Skip to main content

Help us improve the Digital Marketplace - send your feedback

RE-SOLUTION DATA LTD

Cisco Meraki - Network, Security, CCTV & IoT Hosting

Cisco Meraki's Cloud Hosted Technology offers centralised management of network infrastructure via cloud-based platform, enabling remote configuration, monitoring, and troubleshooting with ease. Organisations are easily able to centrally manage and control their Switches, Firewalls, Wireless Access Points, CCTV Cameras and IoT Sensors.

Features

  • Cloud-based management: Simplifies network administration from anywhere.
  • Centralised dashboard: Offers visibility and control over network devices.
  • Scalability: Easily scales from small organisations to large enterprises.
  • Automatic updates: Ensures devices are always running the latest software.
  • Security: Robust security features, including built-in firewall and intrusion prevention.
  • Analytics: Delivers insights into network traffic and user behavior.
  • Mobility management: Enables management of mobile devices and BYOD policies.
  • Application control: Allows prioritisation and restriction of specific applications.
  • Integration: Seamlessly integrates with other Cisco products and third-party solutions.

Benefits

  • Simplified management: Reduces administrative burden with centralised control.
  • Enhanced visibility: Provides comprehensive insights into network performance.
  • Increased flexibility: Adapts to changing business needs with scalable solutions.
  • Improved security: Ensures protection against threats with advanced features.
  • Enhanced productivity: Enables efficient resource allocation and application management.
  • Cost savings: Reduces hardware and maintenance expenses.
  • Seamless connectivity: Facilitates reliable connectivity for users and devices.
  • Streamlined operations: Automates routine tasks for operational efficiency.
  • Better user experience: Ensures consistent network performance and reliability.
  • Future readiness: Supports technology evolution and innovation.

Pricing

£30 to £75 a device a month

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sales@re-solution.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

9 6 1 1 7 0 7 2 1 1 4 5 0 2 6

Contact

RE-SOLUTION DATA LTD Jacob Tranter
Telephone: 02038808369
Email: sales@re-solution.co.uk

Service scope

Service constraints
Planned updates and upgrades require downtime through authorised change control process. Cisco Meraki Dashboard access is wholly dependant on internet access. Standard faulty hardware replacement is next business day if organisations need increased SLA's up to replacement within 4 hours then this would be chargeable from onset.
System requirements
  • Internet connection: Required for cloud-based management.
  • Supported browsers: Works with modern web browsers.
  • Operating systems: Compatible with Windows, macOS, iOS, Android, and Linux.
  • Minimum bandwidth: Adequate bandwidth for device management and updates.
  • Power source: Access to power outlets for device operation.
  • Network configuration: DHCP server or static IP addresses for connectivity.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Our services come with SLAs that outline the level of service, performance, and support guaranteed by us in case of service disruptions or failures.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Remote or on-site support is chargeable on a 'per device' basis.

The baseline support for moves, adds, changes and monitoring of the devices is chargeable on a monthly basis.

The following is chargeable per device per month.

Firewall - £75.00
Switch - up to 24 ports - £30.00
Switch over 24 ports - £60.00
Camera/Access Point £30.00

On site support is chargeable at £800.00 per day in hours and £1200.00 per day out of hours.

Technical account management is included within the monthly support cost.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We typically follow a structured approach that includes the following steps:
- Understand User Requirements by gathering requirements from the users to understand their specific needs and objectives.
- Define Use Cases: This helps in designing a solution that meets the users' needs effectively.
- Create High-Level Design: That outlines the overall architecture and components of the solution.
- Create Low-Level Design: Based on the HLD we create detailed low-level design documentation that provides specific technical details and configurations required to implement the solution.
- Architecture Diagrams: Incorporate architecture diagrams into the documentation to visually represent the structure and relationships between various components of the solution such as network topology diagrams, data flow diagrams, and sequence diagrams.
- Scalability and Resilience: Ensure that the low-level design accounts for scalability and resilience requirements, such as redundancy, load balancing, failover mechanisms.
- Security Considerations: Incorporate security best practices and considerations into the solution.
- Review and Validation: Review the low-level design documentation with stakeholders to validate the design and ensure that it aligns with the users' requirements and best practices.
- Update and Maintain Documentation: Keep the documentation up-to-date with any changes or updates to the underlying infrastructure.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
Dashboard export: Users can export data directly from the Cisco Meraki dashboard, typically in CSV format, by navigating to the desired data section and selecting the export option.

