CTI Digital

Magento 2 Ecommerce Store

Plan, Design, and Build a Magento 2 Commerce, Open Source License Ecommerce online store. Migrate, Upgrade from End of life Magento Community or Enterprise Edition to Magento2. Back office integrations with ERP, CRM and Account systems. WCAG accessibility, PCI compliant. Mobile first responsive, portal, international, multi-site, webshop, marketplace, online payment.

Features

  • Certified: Magento Developers, Partners, PCI Compliant, ISO27001 ISO9001 , ITIL
  • Integrate: Sage 50 x3 200 one, Salesforce, Xero, Linnworks, Orderwise
  • Integrate: Microsoft Dynamics NAV, SAP Business one, Brightpearl, Access Dimensions
  • Integrate: bespoke, ERP, CRM, Accounts, Back Office, Stock Management
  • Marketing: Amazon, eBay, Bronto, Dotmail, DotDigital, MailChimp, Campaign Monitor
  • Theme: Accessibility, WCAG, Mobile first, Responsive, Design, Theme, Templates
  • Optimise: User Experience UX, Conversion Rate Optimisation CRO, Checkout, Basket
  • Payment: Sagepay, Adyen, Braintree, Paypal, Klarna, Stripe, Applepay, Stripe, Worldpay
  • Improve: Speed Optimisation, Cache, Content Distribution Network CDN, Scalable, Performance
  • Feature: B2B, B2C, Portal, Click and Collect, Store, Sample, Payments

Benefits

  • Project Management: Agile, SCRUM, Waterfall, Government Digital Services GDS
  • Quality Assurance QA : ISO 9001, Automated, Smoke, Unit, Testing,
  • Research: Buyer Journey, Customer Persona, Analytics, Business Intelligence, Split A/B
  • Team: UK Based, Magento Certified, Strategy, Creative, Design, Marketing, Development
  • GDS: Discovery, Alpha, Prototype, Beta, Public Beta, Live
  • Specialist: Content Strategy, Card Sorting, Navigation Mapping, Integration, Migration, DevOps.
  • Clients: Govenment, Education, Local Council, Charity, Multi-nationals, Large, SME, Start-up
  • Hosting: Amazon AWS, Rackspace, UKFast, Azure, Scalable, Cloud, High Availability,
  • Support: Maintenance, Service Level Agreement SLA, Service Credit, 24/7365, Helpdesk
  • Migration: Magento end of life, Shopify plus, BigCommerce, Shopware, Hybris,

Pricing

£30000 per instance

  • Education pricing available

Service documents

Framework

G-Cloud 11

Service ID

2 9 5 9 5 3 6 1 2 8 1 4 5 8 1

Contact

CTI Digital

Steve Gale

0161 713 2434

tenders@ctidigital.com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
The service is designed to provide a Magento 2 application on a fully managed AWS cloud hosting infrastructure.
System requirements
  • Magento 2 application
  • Amazon Web Services Hosting

User support

Email or online ticketing support
Email or online ticketing
Support response times
Service operates consistently: 24 hours a day, 7 days a week.

Critical Faults: Response 15 Mins / Target Fix 1 Hour
Urgent Faults: Response 1 Hour / Target Fix 8 Hours
Important Fault: Response 5 Hours / Target Fix 3 Days
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 A
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 A
Web chat accessibility testing
Atlassian suite is a tried and tested industry-leading third-party software package.
Onsite support
Yes, at extra cost
Support levels
Support from £1,250 / month based on a 12-month contract. - Price varies based on number of storefronts and online turnover Service includes: - Critical Support SLA 24/7/365 - Critical Support response within 1 hour - Critical callout/resolution charges included within the fixed monthly cost - Management & maintenance of hosting & application - Uptime & application monitoring (and response to alerts without your intervention) - 24/7 support hotline - Offsite backups - Development & testing environments - Advanced deployment system - Technical account manager
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Our well-documented onboarding process guides you through a smooth service transition. Training can be conducted via Webex or at our Manchester Studio. (or at your premises at additional cost). 1 - Service orientation - General introductions - Key contract identifications - Systems introduction and access - Support service details - Onboarding process and timeline 2 - Systems orientation (on a dedicated workspace for you) - Service desk (reporting faults, checking progress) - JIRA (ticket management, project management) - Confluence (documentation, collaboration) - Reporting (SLA performance, budget management)
Service documentation
Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction
Application: You will have continuous access to pull a copy from the code repository. Documentation: You will have continuous access to export from the Atlassian suite
End-of-contract process
Application: You will have continuous access to pull a copy from the code repository. Documentation: You will have continuous access to export from the Atlassian suite. Handover: 2 x 1-hour webex / conference calls and 4 hours of helpdesk time to help facilitate and handover.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Our in-house theme system is the result of over 400 hours of work leveraging insights from the world's leading user experience research organisations including the Baymard Institute, Nielsen Norman and E-Consultancy.

