Evri Insight Ltd

Evri Insight Cloud Software

Businesses are turning to digitization to simplify and automate processes, engage with customers, reduce costs, and transform services.
However, government sector has unique requirements and security levels.
We provide a Secure App Platform – using a secure cloud environment.
Creating a store of apps that can shared across business boundaries.


  • Common platfrom for business applications
  • Data conectivity (import/export) with external sources
  • Document Sharing and Collaboration (inc: SharePoint, eRooms)
  • Oracle APEX environment
  • Power BI Reporting Server
  • Bespoke application hosting
  • Database applications with Power BI Embedded
  • Competitive Tendering and bid Decision Support applications
  • Digital finance function application platform
  • eDisclosure and Discovery applications


  • Partnership approach (more than just a hosting provider
  • Collaboration across Private WANs (RLI, SLI, N3) and internet
  • UK Hosted Services, Security Cleared staff
  • Increase productivity and operational effectiveness though connected-working
  • Experience to support application integration.


£10 to £250 per person per month

  • Free trial available

Service documents


G-Cloud 11

Service ID

2 0 2 7 2 3 8 4 7 8 6 3 1 6 5


Evri Insight Ltd

Oliver Houseman



Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
This service supports the
"Digital Government Setup and support : Apex SetUp & Support"

This service allows users to have access to a app platform that allows then to host and run apps developed in house - by external parties, or with support, though our Apex support service
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
Customers must:
* Ensure that its Users are uniquely identified and authorised to use the Service;
* Ensure all Users to undergo Training and are suitably experienced and qualified to undergo such Training;
* Users are expected to hold security clearance commensurate with the protective marking of the system (to a minimum of BPSS).
System requirements
  • End Point Devices approved to appropriate security classification
  • Code of Connection provides specific requirements for the project services.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Next Business Day.
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
Included within: SAAS pricing - see SFIA attachment…

L1 Critical:
Critical business process disruption, Loss of data, access failure for >5 users.
Cloud based support team response & resolution plan to L2

L2 High: Non-critical process disruption that is material business operations , <6 users
Cloud based support team response & resolution plan to L3

L3 Medium: Non-Critical problem affecting business processes (not 1 or 2)
Cloud based support team response & resolution plan to L4

L4 Low: Minor: does not impact business process (e.g. error in documentation, of support inquiry)
Solution if within remit of the service

L5 Feature request: not part of core functionality - addition feature customized upon request (additional fee)
Support available to third parties

Onboarding and offboarding

Getting started
Following an order being placed we will provide agree the components of the platform that will be required namely:
• Underlying could platform
• App platform
• Specific app instances that will sit within the platform
As appropriate to the project, we will discuss with the customer any on-boarding and off-boarding requirements and reach agreement on the most suitable approach prior to an order being placed.

When closing a project, we review Lessons Learned and ensure that skills have been transferred to client staff where appropriate.
Service documentation
Documentation formats
End-of-contract data extraction
Off-boarding from the service is as simple as exporting and downloading your data if you choose to do so.
We provide your data in an industry standard and easily readable format to make it as easy as possible for you to migrate to another service if you wish to do so.
In addition, we can support clients to remove their data or transfer their data should they wish.
We can also provide NCSC approved encrypted media to expedite the removal and transfer to another location.
End-of-contract process
Removal of data
Downloading data in an industry standard format

Support with removal, download, and transfer of data.
NCSC Encrypted media

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Our app platform is accesses though web-browsers and support mobile access.
Service interface
Customisation available
Description of customisation
Buyers can add their own or third party apps to the platform, by mutual agreement - providing they meet the platform requirements.


Independence of resources
The Cloud Software solutions offered by Evri Insight are hosted from an Accredited, secure Private Cloud operated entirely within the UK.
The solutions are developed using Oracle Apex, supported by Oracle database technology as the back bone of the system.
This provides the necessary combination of performance, in terms of speed, scalability and concurrent use, for most business applications, whilst also providing the necessary redundancy should the primary become unavailable.


Service usage metrics
Metrics types
We provide metrics on number of users, individual app usages, were apps provide information features used.
Reporting types
Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
We provide your data in an industry standard and easily readable format to make it as easy as possible for you to migrate to another service if you wish to do so.
Data export formats
  • CSV
  • Other
Other data export formats
  • JSON
  • XML
Data import formats
  • CSV
  • Other
Other data import formats
  • JSON
  • XML

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
99.999% availability. Refund based on negotiation.
Approach to resilience
Automatic fail over to a number of mirrored virtual machines.
Resilience of the service is provided throughout the service provision. • The Data Centres are classified as a Tier 3 data centre with alternate supply paths for all services to ensure 100% Data Centre uptime. • All redundant systems are regularly tested for operation and effectiveness. • N+1 Redundant Power Supplies. • The Public Sector Dataroom also has additional power connection allowing the entire room to be independently serviced in the event of a catastrophic failure at the site). • Redundant Backup Power from Generators and UPS (N+1). • 100% carbon neutral, PAS 2060 certified hosting. • Carrier Neutral with a range of Tier 1 and 2 carriers. • Multihomed internet presentation, means that if 1 carriers Point of Presence fails communications will automatically failover to another. • Redundant (N+1) Air Conditioning and Environmental Control. • Environmental systems supported by redundant power systems. DR facilities are also available, with secure connectivity provided to replicate data between the production and DR facilities.
Outage reporting
Service outages and planned maintenance activities are communicated via the service web-interface status dashboards and messaging, via email alters and the Service Desk team make contact with agree Points of Contact in order to communicate status and ongoing activities.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Separate accounts are required for Administrative Access, with authentication and authorisation controls applied to all Administrative functions. SSH access to the Virtual machines command line, and RDP sessions requires key-based authentication from a specified source location into a bastion host, which then requires further authentication and account escalation at each onward connection to the specific administrative services.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users receive audit information on a regular basis
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users receive audit information on a regular basis
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
  • Formal Accreditation from MoD (DAIS).
  • Cyber Essentials.

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
Other security governance standards
Formal Accreditation from MoD (DAIS).
Cyber Essentials.
Information security policies and processes
Security policies and procedures form part of the formal system accreditation by DAIS.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Components of the system are recorded and tracked through their lifetime Every change to a configurable item requires a Change Control Form to be documented and approved. Changes are assessed for potential security impact, and where necessary are communicated to the system Accreditor for approval.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Vulnerability management processes form part of the Risk Managed Accreditation Document Set (RMADS) which have been reviewed and approved by the DAIS Accreditor. SecureIA monitor threat sources, including CERT to gain information about potential threats. Vulnerabilities and Remediation activities are assessed to determine the priority, with patches being applied within the hour for critical security issues through to monthly patching for routine updates.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Evri Insight employ protective monitoring services in compliance with Protective Monitoring for HMG ICT systems (GPG-13).
Incident management type
Supplier-defined controls
Incident management approach
Processes for reporting incidents is included within the Risk Managed Accreditation Document Set (RMADS) which includes HMG monitoring departments and points of contact. Users should report incidents to the first line Service Desk team, either by phone, email or via the web-portal. Incident reports are provided as part of the reporting cycle, with exceptional RCA and incident reports provided for security incidents.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
Connected networks
Other public sector networks


£10 to £250 per person per month
Discount for educational organisations
Free trial available
Description of free trial
Evri Insight are happy to provide a trial of the services or Proof of Concept to demonstrate and verify that the business requirements can be delivered by our services. The period and extent of the trial can be agreed to support the customers business case.

Service documents

Return to top ↑