enCircle Solutions Ltd.

Business Analysis and User Research

We provide IR35 compliant business analysis and user research for cloud services. Our analysts have over 30 years experience in business analysis for large organisations and in highly complex environments. Structured user research is performed to validate requirements and ensure traceability based on detailed user stories.


  • Business analysis performed by analysts with over 25 years experience
  • Ethical business analysts ensure we keep things simple
  • Business case development and BIA (business impact analysis)
  • Requirements capture, user stories and interactive white board sessions
  • Validation and verification of requirements through standard methodologies
  • Risk assessment and risk management plans
  • Technical business analysts with expertise in cloud services


  • Requirements traceability and visibility throughout the engagement
  • Independent accountability of subject matter experts to ensure best value
  • Reduced risk and rapid solution designs
  • Quality assured analysis to improve end user experiences
  • Ensures manageable and maintainable solutions are delivered to meet requirements
  • Ensures benefits realisation
  • Ensures end user buy-in to solutions
  • Ensures best value
  • Detailed documentation and solution designs lead to shorter development cycles
  • Ensures knowledge transfer from SMEs to development teams


£850 to £1,500 a person a day

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at gcloud@encircle.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

3 9 2 7 0 3 6 9 3 5 1 8 2 3 1


enCircle Solutions Ltd. Darren Woods
Telephone: 08449910109
Email: gcloud@encircle.co.uk


Planning service
How the planning service works
EnCircle run interactive workshops with our clients prior to submitting a full proposal and plan for the Discovery, Design and Implementation of Cloud hosting and software. We put the end user at the heart of the design, while ensuring a maintainable and intuitive service is delivered on time.
Planning service works with specific services


Training service provided
How the training service works
EnCircle define session plans and learning outcomes based on the Action Learning methodology. Our training staff are experienced in VARK and other teaching needs assessment methodologies to ensure students have the foundations necessary, leading to a robust understanding and achievement of the desired outcomes. From unconscious incompetence, through to conscious competence, we give students the information and tools they need to reach their desired level of competency.
Training is tied to specific services

Setup and migration

Setup or migration service available
How the setup or migration service works
Performing a full audit of existing systems, covering UI Flows and Data Model dimensions, we map the As-Is to the To-Be, clearly highlighting any gaps and mitigation of risks. Definition of discovery objectives and phased approach to deliverables, ensures requirements tractability and accountability throughout the service migration and also the ongoing service life cycle.
Setup or migration service is for specific cloud services

Quality assurance and performance testing

Quality assurance and performance testing service
How the quality assurance and performance testing works
In addition to performing our own internal component, module, and system testing, we also assist our clients in designing robust UAT (User Acceptance Testing) plans, along with the production of detailed scripts that are executable by end users. This ensures that expected outcomes and user experiences are of the highest quality and meet the expectations of the end users. Automated testing scripts may also be developed to ensure no service degradation is experienced in the event of high loads. Based on the needs of the client, we can provide multiple environments separated from Live, such as Dev, Test, UAT and Staging. By default we deploy at least one UAT environment where all changes are first tested and accepted by clients prior to action plans and roll back procedures being agreed for live deployments. We support multiple UAT iterations, and provide debugging support for any contributed modules, plugins and extensions provided by third parties (assuming we have access to the source code). We will also manage the relationship with third party code contributors to ensure prompt resolution of bugs.

Security testing

Security services
Security services type
  • Security strategy
  • Security risk management
  • Security design
  • Cyber security consultancy
  • Security testing
  • Security incident management
  • Security audit services
Certified security testers

Ongoing support

Ongoing support service
Types of service supported
  • Buyer hosting or software
  • Hosting or software provided by your organisation
  • Hosting or software provided by a third-party organisation
How the support service works
We provide comprehensive managed services to ensure the smooth running of cloud systems and software. Our team of experienced staff have an obsessive approach to support, ensuring end users are delighted by the services they are consuming. We support both buyer services and third party services provided by companies such as Microsoft, Memset, Amazon and Google (to name just a few). Private cloud / hybrid hosted solutions are also supported, e.g. where client support teams are over capacity or lacking experience in the particular software or service in question. We provide Open Source software support, including code audits and quality assurance, vulnerability assessment and monitoring. We provide an educated interface between clients and third party organisations, ensuring prompt communication and resolution of bugs, problems and known errors.

Service scope

Service constraints
As part of our proposal document we will clearly outline any constraints the client must be aware of prior to commencement of the project. Typical constraints may include number of concurrent users, support mechanisms, and response times. We endeavour to minimise constraints in line with budget, scope and milestones.

User support

Email or online ticketing support
Email or online ticketing
Support response times
We endeavour to respond to all requests within 1 hour, however we do prioritise issues and during peak times we may need a little longer to respond to questions, rather than incidents. Incident response times are included in our SLA.
User can manage status and priority of support tickets
Online ticketing support accessibility
WCAG 2.1 A
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Support levels
EnCircle provide just one standard service level, with the optional addition of 24/7 support at extra cost to be negotiated per service. Service owners have a direct line to their technical account manager who is highly skilled and able to diagnose problems and pass straight to third line support if needed. This limits the overhead on the client, and allows enCircle's support team to triage requests promptly and within the shortest time frames possible. We aim to delight our customers with our obsessive commitment to responsive and consistent support.


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)


£850 to £1,500 a person a day
Discount for educational organisations

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at gcloud@encircle.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.