WordPress Web Content Management System
WordPress hosted on Tibus ISO27001 G-Cloud platform. The WordPress Open Source solution is a fully extensible CMS and E-commerce platform providing: Web content Management; Online marketing; E-commerce; Online Communities; Intranet & Collaboration; Platform for web development and Integration 99.999% availability guarantee.
Features
- Secure Fully Managed Wordpress CMS Platform
- 24x7x365 monitoring, alerting and proactive support
- ISO27001 (IL2/IL3 equivalent)
- Data back ups
- Disaster Recovery & Business Continuity options
Benefits
- Easy to use out of box functionality
- Fast website deployment
- Update content quickly
- Manage Your Website from Any Computer
- Self-contained system no HTML editing software required
- Secure Platform that can scale as required
Pricing
£1,950 to £16,600 a unit
Service documents
Request an accessible format
Framework
G-Cloud 11
Service ID
3 1 9 6 6 6 5 3 0 7 9 0 8 4 7
Contact
Simply Zesty Limited
Darren Richardson
Telephone: 02890334044
Email: rfp@simplyzesty.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Website design, development and support services
- Cloud deployment model
- Private cloud
- Service constraints
- None
- System requirements
- Internet Access
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- See Terms and Conditions
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- .
- Web chat accessibility testing
- .
- Onsite support
- Yes, at extra cost
- Support levels
-
Clients have access to the Service Desk and a dedicated cloud support engineer as standard from 0800 - 1800 normal working days.
Email access to support desk is available 24x7x365.
Service is proactively monitored 24x7x365.
Out of normal business hours emergency telephone support is an additional cost of £100/MONTH. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Onsite training and user documentation available.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- As part of our Exit Management process we will provide a snapshot of the latest data once contract ends.
- End-of-contract process
-
WordPress Cloud Software Templates.
Additional services:
Technical Design
Project Management
Service Design
Configuration and Support
Application Support
Programmer
UX User Consultancy
Migration Services
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari 9+
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- MacOS
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- None
- Service interface
- No
- API
- Yes
- What users can and can't do using the API
- WordPress has a choice of thousands of community plugins that act as an API to integrate with different applications. Additionally we can provide custom code integration.
- API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Users can use WordPress to customise web pages, functionality and content.
Scaling
- Independence of resources
- Each instance is dedicated specifically for the client. As part of our Capacity Management process we will upgrade infrastructure as we approach 70% of overall resource.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We monitor the performance metrics of key hardware, operating systems, databases and application software. We will respond to any detected issues and report them immediately to the Client. Real time monitoring is available to the Client.
- Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Data is exported as either an XML or CSV File
- Data export formats
-
- CSV
- Other
- Other data export formats
- XML
- Data import formats
-
- CSV
- Other
- Other data import formats
- XML
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- We provide a 99.999% availability supported by service credits. If unavailable for over 0.001% time within a month, upon the Customer's request, we will credit the Customer's account the pro-rated cost for one-day's charges for each hour of unavailability, up to a maximum of 1 week’s charges within any one month. For the purpose of this Service Availability Commitment Remedy, a Week shall mean the period from 12:00:01 AM Monday, until 12:00:00 AM the following Sunday.
- Approach to resilience
-
Cloud and hosting services are delivered from our Tier 3 and 4 ISO 27001 accredited datacenters. All datacenters operate to ISO27001, ISO22301, ISO 50001, ISO9001, ISO 14001, OHAS 18001, PCI DSS standards and are audited and operated to the EU Code of Conduct’s best practice for datacenters. VESDA detection technology is installed and all infrastructure monitored 24x7x365 by the Network Operations Centre (NOC). There are dual 10G connections between each of our datacentres for resilience and we peer with 5 different Tier 1 telecoms to provide for the best connectivity and internet routes worldwide. In addition we are a member of INEX, LINX and LONAP for further capacity and resilience. There are no single points of failure, with redundancy built in at every layer of the load balanced platform, as well as within the core.
