Ingentive Pro Code Software
Ingentive specialises in Microsoft Pro Code development, focusing on the comprehensive utilisation of Microsoft Power Platform. Our service empowers users to create custom applications in-house, leveraging pro-code tools to address business challenges.
With our guidance, organisations can harness the capabilities of Microsoft Pro Code to build scalable, enterprise-grade solutions.
Features
- Optimisation Workshop: Maximise potential through interactive workshops.
- Business Analysis: Identify solutions tailored to your challenges.
- Tool Integration: Seamless integration into your systems.
- Application Development: Build custom apps.
- Automated Processes: Streamline workflows with automation.
- Technology Awareness: Stay updated on evolving trends.
- Project Evaluation: Assess project benefits.
- Digital Evolution : Navigate the digital transformation path.
- Productivity Enhancement: Boost productivity with advanced features.
- Continuous Learning: Stay informed with ongoing education and updates.
Benefits
- Cutting-edge Awareness: Stay updated on leading pro-code features.
- Tool Understanding: Enhance knowledge of pro-code tools.
- Proficiency Boost: Advance understanding and implementation.
- Staff Empowerment: Independently build pro-code solutions
- Developer Efficiency: Improve efficiency through adoption.
- Cost Reduction: Streamline cost savings development
- Swift Prototyping: Rapidly prototype and iterate new ideas
- Scalable Solutions: Create scalable applications to meet business growth.
- Agile Responsiveness: Quickly adapt to market changes.
- Competitive Advantage: Gain edge with innovative solutions.
Pricing
£2.36 a licence
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 7 7 9 2 5 4 8 9 6 0 7 6 4 1
Contact
INGENTIVE LIMITED
Hemraj Tatur
Telephone: 02081323255
Email: hemraj.tatur@ingentive.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Microsoft has a wide 3rd party ecosystems allowing organisation to integrate and develop and reduce duplication, improve accuracy of information and provide features that currently are not provided within the existing modules.
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- The services and features covered by this module are subject to appropriate licences being in place and as such represent what is possible, rather than something that is necessarily available to everyone immediately.
- System requirements
-
- Internet
- User access to learning/training providers
- Microsoft licenses
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
-
Ingentive can offer a flexible support service (Flexi, Plexi Plus and Complete). These have different features but all have an response SLA of:
- Major: 1hour
- Intermediate: 4hours
- Minor: 8hours - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
-
Microsoft assesses products using three accessibility standards:
Web Content Accessibility Guidelines (WCAG) are internationally adopted technical standards for making web content accessible. Each guideline has testable success criteria. Microsoft assesses products and services against WCAG levels A and AA criteria. The WCAG are developed and maintained by the Worldwide Web Consortium (W3C), an international organisation for the development of web standards.
US Section 508 guidelines were developed by the US Access Board for use by federal agencies in implementing Section 508 of the US Rehabilitation Act. Federal agencies use the Section 508 guidelines to develop, procure, maintain, and use accessible Information and Communication Technology (ICT). The guidelines contain scoping and technical considerations to facilitate accessibility for individuals with disabilities.
ETSI EN 301 549 is a European-developed accessibility standard for ICT products and services developed by the European Standards organisations CEN (European Committee for Standardization), CENELEC (European Committee for Electrotechnical Standardization), and ETSI (European Telecommunications Standards Institute). The standard contains accessibility criteria for ICT products and services and incorporates the WCAG standards for web accessibility. The standard was originally developed for purposes of public procurement in the European Union and is also referenced by jurisdictions outside of Europe. - Onsite support
- Yes, at extra cost
- Support levels
-
Ingentive offers a range of flexible support services, including Flexi, Plexi Plus, and Complete, each with distinct features tailored to meet varying needs.
Across all service tiers, our commitment to responsiveness is reflected in our response SLAs: For major inquiries, we guarantee a response time of 1 hour. For intermediate inquiries, our response time is set at 4 hours.
These SLAs ensure that regardless of the support tier chosen, our customer can expect timely and efficient responses to their questions and concerns. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Users of this service require a license for each Microsoft module that they require access to. This is performed within the Microsoft 365 platform by a Global Admin. Once allocated the appropriate license they will have access to each module.
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
-
There is no Microsoft provided mechanism to extract data held within the Microsoft tenant. A 3rd party tool would be the recommended approach to extract any data stored.
