Wirebox Ltd

Custom Software Development

Wirebox's custom software development service allows us to build and implement solutions into your business that can help streamline and automate your business processes, reduce time spent on tasks and allow for remote working.

Features

  • Bespoke development
  • Open Source projects
  • Automate business processes
  • No licensing costs
  • Technology Independent
  • Access the system remotely
  • Best practices in cyber security

Benefits

  • Developed to fit your requirements
  • Save time on manual processes
  • Reduce cost of monthly licensing
  • The best solution to use for your requirements
  • Access business information from anywhere with an internet connection
  • Minimises risk of security breaches
  • Increasing team efficiency
  • Allows for remote working
  • Utilise existing technology to save on development costs

Pricing

£5,000 a unit

  • Education pricing available

Service documents

Framework

G-Cloud 12

Service ID

2 8 5 5 6 8 7 8 5 3 1 9 1 0 2

Contact

Wirebox Ltd Ryan Taylor-Lunt
Telephone: 02079935485
Email: info@wirebox.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
This would be dependent on your requirements. Any constraints will be discussed after completing the discovery phase. If any issues arise, we will then be able to provide viable solutions.
System requirements
System requirements vary from project to project

User support

Email or online ticketing support
Yes, at extra cost
Support response times
You'll receive a response from our support team within 2 hours during working hours. Overnight/Weekend support tickets will be picked up the next business day.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
With any project at Wirebox, we highly recommend a support & maintenance agreement for once the project is live. This allows for the upkeep of the system.

Rather than having different offerings within our packages, our packages are based on an hourly figure. Starting at 2 hours (£75 per hour) to 10+ hours (£55 per hour).

You will be assigned an account manager who will be your main point of communication with Wirebox and assist with any requests.
Support available to third parties
No

Onboarding and offboarding

Getting started
Our sales team will initially understand your requirements and ask any questions which will need to be answered. Then we would require you to take part in a discovery day with our consultants, where we learn more about the project and can begin to discuss the finer details.

Once we have a firm understanding of the project, you will be assigned an account manager who will liaise between you & the project manager and discuss scheduling, timelines and key deliverables.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
When the project has been completed and final invoice paid, the system that was developed will belong to you.There would be no need to extract data.
End-of-contract process
The development time to build the bespoke system will be included within the contract. Support & Maintenance agreements and hosting costs will be additional unless otherwise stated.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
As the service is custom software development, it depends on the requirements of the initial project.

The requirements for mobile will be discussed during a discovery phase, so we understand what areas of the system will need to be accessed via mobile.
Service interface
No
API
No
Customisation available
Yes
Description of customisation
As the service is custom software development, we would look to understand your requirements in a discovery session. This will allow us to outline what is required on the software functionality wise and aesthetics.

Any further customisation out of scope will need to be done through support & maintenance or a fixed cost project.

Scaling

Independence of resources
We partner with AWS to provide scalable hosting of the system. This allows you to continue to use it as required. The servers we use scale with the requirements at the time of use.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
Never
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
No
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
As the company will have IP rights to the system upon final invoice payment, data export isn't required. For GDPR purposes we will be able to assist with data exportation when required.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
Private network or public sector network
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
As we use AWS hosting, our SLA's for availability fall in line with theirs. In terms of any major error occurring, during business hours our response time is within 2 hours.
Approach to resilience
This information is available upon request
Outage reporting
Wirebox developers receive email alerts and alerts in our internal messaging software, which allows them to pick up the issue.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
When developing solutions for clients, we learn to understand the different user types required. A general admin of a system will have control and visibility of the whole system, but we are able to restrict access dependent on the requirements for different user levels.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
Yes
Any other security certifications
Cyber Essentials

Security governance

Named board-level person responsible for service security
No
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
Cyber Essentials
Information security policies and processes
At Wirebox, our processes fall in line with the guidance from the ICO on GDPR requirements. Required security is implemented.

Our staff are trained in GDPR and understand the processes that are required to be adhered to.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We utilise a ticketing system which allows us to keep track of the configurations and changes that are made to the solution we have developed for you.

Changes are assessed by our developers who then discuss this internally with your account manager who then advises on the best approach to follow for the request.
Vulnerability management type
Undisclosed
Vulnerability management approach
Our internal system admin assesses potential threats through research and testing. They receive weekly alerts from market leaders in cyber security which outlines any vulnerabilities found. This allows our System Admin to then create patches or deploy solutions in order to mitigate threats.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Our protective monitoring approach relies on valuable information gained from market leaders in the cyber security sector. Alongside this we implement alerts and checks on all of the solutions that we develop. Allowing us to be proactive and reactive in a short amount of time.

If a compromise is found we alert the appropriate bodies within the specified time.
Incident management type
Supplier-defined controls
Incident management approach
Users are able to report incidents to your account manager, who will then pass it along to the development team. Users will also have access to our ticketing system which they are able to log tickets about an incident.

We can provide incident reports on request and you will be alerted to any incidents that do occur in the specified time frames.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Pricing

Price
£5,000 a unit
Discount for educational organisations
Yes
Free trial available
No

Service documents