DCSL Software Ltd

Cloud Build, implementation and Delivery of applications

DCSL services facilitate the design, build and implementation of software and applications into a Cloud environment.
DCSL consultants document the environment in detail, providing a detailed architecture and a seamless development to full implementation with comprehensive support and the on-going management and maintenance of the solution as required.

Features

  • AGILE Development
  • C# - the professional’s choice of programming language
  • Web Applications & Website Development
  • Application Support & Maintenance
  • Bespoke Applications development
  • Bespoke Databases
  • Operational Systems
  • Legacy Software Modernisation
  • ASP.NET Web API (.NET Core) for web services
  • Xamarin for mobile apps

Benefits

  • Development by Microsoft Gold Partner
  • UK based in house development
  • Customer IP ownership - Upon a projects completion
  • Bespoke solution best meeting individual organisation software requirements
  • Intelligent, cost-effective and intuitive web applications
  • Full project visibility and budget control
  • Flexible experienced development
  • Phased implementation available

Pricing

£650 to £950 per person per day

Service documents

Framework

G-Cloud 11

Service ID

4 6 6 3 5 7 6 2 3 8 3 6 7 2 2

Contact

DCSL Software Ltd

Nick Thompson

01252 235422

Tenders@dcslsoftware.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
Software development is bespoke to the customers needs, meaning constraints would be discussed on a per-project basis.
System requirements
Dependant upon software requirement

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Within 1 hour. No support at weekends.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
It can be accessed via www.dcslsoftware.com's home page.
Web chat accessibility testing
None
Onsite support
Yes, at extra cost
Support levels
Standard support response levels.
1 Major Incident: 30 mins Identification of fault. 4 hours Fix Time
2 Incident: 4 hours Identification of fault. 48 hours Fix Time
3 Minor incident: 1 working day Identification of fault. 5 days Fix Time

Support includes:
Remote Support
Individual ownership of your fault
Professional case management
Support available to third parties
No

Onboarding and offboarding

Getting started
Bespoke solutions dependent on customer needs/requirements clarified by collaborative customer engagement.
The bespoke systems are designed to be intuitive. Based upon the users required process and collaborative design phase with DCSL. This minimises if not removes any required training. However, explicit training is sometimes desirable, for instance for a complex solution, or for a consumer service product. In these circumstances we can provide several options:
1: Training Workshops
2: Train the Trainer Sessions
3: Step by Step Guides and documentation
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
We provide IP ownership to the customer upon completion of software design.
End-of-contract process
We provide IP ownership upon end of software development and continued support including team-wide knowledge retention, background system maintenance, database analysis, as well as being available to your team to answer any questions you may have on the use of the software.
This is based upon a monthly fee calculated from the initial software development cost.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
None
Service interface
No
API
No
Customisation available
Yes
Description of customisation
DCSL provide a bespoke software development service customised to the user.
Working closely with stakeholders and using prototyping & wireframing, we can build upon your vision, define the strategy and create a fantastic product that delivers the results you are seeking.
The development process we propose for this project will include requirements analysis which incorporates collaborative wireframing and business workflow diagram creation.

Scaling

Independence of resources
DCSL can provide hosting as per requirement of the software and customer.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
In-house
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Dependant upon bespoke software requirement
Data export formats
  • CSV
  • ODF
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Bonded fibre optic connections
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
Dependant upon developed software requirements.
Approach to resilience
Dependant upon developed software requirements.
Outage reporting
Dependant upon developed software requirements.

Identity and authentication

User authentication needed
No
Access restrictions in management interfaces and support channels
Dependant upon developed software requirements.
Access restriction testing frequency
At least every 6 months
Management access authentication
Other
Description of management access authentication
As required by the client.

Audit information for users

Access to user activity audit information
Users receive audit information on a regular basis
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users receive audit information on a regular basis
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
The British Assesment Bureau
ISO/IEC 27001 accreditation date
22/05/2017
What the ISO/IEC 27001 doesn’t cover
N/a
ISO 28000:2007 certification
Yes
Who accredited the ISO 28000:2007
The British Assessment Bureau
ISO 28000:2007 accreditation date
21/05/2017
What the ISO 28000:2007 doesn’t cover
N/a
CSA STAR certification
No
PCI certification
No
Other security certifications
Yes
Any other security certifications
Cyber Essentials Plus

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
ISO 27001 certified
Cyber Essentials Plus

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Dependant upon developed software requirements.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Dependant upon developed software requirements.
Developed under ISO 27001 and Cyber Essentials Plus
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Dependant upon developed software requirements, and hosting utalised.
Incident management type
Supplier-defined controls
Incident management approach
Dependant upon hosting used.
Developed Software optional support is available.
Support is provided 9 to 5, Mon to Fri.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Pricing

Price
£650 to £950 per person per day
Discount for educational organisations
No
Free trial available
No

Service documents

Return to top ↑