If a paid subscription ends or is terminated, Microsoft retains customer data stored in Microsoft tenant in a limited-function account for 90 days to enable the subscriber to extract the data.
After the 90-day retention period ends, Microsoft disables the account and deletes the customer data. No more than 180 days after expiration or termination, disabling the account and deletes all customer data from the account.
Once the maximum retention period for any data has elapsed, the data is rendered commercially unrecoverable. - End-of-contract process
-
Cancelling a Microsoft subscription is performed via the Microsoft 365 admin console within the platform. If this relates to removing one or all of the Microsoft licenses for one or more users, then these users will no longer have access to that service with immediate effect.
The data will remain if the organisation still has licences, but should all licenses be cancelled then all data will expire.
If you are a partner who's an admin on behalf of (AOBO) a customer, and cancelled a subscription, it can take up to 90 days for the admin center to reflect the status change.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Other
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
Interface: The user interface of the mobile service is optimised for smaller screens.
Feature Set: While both versions offer similar core functionality, there is some limitations of certain features.
Navigation: Patterns may differ between the mobile and desktop versions to accommodate the respective form factors.
Performance: Certain operations, such as data loading and rendering may vary.
Customisation: Depending on the platform and device, the level of customisation options available to users may differ.
Offline Access: Desktop versions may offer more robust offline access.
Integration: While both versions support integration, there may be differences in the integration capabilities and connectors. - Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- No
- Customisation available
- Yes
- Description of customisation
-
Users can customise our service extensively to meet their specific needs:
What can be customised:
User interface: Adjust layouts, themes, and colour schemes. Workflows: Create custom workflows to automate tasks. Permissions: Define user roles and access levels.
Integrations: Add or remove third-party app integrations.
Notifications: Configure alerts and notifications based on preferences. Dashboards: Personalise dashboards with widgets and data displays. Reports: Customise report templates and data visualisations. Templates: Create and modify templates for documents, emails, and tasks.
How users can customise: Users can access customisation options through the service's settings menu or administration panel. They can use drag-and-drop interfaces, configuration wizards, and form-based editors to make adjustments. Some customisations may require administrative privileges.
Who can customise: Customisation privileges can be assigned to designated administrators or users with appropriate permissions. Administrators have full access to customisation features, while standard users may have limited options based on their assigned roles and permissions.
Scaling
- Independence of resources
-
Microsoft is delivered via the Microsoft 365 platform that provides the necessary performance and availability to meet any organisations needs.
The data centers that houses the Microsoft 365 instances is continuously monitored to ensure no loss or degradation of service.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Our service metrics for software licensing prioritise transparent insights into license usage and consumption, aiding organisations in optimising costs and ensuring compliance. We offer detailed usage reports, consumption monitoring, and compliance management tools to track usage against entitlements, identify optimisation opportunities, and support strategic planning. Our customizable reporting and continuous monitoring services ensure ongoing optimisation, empowering organisations to maximise the value derived from their software investments while minimising unnecessary expenditures.
- Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Microsoft
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
-
Depending upon which module will affect the approach and export capabilities.
All Microsoft modules provide a dashboard detailing usage of each module. - Data export formats
- ODF
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- IPsec or TLS VPN gateway
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Microsoft prioritises availability, ensuring uninterrupted access to its services. Here’s how it achieves this:
Service Health and Continuity:
- Admins can monitor service status and scheduled maintenance.
- Service health provides real-time updates on disruptions and outages.
- Planned maintenance is communicated in advance through the Message Center.
- Unplanned downtime notifications address unexpected service unavailability .
Recent Worldwide Uptime:
- Microsoft maintains transparency. Recent uptime data (excluding U.S.
- Government DoD and GCC High) shows:
> 2023: 99.98% (Q1), 99.99% (Q2), 99.99% (Q3), 99.996% (Q4).
> 2022: 99.98% (Q1-Q3), 99.99% (Q4).
> 2021: 99.97% (Q1), 99.98% (Q2-Q4) .
Notification Policy:
- Timely communication during service incidents is crucial.