Re-solution can export an organisation's / users support / request tickets and provide these in pdf / .csv format.
End-of-contract process
Handover of administration rights and access to key stakeholders at the customers organisation.

Provide available documentation that was created for organisation. e.g. High Level Designs, Low Level Designs, Export of Customer Support Request from support platform.

The off boarding service is provided free of charge for the above services.

Using the service

Web browser interface
Yes
Using the web interface
Cisco Meraki provides a web-based dashboard for managing and monitoring Meraki networking devices, such as wireless access points, switches, security appliances, and cameras. The web interface offers a wide range of features and capabilities for network administrators and users such as Device Configuration, Monitoring and Troubleshooting, Device Management, User and Device Policies, Alerts and Notifications, Location Analytics, Integration with Other Systems.

What Users Can't Do: Modify Hardware Components, Access Restricted Features, Override Security Policies. While users can configure a wide range of settings through the Meraki dashboard, some advanced configuration options may require access to the device's local configuration interface or command-line interface (CLI).

Overall, the Cisco Meraki web interface provides a powerful and intuitive platform for managing and monitoring Meraki networking devices, offering a wide range of features and capabilities for network administrators to configure, monitor, and troubleshoot their networks effectively.
Web interface accessibility standard
WCAG 2.1 AA or EN 301 549
Web interface accessibility testing
Implemented highlighted and magnification of text.
API
Yes
What users can and can't do using the API
Can retrieve network information: Access details on devices, clients, and network configurations.

Can configure network settings: Modify device configurations, policies, and settings.

Can automate tasks: Create scripts for provisioning, monitoring, and troubleshooting.

Can integrate with third-party systems: Connect Meraki data with other applications and services.

Can develop custom applications: Build applications leveraging Meraki data for specific use cases.

Can't access sensitive data: Limited access to sensitive information like user credentials.

Can't perform all management tasks: Some administrative actions may not be available via API.

Can't bypass security measures: API calls are subject to authentication and authorisation checks.

Can't modify firmware or hardware: Limited control over device firmware and hardware components.

Can't guarantee real-time updates: API responses may have latency, not suitable for real-time applications.
API automation tools
  • Ansible
  • Chef
  • SaltStack
  • Terraform
  • Puppet
  • Other
Other API automation tools
Python with Requests Library
API documentation
Yes
API documentation formats
  • HTML
  • ODF
  • PDF
  • Other
Command line interface
No

Scaling

Scaling available
Yes
Scaling type
Manual
Independence of resources
Service Level Agreements (SLAs): which outline expected response times, resolution times, and availability of support services.

Tiered Support Structure: with multiple levels of support, such as first-line, second-line, and third-line support.

Automated Ticketing and Routing: to efficiently manage and prioritise support requests.

24/7 Support Availability: to ensure that users can access assistance whenever they encounter issues, regardless of their location or time zone.

Capacity Planning and Resource Allocation: we conduct regular capacity planning exercises to forecast demand for support services and allocate resources accordingly.

Continuous Improvement: monitor support performance metrics, including response times, resolution rates, and customer satisfaction scores.
Usage notifications
Yes
Usage reporting
  • API
  • Email
  • SMS
  • Other
Other usage reporting
Webhooks can be implemented dependant on customer requirements.

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • Network
  • Other
Other metrics
  • Network Traffic
  • Bandwidth Utilisation
  • Packet Loss and Latency
  • Device Health Status
  • Connection Statistics
  • Wireless Signal Strength and Quality
  • Client Device Metrics
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Cisco & Cisco Meraki

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
  • Deleted data can’t be directly accessed
  • Hardware containing data is completely destroyed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Yes
What’s backed up
Device Configuration
Backup controls
Backups are stored across disparate data centres. No end user involvement is required.
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
  • Users can recover backups themselves, for example through a web interface
  • Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Cisco Meraki's cloud infrastructure is covered under a 99.99% SLA and the Cisco Meraki Infrastructure team manages it 24×7×365 to ensure high availability.

