Cloud Kentico Solutions

As a Kentico Certified Solutions Partner, Netcel delivers innovative, robust and scalable .NET cloud solutions. Adopting agile project management, we design, build and launch Kentico websites aligned to best practice. Bridging the gap between marketing and delivery, we use strategy, creativity and technology to deliver long-term digital success for clients.


  • Kentico certified development team
  • Fully integrated CMS, eCommerce and Online Marketing platform
  • Websites that are fully optimised
  • Agile project management processes
  • Technical architecture consultancy
  • Fully responsive website design and build
  • Cloud hosting
  • Ongoing support & maintenance
  • Full training upon handover
  • Dedicated account management


  • 20 years+ knowledge with highly experienced team
  • Developed by certified developers in the UK
  • User experience and creative consultancy throughout the project
  • Stakeholder involvement from the start
  • Structured project management methodology
  • User friendly CMS
  • Fully secure and easy to maintain
  • Engage with visitors with targeted content
  • Strategic approach and holistic view delivers scalable solutions
  • Long term client partnerships for ongoing digital maturity management


£686 to £1204 per person per day

  • Education pricing available

Service documents

G-Cloud 9



Tim Parfitt

020 3743 0100

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints None
System requirements
  • Software licence for relevant CMS platform
  • Multi deployment environments - Deployment, test, staging and production
  • SSL certificate
  • Content delivery network - CDN
  • Web application firewall
  • Anti-virus software
  • High availability infrastructure

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Our normal support hours are Mon-Fri, 8am to 6pm (GMT).

Logging/tracking issues during standard support times is done via our Zendesk online ticketing support system, where users can set the priority and review the status of the ticket. Registered users can also email a central support address and the system will automatically create and acknowledge the ticket.

When an issue is reported via telephone, email or Zendesk, we immediately assign a minimum of 15 minutes to review, investigate and respond to the ticket.

Any support required outside the normal hours is available as a 24x7x365 service at an additional fee.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels We have 5 different support levels which are carried out on a time and materials basis.

Typical response times for all defect levels are as follows:
Priority One - Response is up to 1 hour (catastrophic & functional critical);
Priority Two - Response is up to 4 hours (functional critical);
Priority Three - Response is up to 2 working days (functional non-critical);
Priority Four- Response is up to 2 working days (minor);
Maintenance - Response is up to 2 working days;

Priority One or Two levels are dealt with as a matter of urgency based on the SLA response and fix times. Typically, these are deployed as hot fixes due to the nature of the issues, hence the name priority support.

Priority Three and Four support requests can also be deployed as hotfixes. However, where there isn’t an immediate need to resolve the issue, greater efficiencies can be leveraged by combining tickets into regular deployment windows (typically monthly). This is a managed process with the involvement of a BA / PM to identify and review the requirements for the next release.

A member of the support triage team is responsible for resolution of each support ticket.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started All users are provided with a range of resources required to ensure they get the most out of the service. This includes:

- Trainings Needs Analysis
- Vendor training
- Train the trainer
- Exercise books
- Bespoke user manual
- Training Videos
- Facilitation days and workshops
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Any solution data held within the hosting service will be made (securely) available at the end of the contract. If transferring to another similar solution configuration the data can be provided in the standard Episerver format of SQL database backups. If transferring to a different solution and the standard SQL database backups will not suffice, any solution data can be extracted and provided in common formats such as CSV or XML as required.
End-of-contract process The Contract will be effective from the date of the agreement and continues to be in force for a period of twelve months after which the Contract may be terminated by either party at any time by providing one month’s prior written notice.

The supply of Goods and Services and Price are subject to the terms and conditions set out in the Contract Agreement.

A full set of Schedules and Appendices to the Contract Agreement with any documents referred to in them, form an integral part of the Contract and any reference to the Contract means this agreement in writing as may subsequently be agreed between the parties.

The Price detailed in the Contract are exclusive of VAT, which shall be charged to and be payable by the Client pursuant to the relevant invoice for the same.

Any Goods or Services not expressly provided for in the Contract, yet agreed to by the Parties will be documented and be delivered by Netcel hereunder, will be chargeable on a time and materials basis in accordance with the Billing Rates.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10+
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service None
Accessibility standards WCAG 2.0 AAA
Accessibility testing Screen Reader testing is performed to assist with visually impaired users whose vision loss prevents them from seeing screen content or being able to navigate with a mouse. The correct use of assistive technology needs to be accompanied by experience of how everyday users employ the technology and conclusions drawn from such use should ideally be confirmed by expert users therefore specific requirements gathering is critical here to perform valid tests. The following tools have been used for ‘assistive technology’ within Netcel - iOs Screen reader, Chrome Vox tool and Power Mapper Sort Site to perform interface testing:
• Adding a New Video Block to the Metro Bank website – General Accessibility was set at AA Standard so visually impaired users can still experience the site as it was intended to be. Therefore, when playing the video transcript and then invoked, the text appears on screen and the transcript is read out by the screen reader.
• Also, viewing a page with the Vischeck simulator, which attempts to present the page, images included, as people with different forms of colour blindness see it.
• Turning off a monitor while using a screen reader in conjunction with a browser.
What users can and can't do using the API The Service API is a service layer available for system integrators to update and retrieve information from their CMS, ensuring a seamless integration with external systems such as PIM, DAM and ERP.

