Jofel Consultancy Ltd

Digital Transformation, Recommendation on Legacy System Migration, Technical & Professional Services

Digital transformation that helps organisations to move away from legacy code base. We take responsibility in developing new application (or) migrating existing applications to the cloud in a phased approach in an agile environments that helps the clients to achieve success .

Features

  • Requirement Analysis
  • Software Development
  • Software Deployment
  • Technical Architecture
  • Digital Transformation
  • Recommendations on Legacy System Migration

Benefits

  • Identifies scope of work involved and capture the requirements
  • Creates software services and components required to achieve the goal
  • Deploys the software services to cloud and accessible to users
  • Technical guidance on building software services and components
  • Revamping existing software services to meet the current business needs
  • Moving away from legacy systems and migration to the cloud

Pricing

£700 to £900 a person a day

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at jonathan.prem@gmail.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

4 2 3 9 0 7 8 7 1 7 6 0 9 0 8

Contact

Jofel Consultancy Ltd Prem Anand Fredrick Selvaraj Jonathan
Telephone: +447825523047
Email: jonathan.prem@gmail.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
No
System requirements
  • Software licences for the tools used to build the software
  • Access to cloud infrastructure where the services can be hosted

User support

Email or online ticketing support
Email or online ticketing
Support response times
Weekday 8 AM - 5 PM
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Using collaborative tools like Slack, MS-Teams
Web chat accessibility testing
No
Onsite support
Yes, at extra cost
Support levels
Business Analysts be onsite with the buyers product owners to gather the requirements.

Software developers be onsite with buyers development team to understand the tools used for development and the existing coding standards.

QA analysts be onsite with buyers testing team to understand the tools used for testing and the existing strategies used for testing.

Technical Architects be onsite with buyers architect team to understand the existing architecture and propose the architecture design.

All be required to be paid their day rate depending on their skillset and experience and the travel expenses while visiting onsite.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Providing user documentation that helps users to start using our services.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
  • Confluence
  • Readme
  • Wiki Pages
End-of-contract data extraction
Shall return the Covered Data to Institution unless Institution requests that such data be destroyed.
End-of-contract process
Contract can end when we have done all that the contract requires. Some obligations may continue after the end of the contract. For example, the contract may continue to require us to keep some information confidential.

Using the service

Web browser interface
No
Application to install
No
Designed for use on mobile devices
No
Service interface
No
API
No
Customisation available
No

Scaling

Independence of resources
Resources won't be shared across users, every user got their dedicated resources assigned to them.

Analytics

Service usage metrics
Yes
Metrics types
Service Availability
Number of Service Interruptions
Duration of Service Interruptions
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least every 6 months
Penetration testing approach
In-house
Protecting data at rest
Encryption of all physical media
Data sanitisation process
No
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Existing cloud services used by the users to export their data safely & securely.
Data export formats
  • CSV
  • Other
Other data export formats
Users requested formats
Data import formats
  • CSV
  • Other
Other data import formats
Users requested formats

Data-in-transit protection

Data protection between buyer and supplier networks
Private network or public sector network
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Onsite Availability
Weekday 8 AM - 5 PM

Phone support availability
9 to 5 (UK time), Monday to Friday

Web chat support availability
9 to 5 (UK time), Monday to Friday
Approach to resilience
Available on request.
Outage reporting
Public dashboard, API & email alerts are available.

Identity and authentication

User authentication needed
No
Access restrictions in management interfaces and support channels
Management interfaces and support channels be protected by username & password.
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Available on request.
Information security policies and processes
Available on request.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Available on request.
Vulnerability management type
Undisclosed
Vulnerability management approach
Available on request.
Protective monitoring type
Undisclosed
Protective monitoring approach
Available on request.
Incident management type
Undisclosed
Incident management approach
Available on request.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Pricing

Price
£700 to £900 a person a day
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at jonathan.prem@gmail.com. Tell them what format you need. It will help if you say what assistive technology you use.