Rapid Information Systems Ltd.

Rapid application platform

Rapid is an easy to use open source platform for creating powerful web, mobile, and form applications. It lowers the skillset required to build applications and supports collaboration, re-use and sharing, radically reducing development time and cost. It is highly flexible and any integration is possible.


  • Drag and drop, low code, application development
  • 100% browser-based, nothing to install
  • Easily create and integrate responsive web applications
  • Easily create offline mobile applications and progressive web apps
  • Easily create complex forms with save, resume, and summary
  • Open legacy systems with integration and modern UI
  • Easy to extend with custom code
  • Strong security with user roles and integration, for example AD
  • Modern reusable languages - HTML5, CSS3, JavaScript, jQuery, Java
  • Produces highly optimised code for scalability


  • Reduce time and cost of creating software
  • Create in house using less-skilled workers to produce amazing results
  • Keep full control of your software
  • Mobile working, integration, automation
  • Open and extend legacy systems
  • Supports agile, rapid prototyping, and remote working
  • Single platform for web, offline mobile, forms, webservice APIs
  • Quickly create applications for web, mobile, forms, and webservice APIs
  • Reduces overheads due to free / open source software
  • Radically reduces time to live for shorter development cycles


£5000 per instance per year

Service documents

G-Cloud 11


Rapid Information Systems Ltd.

Rapid Information Systems



Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to Whilst many completely stand-alone application are also developed with Rapid, it is often used to provide live two-way integration to multiple legacy systems, especially in social housing. For example joining up call centres with a single search and view of housing management, asset management, documents, sub-contractors, appointments, and more.
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints None
System requirements Chrome 20+, Firefox 17+, IE9+, Safari 6+

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Within 30 minutes 9-5, Monday to Friday. Weekend and out of hours support response within 1 hour, available at extra cost.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard None or don’t know
How the web chat support is accessible Users can chat, upload files, initiate screen share.
Web chat accessibility testing None
Onsite support Yes, at extra cost
Support levels Priority 1: Business Critical – The client requires urgent support to
perform its statutory duties.
Priority 2: Material Fault ‐ Interruption to normal service – The client is
still able to perform the majority of the statutory duties.
Priority 3: Cosmetic Fault
Priority 4: Change Request

No additional cost per standard levels. Engineer provided as necessary.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We provide onsite training, user documentation, and videos. Each new user receives a minimum of 2 days complimentary consultancy to help them make best use of the product.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction On a per-request basis. It is also likely the data is already stored on users existing legacy back-office applications and database.
End-of-contract process The contract includes annual support and maintenance. Additional costs can include bespoke build support (requiring investigation into customers' build or data), and any additional consultancy or training.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service We provide mobile clients for Android, iOS, and Windows Phone that allow Rapid apps to run completely offline as well as integrate with local hardware such as camera, GPS, phone, etc. We have also added progressive web app (PWA) support and all hardware integrated services previously available only through the mobile clients are now available though mobile browsers.
Service interface Yes
Description of service interface There is a secure administrative area where privileged users can monitor and administrate the service in considerable detail.
Accessibility standards None or don’t know
Description of accessibility Supports screen readers
Accessibility testing None
What users can and can't do using the API There are a number of tools within Rapid to create APIs. In addition existing Rapid actions can be called as webservices. This allows the setup of users, creation of apps, etc.
API documentation Yes
API documentation formats
  • HTML
  • Other
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Rapid is a highly flexible application development platform. Apps are created by adding pages and arranging controls with events that fire actions. Controls can be arranged visually in pages by low-skillset users. Actions are visually added to events in the same easy to use tool. Advanced users can make their own controls and actions by modifying definition files. Actions have an additional Java class which can be programmed to perform any required task on the server backend.


Independence of resources Each Rapid application instance is installed on it's own virtual machine.


Service usage metrics No


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach There are a variety of ways. Rapid is a flexible solution and can be made be made to export data from any user action. SOAP, RESTful, and JSON APIs are available too.
Data export formats
  • CSV
  • Other
Other data export formats PDF
Data import formats
  • CSV
  • Other
Other data import formats PDF

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network Other
Other protection within supplier network Data-in-transit within the network is not currently protected. Should it be required by customers it would be TLS.

Availability and resilience

Availability and resilience
Guaranteed availability Rapid aims for 99.95 percent uptime. Refunds on downtime can be negotiated.
Approach to resilience This is dependent on configuration/request. Loadbalancing, clusters, and fail-over are all supported.
Outage reporting Email alerts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Other user authentication Rapid is a flexible solution with various adaptors/plugins. Authentication adaptors can be created that support any mechanism. In addition to username and password IP address and user-agent string can be included in authentication as well as mac address, IMEI, IMSI, and SIMNO on mobile devices.
Access restrictions in management interfaces and support channels Username, password, IP address, user-agent string, mobile device ID
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Description of management access authentication Rapid is a flexible solution with various adaptors/plugins. Authentication adaptors can be created that support any mechanism. In addition to username and password IP address and user-agent string can be included in authentication as well as mac address, IMEI, IMSI, and SIMNO on mobile devices.

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach We adhere to customer requirements.
Information security policies and processes The CEO is ultimately responsible for the Information Security and thus also for the implementation of this policy. Responsibility for the implementation may be delegated to a named Information Security Responsible [e.g., Finance/Operations/IT].

The Information Security Responsible is responsible for the determination of which (if any) regulatory or other compliance requirements apply to the Company (e.g., PCI, HIPAA, GLBA, DFARS), as well as maintenance of documentation, implementation of the Policy and fulfilling the regulatory/compliance requirements of the Company.

The individual manager/team leader is responsible for compliance with the Policy, procedures and guidelines within his/her own group of personnel.

The individual employee is responsible for working within the rules of the Policy to protect the Company's data.

Every individual in the Company is tasked with immediately reporting any potential infringement of the Policy to the next available supervisor.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach The product produces a report of all files including a hash to compare configurations. These reports are saved at each modification to produce a history. Security impact is considered as part of regular penetration testing,
Vulnerability management type Supplier-defined controls
Vulnerability management approach Operating system security patches are applied automatically. Respective server webpages (generally Apache Tomcat) are monitored for reported on new patched vulnerabilities. Depending on the severity of the vulnerability patches are applied as soon as possible, or regularly every 6 months.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Tools psad and fail2ban are installed on all servers for automated scanning of log files and blocking of suspect IP addresses. In addition emails are sent which we investigate as soon as possible.
Incident management type Supplier-defined controls
Incident management approach Users report events via our support portal.
Incidents are investigated and users regularly communicated with as to progress.
Reports are provided as the incident is closed.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £5000 per instance per year
Discount for educational organisations No
Free trial available Yes
Description of free trial The community edition can be installed and used for free. It includes all features required to make applications but does not include enterprise features like AD integration, connection pooling, address search, etc.
Link to free trial https://github.com/RapidInfoSys/Rapid/releases

Service documents

pdf document: Pricing document pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