Nudge Digital Ltd

Open Source Web Development and Drupal CMS Design

Nudge specialises in delivering innovative digital consultancy, strategy and design; implementing our solutions using open-source PHP web development tools.

We specialise in Drupal and WordPress content management systems and are highly-experienced using agile and user-centric design methodologies, GDS principles and helping our clients successfully navigate and pass GDS assessments.

Features

  • Concept development and consultancy
  • Digital strategy and service design
  • User experience development and user testing
  • Drupal 7 & 8 content management system (CMS)
  • 3rd party systems integration
  • GDS compliant project methodology
  • Drupal support and maintenance packages
  • Conversion rate optimisation / split (A/B) testing
  • Highly user-centric design and development methodology
  • WordPress content management system (CMS)

Benefits

  • Highly user-centric design and development methodology highly-effective and engaging websites
  • Highly-effective and engaging websites
  • Resilient and cost-effective digital solutions
  • Experts in GDS process and assessments with demonstrable experience
  • Best possible UX achieved by using dedicated user-testing exercises
  • Full digital marketing services to help you promote your website
  • Quick and cost-effective delivery from Drupal experts
  • Responsive and agile service as small-medium sized agency
  • Ensure widest possible audience reach by delivering multi-platform solutions

Pricing

£600 to £750 per person per day

  • Education pricing available
  • Free trial available

Service documents

Framework

G-Cloud 11

Service ID

1 1 0 4 9 5 7 7 4 0 6 5 7 3 9

Contact

Nudge Digital Ltd

Luke Aikman

0117 325 3200

luke.aikman@nudgedigital.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
There are no known service constraints.

Drupal is a widely adopted enterprise level CMS, open source software platform with no recurring licence fees.
System requirements
  • LAMP stack hosting environment
  • Modern browser to access the website

User support

Email or online ticketing support
Email or online ticketing
Support response times
Response time for critical issues - within 4 working hours.

Response time for serious issues - within 1 working day.

Response time for non-critical issues - within 2 working days.

Working days are Monday-Friday.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
N/A
Onsite support
Yes, at extra cost
Support levels
Nudge provides dedicated support and maintenance to many clients, which includes all security patches and CMS module updates, changes to /and or new features and functionality, on-going user testing, conversion rate optimisation services and full telephone and email support, and hosting provider liaison.

Our standard support includes all security patching and upgrading modules to the latest versions, testing of all upgrades on a development environment, bug fixes, enhancements to the site functionality and content updates where required.

We regularly review the support agreement to ensure the level of support matches your actual requirements / usage. Following the review we can increase, decrease or maintain the support level.

Performance measuring and reporting - All of our work is logged, tracked and reported against within our project Management System. Our clients are granted access to the system and can track our work and performance against our KPIs in near real time. This transparent approach is design to allow the client team complete visibility on Nudge’s work, costs and performance.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Following contract award , the internally project team is briefed and given access to all tender documents, our submission, clarifications and presentation slides. This gives us an opportunity to gain initial further feedback and questions from our team before we arrange our first introductory meeting with the client.

The project is also set up on our project management system and any notes / questions are recorded. Access to our project management system will be granted to the client and training provided following the kick-off session as detailed below.

In this first meeting, we discuss a wide range of relevant project topics, all of which will help us get to know each other and gain a mutually aligned understanding of the services we’re providing and the project we’re delivering.

We’ll lead this important session with the aim of discussing every aspect of the new solution, your aims, goals and aspirations for the new portal, identifying all key internal and external stakeholders within the project, defining and agreeing timelines and milestones for the project plan as well as discussing and provoking thoughts about the functionality needed on your system and much more.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Any data kept in any associated database can be extracted at the end of a project.
End-of-contract process
Inevitably, some contracts come to an end and it is essential that Nudge supports its clients in whichever path they decide.

In order to support this, Nudge will ensure we do the following where necessary:

- Have an up-to-date summary of the project solution,
- Detailed project and technical requirements,
- Well-documented code adhering to best practices and using standard APIs and libraries, allowing for portability,
- Documentation of server architecture (hosting environment including server specifications),
- List of contact and access details (key contacts and details on how to access the code / servers),
- Migration plan (checklist to be followed when migrating to a new supplier / internal team),
- List of known / outstanding issues (list of any known or pending issues with the code or server environment),
- Training for new development team / internal Orison resource,
- Access to project management history,
- Access to code repositories

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
We're very conversant with mobile design principles to ensure great user experience across a range of devices, ensuring maximum usability and accessibility by a large daily audience focusing on an intuitive and logic interface.

Our prototypes are designed using fully responsive wireframes. This appreciation of mobile access and UX from day one ensures our designs are meeting the needs of your audiences using their mobile devices.

Responsive wireframes allow us to rapidly prototype and showcase the structure of the proposed website on each device, including representations of pages, features and functionality, to users at a very early stage.
Service interface
No
API
Yes
What users can and can't do using the API
There is no 'off the shelf' API.

We are, however, able to build a custom API if required. Any API we develop would be bespoke and based around your organisational and data interchange needs.
API documentation
No
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Nudge is an open source web development agency, working with a broad spectrum of PHP, MySQL, XHTML, CSS, JavaScript, jQuery based technologies

We also utilise off the shelf systems such as Drupal; an open source Content Management Framework (CMF), unlike a typical Content Management System (CMS); which is geared more towards customisation and configurability.

Out of the box Drupal (7 and 8) provides key features to meet most common requirements such as users, roles, permissions, content management, workflow, clean URLs, a multi-level menu system, user comments, user registration & authentication and built-in caching & optimisation, content publishing rules, user directories and search etc.

These ‘out of the box’ benefits mean we can focus your budget, not on creating core functionality, but on customising and creating a great user experience and creative design for your audiences.