The Service API provides a programming interface for performing operations like:
- Import and export of data files;
- Import and export forms data;
- Bulk import and export of media and catalog data in Commerce;
- Bulk asset linking between media and catalog content in Commerce;
- 'RESTful' CRUD operations for managing individual catalogs, nodes, entries, and warehouses in Commerce;
API documentation Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation The Sitecore CMS platform is extremely customisable, from both a frontend and backend perspective. It can be customised by editors, developers and system architects. The various customised elements include:

- Develop custom properties and introduce editor functionality
- Develop custom on page editing
- Quick navigation menu
- Global menu selection
- Add image and logo on the log in page
- Manually render a page or block using .NET
- Create content icons
- Render custom HTML for CMS properties
- Custom icons for specific page types
- Content approval system
- A/B Testing
- Personalisation


Independence of resources Through differing levels of performance, load and stress testing we ensure that the service itself is resilient to high loads. Both the applications we architect and deliver and the infrastructure upon which they reside are built appropriately for the anticipated load and, within reason, and more. Our services are designed to scale appropriately.

The net output of the architecture, implementation and infrastructure we deliver is a service where high traffic will not affect other users of the service.


Service usage metrics Yes
Metrics types Configuration, management and reporting via Google Analytics or in-application dashboards. Gives instant access to analytics and trends within your working website context, allowing you to take immediate actions to improve conversions and optimise traffic.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Reseller providing extra features and support
Organisation whose services are being resold Episerver, Sitecore and Kentico

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations Yes
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Clients can export data from their CMS solution directly to ODF, CSV, Excel or alternatively directly to a similar CMS. This is particularly helpful when working across several environments that sit across the same infrastructure. This function is widely used by developers building new functionality in a test or development environment. When work is completed, and the information is ready for the production environment, you can simply use the export features to transfer the data between websites.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats Excel
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability For a period of 12 months from acceptance, the service will be free of viruses, trojan horses, logic bombs and other deleterious materials except where any such materials have been introduced to the service by the Client or any third party appointed by the Client; and

It shall use all reasonable skill and care in the provision of the Project to the Client, using at all times appropriately qualified and skilled personnel in the delivery thereof; and will not infringe the intellectual Property Rights of any third party.
Approach to resilience All infrastructure provided to our clients has the option for complete resilience either within a single datacentre, across multiple datacentres in a single region (such as the UK) or across multiple datacentres geographically.

This configuration allows for the worst case loss of an entire physical datacentre with services remaining fully operational.

Methods such as load balancing, mirroring and the more traditional failover are utilised to provide such resilience.
Outage reporting Outages can be reported via different channels subject to the specific requirements either in real-time or delayed until the next working business day.

Our services can provide access for service outages to a private, client specific, dashboard. Email alerts can also be provided alongside a more personal phone call should a service outage occur.

We are also able to hook in to different channels such as API alerts should these be required.

Outages for maintenance include: Emergency maintenance - we aim to notify you of this outage as soon as practicably possible. Planned maintenance - we shall use reasonable endeavors to provide you with a minimum of seven days’ notice and shall in any event give you as much notice as practicably possible. Scheduled maintenance - our standard scheduled maintenance window is every day between 12am-3am UK time. In this case, we shall, where practical, provide notice of such. All clients will be notified via email, phone and dashboard as appropriate.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels At a minimum, access to management interfaces are restricted with a username/password and SSL encryption.

Where permitted by the infrastructure configuration, management interfaces are entirely removed from public access and accessible only via a secure channel.

Multi-factor authentication or integration with a client (service) specific authentication source is feasible.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation No
Security governance approach Monitoring is deployed within our network to audit access to data both as the individual and the device. Our network contains both application security and threat analytics via industry standard monitoring solutions helping to enforce our policies.
Information security policies and processes Netcel follow a standard information security policy in context of modern cyber security classified as "a formal set of rules by which those people who are given access to company technology and information assets must abide."

Our policy covers hardware, software, communications and data throughout. Information is classified in to categories based on the confidentiality of the data.

Monitoring is deployed within our network to audit access to data both as the individual and the device. Our network contains both application security and threat analytics via industry standard monitoring solutions helping to enforce our policies.

Violation, either automatically detected or manually detected, must be reported to the IT department immediately from where the issue will be escalated accordingly.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Netcel hold a change log for aspects of the solution that are infrastructure related. Only Microsoft approved patches are deployed. Third party drivers or such are not permitted.

Any security vulnerabilities identified by third parties are addressed in accordance with the industry standard recommendations as a priority.

Where possible, environment configurations are fully automated and controlled with all configuration and change operated through auditable source control.
Vulnerability management type Supplier-defined controls
Vulnerability management approach In accordance with our cyber security policy, access to our networks is monitored through automated solutions to detect, as close to the perimeter as possible, any initial threat.

Infrastructure, both internal and that which we provide as part of a service, is patched at least on a monthly cycle in accordance with Microsoft best practice recommendations.

Information regarding potential threats is obtained from our automated solutions and specialist security partners.
Protective monitoring type Supplier-defined controls
Protective monitoring approach In accordance with our cyber security policy, access to our networks is monitored through automated solutions to detect, as close to the perimeter as possible, any initial threat.

If a potential compromise is detected this is addressed through the security software that we have deployed either blocking the compromise automatically or manually.

Where a potential compromise is being attempted automated escalation of security risks are undertaken and approaches such as multi-factor authentication are instigated to protect the network and data within.

Responses to incidents are on a priority basis and attended to immediately where feasible.
Incident management type Supplier-defined controls
Incident management approach Users are, subject to the specific incident type, generally required to escalate incidents to the IT department upon discovery from where the incident will be triaged and further escalated accordingly.

Netcel have in place standard processes for dealing with any incident occurrences. Initial incident reports are provided within the next working business day and further developed if required.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No


Price £686 to £1204 per person per day
Discount for educational organisations Yes
Free trial available No


Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