Intelligration Limited

Intelligration Limited

Bespoke cloud software development services using a variety and customers choice of technologies. Utilising a variety of methodologies and ways of working.

Features

  • Remote Access
  • Mutiple Device Access
  • Multiple user access
  • Real Time reporting
  • Scheduled reporting delivered to inbox
  • Dashboards
  • Identity login
  • Active Directory Integration
  • Integration with any system over many transport and formats

Benefits

  • User targeted and bespoke experience
  • Content available on a variety of devices
  • System talk with any disparate third party system
  • Ability to engineer own BI/MI Information
  • Scheduled services

Pricing

£400 per person per day

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 10

219235235564827

Intelligration Limited

Chris Stott

07889 509033

crstott@gmail.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints No
System requirements A modern Browser, Javascript compatible.

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Within 24 hours. Once in production we have a P1-P4 system where the most serious incident requires a 10 minute response.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Onsite support
Support levels Support and maintenance is provided for all services. We have a P1-P4 system, where the more severe incident has a 10 minute response. exact details are captured in a SLA document,
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Our preferred method is onsite training. Our belief is there is simply no substitute for face to face. We also have online training and extensive user documentation. Equally we are happy to utilise modern collaborative methods eg. GoConference, Skype etc.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Users could use the restful webAPI, built in features eg. direct file download in industry standard .csv, excel or PDF
End-of-contract process Full bespoke cloud software development. Support and maintenance of the product. Training and user familiarizsation. All using a variety of methods eg. on/off site, web, telephone. We are bespoke and amenable to the customer's ideas and suggestions.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The services use bootstrap so that content is automatically and optimally rendered most appropriately on host device.
Accessibility standards None or don’t know
Description of accessibility Where colour is used, we would also perhaps provide a hover with colour name in text for colour blind individuals. Provide sound technology for those with hearing difficulties.
Accessibility testing JAWS testing.
API Yes
What users can and can't do using the API Restful web services. Users can access vital services via web service over HTTP port 80. Port 80 is usually open over most firewalls so is compatible with most organisations.
API documentation Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation As this is a bespoke offering, supplier can collaborate with buyer for exact requirements.

Scaling

Scaling
Independence of resources A cloud based offering allowing us to extend hardware requirements in real time. Also full segregation by web server, database server and reporting server.

Analytics

Analytics
Service usage metrics Yes
Metrics types Google Analytics-like analysis of user/page/report usage.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Users could export via industry standard .csv, pdf, Microsoft Word or microsoft Excel. Also we provide web services in form of Restful WebAPIs. We have also provided a substantial facility in the form of SQL Server Integration Services allowing user to import/export from an underlying data source.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • PDF
  • Word
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • PDF
  • Word
  • Excel

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability As per the cloud provider - 99.9% uptime of hardware. As per SLA for software on P1-P4 incident basis.
Approach to resilience Using cloud hardware features. Database has incremental backups in real time and daily full backups. All virtual machines are re-imaged within the hour in the case of catastrophe.
Outage reporting SCOM Alerting, reporting via email, SMS or Web portal.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Active Directory restriction to valid AD users in a domain. IP address/MAC Address restriction. Internal firewall restricts traffic to correct ports for services.
Access restriction testing frequency At least every 6 months
Management access authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
  • Other

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Complies with all latest standards. Bespoke as per working with customers requirements.
Information security policies and processes Adhere to information security

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach We work with CAB - Change Board standards.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Any new patches released by software vendors are assessed, tested and deployed on a weekly basis. Provision for ultra urgent patches imminently.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Emergency P1 incidents respond within 10 minutes. All hardware installed with industry standard virus software and internal firewalls. Additionally access can be restricted to IP address/MAC address.
Incident management type Supplier-defined controls
Incident management approach Established P1-P4 process for incident management

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £400 per person per day
Discount for educational organisations Yes
Free trial available Yes
Description of free trial A Demo version

Documents

Documents
Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