Pivotal Technology

Cloud Based Development , Deployment & DevOps

Pivotal undertakes development, implementation, integration, and migration to the new platform from a conceptualisation stage to implementation of cloud-based solution. We deliver an customer-need based Minimum Viable Product (MVP), testing, learning, and iterating the service until it is made fit for purpose before going Live.


  • A business-user requirement leads to MVP-based implementation
  • Development of business case and preparing the target operating model
  • An operational system ready for use by real users
  • A duly authorised and prioritised backlog for future business needs
  • Agreed testing, implementation and deployment strategy and plan
  • Agreed metrics and measurements to enable KPI measurement
  • A definitive near technical solution architecture
  • An agreed approach to security adhering to industry accepted standards


  • Business led transformation change & design
  • Hosting partners enable transition to cloud
  • Extensive combined management team experience deliver large engagements
  • Road map to successful live implementation from conceptualisation stage
  • Innovative cost model to lower your total cost of ownership
  • Proven , strong track record of team
  • Strong Project Governance and management attention at all levels
  • Timely alerts of risks , issues and its visibility
  • Ability to scale up and down operations with ease


£120 to £950 per person per day

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 10


Pivotal Technology

Dilip Kumar Srivastava



Service scope

Service scope
Software add-on or extension No
Cloud deployment model Hybrid cloud
Service constraints We do not visualise any constraints that user may need to know however this aspect differs from project to project. It is dealt during the life cycle of the project.
System requirements
  • Laptops with internet access
  • Smartphones - Android or iOS
  • Tablets - Android or iOS

User support

User support
Email or online ticketing support Email or online ticketing
Support response times From 9 am to 5 pm UK business hours for all 7 days a week
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels We provide Level 1 - Level 4 support to all our customers depending upon the requirements based on an agreed SLA.
For all engagements , we assign a technical account manager to manage relationship and customer satisfaction.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Onsite Training, Train the trainer and user documentations are provided for the services undertaken by Pivotal
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Users shall be able to extract the data based on the contractual agreements
End-of-contract process A project closure synopsis is prepared and presentation to the client for formal sign off and handover. An agreed warranty period sets in and then the project is deemed as closed or the next phase of support and maintenance starts with a separate contract & terms.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service None
Accessibility standards None or don’t know
Description of accessibility Our services are accessible by industry accepted general norms
Accessibility testing Don't know
Customisation available Yes
Description of customisation We recommend that our solutions are configurable by users however in extreme cases, Pivotal would prefer to do it for the customers themselves.


Independence of resources We have strong process of hiring, training and employee retention. Normally we endeavour to keep an employee on a project for 18 - 24 months or more if the individuals wishes to continue in the same project.
There is a process for on-boarding of resource so that knowledge is retained


Service usage metrics Yes
Metrics types We shall be able to provide metrics agreed at the time of starting the project such systems usage, downtime and outage etc.
Reporting types Regular reports


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency Never
Protecting data at rest Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Users can export their data based on the application and business requirements agreed in project charter.
Data export formats
  • CSV
  • Other
Other data export formats XML
Data import formats
  • CSV
  • Other
Other data import formats XML

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Other
Other protection between networks We strong security policy to protect against breaches and threats
Data protection within supplier network Other
Other protection within supplier network We have strong security policy to protect against any breaches

Availability and resilience

Availability and resilience
Guaranteed availability We mutually agree SLA with each clients based on their business and operational needs. We are happy to discuss and agree a penal charges in the event of any failures that is beyond our reasonable control of rectification
Approach to resilience It will be available upon request
Outage reporting Email alerts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Configurable solutions are built based on customer needs.
Access restriction testing frequency Less than once a year
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach We are in the process of building our policies to meet the requirements.
Information security policies and processes We have a security policy and any breaches are reported to Technical Director for remedial actions

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach It is based on project to project and as per customer needs
Vulnerability management type Supplier-defined controls
Vulnerability management approach It is based on customer agreed to requirements and differs from project to project. We endeavour to deploy patches and fixes based on the agreed SLA
Protective monitoring type Supplier-defined controls
Protective monitoring approach Response and turnaround time is based on agreed SLA's with the client.
Incident management type Supplier-defined controls
Incident management approach We have a well defined process of incident management, tracking and resolution of the same. It is reported by the Technical Account Manager in his monthly communication to the client. An emergent incident critical to the business is report immediately

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £120 to £950 per person per day
Discount for educational organisations Yes
Free trial available Yes
Description of free trial Our solution shall be specific to a customer hence any discount or free trial will depend upon the client requirements.


Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