As an IT service provider, we understand the critical importance of ensuring high availability for our customers' systems and applications. Our commitment to availability is outlined in our service level agreements (SLAs), which are designed to provide transparency and accountability in our service delivery.

We maintain a response SLA of within 4 hours for all critical incidents.

Our SLAs may include provisions for proactive monitoring and notification of potential issues, as well as defined response times for resolving incidents and restoring service in the event of an outage. These measures help to minimise downtime and ensure that our customers' systems remain accessible and reliable.
Approach to resilience
The Meraki cloud is the backbone of the Meraki management solution. This "cloud" is a collection of highly reliable multi-tenant servers strategically distributed around the world at Meraki data centers. The servers at these data centers are powerful hosting computers comprised of many separate user accounts. They are called multi-tenant servers because the accounts share (equal) computing resources on their host (the server). However, even though these accounts share resources, Meraki ensures that customer information is kept secure by restricting organisation access based on account authentication, as well as hashing authentication information such as user passwords or API keys.
Outage reporting
Our IT managed service employs a multi-faceted approach to report any outages promptly and efficiently.

- Cisco Meraki Dashboard: We maintain a public-facing dashboard that provides real-time status updates on the availability and performance of the network services. This dashboard is accessible to all our customers allowing them to monitor the health of their IT infrastructure at any time.

https://status.meraki.net

Email Alerts: We also provide email alerts to notify customers of any outages or incidents affecting their services. These email alerts are sent directly to designated contacts or distribution lists, ensuring that relevant stakeholders are promptly informed of any disruptions to service. Email alerts typically include details such as the nature of the outage, expected resolution time, and any actions that customers may need to take.

We strive to provide comprehensive and timely reporting of outages, enabling our customers to stay informed and effectively manage their IT operations.

Identity and authentication

User authentication
  • 2-factor authentication
  • Other
Other user authentication
- Email-Based Authentication: Users are prompted to provide their email address and must click on the verification link in the email to authenticate their identity.

- Role-Based Access Control (RBAC): Once authenticated, users are granted access to the dashboard based on their assigned roles and permissions.

- Single Sign-On (SSO): Users log in to the dashboard using their corporate credentials through integration with identity providers such as Active Directory, LDAP, or SAML-based authentication.

- Two-Factor Authentication (2FA): Users must provide a second form of verification, such as a one-time passcode generated by a mobile authenticator app or sent via SMS.
Access restrictions in management interfaces and support channels
Role-Based Access Control: To restrict access to management interfaces based on user roles and permissions.

Multi-Factor Authentication: An additional security measure to protect access to management interfaces.

IP Whitelisting: To restrict access to the Meraki dashboard from specific IP addresses or ranges.

Audit Logs and Monitoring: Dashboard logs all user activities and access attempts.

Encrypted Communication Protocols: In use to secure data transmitted between users' devices and the management interfaces.

Restricted Support Channels: Cisco Meraki restricts access to its support channels, such as phone support and live chat, to authorised individuals with valid support contracts.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
  • Other
Description of management access authentication
- Email-Based Authentication: Users are prompted to provide their email address and must click on the verification link in the email to authenticate their identity. - Role-Based Access Control (RBAC): Once authenticated, users are granted access to the dashboard based on their assigned roles and permissions. - Single Sign-On (SSO): Users log in to the dashboard using their corporate credentials through integration with identity providers such as Active Directory, LDAP, or SAML-based authentication. - Two-Factor Authentication (2FA): Users must provide a second form of verification, such as a one-time passcode generated by a mobile authenticator app or sent via SMS.
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device on a government network (for example PSN)
  • Dedicated device over multiple services or networks
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
  • Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
03/08/2018
What the ISO/IEC 27001 doesn’t cover
While ISO/IEC 27001 certification provides a comprehensive framework for establishing, implementing, maintaining, and continually improving an ISMS, there are certain aspects it may not cover: Physical Security: While ISO/IEC 27001 includes requirements for physical security controls, such as access control and protection of facilities, it may not address every aspect of physical security in detail. Third-Party Security: ISO/IEC 27001 requires our company to assess and manage risks associated with third-party relationships, including suppliers, partners, and service providers. However, it may not cover every aspect of third-party security management, such as contractual agreements, service level agreements, and ongoing monitoring of third-party security practices. Emerging Threats and Technologies: Information security threats and technologies are continually evolving. While ISO/IEC 27001 provides a framework for managing information security risks, it may not address every emerging threat or technology.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
We have a comprehensive Information Security Policy that outlines our commitment to protecting sensitive information.
We maintain strict access control policies to limit access to sensitive systems and data only to authorised personnel.
We have an established Incident Response Plan that outlines the steps to be taken in the event of a security incident or breach.
We perform regular audits and assessments of our information security controls to ensure compliance with internal policies, industry standards, and regulations.

