Concept. Ongoing support post-implementation is discussed on an individual. Standard support is provided during UK office hours.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
The Citrix Cloud PoC is fully managed, Workspace IT will drive the tenant provisioning and access for relevant users.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
No user or customer data is stored during the Proof of Concept
End-of-contract process
At the end of the Proof of Concept the trial Citrix tenant will expire and all accounts used to access it will no longer work.
The internal infrastructure will be left in place for decommissioning, or can be decommissioned (deleted) by Workspace IT no extra cost assuming sufficient permissions are available.

Using the service

Web browser interface
Yes
Using the web interface
Citrix Cloud (DaaS) has a full web-based management platform.
Web interface accessibility standard
None or don’t know
How the web interface is accessible
https://citrix.cloud.com
Web interface accessibility testing
Citrix is committed to making technology accessible to everyone. We are currently engaged in high-priority initiatives to design and engineer products with a focus on improved usability and accessibility for all customers, with or without a disability. Citrix is committed to supporting well known accessibility standards including Section 508 compliance and WCAG 2.0.
API
No
Command line interface
No

Scaling

Scaling available
Yes
Scaling type
Automatic
Independence of resources
The platform uses auto-scale technology to expand as demand increases
Usage notifications
Yes
Usage reporting
Email

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • Memory
  • Network
  • Number of active instances
Reporting types
Real-time dashboards

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Microsoft, Citrix, IGEL

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Other
Other data at rest protection approach
N/a the service does not touch client data
Data sanitisation process
No
Equipment disposal approach
In-house destruction process

Backup and recovery

Backup and recovery
No

Data-in-transit protection

Data protection between buyer and supplier networks
Other
Other protection between networks
N/a - no access between the customers network and our network is required
Data protection within supplier network
Other
Other protection within supplier network
N/a - our network is not required for the service

Availability and resilience

Guaranteed availability
https://docs.citrix.com/en-us/citrix-cloud/overview/service-level-agreement.html
Approach to resilience
https://docs.citrix.com/en-us/citrix-cloud/overview/service-level-agreement.html
Outage reporting
https://status.cloud.com/

Identity and authentication

User authentication
2-factor authentication
Access restrictions in management interfaces and support channels
Citrix Cloud services fully supports two-factor authentication.
Access restriction testing frequency
At least every 6 months
Management access authentication
2-factor authentication
Devices users manage the service through
Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Workspace IT take security, integrity and compliance very seriously. We have several customers whose business operates in a secure environment and are used to complying with the strictest of rules. We are happy to adhere to standards or compliancy stipulations that the client requires.
All of Workspace IT consultants are UK based and qualified to work in the UK.

All Workspace IT employees and contractors are checked at the commencement of their employment against BPSS to verify their identity, employment history, right to work and criminal record.
Information security policies and processes
Workspace IT take security, integrity and compliance very seriously. We have defined internal policies for information and data security which are available on request.
Note - this service does not require access to any customer data.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Workspace IT has templates for change management for all the processes required for the service. These are applied to the clients own change management systems and processes.
Vulnerability management type
Undisclosed
Vulnerability management approach
We are not a security company, however we are very aware of our place in identify threat and taking action. Workspace IT constantly monitors a number of security feed from organizations such as CISA.
Protective monitoring type
Undisclosed
Protective monitoring approach
- monitor news feeds for security incidents e.g. CISA
- Regularly update Windows and key applications
- Critical vulnerabilities are assessed the same day and fix or patch issued for deployment as quickly as is practical
Incident management type
Undisclosed
Incident management approach
We have an online reporting tool via our website. Customers are provided a monthly report detailing incidents logged.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
No

Energy efficiency

Energy-efficient datacentres
No

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

Workspace IT are proud signatories to Techie Go Green - https://www.techiesgogreen.com/. The environmental impact of IT is at the heart of every piece of work that we undertake and we will always engage with our customers to try an reduce the impact of IT transformation on the environment.

Pricing

Price
£3,000.00 to £10,000.00 a unit
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at dan.ogilvie@workspace-it.com. Tell them what format you need. It will help if you say what assistive technology you use.