- Microsoft aims for accuracy and transparency in notifications
In summary, Microsoft maintains high availability, empowering users with reliable and secure services. - Approach to resilience
-
Microsoft's approach to resilience is multi-faceted and involves several layers of protection to ensure the availability and reliability of the service. Some of the key measures include:
- Datacenter redundancy: Microsoft has multiple datacenters in different regions, ensuring that if one datacenter experiences an outage, the service can failover to another datacenter with minimal disruption.
- Network resilience: Microsoft's network infrastructure is designed to be highly resilient, with multiple redundant paths and automatic failover mechanisms.
- Data backup and recovery: Microsoft has robust data backup and recovery processes in place to ensure that customer data is protected and can be restored in the event of a disaster.
- Monitoring and incident response: Microsoft continuously monitors the service for any issues and has a dedicated incident response team to quickly address and resolve any problems that arise.
Overall, Microsoft's approach resilience is focused on providing a highly available and reliable service to its customers. - Outage reporting
-
Microsoft reports on outages through the Service Health Dashboard and the Microsoft Admin Center.
These tools provide real-time information on the status of the service, including any current or recent outages. Administrators can view the details of the outage, including the cause, impact, and estimated time of resolution.
Microsoft also provides regular updates on the progress of resolving the issue. Additionally, Microsoft may send email notifications to administrators to alert them of any service disruptions.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
-
Microsoft have a number of different administrative roles pre-defined to help organisation ensure that the right people have access to monitor, manage and configure the products and services available.
These can be extended and adapted for each organisation based upon their individual needs. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- ISO/IEC 27001
- Information security policies and processes
-
Microsoft follows a wide range of information security policies and processes to protect its customers' data and ensure the security of its products and services. Some of these include:
- Risk management: Microsoft has a comprehensive risk management program that identifies, assesses, and mitigates potential security risks.
- Compliance: Microsoft complies with various industry standards and regulations, such as ISO 27001, SOC 2, and GDPR.
- Data protection: Microsoft uses encryption, access controls, and other security measures to protect customer data.
- Incident response: Microsoft has a dedicated security response team that handles security incidents and works to prevent future occurrences.
- Employee training: Microsoft provides regular security training to its employees to ensure they are aware of the latest threats and best practices for protecting customer data.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Microsoft changes are released to both services and clients, referred to as Microsoft Apps.
Services and clients have different release choices and deployment controls, so it's important to understand the differences as you implement your release management strategy.
Types of changes for Microsoft services and clients
Changes can be planned or unplanned, depending on the nature of the changes.
For example, security updates aren't always planned, because they're reactions to emergent risks or issues. Depending on the type of change, the communication channel might also vary. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Microsoft online services use machine state scanning to make sure the machines comprising our infrastructure are up to date with the latest patches and that their base configurations correctly align with relevant frameworks.
Machine state scanning uses patching, anti-malware, vulnerability scanning, and configuration scanning (PAVC). Microsoft online services apply effective PAVC by installing a custom security agent on each asset during deployment. This security agent enables machine state scanning and reports results to our service teams. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Microsoft uses outside-in monitoring, which involves creating synthetic transactions to test everything that is important. For example, in Exchange Online each scenario is testing every database worldwide every five minutes in a scattered fashion, providing near continuous coverage of everything that lives in the system.
From multiple locations, 250 million test transactions per day are performed to create a robust baseline or heartbeat for the service. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Microsoft online services security teams and service teams take the same approach to security incidents, which is based on the NIST 800-61:
Preparation: Organisational preparation that is needed to be able to respond, including tools, processes, competencies, and readiness.
Detection & analysis: Activity to detect a security incident in the environment and to analyse all events to confirm the authenticity of the security incident.
Containment-eradication-recovery: Required and appropriate actions taken to contain the security incident based on the analysis.
Post-incident activity: Post-mortem analysis performed after the recovery of a security incident.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- Public Services Network (PSN)
- Police National Network (PNN)
- NHS Network (N3)
- Joint Academic Network (JANET)
- Scottish Wide Area Network (SWAN)
- Health and Social Care Network (HSCN)
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Ingentive is committed to delivering services sustainably, supported by our annually updated environmental policy, dynamic roadmap of environmental initiatives, and a scorecard. Under the leadership of Ingentive’s CFO, our Greening Committee (GC) drives environmental & sustainability initiatives with set targets. The GC includes representation from every department, ensuring innovation and participation across the organisation through annual member rotations. The GC meets quarterly & sets the agenda for driving environmental policy improvements. Market research responsibility revolves through GC members and feedback on environmental impacts and benefits form part of the quarterly agenda and are presented back to the GC for further action and consideration.
