RSI Content Solutions

Marklogic services and CMS

We provide MarkLogic services to their customers across the globe. We also have Automated CMS named RSuite. We are specialized in Marklogic development and Admin.

Features

  • Marklogic development
  • Automated CMS for publishing

Benefits

  • MarkLogic development and Administration
  • Metadata management
  • Multi platform publishing

Pricing

£320 to £480 per person per day

  • Education pricing available

Service documents

G-Cloud 9

313641943999586

RSI Content Solutions

Ramprasad Dommaraju

+919566202885

prasad@rsicms.com

Service scope

Service scope
Service constraints Nothing
System requirements Marklogic license

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Quicktime
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard WCAG 2.0 A
Web chat accessibility testing Skype for Business
Gotomeeting
Webex
Onsite support Yes, at extra cost
Support levels We give complete support free for initial stipulated period. After the free support period , Costs will be included separately.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started We provide online training and user documentation.
If required,we also provide onsite training on case to case basis.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction They have to get in touch with our 24/7 support team for the above.
End-of-contract process While submitting the proposal,We give the complete terms and conditions of the pricing.

Using the service

Using the service
Web browser interface Yes
Using the web interface RSuite is a web application.Just by a click,complete application can be accessed.
Create user accounts
Access rights to the content repository
Complete communication can be carried o
Web interface accessibility standard WCAG 2.0 A
Web interface accessibility testing RSuite supports 508 Compliance standards.Our software and website is accessible to people with assistance.
API Yes
What users can and can't do using the API RSuite application can be customized and featured using API.
API automation tools Other
Other API automation tools
  • Topleaf
  • Oxygen
  • Selenium
API documentation Yes
API documentation formats
  • HTML
  • PDF
Command line interface No

Scaling

Scaling
Scaling available Yes
Scaling type Manual
Independence of resources We have been working with customers across the globe for 15 years and we update our software every year with latest integrations to keep up with the emerging technologies.
Usage notifications Yes
Usage reporting Email

Analytics

Analytics
Infrastructure or application metrics Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations Other locations
User control over data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency At least every 6 months
Penetration testing approach In-house
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process No
Equipment disposal approach In-house destruction process

Backup and recovery

Backup and recovery
Backup and recovery Yes
What’s backed up
  • Files
  • Databases
  • Digital asset management
Backup controls Backup can be scheduled in automated way by the users.
Datacentre setup Single datacentre with multiple copies
Scheduling backups Users contact the support team to schedule backups
Backup recovery Users contact the support team

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Legacy SSL and TLS (under version 1.2)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability We usually Adhere to the points covered in the MSA supplied by the client itself and agree to the terms and conditions mentioned.
Approach to resilience Available on request
Outage reporting Email alerts

Identity and authentication

Identity and authentication
User authentication Username or password
Access restrictions in management interfaces and support channels Our software provides rights management to admin where they can control the complete restrictions.
Access restriction testing frequency At least every 6 months
Management access authentication Username or password
Devices users manage the service through Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation No
Security governance approach We make it a point to sign NDA and maintain confidetality.
Information security policies and processes We make sure that our systems are secured,Resources completely undergo security process which is a mandate.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Not applicable
Vulnerability management type Supplier-defined controls
Vulnerability management approach We don't see any threats to our services and also we do regular updates on our software.
Protective monitoring type Supplier-defined controls
Protective monitoring approach We have 24/7 support to address any issues.
Incident management type Undisclosed
Incident management approach Users are given access to project management tool like JIRA and can also send emails to support team.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart No

Energy efficiency

Energy efficiency
Energy-efficient datacentres No

Pricing

Pricing
Price £320 to £480 per person per day
Discount for educational organisations Yes
Free trial available No

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