Synectics Solutions Ltd


AppCheck from the Cabinet Office National Fraud Initiative can help significantly reduce the number of application referrals organisations have to investigate. Using the AppCheck software will ensure that, from the outset, you have a validation and authentication process in place to minimise errors and costly investigations in the future.


  • Easy checking of the validity of an application in real-time.
  • Built-in risk assessment and simple referral escalation interface
  • Intelligent colour coding to classify applications in need of investigation
  • Matches employees details against key Home Office data
  • Search against 1/3 billion NFI data records including immigration data
  • Stops invalid or fraudulent claims at the point of application
  • Establishes if an applicant has the right to work
  • Alerts you about potential risks and identifying genuine applicants


  • Reduce the risk of your organisation falling victim to fraud
  • Proactively protects your organisation and improve customer interactions
  • Mitigates risk of falling foul of the employment legislation requirements
  • Reduce and stop the provision of invalid or fraudulent payments
  • Reduce future costs by managing the risk of application errors
  • Fraudulent or mistaken claims or payments identified before becoming active
  • Available to multiple departments or individuals ensuring full protection
  • User friendly interface to support usage across all staff levels


£0.05 to £0.50 a transaction

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

2 7 0 3 8 6 8 0 5 7 8 0 2 7 2


Synectics Solutions Ltd Louise Williams
Telephone: 01782 664000

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
The National Fraud Initiative, ReCheck and FraudHub.
Cloud deployment model
Private cloud
Service constraints
The service is for the detection and prevention of fraud only.
System requirements
  • Have access to PC, tablet or computer device
  • Access to the internet or web services
  • Needs to have a current web browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
We have dedicated help desk facilities that respond to all queries via email from 8.00am to 6.00pm monday to friday for the AppCheck product.
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Onsite support
Support levels
We provide training and set up materials as well as coaching. We have a dedicated help desk facility and out of hours system support staff. Dependent on the complexity of the account we can also supply technical account support staff and project management. Support costs are included in the overall contract value.
Support available to third parties

Onboarding and offboarding

Getting started
New users or existing customers have access to a dedicated help desk facility that can support with training and guidance. We have training materials and guide books and hold training workshops on a regular basis.
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
The service is for matching data to the National Fraud Initiative data only once matching is complete the client can extract the matches via excel or CSV downloads. We delete all data held within the system within 3 months of the contract ending
End-of-contract process
The contract is a fixed priced relating to the usage of the data and to that end once the contract ends all access to the product ceases. Data can be exported via excel at any point during the contract. We will delete all data and matches held within AppCheck within 3 months of termination.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
Designed for use on mobile devices
Service interface
Description of service interface
The product is accessible through the NFI web portal, which has been designed with the Cabinet Office's to meet their accessibility standards. The product could also be accessed through API.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
We work with user groups to ensure screens and accessibility is as inclusive as possible
What users can and can't do using the API
The API can be integrated into fraud prevention and detection products only. Any new users wanting to access AppCheck through the API would be set up by specific supplier credentials. We dont allow users to make any changes through the API it is for read only operations of the AppCheck data.
API documentation
API documentation formats
API sandbox or test environment
Customisation available


Independence of resources
We consistently perform testing on capacity levels and service . We have load balancing in place and multiple internet connections and multiple points of redundancy and resilience.


Service usage metrics
Metrics types
A full suite of reports are available logging all usage, out of hours log ins, service provision and user engagement. These can be accessed through the site, they also monitor matching levels and overall performance of the product.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Other
Other data at rest protection approach
Independent review of processes (for example CESG CPA Build Standard, Cyber Essentials Plus , ISO/IEC 27001 )
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Export functionality is built into the product and is available to those users with appropriate permissions. The data is easily exported through CSV or Excel.
Data export formats
  • CSV
  • Other
Other data export formats
Data import formats
  • CSV
  • Other
Other data import formats
  • Xls
  • Xlsx
  • Mdb
  • Accdb
  • Zip
  • 7Z
  • Rar

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
We maintain 98% service level or higher with all development, upgrades and maintenance performed in scheduled windows, which are executed outside of normal operating hours.
Approach to resilience
Data centres are highly resilient with back up generators, UPS and FM200 fire suppressant systems. Our Systems are built to be highly fault tolerant using dual power and network connections. Data centres are served by multiple ISP connections. We have a dedicated Business Continuity Management department. We load balance our system across multiple virtual machines which themselves can be migrated to new physical hardware when required.
Outage reporting
We report service outages once they have exceeded the clients contractual targets directly to the client with estimated fix times and solutions via email or phone.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
We issue specific passwords, user names and log on code, once we have received written authorisation from senior persons of authority from within the purchasing organisation. Every user account has an associated user level. The user level dictates the set of permissions the user has and therefore their access within the system.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
BSI Assurance Group Ltd .
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
The ISO/IEC 27001 scope covers the entire business operation of Synectics Solutions.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
  • Cyber Essentials Plus
  • SAFO ( Specified Anti Fraud Organisation )

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Overall responsibility for information security rests with the Chief Information Security Officer who reports to the Legal & Compliance Director. An ISMS review committee (which includes at least one Director) meets twice annually. The Security Strategy group formally meet every two weeks. A dedicated IT Security team are responsible for operational security. Physical security is the responsibility of the Facilities team. We meet and adhere to the following: Cyber Essentials , • Security operating Procedures (SyOPS) • Protective Monitoring Controls selected from GPG13 in accordance with risks resultant from IS1 calculations. Monitoring is currently designed to protect OFFICIAL records (individually (IL3) and aggregated (IL5)). • A ‘Requirements for Secure Delivery of Online Public Services’ (RSDOPS) assessment has been carried out as part of the accreditation to profile the current system design against GPG43 guidance. The system has been continuously accredited since 2009 and is operated as a ‘private cloud’. Synectics also design and host the multiple fraud prevention solutions for the financial services sector. The Synectics ISMS is certified to ISO27001:2013. All fourteen cloud security principles are met in the delivery of all products securely. We have fully documented security policies available.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Configuration and change management processes are operated in line with ITIL V3.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Penetration and Vulnerability tests will be completed on an annual basis. If further investigation is required we will evoke the BCP to manage and operate a project team to rectify issues and risks to the business. The IT Security team use a number feeds to enable them to proactively manage new threats and vulnerabilities and reduce the windows of vulnerability. These include: NCSC, McAfee, CheckPoint, Microsoft, AlienVault Open Threat Exchange, thehackernews, theregister and reddit. Synectics also participate in the NCSC CiSP. Patch management is in accordance with defined patching policy dependant on risk and severity of situation.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Synectics have implemented a protective monitoring policy with associated technology and processes to oversee the use of ICT systems (including NFI) and to provide assurance and user accountability. This, along with the Information Security Incident Management policy forms part of the current NFI system accreditation and are documented within the current RMADS.
The technology employed includes IPS/IDS (intrusion prevention/detection) software and a SIEM (Security Incident and Event Management) solution. Penetration and Vulnerability tests will be completed on an annual basis. Incidents are accessed and responded to inline with our Information Security Incident Management policy.
Incident management type
Supplier-defined controls
Incident management approach
The Security Incident Management Policy and processes are designed in line with NCSC guidance, industry best practice, and ISO27035. Any incident that is uncovered will be rectified using each departments BCP plan. Any client is welcome to review the plans during an onsite visit or secure video conference. Users can report incidents through the dedicated helpdesk facilities and we are able to provide reporting.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks


£0.05 to £0.50 a transaction
Discount for educational organisations
Free trial available
Description of free trial
50 free searches to be used within 30 days ,

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.