Microsoft .NET Development and Support Service

Techmodal’s Microsoft .NET Development and Support Service uses a toolkit of reusable open-source components and web services to save the client time and money. Solutions can be deployed to SharePoint, Office 365, Paas or on-site.


  • Databases: MySQL, Oracle, MSSQL, CosmoDB or Firebase
  • Backend development using .NET or .NET Core
  • Frontend development using Angular, jQuery, CSS, SASS, Knockout
  • Application developing using Office 365 (O365), SharePoint, Logic Apps
  • Reporting using PowerBi or SSRS
  • Hosting using Azure, Docker, AWS or Heroku
  • Agile process using Scrum or Kanban


  • Flexibility to work with multiple platforms and technologies
  • Reusable components and services save time and cost
  • Access to large pool of skilled tech resources, personnel, experience
  • Flexible working arrangements (on-site, off-site, work packages etc)


£465 to £2,165 a person a day

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

3 7 9 2 5 3 4 7 9 6 1 5 8 7 0


Techmodal Asad Bukhari
Telephone: 0117 376 3477

Service scope

Software add-on or extension
What software services is the service an extension to
Azure, Office 365, .NET
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
System requirements

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Techmodal offer a multi-tier support solution and the level and nature of support we provide can be tailored to meet the specific needs of your organisation and user base.
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Onsite support
Support levels
Level 0 - Intuitive application help text
Level 1 - Basic support and troubleshooting
Level 2 - Break fix configuration issues
Level 3 - Application repair
Support available to third parties

Onboarding and offboarding

Getting started
Onsite training and user documentation is provided.
Service documentation
Documentation formats
End-of-contract data extraction
The ability to use the application is enduring, however there is no ongoing support to maintain with software upgrades and data structure changes after the end of the contract.
End-of-contract process

Using the service

Web browser interface
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Both are browser based
Service interface
Customisation available
Description of customisation
The intent of this service is to utilise existing services and components to create a customisable solution


Independence of resources
Users will have their application embedded within a separate application.


Service usage metrics


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
Private network or public sector network
Data protection within supplier network
  • IPsec or TLS VPN gateway
  • Other
Other protection within supplier network
2 x physical firewalls protecting the perimeter of the network

Availability and resilience

Guaranteed availability
Techmodal offer committed availability monthly. Techmodal can work with the client to plan any periods of service unavailability and will always work to ensure any unplanned outage is resolved within service level agreement thresholds.
Approach to resilience
The service provided by Techmodal is developed on existing Microsoft technology and therefore benefits from the investment Microsoft have made in resilience.
Outage reporting
For outages longer than an agreed threshold with the client (in minutes), an outage process is entered with an outage notification provided by email to agreed users. Outage updates are then provided hourly until the outage is resolved. Upon resolution, a reason for outage report is compiled for the client, providing details of the occurrence and future remedial actions being taken to avoid recurrence.

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
Techmodal achieves this by securely authenticating users before they are allowed to perform management activities, report faults or request changes to the service. These activities may be conducted through telephone or email. Restriction is also achieved through use of usernames and passwords.
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
Cyber Essentials Plus

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
Other security governance standards
Techmodal has IT Cyber Essentials accredited by IASME.
Information security policies and processes
Techmodal consultants adhere to all internal IT policy including each of the following areas: Data, Personal Security, IT Security, Disaster Prevention and Recovery and Social Media.

All Techmodal employees attend an annual security briefing and mandatory security training. When using client Information Systems, our consultants work in accordance with the client’s policies and procedures. Our company IT systems are backed up regularly and can be fully restored if required. Our company IT Disaster Recovery Policy supports the recovery of our operating capability with the minimum possible disruption from uncontrolled events.

Penetration testing is carried out annually. Access to any client data is strictly permissions based and issued on a need to know basis.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Techmodal have a release management process and plan, that the components of the client’s services are tracked through their lifetime. All changes are assessed to check they do not impact the efficiency or security of the system. Techmodal also employ an SNV system for managing the development and versioning of the system as it is developed. All changes are only placed into the required version.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Techmodal’s Software Delivery Manager is responsible for continually monitoring the vulnerability of the systems. Any potential threats, which may be identified by penetration testing or Oracle support are dealt with through patches in a period between a day or a week depending on criticality. Techmodal’s vulnerability management process consists of five phases: Preparation, Vulnerability scan, Define re-mediating actions, Implement re-mediating actions and Re-scan. Techmodal's consultants assess potential threats, and any that are accepted are added to the company’s issue tracker with a priority and dealt with by a patch within timelines based on criticality between 1 day and a week.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Techmodal have a Fortigate firewall protecting the network that allows us to actively monitor web traffic and to block domains where necessary. This firewall is regularly monitored by the IT Manager for improper use and unauthorised access. We also have Eset Mail Security that allows us to monitor and set parameters for emails intercepted on our Exchange server. Techmodal collect log data on the activities of both systems and users and review and audit it in near real-time. Coupled with intelligent baselining and effective prioritisation, this enables critical alerts to be raised to the right people at the right time.
Incident management type
Incident management approach
Techmodal have an in-house incident management process which is constantly being reviewed and improved within out ISO 9001 accreditation. Users can report incidents through email or phone and they are logged on the system and assigned to an appropriate person. Following investigation, a response is given including any remedial action that has been taken.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£465 to £2,165 a person a day
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.