The accelerator theme allows us to quickly construct and customise your store layout to fit devices of all shapes and sizes across 5 responsive breakpoints. Your customers can browse and buy from your store using any mobile phone or tablet.
Service interface
Yes
Description of service interface
Magento Administration panel is accessed via any browser.
Granular user permissions can be configured with a fully logged audit trail.
Accessibility standards
WCAG 2.1 A
Accessibility testing
Magento is a tried and tested industry-leading third-party software package.
API
Yes
What users can and can't do using the API
Magento is a tried and tested industry-leading third-party software package.

RestFul API is available for custom integrations.
Many integrations for popular applications already exist within the Magento Marketplace.
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • ODF
  • PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Magento is a tried and tested industry-leading third-party software package.

Almost every aspect can be customised through the comprehensive extension market place.

Our fully certified development team can also create bespoke customisations to tailor the service to your organisation's exact needs.

Scaling

Independence of resources
Each instance is provisioned independently through Amazon Web Services.

Analytics

Service usage metrics
Yes
Metrics types
Google analytics
We’ll integrate Google analytics with ecommerce tracking allowing you to gain a valuable insight into checkout goals in addition to how the customers arrived at your site, and their behaviour whilst they are on it.

Admin dashboard reports
You can access many business reports directly through the Magento administration including:
Sales report
Tax report
Abandoned shopping cart report
Best viewed products report
Low stock report
Search terms report
Product reviews report
Promo code usage report
Total sales invoiced report
Total sales refunded report
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Magento Commerce, Amazon Web Services

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Application: You will have continuous access to pull a copy from the code repository. Documentation: You will have continuous access to export from the Atlassian suite.

Additionally, data can also be exported at any time directly from Magento admin.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
Service operates consistently: 24 hours a day, 7 days a week. Critical Faults: Response 15 Mins / Target Fix 1 Hour Urgent Faults: Response 1 Hour / Target Fix 8 Hours Important Fault: Response 5 Hours / Target Fix 3 Days
Approach to resilience
Hosting is provided by Amazon Web Services, however, alternatives are available if required. Our unique implementation details are available upon request.
Outage reporting
We report service outages via multiple channels to nominated stakeholders. (Typically The Product Owner) Automated notifications - Monitoring alert - JIRA alert - Email - Text Manual notification - Call - Online chat

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
We can operate a detailed hierarchy of access permissions. Your application 'self managed', allowing a superuser to manage others permissions. Public key authentication (including by TLS client certificate) Identity federation with existing provider (for example Google apps) Username or password Other Other
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
Yes
Any other security certifications
Cyber Security Essentials

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
CTI Digital Information Services Team (IST) has been established to manage information services within the organisation, chaired by a Technical Director or Director. The IST is made up of appropriate senior organisational managers. It exists, in part, to: Ensure that CTI Digital and its staff and students meet the requirements of extant UK legislation and regulations in relation to Information Security; Ensure that there is clear direction and visible management support for security initiatives within the organisation; Ensure that appropriate risk management assessments are resourced an undertaken; and Promote security through appropriate commitment and adequate resourcing.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We adhere to Magento Developer best practice and rigorous QA process to review code before and test after deployment. Regular service reviews capture your requirements to security and make changes to our testing process and identifies remedial work that should take place to reach the new benchmark of compliance.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We adhere to Magento best practice for deploying patches to our service. The threat is assessed to identify urgency vs impact on a case by case basis
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We implement New Relic monitoring to provide detail reports on service performance and on-going vulnerability. Notifications are handled inline with our SLAs. Service operates consistently: 24 hours a day, 7 days a week. Critical Faults: Response 15 Mins / Target Fix 1 Hour Urgent Faults: Response 1 Hour / Target Fix 8 Hours Important Fault: Response 5 Hours / Target Fix 3 Days
Incident management type
Supplier-defined controls
Incident management approach
Certain service outages have automated recovery response potentially bringing services online within 2 minutes of an issue. We have common workflow process which resolve 80% of all issues. A further 10% of all issues are resolved with Systems administration intervention and only the final 10% of issues usually result in the need to write new code. Issues are reported by automated monitoring, servicedesk, helpline, email or chat. You receive realtime access to incident reports, and are sent regular service performance reports.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Pricing

Price
£30000 per instance
Discount for educational organisations
Yes
Free trial available
No

Service documents

Return to top ↑