Skip to main content

Help us improve the Digital Marketplace - send your feedback

INGENTIVE LIMITED

Ingentive Pro Code Software

Ingentive specialises in Microsoft Pro Code development, focusing on the comprehensive utilisation of Microsoft Power Platform. Our service empowers users to create custom applications in-house, leveraging pro-code tools to address business challenges.

With our guidance, organisations can harness the capabilities of Microsoft Pro Code to build scalable, enterprise-grade solutions.

Features

  • Optimisation Workshop: Maximise potential through interactive workshops.
  • Business Analysis: Identify solutions tailored to your challenges.
  • Tool Integration: Seamless integration into your systems.
  • Application Development: Build custom apps.
  • Automated Processes: Streamline workflows with automation.
  • Technology Awareness: Stay updated on evolving trends.
  • Project Evaluation: Assess project benefits.
  • Digital Evolution : Navigate the digital transformation path.
  • Productivity Enhancement: Boost productivity with advanced features.
  • Continuous Learning: Stay informed with ongoing education and updates.

Benefits

  • Cutting-edge Awareness: Stay updated on leading pro-code features.
  • Tool Understanding: Enhance knowledge of pro-code tools.
  • Proficiency Boost: Advance understanding and implementation.
  • Staff Empowerment: Independently build pro-code solutions
  • Developer Efficiency: Improve efficiency through adoption.
  • Cost Reduction: Streamline cost savings development
  • Swift Prototyping: Rapidly prototype and iterate new ideas
  • Scalable Solutions: Create scalable applications to meet business growth.
  • Agile Responsiveness: Quickly adapt to market changes.
  • Competitive Advantage: Gain edge with innovative solutions.

Pricing

£2.36 a licence

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at hemraj.tatur@ingentive.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

9 7 7 9 2 5 4 8 9 6 0 7 6 4 1

Contact

INGENTIVE LIMITED Hemraj Tatur
Telephone: 02081323255
Email: hemraj.tatur@ingentive.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Microsoft has a wide 3rd party ecosystems allowing organisation to integrate and develop and reduce duplication, improve accuracy of information and provide features that currently are not provided within the existing modules.
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
The services and features covered by this module are subject to appropriate licences being in place and as such represent what is possible, rather than something that is necessarily available to everyone immediately.
System requirements
  • Internet
  • User access to learning/training providers
  • Microsoft licenses

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Ingentive can offer a flexible support service (Flexi, Plexi Plus and Complete). These have different features but all have an response SLA of:
- Major: 1hour
- Intermediate: 4hours
- Minor: 8hours
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), 7 days a week
Web chat support
Yes, at an extra cost
Web chat support availability
9 to 5 (UK time), 7 days a week
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
Microsoft assesses products using three accessibility standards:

Web Content Accessibility Guidelines (WCAG) are internationally adopted technical standards for making web content accessible. Each guideline has testable success criteria. Microsoft assesses products and services against WCAG levels A and AA criteria. The WCAG are developed and maintained by the Worldwide Web Consortium (W3C), an international organisation for the development of web standards.

US Section 508 guidelines were developed by the US Access Board for use by federal agencies in implementing Section 508 of the US Rehabilitation Act. Federal agencies use the Section 508 guidelines to develop, procure, maintain, and use accessible Information and Communication Technology (ICT). The guidelines contain scoping and technical considerations to facilitate accessibility for individuals with disabilities.

ETSI EN 301 549 is a European-developed accessibility standard for ICT products and services developed by the European Standards organisations CEN (European Committee for Standardization), CENELEC (European Committee for Electrotechnical Standardization), and ETSI (European Telecommunications Standards Institute). The standard contains accessibility criteria for ICT products and services and incorporates the WCAG standards for web accessibility. The standard was originally developed for purposes of public procurement in the European Union and is also referenced by jurisdictions outside of Europe.
Onsite support
Yes, at extra cost
Support levels
Ingentive offers a range of flexible support services, including Flexi, Plexi Plus, and Complete, each with distinct features tailored to meet varying needs.

Across all service tiers, our commitment to responsiveness is reflected in our response SLAs: For major inquiries, we guarantee a response time of 1 hour. For intermediate inquiries, our response time is set at 4 hours.

