Power Platform Consultancy
Our Power Platform Consultancy service offers expert guidance and tailored solutions, leveraging the Microsoft Power Platform. Specialising in Power Apps, Robotic Process Automation, Power BI Reporting, intergrated AI and Microsoft Teams, we empower businesses across industries. From analysis to development and training, we ensure seamless integration, efficiency, and sustained success.
Features
- Power Platform Development
- Power Apps Development
- Robotic Process Automation (RPA)
- Business Analytics (Power BI)
- Model Driven Applications
- Canvas Applications
- Artificial Intelligence Features
- SQL Server data storage
- Dataverse data storage
- Full life cycle support and engagement
Benefits
- Cost savings
- Efficiency building
- Rapid Solution Development
- Scalable solutions
- Integration solutions
- Unified platform
Pricing
£1,000 to £80,000 a unit a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 5 0 5 7 2 9 0 6 2 4 8 6 3 4
Contact
DIGPACKS LTD
Bill Irvine
Telephone: 0203 576 0089
Email: admin@digpacks.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- Our service seamlessly integrates with the robust Microsoft Power Platform and Office 365. However, it's essential to note that in the rare event of Microsoft services experiencing downtime, any solutions built on our platform may also be temporarily affected. We continuously strive to minimise disruptions and ensure optimal performance for our users.
- System requirements
-
- Office 365
- Power Platform Licensing (Power Apps, Power Automate, RPA)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Depending on support, we have various SLA's in operation.
Typically all questions are responded to within 2 business hours. - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Our support structures are intricately tailored to the unique needs of each solution. Following a T-shirt-sized approach, our support contracts are custom-fitted according to the complexity and scale of the delivered solution. The depth of support provided aligns seamlessly with the specific requirements and levels of assistance required.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- As a Microsoft Power Platform service provider, our approach to engagements begins with a thorough understanding of your requirements. We delve into the specific challenges you're facing, presenting high-level solutions leveraging the capabilities of the Power Platform. Our estimation process employs a user-friendly t-shirt sizing method, offering a clear assessment of the effort required for implementing the proposed solutions. This approach provides a reliable estimate of the associated costs for delivering these solutions. Once an agreement is reached, we formally kickstart the project, which may encompass activities such as process mapping (both current and future states), drafting a comprehensive statement of work, handling development tasks, providing ongoing support, and producing detailed documentation. This is typically performed via Microsoft Teams.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- As our service operates within the Power Platform, it's important to note that we, as a supplier, don't retain any customer data within DigPacks. Our solutions seamlessly transition by being exported and imported into our customers' Power Platform tenants. Consequently, when the contract with DigPacks concludes, there is no requirement for a specific data extraction process.
- End-of-contract process
- Given the unique nature of each requirement, our comprehensive statement of work meticulously outlines the specific in-scope and out-of-scope items. Recognising the diversity of customer needs, we tailor our approach to accommodate individual requirements.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Layouts differ from Desktop device to Mobile device - all functionality exists in both Desktop and Mobile.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AAA
- API
- Yes
- What users can and can't do using the API
- Every solution we craft is meticulously constructed on the foundation of the Microsoft Power Platform. As a result, the underlying service is equipped with a versatile API, providing you with seamless accessibility. This API, commonly accessible via Microsoft Power Platform API's (Graph, etc)
- API documentation
- No
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- Solutions we build are on the Microsoft Power Platform. We work with organisations to understand their requirements and build an appropriate solution.
Scaling
- Independence of resources
- As DigPacks doesn't host any services, each deployment of our solution takes place within the customer's Power Platform environment. Consequently, the solution remains exclusively accessible to the customer.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- Never
- Protecting data at rest
- Other
- Other data at rest protection approach
- All environments of the Dataverse database use SQL Server Transparent Data Encryption (TDE) to perform real-time encryption of data when written to disk, also known as encryption at rest. By default, Microsoft stores and manages the database encryption keys for all environments
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- As our service operates within the Power Platform, it's important to note that we, as a supplier, don't retain any customer data within DigPacks. Our solutions seamlessly transition by being exported and imported into our customers' Power Platform tenants. As a result there is no specific data extraction process.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- Other
- Other protection between networks
- N/A. Our expertise lies in crafting solutions within the Microsoft Power Platform. All our solutions are deployed directly to the customer's environment, ensuring that the solution seamlessly integrates within the confines of their network.
