DCSL Software Ltd

Cloud Build, implementation and Delivery of applications

DCSL services facilitate the design, build and implementation of software and applications into a Cloud environment.
DCSL consultants document the environment in detail, providing a detailed architecture and a seamless development to full implementation with comprehensive support and the on-going management and maintenance of the solution as required.


  • AGILE Development
  • C# - the professional’s choice of programming language
  • Web Applications & Website Development
  • Application Support & Maintenance
  • Bespoke Applications development
  • Bespoke Databases
  • Operational Systems
  • Legacy Software Modernisation
  • ASP.NET Web API (.NET Core) for web services
  • Xamarin for mobile apps


  • Development by Microsoft Gold Partner
  • UK based in house development
  • Customer IP ownership - Upon a projects completion
  • Bespoke solution best meeting individual organisation software requirements
  • Intelligent, cost-effective and intuitive web applications
  • Full project visibility and budget control
  • Flexible experienced development
  • Phased implementation available


£650 to £950 per person per day

Service documents

G-Cloud 11


DCSL Software Ltd

Nick Thompson

01252 235422


Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints Software development is bespoke to the customers needs, meaning constraints would be discussed on a per-project basis.
System requirements Dependant upon software requirement

User support

User support
Email or online ticketing support Yes, at extra cost
Support response times Within 1 hour. No support at weekends.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard None or don’t know
How the web chat support is accessible It can be accessed via www.dcslsoftware.com's home page.
Web chat accessibility testing None
Onsite support Yes, at extra cost
Support levels Standard support response levels.
1 Major Incident: 30 mins Identification of fault. 4 hours Fix Time
2 Incident: 4 hours Identification of fault. 48 hours Fix Time
3 Minor incident: 1 working day Identification of fault. 5 days Fix Time

Support includes:
Remote Support
Individual ownership of your fault
Professional case management
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started Bespoke solutions dependent on customer needs/requirements clarified by collaborative customer engagement.
The bespoke systems are designed to be intuitive. Based upon the users required process and collaborative design phase with DCSL. This minimises if not removes any required training. However, explicit training is sometimes desirable, for instance for a complex solution, or for a consumer service product. In these circumstances we can provide several options:
1: Training Workshops
2: Train the Trainer Sessions
3: Step by Step Guides and documentation
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction We provide IP ownership to the customer upon completion of software design.
End-of-contract process We provide IP ownership upon end of software development and continued support including team-wide knowledge retention, background system maintenance, database analysis, as well as being available to your team to answer any questions you may have on the use of the software.
This is based upon a monthly fee calculated from the initial software development cost.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service None
Service interface No
Customisation available Yes
Description of customisation DCSL provide a bespoke software development service customised to the user.
Working closely with stakeholders and using prototyping & wireframing, we can build upon your vision, define the strategy and create a fantastic product that delivers the results you are seeking.
The development process we propose for this project will include requirements analysis which incorporates collaborative wireframing and business workflow diagram creation.


Independence of resources DCSL can provide hosting as per requirement of the software and customer.


Service usage metrics No


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach In-house
Protecting data at rest Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Dependant upon bespoke software requirement
Data export formats
  • CSV
  • ODF
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Bonded fibre optic connections
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability Dependant upon developed software requirements.
Approach to resilience Dependant upon developed software requirements.
Outage reporting Dependant upon developed software requirements.

Identity and authentication

Identity and authentication
User authentication needed No
Access restrictions in management interfaces and support channels Dependant upon developed software requirements.
Access restriction testing frequency At least every 6 months
Management access authentication Other
Description of management access authentication As required by the client.

Audit information for users

Audit information for users
Access to user activity audit information Users receive audit information on a regular basis
How long user audit data is stored for User-defined
Access to supplier activity audit information Users receive audit information on a regular basis
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 The British Assesment Bureau
ISO/IEC 27001 accreditation date 22/05/2017
What the ISO/IEC 27001 doesn’t cover N/a
ISO 28000:2007 certification Yes
Who accredited the ISO 28000:2007 The British Assessment Bureau
ISO 28000:2007 accreditation date 21/05/2017
What the ISO 28000:2007 doesn’t cover N/a
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Cyber Essentials Plus

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes ISO 27001 certified
Cyber Essentials Plus

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Dependant upon developed software requirements.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Dependant upon developed software requirements.
Developed under ISO 27001 and Cyber Essentials Plus
Protective monitoring type Supplier-defined controls
Protective monitoring approach Dependant upon developed software requirements, and hosting utalised.
Incident management type Supplier-defined controls
Incident management approach Dependant upon hosting used.
Developed Software optional support is available.
Support is provided 9 to 5, Mon to Fri.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No


Price £650 to £950 per person per day
Discount for educational organisations No
Free trial available No

Service documents

pdf document: Pricing document pdf document: Terms and conditions
Service documents
Return to top ↑