We have a dedicated Information Security Officer responsible for overseeing our information security program and ensuring compliance with relevant policies and regulations.
Employees are encouraged to report any security incidents, concerns, or policy violations to the Information Security Team or the designated incident response contact, either through internal reporting mechanisms or directly to their supervisors.

We conduct regular monitoring and review of our information security controls to ensure compliance with policies and identify any gaps or areas for improvement.
Policy violations are taken seriously, and appropriate enforcement measures are implemented to address non-compliance.
We continuously review and update our information security policies and processes to adapt to evolving threats, ensuring that our security measures remain effective and aligned with best practices.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Configuration Management:
- Asset Inventory: We maintain a comprehensive inventory of all components and assets of our services.
- Version Control: We utilise version control systems to manage changes to configuration files. This ensures that changes are tracked, documented, and easily reversible.

Change Management:
- Change Request Process: All changes are subject to a formal change request process. This process includes submitting a change request, assessing the potential impact of the proposed change, obtaining approval, and implementing the change.
- Security Impact Assessment: Proposed changes undergo a thorough security impact assessment to identify potential security risks and vulnerabilities.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
- Continuous Monitoring: We employ continuous monitoring mechanisms to detect potential threats and vulnerabilities in our systems and services.
- Threat Intelligence Feeds: We subscribe to reputable threat intelligence feeds and security advisories provided by industry organisations, government agencies, security vendors, and trusted information sharing platforms.
- Patch Management Process: We have a structured patch management process in place to deploy security patches and updates promptly across our systems and services.
- Vendor Security Advisories: We closely monitor security advisories and bulletins issued by software and hardware vendors for information about newly discovered vulnerabilities and available patches.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We employ continuous monitoring tools and technologies to collect and analyse security-relevant data from various sources, including network traffic, system logs, and user activity.
We deploy intrusion detection and prevention systems ,security information and event management solutions tools to detect known threats, zero-day exploits, malware infections, and unauthorised access attempts.

We have a documented incident response plan that outlines the steps to be taken in the event of a security incident or compromise.

We aim to respond to security incidents promptly and efficiently. Response times vary depending on the severity and are guided by predefined SLAs.
Incident management type
Supplier-defined controls
Incident management approach
We maintain pre-defined incident management processes for common events such as service outages, performance degradation, security incidents, and other disruptions to our services.

Users can report incidents through various channels, including, Service desk ticketing systems, Email, Phone.

Upon receipt of an incident report, our incident response team initiates the incident management process according to predefined procedures. Incidents are categorised and prioritised based on their severity, impact on services, and urgency of resolution.

Once an incident is resolved, we provide incident reports to affected users to summarise the details of the incident.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
No

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
Cisco's data centers adhere to the EU Code of Conduct for Energy Efficient Data Centers by prioritising energy-efficient hardware, implementing innovative cooling solutions, closely monitoring energy usage, and engaging in capacity planning. This ensures optimal performance while minimising environmental impact and reducing costs.

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

1. Carbon Neutrality:
By January 2030 Re-solution Data Ltd aims to achieve carbon neutrality by implementing measures to reduce our carbon footprint. This includes enhancing energy efficiency in our operations, investing in renewable energy sources, and offsetting any remaining emissions through verified carbon offset programs.

2. Energy Efficiency:
Reduce overall energy consumption by 30% by 2028. This will be achieved through the implementation of energy-efficient technologies, regular energy audits, and the promotion of sustainable practices across all company facilities.

3. Waste Reduction:
Decrease waste generation by 75% by 2030. We will focus on minimising single-use plastics, promoting recycling initiatives, and adopting circular economy principles to ensure responsible waste management.

