Design Direct Web Solutions Ltd

Software and Software as Service

Design Direct Web Solutions provide Software and SaaS Applications to protect the privacy of each customers while providing service that is reliable and secure—on a massive scale. Customers can access and download their data stored and saved in CSV, Excel or Zip Folder using a secure username and password.

Features

  • A Subscription Model
  • Centrally Maintained Multi-user Architecture
  • Customers can access applications remotely via the Web.
  • Improved Access to Data from any Networked Device
  • SaaS Integration Platforms for Building Additional Applications
  • Powerful Backend to Process Large Amounts of Data
  • Easy Scalability and Quick Integration with Other Similar Systems
  • Efficient Development Process Using Latest Standards
  • Quality Assurance in Compliance with Latest Technology
  • Documentation Guide & 24/7 User Support

Benefits

  • Pay per use
  • Scalability and Reliability
  • Reduced Operational Risk
  • Less Onsite IT infrastructure
  • Stops Software Piracy and Illegal Software Distribution
  • Less Management and More Productivity
  • Improvement in Product/Services Quality
  • More Profit and Predictable Income
  • Faster Integration of New Functions and Updates
  • Simple authentication process

Pricing

£30 to £60 per unit per hour

  • Education pricing available
  • Free trial available

Service documents

Framework

G-Cloud 11

Service ID

3 3 4 3 3 7 8 8 5 8 9 4 0 6 7

Contact

Design Direct Web Solutions Ltd

Roys Kalarikkan

02083634905

Info@designdirectuk.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
There are only specific service constraints on Design Direct Software and Software as a Service.
• Consumers need to make only a one-off payment on software.
• All services can be drawn on subscription basis.
• Users need to pay for the resources they consume.
System requirements
  • PC - Windows 7 and above
  • Desktop browsers - Internet Explorer 10 or later
  • Desktop browsers - Edge (latest stable version)
  • Desktop browsers - Firefox (latest stable version)
  • Desktop browsers - Google Chrome (latest stable version)
  • Desktop browsers - Safari (latest stable version)
  • Mobile apps - iOS 8 or later
  • Mobile apps - Android 4.4 or later

User support

Email or online ticketing support
Email or online ticketing
Support response times
Service will be available from 07:00 AM to 05:30 PM, Monday through Friday. Incidents reported or services requested outside the working hours and weekends (Saturday and Sunday) will be served at the next scheduled working day (Monday), unless for a major incident/emergency is invoked by Clients. If it is an emergency incident/issue, we will try to fix it as early as possible
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AAA
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Clients can enter their issues/concerns or any other communications in the chat window provided in the website and we respond to the chat queries at the earliest
Web chat accessibility testing
Not Applicable
Onsite support
Yes, at extra cost
Support levels
In support of services requested/initiated by Clients, we will be immediately available over the telephone and email, to register the issue and the target resolution time for each Incident or Service Request depends on its priority.

We will respond to the requests/incidents within the following time frames:
• High priority incidents/issues – within 1 hour
• Medium priority/low priority incidents/issues – within 2 hours

In the rare event that the problem cannot be solved within 2 hours, the client will be immediately notified by telephone. We provide a detailed overview of the issue and inform them when it will be resolved. We will keep the Clients updated with phone calls until the problem is resolved.
Support available to third parties
No

Onboarding and offboarding

Getting started
Our in - house team of UI Designers, Developers, Quality Analyst, App developers(wherever applicable), CTO and a dedicated Project Manager will be working in any development projects and the Project Manager works closely with Clients, during and after the project delivery. We have a well structured project process and follows agile methodology, where complete project documentation will be prepared and shared with users. We also do milestone meetings and client will be kept informed about the status. We provide onsite training to clients while project delivery.
Service documentation
Yes
Documentation formats
  • PDF
  • Other
Other documentation formats
  • MS Word
  • Google Docs
End-of-contract data extraction
As per the GDPR, the clients need to send a mail to our email from their registered/official email address notifying discontinuation or end of contract, so that we will send all the details in a downloadable zip file via email or via a downloadable secured link.
End-of-contract process
All the features and functionalities in the project proposal will be included in the price and any other extra/additional service may incur extra price and quote.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
  • Other
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
The mobile application is developed with all the features as the browser or desktop application
Service interface
No
API
No
Customisation available
Yes
Description of customisation
Users can make customisation as per their requirement and make it a complete bespoke application.

Scaling

Independence of resources
Our Inhouse team of experts are working for the clients, with individual project managers to manage each clients.

Analytics

Service usage metrics
Yes
Metrics types
Analytics can be viewed and monitored in the dashboards on a regular basis. Users can also get the reports upon request.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least every 6 months
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Users can get their data in a downloadable zip file via email or via a downloadable secured link, upon their request
Data export formats
  • CSV
  • Other
Other data export formats
MS Excel
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection within supplier network
We set up our own firewalls and other high end security measures on our servers.

Availability and resilience

Guaranteed availability
We provide SLAs to our clients for a better understanding of our service terms and processes and it covers the services included, service scope, service hours, service availability, service reliability, service mode and monitoring service performance.
Approach to resilience
Available on request.
Outage reporting
We usually inform through Telephone and Email alerts.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
We have a standard policy to define and implement access restrictions in management interfaces and support channels which depends on each customer’s specific requirement.
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users receive audit information on a regular basis
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users receive audit information on a regular basis
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Our Governance specifies the accountability framework and provides oversight to ensure that risks are adequately mitigated, while management ensures that controls are implemented to mitigate risks. Management recommends security strategies. We have defined organisational structure with roles and responsibilities assigned to each users, designed and maintaining a governance policy for compliance and risk management.
Information security policies and processes
IT governance-related committees include Top-level IT steering committee for oversight of major IT policies and initiatives IT advisory committees for administration and teaching and learning IT initiative specific committees for items like enterprise resource planning, security or business continuity Governance structures depend on desired outcomes.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We prepare a detailed documentation of the project scope and share with the client. Also any changes coming over the scope of the project will be through a change request doc and this will also be tracked and maintained along with project docs.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Our inhouse team keeps an everyday track for any potential threats and preventive measures are taken to minimise the issues. if in any case any issues or downtime happens, we ensure the same is being addressed at the earliest.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Protective Monitoring solution will provide visibility and an understanding of who is accessing the files and in what frequency. Each of the Protective Monitoring Controls has an obligation to record specific information and this is done based on user requests. For example keeping accurate time stamps, recording of user activities, suspicious activities, record on data back ups, alerting critical events etc.
Incident management type
Supplier-defined controls
Incident management approach
An Incident can be reported by telephone during working hours, or by mail or by the Web Portal. In support of services, we will be available over the telephone and email, register the issue and the target resolution time for each Incident. We will respond to the incidents within: • High priority incidents – within 1 hour • Medium/low priority incidents – in 2 hours In the rare event that the problem cannot be solved within 2 hours the client will be notified by telephone. Also the client will be kept updated with phone calls until the problem is resolved.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Pricing

Price
£30 to £60 per unit per hour
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
We can provide a free trial version of the software and the users can test use it up-to a period of 30 days on a free trial basis.

Service documents

Return to top ↑