These SLAs ensure that regardless of the support tier chosen, our customer can expect timely and efficient responses to their questions and concerns.
Support available to third parties
No

Onboarding and offboarding

Getting started
Users of this service require a license for each Microsoft module that they require access to. This is performed within the Microsoft 365 platform by a Global Admin. Once allocated the appropriate license they will have access to each module.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
There is no Microsoft provided mechanism to extract data held within the Microsoft tenant. A 3rd party tool would be the recommended approach to extract any data stored.

If a paid subscription ends or is terminated, Microsoft retains customer data stored in Microsoft tenant in a limited-function account for 90 days to enable the subscriber to extract the data.

After the 90-day retention period ends, Microsoft disables the account and deletes the customer data. No more than 180 days after expiration or termination, disabling the account and deletes all customer data from the account.

Once the maximum retention period for any data has elapsed, the data is rendered commercially unrecoverable.
End-of-contract process
Cancelling a Microsoft subscription is performed via the Microsoft 365 admin console within the platform. If this relates to removing one or all of the Microsoft licenses for one or more users, then these users will no longer have access to that service with immediate effect.

The data will remain if the organisation still has licences, but should all licenses be cancelled then all data will expire.

If you are a partner who's an admin on behalf of (AOBO) a customer, and cancelled a subscription, it can take up to 90 days for the admin center to reflect the status change.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
  • Other
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Interface: The user interface of the mobile service is optimised for smaller screens.

Feature Set: While both versions offer similar core functionality, there is some limitations of certain features.

Navigation: Patterns may differ between the mobile and desktop versions to accommodate the respective form factors.

Performance: Certain operations, such as data loading and rendering may vary.

Customisation: Depending on the platform and device, the level of customisation options available to users may differ.

Offline Access: Desktop versions may offer more robust offline access.

Integration: While both versions support integration, there may be differences in the integration capabilities and connectors.
Service interface
No
User support accessibility
WCAG 2.1 AA or EN 301 549
API
No
Customisation available
Yes
Description of customisation
Users can customise our service extensively to meet their specific needs:
What can be customised:
User interface: Adjust layouts, themes, and colour schemes. Workflows: Create custom workflows to automate tasks. Permissions: Define user roles and access levels.
Integrations: Add or remove third-party app integrations.
Notifications: Configure alerts and notifications based on preferences. Dashboards: Personalise dashboards with widgets and data displays. Reports: Customise report templates and data visualisations. Templates: Create and modify templates for documents, emails, and tasks.

How users can customise: Users can access customisation options through the service's settings menu or administration panel. They can use drag-and-drop interfaces, configuration wizards, and form-based editors to make adjustments. Some customisations may require administrative privileges.

Who can customise: Customisation privileges can be assigned to designated administrators or users with appropriate permissions. Administrators have full access to customisation features, while standard users may have limited options based on their assigned roles and permissions.

Scaling

Independence of resources
Microsoft is delivered via the Microsoft 365 platform that provides the necessary performance and availability to meet any organisations needs.

The data centers that houses the Microsoft 365 instances is continuously monitored to ensure no loss or degradation of service.

Analytics

Service usage metrics
Yes
Metrics types
Our service metrics for software licensing prioritise transparent insights into license usage and consumption, aiding organisations in optimising costs and ensuring compliance. We offer detailed usage reports, consumption monitoring, and compliance management tools to track usage against entitlements, identify optimisation opportunities, and support strategic planning. Our customizable reporting and continuous monitoring services ensure ongoing optimisation, empowering organisations to maximise the value derived from their software investments while minimising unnecessary expenditures.
Reporting types
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Microsoft

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Depending upon which module will affect the approach and export capabilities.

All Microsoft modules provide a dashboard detailing usage of each module.
Data export formats
ODF
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
IPsec or TLS VPN gateway
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Microsoft prioritises availability, ensuring uninterrupted access to its services. Here’s how it achieves this:

Service Health and Continuity:
- Admins can monitor service status and scheduled maintenance.
- Service health provides real-time updates on disruptions and outages.
- Planned maintenance is communicated in advance through the Message Center.
- Unplanned downtime notifications address unexpected service unavailability .

Recent Worldwide Uptime:
- Microsoft maintains transparency. Recent uptime data (excluding U.S.
- Government DoD and GCC High) shows:
> 2023: 99.98% (Q1), 99.99% (Q2), 99.99% (Q3), 99.996% (Q4).
> 2022: 99.98% (Q1-Q3), 99.99% (Q4).
> 2021: 99.97% (Q1), 99.98% (Q2-Q4) .

