Simply Zesty Limited

Kentico Web Content Management System

Kentico Enterprise marketing solution hosted on Tibus ISO27001 G-Cloud platform is an all in one CMS, E-commerce and Online Marketing platform providing: Web content Management; Online marketing; E-commerce; Online Communities; Intranet & Collaboration; Platform for web development and Integration 99.999% availability guarantee.


  • Secure Fully Managed Kentico CMS Platform
  • 24x7x365 monitoring, alerting and proactive support
  • ISO27001 (IL2/IL3 equivalent)
  • Data back ups
  • Disaster Recovery & Business Continuity options


  • Easy to use out of box functionality
  • Fast website deployment
  • Update content quickly
  • Manage Your Website from Any Computer
  • Self-contained system no HTML editing software required
  • Secure Platform that can scale as required


£15,100 to £48,808 a unit a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

1 6 9 2 2 4 7 1 0 4 4 7 4 8 8


Simply Zesty Limited Darren Richardson
Telephone: 02890334044

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Website design, development and support services
Cloud deployment model
Private cloud
Service constraints
System requirements
Internet Access

User support

Email or online ticketing support
Email or online ticketing
Support response times
See Terms and Conditions
User can manage status and priority of support tickets
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
Clients have access to the Service Desk and a dedicated cloud support engineer as standard from 0800 - 1800 normal working days.
Email access to support desk is available 24x7x365.
Service is proactively monitored 24x7x365.
Out of normal business hours emergency telephone support is an additional cost of £100/MONTH.
Support available to third parties

Onboarding and offboarding

Getting started
Onsite training and user documentation available.
Service documentation
Documentation formats
End-of-contract data extraction
As part of our Exit Management process we will provide a snapshot of the latest data once contract ends.
End-of-contract process
Kentico Cloud Software Templates.

Additional services:
Technical Design
Project Management
Service Design
Configuration and Support
Application Support
UX User Consultancy
Migration Services

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Compatible operating systems
  • Android
  • IOS
  • MacOS
  • Windows
Designed for use on mobile devices
Differences between the mobile and desktop service
Service interface
What users can and can't do using the API
Kentico has a documented and robustly integrated API / Web Service layer as part of the core platform, and has a working relationship with Salesforce, Microsoft Dynamics, SAP and SharePoint which has resulted in modules for integration being developed to allow standards driven deployment into these systems using the Integration Bus. Additionally we can provide custom code integration.
API documentation
API documentation formats
API sandbox or test environment
Customisation available
Description of customisation
Users can use Kentico to customise web pages, functionality and content.


Independence of resources
Each instance is dedicated specifically for the client. As part of our Capacity Management process we will upgrade infrastructure as we approach 70% of overall resource


Service usage metrics
Metrics types
We monitor the performance metrics of key hardware, operating systems, databases and application software. We will respond to any detected issues and report them immediately to the Client. Real time monitoring is available to the Client.
Reporting types
Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Data is exported as either an XML or CSV File
Data export formats
  • CSV
  • Other
Other data export formats
Data import formats
  • CSV
  • Other
Other data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
We provide a 99.999% availability supported by service credits. If unavailable for over 0.001% time within a month, upon the Customer's request, we will credit the Customer's account the pro-rated cost for one-day's charges for each hour of unavailability, up to a maximum of 1 week’s charges within any one month. For the purpose of this Service Availability Commitment Remedy, a Week shall mean the period from 12:00:01 AM Monday, until 12:00:00 AM the following Sunday.
Approach to resilience
Cloud and hosting services are delivered from our Tier 3 and 4 ISO 27001 accredited datacenters. All datacenters operate to ISO27001, ISO22301, ISO 50001, ISO9001, ISO 14001, OHAS 18001, PCI DSS standards and are audited and operated to the EU Code of Conduct’s best practice for datacenters. VESDA detection technology is installed and all infrastructure monitored 24x7x365 by the Network Operations Centre (NOC). There are dual 10G connections between each of our datacentres for resilience and we peer with 5 different Tier 1 telecoms to provide for the best connectivity and internet routes worldwide. In addition we are a member of INEX, LINX and LONAP for further capacity and resilience. There are no single points of failure, with redundancy built in at every layer of the load balanced platform, as well as within the core.

