datb limited

datb: kinodb enterprise application platform

Provision and support of securely hosted development, testing and production environments using the kinodb application development and deployment framework. kinodb allows the development and deployment of enterprise applications of all types in a fraction of the time required by conventional development tools.

Features

  • Cloud hosted complete development and deployment environment offering unparalleled productivity
  • Application defined entirely within metadata model
  • Technological implementation handled by server, not developer
  • Applications scale from workgroup to enterprise scale and beyond
  • Applications deploy to desktop and mobile browsers without change
  • Full inbuilt reporting capabilities
  • Security model allows disparate user types to use single application
  • Full web service (XML, JSON) capabilities as client and server
  • Fully managed incremental release process
  • Security includes two-factor authentication, SPNEGO and SAML

Benefits

  • Reduction in development and maintenance timescales > 85%
  • Applications can scale from workgroup to enterprise scale and beyond
  • Systems can be moved between database platforms at any time
  • No limit to application size, complexity or data volumes
  • Easy integration with services such as Google maps, graphing component
  • Ideally suited to extremely rapid development methodologies
  • Complete coverage (data, UI, reporting, interfaces etc.) greatly reduces complexity
  • No development required to support multiple devices
  • Updates to the framework remove technological dependencies, increasing systems' longevity
  • Development change impact is easily assessed in the largest systems

Pricing

£17500 to £50000 per server per year

  • Education pricing available

Service documents

G-Cloud 10

165133116104217

datb limited

Mark Bushman

020 7923 9239

mark.bushman@datb.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints None
System requirements
  • Platform can be deployed in any public or private cloud
  • Users access all applications using mobile or desktop browsers
  • Uses variety of SQL databases (Oracle, MySQL, MariaDB etc.)

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Full support service offered during UK business hours and by arrangement at other times.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.0 AA or EN 301 549
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Datb has been supporting clients across a number of industries since 2002.
We pride ourselves on our responsiveness to client needs and our support arrangements define a set of issue criticalities with associated response times.
We can offer full support of the entire environment (database, applications, OS patching etc.) or support for the kinodb platform alone.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Datb provides developer and administrator training in classroom, one-to-one and online formats.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction All data is stored in the relational database of the client's choosing. This can be extracted using conventional tools appropriate to the RDMBS used or via web services configured for that purpose.
End-of-contract process No additional costs at end of contract.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Mobile and desktop user experiences are identical although screens may be designed to present differently when viewed on smaller devices, if required.
Accessibility standards WCAG 2.0 AA or EN 301 549
Accessibility testing We use third-party tools (e.g. WAVE http://wave.webaim.org/) to scrutinise web pages to ensure that all images have appropriate ‘alt’ tags, that there are no contrast errors between foreground and background colours and to ensure pages are clearly legible to partially sighted users.
API No
Customisation available Yes
Description of customisation Kinodb is a full development and deployment platform that is used to create rich applications to meet a wide range of requirements across many industries. As such, clients' development teams can create the applications required by their users.

Scaling

Scaling
Independence of resources Clients will choose a web hosting provider appropriate to their needs (such as AWS, Oracle Cloud etc.) in order to ensure that their current and future resource requirements are met.

Analytics

Analytics
Service usage metrics Yes
Metrics types Activity per user, various server performance metrics, session metrics etc.
Reporting types Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
  • Other locations
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency Less than once a year
Penetration testing approach In-house
Protecting data at rest Other
Other data at rest protection approach Data is safeguarded according to clients' choice of web hosting provider (AWS, Oracle Cloud etc.).
Data sanitisation process No
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach All data is stored in the relational database of the client's choosing. This can be extracted using conventional tools appropriate to the RDMBS used or via web services configured for that purpose.
Data export formats
  • CSV
  • Other
Other data export formats
  • XML
  • Export formats appropriate to host RDBMS
Data import formats
  • CSV
  • Other
Other data import formats
  • XML
  • Formats appropriate to host RDBMS

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Other
Other protection between networks Clients will choose a web hosting provider appropriate to their needs (such as AWS, Oracle Cloud etc.) in order to ensure that their data security requirements are met.
Data protection within supplier network Other
Other protection within supplier network Data is safeguarded according to clients' choice of web hosting provider (AWS, Oracle Cloud etc.).

Availability and resilience

Availability and resilience
Guaranteed availability SLAs for availability will be according to clients' choice of web hosting provider (AWS, Oracle Cloud etc.).
Approach to resilience Resilience measures are according to clients' choice of web hosting provider (AWS, Oracle Cloud etc.).
Outage reporting According to clients' choice of web hosting provider (AWS, Oracle Cloud etc.).

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Users are required to be authenticated before accessing management interfaces; this may require a second or additional authentication factors appropriate to the actions being requested.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards Other
Other security governance standards Internal standards complying with or exceeding ISO27001 (certification in progress)
Information security policies and processes Board-level director responsible for security policy; quarterly review of conformance of all staff with security policy. All staff can raise security exceptions and are expected to do so in the course of their every day activities.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach All changes are made in response to a request for change (RFC) and are reviewed according to our quality management processes. Each change is identifiable as being associated with the RFC that gave rise to it and the developer responsible for the change. Entities (tables, fields etc.) within a kinodb application are fully auditable in terms of all changes made since their initial creation (who, when, in what environment). Changes are propagated from development to master, test & production environments in a fully managed way, ensuring full traceability.
Vulnerability management type Supplier-defined controls
Vulnerability management approach We subscribe to a threat monitoring & notification service and assess the impact of all threats reported to us. Potential vulnerabilities identified internally are reported using our quality management exception reporting process and reviewed weekly or earlier if critical. Patches are deployed as soon as practicable given the extent and impact of the potential vulnerability.
Protective monitoring type Supplier-defined controls
Protective monitoring approach The kinodb platform monitors all activity and reports on potential intrusion attempts. Our policies define the actions to be taken in the event of a compromise and are compliant with ISO27001.
Incident management type Supplier-defined controls
Incident management approach Internally, incidents are reported via our exceptions reporting process and are reviewed at director level weekly.
Externally, clients can report incidents to us online, by email or telephone.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £17500 to £50000 per server per year
Discount for educational organisations Yes
Free trial available No

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