Aligned with Microsoft’s commitment, Ingentive provides services focused on being carbon-negative, water-positive, and zero waste by 2030, in line with the government's 25-year plan objectives. Our research efforts encompass:
Clean Air: Researching technologies like virtualisation and cloud computing to promote clean air & aligning with Microsoft’s air quality policies.
Clean and Plentiful Water: Researching water-efficient data centre design, recycling & engaging with Microsoft stakeholders on water-related challenges in IT services.
Reducing Risks of Harm: Analysing environmental hazards in IT operations such as electronic waste, hazardous components & pollution.
Using Resources Sustainably: Investigating resource-efficient IT infrastructure technologies, collaborating with suppliers & partners to optimise IT services lifecycle.
Mitigating Climate Change: Researching climate mitigation strategies like carbon offsetting and renewable energy adoption & collaborating with Microsoft to deploy climate-resilient IT solutions.
Minimising Waste: Researching waste minimisation services & sustainable product design & partnering with waste & recycling facilities for optimised waste recovery & disposal processes.Tackling economic inequality
At Ingentive, we're deeply committed to tackling economic inequality and promoting social equity. We recognise that economic disparities disproportionately affect marginalised groups. To drive positive change, we're taking proactive steps through various initiatives:
Diversity and Inclusion: Prioritising diversity in hiring, procurement, and vendor selection.
Equal Pay and Benefits: Ensuring fair compensation and benefits for all employees.
Supplier Diversity: Supporting minority-owned and women-owned businesses.
Community Investments: Investing in community development and workforce training.
Mentorship and Skills Development: Offering mentorship programs and skills workshops.
Advocacy and Policy Engagement: Advocating for equitable policies and initiatives.
Community Partnerships: Collaborating with non-profits agencies.
Transparency and Accountability: Maintaining transparency in our efforts.
Through these initiatives, we're working towards a more inclusive and prosperous future for all.Equal opportunity
At Ingentive, we are dedicated to fostering an inclusive and diverse work environment. We believe in equal opportunity employment practices, where decisions regarding hiring, promotion, discipline, or dismissal are made solely on the basis of merit, competence, performance, and business needs. We actively promote diversity and do not discriminate against individuals based on race, colour, religion, marital status, age, national origin, ancestry, physical or mental disability, medical condition, pregnancy, genetic information, gender, sexual orientation, gender identity or expression, or any other legally protected status.
Our commitment extends beyond our own organisation to our supply chain partners. We ensure that all organisations within our supply chain share our values and principles of equal opportunity employment.
Through collaboration and engagement, we work with our partners to uphold these standards and create a culture of inclusivity across all aspects of our business operations.Wellbeing
At Ingentive, we prioritise the health and wellbeing of our employees. We believe that fostering a supportive and nurturing work environment is essential for individual and collective success.
Our commitment to employee wellbeing includes:
Comprehensive Health Benefits: We provide robust health insurance coverage, including medical and dental plans, to ensure that our employees have access to quality healthcare services.
Mental Health Support: We offer resources and programs to support mental health, including counselling services, employee assistance programs, and mindfulness workshops.
Work-Life Balance: We promote work-life balance by offering flexible work arrangements and remote work options.
Ergonomic Workspaces: We prioritise ergonomic design in our workspaces to promote comfort and reduce the risk of injury or strain.
Employee Assistance: We provide access to confidential support services for employees facing personal or professional challenges.
Training and Development: We invest in employee training and development programs to enhance skills, promote career growth, and foster a sense of fulfilment and accomplishment.
Recognition and Appreciation: We recognise and celebrate the contributions of our employees through various recognition programs, rewards, and incentives.
Open Communication: We maintain open and transparent communication channels to encourage feedback, address concerns, and foster a culture of trust and collaboration.
Community Engagement: We encourage employees to participate in community service and volunteer activities to give back to society and promote social connectedness.
Through these initiatives, we strive to create a workplace where every employee feels valued, supported, and empowered to thrive personally and professionally.
Pricing
- Price
- £2.36 a licence
- Discount for educational organisations
- Yes
- Free trial available
- No