4. Sustainable Procurement:
By 2030, Re-solution Data Ltd commits to sourcing a minimum of 75% of our products and services from suppliers who adhere to environmentally responsible practices. This includes selecting suppliers with sustainable sourcing, ethical labor practices, and a commitment to reducing their own environmental impact.

5. Paperless Operations:
Transition to a paperless office environment by 2027. This goal involves the digitisation of internal processes, reducing reliance on paper-based documentation, and promoting electronic communication and collaboration tools.

6. Employee Engagement:
Foster a culture of environmental sustainability among employees by providing training programs. Encourage employees to contribute ideas and actively participate in achieving our sustainability goals.

7. Continuous Improvement and Reporting:
Regularly assess and improve our environmental sustainability practices. Re-solution Data Ltd will conduct annual reviews of our progress, communicate transparently about our achievements and challenges, and seek opportunities for continuous improvement in our sustainability performance.

These goals are designed to guide Re-solution Data Ltd in its journey towards becoming a more environmentally sustainable organisation. Regular monitoring, reporting, and engagement with stakeholders will be integral to the success of these initiatives.

Covid-19 recovery

We believe our Managed Network & Security service can play a pivotal role in supporting Covid-19 recovery efforts in several ways:

- Enabling Remote Work: With the transition to remote work during the pandemic, reliable network connectivity and secure access to resources have become crucial. Employees can effectively and securely work remotely, aiding business continuity and supporting economic recovery efforts.

- Supporting Distance Learning: As educational institutions adopt online learning models, our service helps ensure that students, teachers, and administrators can securely access educational resources from any location. This supports educational continuity and helps mitigate the impact of school closures on students' academic progress.

- Enhancing Cybersecurity Resilience: The Covid-19 pandemic has led to a rise in cyber threats targeting remote workers, healthcare organisations, and critical infrastructure. Our service enhances cybersecurity resilience by implementing robust security measures, conducting threat monitoring, and providing incident response capabilities, thereby protecting against cyber attacks and disruptions to essential services.

Overall, our Managed Network & Security service plays a vital role in supporting Covid-19 recovery efforts by enabling remote work and distance learning, enhancing cybersecurity resilience, and promoting business continuity and resilience in challenging times.

Tackling economic inequality

Supporting Small and Medium Enterprises (SMEs): We offer affordable and scalable network and security solutions, enabling SMEs to compete effectively, grow their businesses, create jobs, and contribute to economic growth, thereby reducing inequality.

Enabling Remote Work and Access to Opportunities: Our robust managed network service facilitates remote work, providing access to job opportunities and educational resources across diverse backgrounds and locations, bridging the digital divide and reducing economic inequality.

Protecting Against Cyber Threats and Data Breaches: Our service safeguards against cyber threats and data breaches, protecting sensitive information and financial assets for all stakeholders, thus reducing the impact of cybercrime on economic inequality.

Enhancing Access to Critical Services: We ensure reliable network connectivity and secure access to digital services, crucial for accessing healthcare, financial services, and government resources. Our compliance with accessibility standards ensures equal access for users with disabilities, promoting economic equality.

Accommodating Diverse Workforce Needs: With user-friendly interfaces, multilingual support, and culturally sensitive security policies, we cater to diverse workforce needs, ensuring equal opportunity for all users to utilise digital resources effectively and securely.

Equal opportunity

Re-solution believes the skills, capabilities and talents of its employees are the key to its success. Re-solution is fully committed as an equal opportunities’ employer, defined by its diversity and opposition to all forms of unlawful and unfair discrimination.

Wellbeing

- Promote Work-Life Balance: Our solutions enable remote work, reducing commuting stress and allowing for more flexible work arrangements.

- Enhanced Security: Secure network infrastructure and data protection measures alleviate concerns about cyber threats, promoting peace of mind.

- Encourage Collaboration: Seamless communication tools foster teamwork and social connections, improving morale and job satisfaction.

- Enable Personal Development: Access to online learning resources and remote training opportunities supports continuous professional growth and skill development.

Pricing

Price
£30 to £75 a device a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Full trials available with all features included. There are zero restrictions on trial devices / features. Trials can be utilised for 30 days with extensions possible.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sales@re-solution.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.