We also use WordPress where appropriate as this sometimes allows a quicker route to market when functionality requirements are very simple and straightforward.

Scaling

Independence of resources
Nudge builds in contingency time and flexibility where possible. This includes the responsibilities of each resource at each stage / milestone throughout the project, an appreciation of the client’s availability.

By using a detailed project plan and Gantt chart both parties will be able to monitor the project progress across all of the project milestones and plan for such contingency with adequate notice.

All scheduled and upcoming work across all clients is reviewed at a global level on a weekly basis, allowing us to plan for unforeseen circumstances, accommodate known changes and to prioritise certain projects.

Analytics

Service usage metrics
Yes
Metrics types
Alongside many other standard Google Analytics website stats, we’ll track and report on specific user events and conversions using Custom Event Tracking. This enables us to gain invaluable insights into the behaviour of your users and the website's performance against key goals, metrics and desired outcomes.
The percentage of visitors to your website that produce a positive action is known as your conversion rate. This can be further broken down to the number of page components or tools (features and functionality) required to facilitate that conversion.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Any data associated with any database can be exported in a file format that suits the clients requirements.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
There are two main aspects of Continuity / Availability Management:

Service continuity / availability - ensures that the solution can always (so far as possible) provide the minimum agreed Service Levels, by reducing the risk from disaster events to an acceptable level and by planning for the recovery of IT services. Nudge also plans to ensure that all contracts with suppliers support the needs of the business, and that all suppliers meet their contractual commitments.

Management continuity - ensures that the client can receive continual service / support from alternative providers or through internal resource.
Approach to resilience
We use frameworks and content management systems rather than writing bespoke code, since these frameworks enforce good security practices, are well tested, and have regular patches and updates available to fix known vulnerabilities. We evaluate the choice of 3rd-party systems by reviewing how frequency of updates, their security methodology is, and historic security record.

We use the OWASP top 10 (https://www.owasp.org/index.php/OWASP_Top_Ten_Cheat_Sheet) to guide our approach to building secure websites and applications.

Protecting against injection - for example, by enforcing input field type and lengths, validating fields and always sanitising user input.

Strong authentication and session management - for example, by validating users and their roles, and adding CSRF tokens to forms.

Prevent XSS - for example, by canonicalising data and only processing data that is input by trusted users.

Avoid security misconfiguration - for example, ensuring web servers are hardened and configured with security in mind, and through regular penetration testing.

Encrypt sensitive data - for example, using secure hashing algorithms to hash passwords, enforcing TLS 1.2 or later with an EV SSL certificate, and protecting cryptographic keys.

Robust access control - for example, ensuring all non-web data is outside the webroot and implementing role-based access control for all pages.
Outage reporting
Email alerts originating from the server hosting environment

Identity and authentication

User authentication needed
No
Access restrictions in management interfaces and support channels
Two factor authentication as required
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users receive audit information on a regular basis
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users receive audit information on a regular basis
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
Yes
Any other security certifications
Cyber Essentials Plus

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
Cyber Essentials Plus
Information security policies and processes
We take our responsibility for security very seriously and ensure all members of staff are aware of and trained in information security best practices and apply this throughout their work.

We have a comprehensive data protection policy (available upon request) which ensures our staff, processes, systems and overall approach always focussed on data security.

The key points of this policy are:

All computer systems and information contained within must be protected against unauthorised access.

Secret and confidential data should not be shared or distributed without process or prior authorisation.

In the event that staff find a system or process which they suspect is not compliant with this policy or the objective of information security, they have a duty to inform a Director so that appropriate action can be taken.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
The steps below are followed for any change.

Documentation:
All change requests (including rejected requests) shall be and logged.

A documented audit trail must be maintained at all times.

Change Classification - All change requests shall be prioritised in terms of benefits, urgency, effort required and potential impact.

Approval - All changes shall be approved prior to implementation.

Risk Management - A risk assessment shall be performed for all changes and dependant on the outcome, an impact assessment should be performed.

Changes affecting SLAs - The impact of the change on existing Service Level Agreements (SLAs) shall be considered.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Nudge adheres to industry best practice with respect to security, ensuring we protect against common threats such as SQL injection and cross-site scripting.

However, as with any software product, it is inevitable that security vulnerabilities will exist. Thanks to the large open source community, these vulnerabilities are rare and any vulnerability that does exist is quickly patched and distributed to the community.

Drupal have a dedicated security team and a comprehensive security announcement and release process. Nudge are on the Drupal security-mailing list (see https://www.drupal.org/security-team), so we receive updates about security vulnerabilities almost immediately after they are discovered.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Drupal have a dedicated security team and a comprehensive security announcement and release process. Nudge are on the Drupal security-mailing list (see https://www.drupal.org/security-team), so we receive updates about security vulnerabilities almost immediately after they are discovered. With our recommended support package, we can apply these updates to the website as they are released, ensuring the website is always patched against the latest vulnerabilities.
Incident management type
Supplier-defined controls
Incident management approach
When a service is disrupted or fails to deliver the promised performance during normal service hours, it is essential to restore the service to normal operation as quickly as possible. Also any condition that has the potential to result in a breach or degradation of service ought to trigger a response that prevents the actual disruption from occurring. These are our objectives of incident management.

Level 1 - Incident identification / Incident logging / Incident categorisation / Incident prioritisation / Initial diagnosis

Escalation to level 2 support - Incident resolution / Incident closure / Communication with the client throughout incident.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Pricing

Price
£600 to £750 per person per day
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Free strategic consultancy.

If you're unsure as to the best approach to meet your objectives, our senior team will spend time with you discussing potential project, your requirements and digital strategies to achieve your objectives.

Service documents

Return to top ↑