Tibus can facilitate any frequency of backups e.g. hourly, daily or anything in between. All data, including server configuration, application data and configuration, is backed up on minimum a daily basis, and retained for a minimum of 30 days.
Outage reporting
Email alerts.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Our Access Control Policy ensure that the principles of ‘least privilege’ and ‘need to know’ are applied consistently across the management of authorised access to information assets including management interfaces and support channels.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
Certification Europe
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
All hosting and cloud infrastructure business processes are covered by ISO27001.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Secure Engineering Principles
Supplier Assurance
Training and Awareness
Information Security Metrics & KPIs
Remote Working
Removeable Media
Security Education and Awareness
Access Control Policy
Accounting and Audit
Anti Malware
Operating System Hardening
Business Security Continuity Management
Business Security Continuation Plan
Change Management Policy
Cryptography Policy
Customer Access Management
Email Usage
Forensic Readiness
IA Policy
Incident Identification Reporting and Management
Information Classification
Information Security in Project Management
Information System Backup
Information Transfer
Internal Audit
IT Account Management - Users
IT Account Policy – Administrator
Mobile Device and Telephony
Network Security
Patch Management
Physical and Environmental Controls
Secure Information Asset Disposal
Virtual Private Network
Document Control
Employee Arrivals
Employee Exit
Employee Movers
Security Operating Procedures
Corrective Action

There is a IT Security Working group chaired by the SIRO and including ITSO, Change Managers, Systems Manager. Reporting structure is available as an Organisational Chart detailing ISMS.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We have a bespoke change management tool to enable all change requests to be logged, tracked, approved/rejected and reported on. The change management process includes:
• Documented Change Requests;
• Identification, prioritisation and initiation of change;
• Proper authorisation of change;
• Requirements analysis;
• Inter-dependency and compliance analysis;
• Business Impact Assessment;
• Change approach;
• Change testing;
• UAT and approval;
• Implementation, release planning and roll back procedures;
• Documentation;
• Change monitoring;
• Defined responsibilities of all users and IT personnel;
• Emergency change parameters.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Patch management is part of our ISO27001 ISMS.To assist the System Manager, there are a number of resources available for monitoring the status of vulnerabilities and patches including vendor/3rd party websites, mailing lists, vulnerability databases, Network management tools to scan for vulnerabilities on computers, provide information regarding needed patches and other software updates on those computers. Patch deployment should be conducted under direction of the Change Manager. They must be applied in a structured and methodical way, based on a determination of priority and within pragmatic timeframes: Emergency 24 hours, High priority 7 days, Medium within 30 days.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Systems are in place to alert NOC to potential issues as soon as they develop. The G Cloud platform sits behind perimeter enterprise-class, redundant core routers, firewalls and intrusion prevention systems. This includes Syslog, Netflow use of MD5 passwords. Perimeter firewalls are configured with ports locked down. Other ports are locked down to individual fixed IP addresses. Cisco IPS provides for real-time traffic analysis and packet logging on our IP networks to perform protocol analysis, content searching/matching to detect buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting. Regular vulnerability assessments of core network are undertaken.
Incident management type
Supplier-defined controls
Incident management approach
We provide a consolidated incident management process. The primary objective of the process is to restore normal operation as soon as possible, in accordance with service levels. The Incident Manager responsibilities include:

o Ensuring that issues are accurately recorded and that investigation is undertaken in a timely manner;
o Agreeing an appropriate priority with impacted users;
o Communicating relevant information about the incident and resolution progress to impacted users;
o Ensuring that business and technical escalations are managed in line with agreed best practice and service level targets;
o Communicating, resolution and closure of the incident to impacted users.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£15,100 to £48,808 a unit a year
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.