Tibus can facilitate any frequency of backups e.g. hourly, daily or anything in between. All data, including server configuration, application data and configuration, is backed up on minimum a daily basis, and retained for a minimum of 30 days. - Outage reporting
- Email alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Our Access Control Policy ensure that the principles of ‘least privilege’ and ‘need to know’ are applied consistently across the management of authorised access to information assets including management interfaces and support channels.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Certification Europe
- ISO/IEC 27001 accreditation date
- 14/01/2015
- What the ISO/IEC 27001 doesn’t cover
- All hosting and cloud infrastructure business processes are covered by ISO27001.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Secure Engineering Principles
Supplier Assurance
Training and Awareness
Information Security Metrics & KPIs
Remote Working
Removeable Media
Security Education and Awareness
Access Control Policy
Accounting and Audit
Anti Malware
Operating System Hardening
Business Security Continuity Management
Business Security Continuation Plan
Change Management Policy
Cryptography Policy
Customer Access Management
Email Usage
Forensic Readiness
IA Policy
Incident Identification Reporting and Management
Information Classification
Information Security in Project Management
Information System Backup
Information Transfer
Internal Audit
IT Account Management - Users
IT Account Policy – Administrator
Mobile Device and Telephony
Network Security
Patch Management
Physical and Environmental Controls
Secure Information Asset Disposal
Virtual Private Network
Document Control
Employee Arrivals
Employee Exit
Employee Movers
Security Operating Procedures
Corrective Action
There is a IT Security Working group chaired by the SIRO and including ITSO, Change Managers, Systems Manager. Reporting structure is available as an Organisational Chart detailing ISMS.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
We have a bespoke change management tool to enable all change requests to be logged, tracked, approved/rejected and reported on. The change management process includes:
• Documented Change Requests;
• Identification, prioritisation and initiation of change;
• Proper authorisation of change;
• Requirements analysis;
• Inter-dependency and compliance analysis;
• Business Impact Assessment;
• Change approach;
• Change testing;
• UAT and approval;
• Implementation, release planning and roll back procedures;
• Documentation;
• Change monitoring;
• Defined responsibilities of all users and IT personnel;
• Emergency change parameters. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Patch management is part of our ISO27001 ISMS.To assist the System Manager, there are a number of resources available for monitoring the status of vulnerabilities and patches including vendor/3rd party websites, mailing lists, vulnerability databases, Network management tools to scan for vulnerabilities on computers, provide information regarding needed patches and other software updates on those computers. Patch deployment should be conducted under direction of the Change Manager. They must be applied in a structured and methodical way, based on a determination of priority and within pragmatic timeframes: Emergency 24 hours, High priority 7 days, Medium within 30 days.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Systems are in place to alert NOC to potential issues as soon as they develop. The G Cloud platform sits behind perimeter enterprise-class, redundant core routers, firewalls and intrusion prevention systems. This includes Syslog, Netflow use of MD5 passwords. Perimeter firewalls are configured with ports locked down. Other ports are locked down to individual fixed IP addresses. Cisco IPS provides for real-time traffic analysis and packet logging on our IP networks to perform protocol analysis, content searching/matching to detect buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting. Regular vulnerability assessments of core network are undertaken.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
We provide a consolidated incident management process. The primary objective of the process is to restore normal operation as soon as possible, in accordance with service levels. The Incident Manager responsibilities include:
o Ensuring that issues are accurately recorded and that investigation is undertaken in a timely manner;
o Agreeing an appropriate priority with impacted users;
o Communicating relevant information about the incident and resolution progress to impacted users;
o Ensuring that business and technical escalations are managed in line with agreed best practice and service level targets;
o Communicating, resolution and closure of the incident to impacted users.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £1,950 to £16,600 a unit
- Discount for educational organisations
- No
- Free trial available
- No