Notification Policy:
- Timely communication during service incidents is crucial.
- Microsoft aims for accuracy and transparency in notifications

In summary, Microsoft maintains high availability, empowering users with reliable and secure services.
Approach to resilience
Microsoft's approach to resilience is multi-faceted and involves several layers of protection to ensure the availability and reliability of the service. Some of the key measures include:

- Datacenter redundancy: Microsoft has multiple datacenters in different regions, ensuring that if one datacenter experiences an outage, the service can failover to another datacenter with minimal disruption.

- Network resilience: Microsoft's network infrastructure is designed to be highly resilient, with multiple redundant paths and automatic failover mechanisms.

- Data backup and recovery: Microsoft has robust data backup and recovery processes in place to ensure that customer data is protected and can be restored in the event of a disaster.

- Monitoring and incident response: Microsoft continuously monitors the service for any issues and has a dedicated incident response team to quickly address and resolve any problems that arise.
Overall, Microsoft's approach resilience is focused on providing a highly available and reliable service to its customers.
Outage reporting
Microsoft reports on outages through the Service Health Dashboard and the Microsoft Admin Center.

These tools provide real-time information on the status of the service, including any current or recent outages. Administrators can view the details of the outage, including the cause, impact, and estimated time of resolution.

Microsoft also provides regular updates on the progress of resolving the issue. Additionally, Microsoft may send email notifications to administrators to alert them of any service disruptions.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Microsoft have a number of different administrative roles pre-defined to help organisation ensure that the right people have access to monitor, manage and configure the products and services available.

These can be extended and adapted for each organisation based upon their individual needs.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
Between 6 months and 12 months
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • CSA CCM version 3.0
  • ISO/IEC 27001
Information security policies and processes
Microsoft follows a wide range of information security policies and processes to protect its customers' data and ensure the security of its products and services. Some of these include:

- Risk management: Microsoft has a comprehensive risk management program that identifies, assesses, and mitigates potential security risks.

- Compliance: Microsoft complies with various industry standards and regulations, such as ISO 27001, SOC 2, and GDPR.

- Data protection: Microsoft uses encryption, access controls, and other security measures to protect customer data.

- Incident response: Microsoft has a dedicated security response team that handles security incidents and works to prevent future occurrences.

- Employee training: Microsoft provides regular security training to its employees to ensure they are aware of the latest threats and best practices for protecting customer data.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Microsoft changes are released to both services and clients, referred to as Microsoft Apps.

Services and clients have different release choices and deployment controls, so it's important to understand the differences as you implement your release management strategy.

Types of changes for Microsoft services and clients
Changes can be planned or unplanned, depending on the nature of the changes.

For example, security updates aren't always planned, because they're reactions to emergent risks or issues. Depending on the type of change, the communication channel might also vary.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Microsoft online services use machine state scanning to make sure the machines comprising our infrastructure are up to date with the latest patches and that their base configurations correctly align with relevant frameworks.

Machine state scanning uses patching, anti-malware, vulnerability scanning, and configuration scanning (PAVC). Microsoft online services apply effective PAVC by installing a custom security agent on each asset during deployment. This security agent enables machine state scanning and reports results to our service teams.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Microsoft uses outside-in monitoring, which involves creating synthetic transactions to test everything that is important. For example, in Exchange Online each scenario is testing every database worldwide every five minutes in a scattered fashion, providing near continuous coverage of everything that lives in the system.

From multiple locations, 250 million test transactions per day are performed to create a robust baseline or heartbeat for the service.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Microsoft online services security teams and service teams take the same approach to security incidents, which is based on the NIST 800-61:

Preparation: Organisational preparation that is needed to be able to respond, including tools, processes, competencies, and readiness.

Detection & analysis: Activity to detect a security incident in the environment and to analyse all events to confirm the authenticity of the security incident.

Containment-eradication-recovery: Required and appropriate actions taken to contain the security incident based on the analysis.

Post-incident activity: Post-mortem analysis performed after the recovery of a security incident.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
Yes
Connected networks
  • Public Services Network (PSN)
  • Police National Network (PNN)
  • NHS Network (N3)
  • Joint Academic Network (JANET)
  • Scottish Wide Area Network (SWAN)
  • Health and Social Care Network (HSCN)

Social Value

Social Value

Social Value

  • Fighting climate change
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Ingentive is committed to delivering services sustainably, supported by our annually updated environmental policy, dynamic roadmap of environmental initiatives, and a scorecard. Under the leadership of Ingentive’s CFO, our Greening Committee (GC) drives environmental & sustainability initiatives with set targets. The GC includes representation from every department, ensuring innovation and participation across the organisation through annual member rotations. The GC meets quarterly & sets the agenda for driving environmental policy improvements. Market research responsibility revolves through GC members and feedback on environmental impacts and benefits form part of the quarterly agenda and are presented back to the GC for further action and consideration.