- Data protection within supplier network
- Other
- Other protection within supplier network
- N/A. Our expertise lies in crafting solutions within the Microsoft Power Platform. All our solutions are deployed directly to the customer's environment, ensuring that the solution seamlessly integrates within the confines of their network.
Availability and resilience
- Guaranteed availability
- Service Level Agreements are customarily established in collaboration with the customer, with our core operating hours set from 8 am to 6 pm, Monday to Friday, excluding Public Holidays. For specific needs, we can provide extended support, tailored and addressed on a case-by-case basis.
- Approach to resilience
-
Power Platform stores customer data in the tenant's assigned Azure geography, or home geo, except where organisations deploy services in multiple regions.
In this case, only metadata related to the environment is stored in the home geo. All metadata and product data in that environment is stored in the remote geo.
Microsoft may replicate data to other regions for data resiliency. We don't replicate or move personal data outside the geo, however. Data replicated to other regions may include non-personal data such as employee authentication information. - Outage reporting
- A public dashboard - Microsoft Power Platform Health Checker, email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
- Access restrictions in management interfaces and support channels
- Access to management interfaces and support channels is restricted through stringent measures. Authentication mechanisms, including multi-factor authentication, are enforced for personnel accessing these interfaces. Role-based access controls limit privileges, ensuring only authorized individuals can perform specific actions. Additionally, secure communication protocols, such as encrypted connections, are employed to protect data during interactions with management interfaces and support channels. Regular audits and reviews of access logs help monitor and track usage, promptly identifying any anomalies or unauthorized access attempts. This layered approach ensures a robust restriction of access, safeguarding sensitive systems and data.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- In addressing security governance, our approach is comprehensive and meticulous. We prioritise the establishment and enforcement of robust security measures throughout our operations. This involves implementing industry-leading practices to safeguard sensitive information and ensure the integrity of our systems. Our security governance framework encompasses regular risk assessments, continuous monitoring, and proactive threat detection.
- Information security policies and processes
-
We adhere to a comprehensive set of information security policies and processes to ensure the confidentiality, integrity, and availability of data. Some key aspects of our information security framework include:
1. **Access Controls:**
2. **Data Encryption:**
3. **Regular Risk Assessments:**
4. **Continuous Monitoring:**
5. **Incident Response:**
6. **Security Awareness Training:**
7. **Vendor Management:**
8. **Compliance:**
10. **Security Audits:**
11. **Collaboration with Clients:**
These policies and processes collectively form a robust information security framework, reflecting our commitment to maintaining a secure environment for both our internal operations and our clients' data.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- We utilise an internal change management Power App designed for the seamless initiation and evaluation of change requests. This application undergoes a bi-weekly review during the Change Advisory Board (CAB) meetings, where decisions of approval or rejection are made. The app meticulously outlines the necessary steps for change implementation, including comprehensive details on back-out plans, supported by relevant information. Following the implementation, the system is promptly updated to accurately reflect the actual outcomes of the change, ensuring a thorough and transparent change management process.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- We systematically assess potential threats through regular risk assessments and vulnerability scans. Swift patch deployment is a priority, with rigorous testing in a controlled environment before live implementation. We stay informed through security advisories, threat intelligence feeds, and industry forums. Continuous improvement is integral to our process, ensuring a resilient and secure service environment.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- We proactively identify potential compromises through continuous behavioural analytics and real-time monitoring. Clear response protocols guide our dedicated incident response team to swiftly investigate and mitigate incidents. Our commitment ensures a rapid and coordinated approach, prioritising the security of our systems.
- Incident management type
- Undisclosed
- Incident management approach
- Our incident management includes pre-defined processes for common events. Users report incidents through our dedicated reporting system. Following resolution, we provide detailed incident reports, outlining the event, actions taken, and preventive measures.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Covid-19 recoveryCovid-19 recovery
As an organisation deeply committed to social value, we actively contribute to the NHS Solutions store, providing all NHS Trusts and Local Government organisations access to purpose-built Power Apps for the greater benefit of the NHS. Amidst the challenges posed by COVID, we collaborated with Microsoft and NHS England to develop and enhance an asset booking application. This freely available application supports a phased return to work, allowing users to upload floorplans and seamlessly book assets like meeting rooms, desks, showers, and cars. Our commitment extends beyond the NHS, offering this valuable tool to all organisations for efficient workplace allocation.
Pricing
- Price
- £1,000 to £80,000 a unit a year
- Discount for educational organisations
- No
- Free trial available
- No