SempTech Ltd

SNAP Works | Low-code Enterprise Application Development Platform

SNAP Works is a purpose built low-code application development platform that enables the rapid design, development and deployment of powerful enterprise applications that unify legacy back-end systems up to x10 faster, without the traditional costs and complexities of traditional development.


  • Up to x10 faster application development
  • Powerful, drag & drop user interface
  • Enterprise-grade code automatically generated
  • Error free development, syntax & structure automatically enforced
  • Requires significantly less developers to build systems
  • Connect multiple back end systems in a single transaction
  • Uses latest connectivity technology such as XML and restful APIs
  • Contains comprehensive security and audit framework
  • Separates mobile front end from server level technology
  • Available on ISO 27001 compliant public cloud services


  • Business analysts can directly analyse and develop solutions
  • Requires significantly less resource to create a solution
  • Includes live prototyping and built in test process
  • Ultimate Agile development environment
  • Strong built in security used for government, Telco and banking
  • Auto declares variables and only correct syntax can be chosen
  • Works on any major mobile or desk top platform
  • Visual representation of all logic and screens
  • Easy to import WSDLs, JSON variables and Restful API services
  • Easy to use existing look and feel using CSS3


£4500 per instance per month

  • Free trial available

Service documents


G-Cloud 11

Service ID

1 4 2 1 1 7 5 8 4 8 5 7 5 4 0


SempTech Ltd

Charles Hudson

07497 895 663

Service scope

Software add-on or extension
What software services is the service an extension to
Existing software services of an organisation as it provides a front end
Cloud deployment model
Hybrid cloud
Service constraints
Front end Service runs on Ios, Android and windows envrionments. Server supports windows and Linux.
System requirements
No specific requirements

User support

Email or online ticketing support
Email or online ticketing
Support response times
Depends on service package
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
Depends on engagement with client
Support available to third parties

Onboarding and offboarding

Getting started
On line tutorial and can also provide on site training
Service documentation
Documentation formats
End-of-contract data extraction
Data can be permanently deleted and purged from the system, there is also an export facility so that the user cna retain their solutions
End-of-contract process
User can extract created solutions from development environment and continue to use run time environment if this is still licenced.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Chrome
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Works seamlessly on mobile and desk top devices
Service interface
Customisation available
Description of customisation
Customers can build their own application with the product. The building blocks can also be customised


Independence of resources
Monitoring of server usage and scaling environment


Service usage metrics


Supplier type
Reseller providing extra support
Organisation whose services are being resold
F12 Ltd in Hungary

Staff security

Staff security clearance
Staff screening not performed
Government security clearance

Asset protection

Knowledge of data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
Data sanitisation process
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Download to their workstation
Data export formats
Other data export formats
Data import formats
Other data import formats
  • WSDL
  • JSON
  • Restful aPI
  • CSS3
  • Html5

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
Depends on engagement
Approach to resilience
Available on request
Outage reporting
Email and SMS can be provided

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels
System assigns roles to various users
Access restriction testing frequency
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
On request
Information security policies and processes
On request

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
On request
Vulnerability management type
Vulnerability management approach
On request
Protective monitoring type
Protective monitoring approach
On request
Incident management type
Incident management approach
On request

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£4500 per instance per month
Discount for educational organisations
Free trial available
Description of free trial
Ability to use the sand box environment and create projects. Can be fully tested but not run in a live environment. Time period 30 days

Service documents

Return to top ↑