Aligned with Microsoft’s commitment, Ingentive provides services focused on being carbon-negative, water-positive, and zero waste by 2030, in line with the government's 25-year plan objectives. Our research efforts encompass:

Clean Air: Researching technologies like virtualisation and cloud computing to promote clean air & aligning with Microsoft’s air quality policies.

Clean and Plentiful Water: Researching water-efficient data centre design, recycling & engaging with Microsoft stakeholders on water-related challenges in IT services.

Reducing Risks of Harm: Analysing environmental hazards in IT operations such as electronic waste, hazardous components & pollution.

Using Resources Sustainably: Investigating resource-efficient IT infrastructure technologies, collaborating with suppliers & partners to optimise IT services lifecycle.

Mitigating Climate Change: Researching climate mitigation strategies like carbon offsetting and renewable energy adoption & collaborating with Microsoft to deploy climate-resilient IT solutions.

Minimising Waste: Researching waste minimisation services & sustainable product design & partnering with waste & recycling facilities for optimised waste recovery & disposal processes.

Tackling economic inequality

At Ingentive, we're deeply committed to tackling economic inequality and promoting social equity. We recognise that economic disparities disproportionately affect marginalised groups. To drive positive change, we're taking proactive steps through various initiatives:

Diversity and Inclusion: Prioritising diversity in hiring, procurement, and vendor selection.

Equal Pay and Benefits: Ensuring fair compensation and benefits for all employees.

Supplier Diversity: Supporting minority-owned and women-owned businesses.

Community Investments: Investing in community development and workforce training.

Mentorship and Skills Development: Offering mentorship programs and skills workshops.

Advocacy and Policy Engagement: Advocating for equitable policies and initiatives.

Community Partnerships: Collaborating with non-profits agencies.

Transparency and Accountability: Maintaining transparency in our efforts.

Through these initiatives, we're working towards a more inclusive and prosperous future for all.

Equal opportunity

At Ingentive, we are dedicated to fostering an inclusive and diverse work environment. We believe in equal opportunity employment practices, where decisions regarding hiring, promotion, discipline, or dismissal are made solely on the basis of merit, competence, performance, and business needs. We actively promote diversity and do not discriminate against individuals based on race, colour, religion, marital status, age, national origin, ancestry, physical or mental disability, medical condition, pregnancy, genetic information, gender, sexual orientation, gender identity or expression, or any other legally protected status.

Our commitment extends beyond our own organisation to our supply chain partners. We ensure that all organisations within our supply chain share our values and principles of equal opportunity employment.

Through collaboration and engagement, we work with our partners to uphold these standards and create a culture of inclusivity across all aspects of our business operations.

Wellbeing

At Ingentive, we prioritise the health and wellbeing of our employees. We believe that fostering a supportive and nurturing work environment is essential for individual and collective success.

Our commitment to employee wellbeing includes:

Comprehensive Health Benefits: We provide robust health insurance coverage, including medical and dental plans, to ensure that our employees have access to quality healthcare services.

Mental Health Support: We offer resources and programs to support mental health, including counselling services, employee assistance programs, and mindfulness workshops.

Work-Life Balance: We promote work-life balance by offering flexible work arrangements and remote work options.

Ergonomic Workspaces: We prioritise ergonomic design in our workspaces to promote comfort and reduce the risk of injury or strain.

Employee Assistance: We provide access to confidential support services for employees facing personal or professional challenges.

Training and Development: We invest in employee training and development programs to enhance skills, promote career growth, and foster a sense of fulfilment and accomplishment.

Recognition and Appreciation: We recognise and celebrate the contributions of our employees through various recognition programs, rewards, and incentives.

Open Communication: We maintain open and transparent communication channels to encourage feedback, address concerns, and foster a culture of trust and collaboration.

Community Engagement: We encourage employees to participate in community service and volunteer activities to give back to society and promote social connectedness.

Through these initiatives, we strive to create a workplace where every employee feels valued, supported, and empowered to thrive personally and professionally.

Pricing

Price
£2.36 a licence
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at hemraj.tatur@ingentive.com. Tell them what format you need. It will help if you say what assistive technology you use.