Answers and Solutions ltd

Events, Conferences and Meeting Organisation Solutions.

A cloud app for events and meeting management. Online meeting Description are easily setup. Download / upload lists of attendees from a control panel. Send invitations. Invitees can book and pay for tickets if you set a charge.

You can check people into your event.

Features

  • Allows end-uses to quickly create an events website
  • Installed onto our hosting system for a one-stop experience

Benefits

  • Easy way to notify / manage Publicity for your events

Pricing

£2,000 a unit a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Christopher.Wainwright@letsdiscuss.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

3 9 2 7 7 5 1 0 5 3 1 4 4 7 1

Contact

Answers and Solutions ltd Christopher Wainwright
Telephone: 07887747918
Email: Christopher.Wainwright@letsdiscuss.co.uk

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Cloud hosting services.
Cloud deployment model
  • Private cloud
  • Community cloud
Service constraints
The software is highly configurable. For all practical purposes, you are unlikely to be constrained by it.
System requirements
A web browser is required

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Usually within a few hours, but our SLA will be 48hrs
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
No
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
We shall produce a base system setup. Our price includes some "get you going" support - see the service description documentation
Support available to third parties
No

Onboarding and offboarding

Getting started
We can provide an onsite trainer. Online training video's are widely available. Someone with good IT skills but familiar with WordPress can often master the package after 2 or 3 days.

We make sue that the system is fully setup, logon passwords provided and suitable initial designs and themes and plugins are loaded.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
On contract end, once your user has secured new hosting we can migrate the WordPress installation to the new provider.
End-of-contract process
On contract end, once your user has secured new hosting we can migrate the WordPress installation to the new provider.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
The differences will depend on how you design your deployment.
Service interface
Yes
Description of service interface
The Webbrowser based interface with enhanced access rights allows relatively low skilled staff to maintain a site. Someone with a higher skill set will be needed to set it up initially.
Accessibility standards
None or don’t know
Description of accessibility
The interface is well designed but not certified to these EU standards
Accessibility testing
The interface is well designed but not certified to these EU standards
API
No
Customisation available
No

Scaling

Independence of resources
The software will be hosted on servers that we own and operate. These can scale out significantly, and additional servers will be added when the need arises.

Our company policy is to over-provision, not under provision.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Data can be exported to Excel
Data export formats
  • CSV
  • Other
Other data export formats
CSV and Excel XLS formats supported
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
We aim for 99.9% availability. In the event of an unplanned outage of one or more hours being notified we will provide a week of free operation.

Pre-notified outages do not qualify for refunds since we will liaise with the customer and choose a time mutually acceptable. Planned works are rare, and will be scheduled for out of hours.
Approach to resilience
This is available on request
Outage reporting
A public dashboard

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
N/A in this document. Management interfaces are provided in our cloud hosting document
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
No audit information available
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
Yes
Who accredited the PCI DSS certification
WorldPay
PCI DSS accreditation date
31/10/2019
What the PCI DSS doesn’t cover
We do not store CC details on our servers; CC details are processed by our bank on their PCI DSS certified servers. Our PCI certification was issued with this processing method declared. Most payment processing applications handover to an external CC payment provider, who accepts payment before handing purchase approval back to the application that you would be running on our system. This means that our PCI DSS certification is suitable for eCommerce solutions used by most organisations . If you want to store people CC details on our servers, that can be arranged and our PCI DSS would be amended to suit. Your software solution would need to be PCI DSS compliant. Using a 3rd party processor such as Worldpay [or one of their numerous competitors] is by far the best way to handle PCIO DSS aspects of Credit Card processing.
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Word Press security is passed across to the buyer once the system is installed via the Admin login details
Information security policies and processes
Information security is maintained in house and managed via our Information security policies

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We use the ITiL Configuration and Change management appraoch
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
WordPress systems are scanned for vulnerabilities using entry level Pen Testing tools. WordPress has an an automatic patching features which we ensure was active prior to handover. We are subscribed various services that check the integrity of our hosting platform. We run regular Anti-Virus scans.
Protective monitoring type
Undisclosed
Protective monitoring approach
We are subscribed various services that check the integrity of our hosting platform. We run regular Anti-Virus scans. The risks not covered include those from people with valid username/passwords who deface a website / damage data etc. Scanning services that address this risk are available at extra cost.

Our aim is to avoid being compromised. Our response is determined by the type of compromise detected.
Incident management type
Undisclosed
Incident management approach
Users can report incidents via a ticketing system. Reported incidents will be logged and an incident report provided at month end. Reports will not be generated in those months when no incidents occurred unless requested by the buyer

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Pricing

Price
£2,000 a unit a year
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Christopher.Wainwright@letsdiscuss.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.