With concrete5, you get the best of both worlds. Anyone can start making their own website in seconds, and the editing experience is easy; just click on what you want to change.
Juicy Media provide bespoke design and development for concrete5.
- Mobile responsive website design and development
- Cloud-based architecture
- Cloud hosting through GCloud approved partners (Rackspace, Memset, AWS, etc)
- Ecommerce strategy and planning consultancy
- License-free cloud hosted software with 99.9% network uptime guarantee available
- User friendly web based administration system
- Mobile and tablet responsive
£425 to £1200 per person per day
- Education pricing available
Juicy Media Ltd.
0844 482 0152
|Software add-on or extension||No|
|Cloud deployment model||Public cloud|
|Email or online ticketing support||Email or online ticketing|
|Support response times||Based on SLA|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||Web chat|
|Web chat support availability||9 to 5 (UK time), 7 days a week|
|Web chat support accessibility standard||None or don’t know|
|How the web chat support is accessible||Cloud-based software|
|Web chat accessibility testing||N/A|
|Onsite support||Yes, at extra cost|
|Support levels||Typically we provide SLA's starting from 1 day per month to manage design and technical aspects of the complete concrete5 delivery.|
|Support available to third parties||No|
Onboarding and offboarding
Client specification analysis and knowledge transfer
|End-of-contract data extraction||The content for this e-commerce platform uses standard data storage mechanisms allowing extraction of content using standard tools.|
Design & development of a fully operational site.
Ongoing development at additional cost post-contract
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||As with any web based application with responsive design some functionality may be reduced.|
|Accessibility standards||WCAG 2.0 AAA|
|Accessibility testing||We install and implement BrowserAloud to ensure accessibility with screen-readers.|
|Description of customisation||Fully customisable to meet client requirements.|
|Independence of resources||
Depending on the hosting package for the service you will be on a segregated network and hosting architecture.
We also provide monitoring of all elements of the architecture, allowing us to identify bottlenecks and ongoing capacity planning tasks.
|Service usage metrics||Yes|
Web Server Analytics.
|Supplier type||Reseller providing extra features and support|
|Organisation whose services are being resold||Concrete5|
|Staff security clearance||Staff screening not performed|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Managed by a third party|
|Penetration testing frequency||At least every 6 months|
|Penetration testing approach||‘IT Health Check’ performed by a CHECK service provider|
|Protecting data at rest||
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||CSV format or custom export such as; XML, EDI.|
|Data export formats||
|Other data export formats||
|Data import formats||
|Other data import formats||
|Data protection between buyer and supplier networks||
|Data protection within supplier network||
Availability and resilience
|Guaranteed availability||We provide an SLA covering 99% - 99.999% depending on requirements.|
|Approach to resilience||Available on request.|
|Outage reporting||Client dependant a choice of: a public dashboard, an API or email alerts.|
Identity and authentication
|User authentication needed||Yes|
|Other user authentication||Yubikey|
|Access restrictions in management interfaces and support channels||
Concrete5 operates in a flat network so separate management interface is not required.
Depending on client requirements the server architecture can have separate network connections or segregated network for management interfaces.
|Access restriction testing frequency||At least once a year|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security accreditations||No|
|Named board-level person responsible for service security||Yes|
|Security governance accreditation||Yes|
|Security governance standards||
|Other security governance standards||Cyber Essentials Plus|
|Information security policies and processes||
We follow the security policy framework in our processes and practices.
Further details are available upon request.
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||Further information is available upon request.|
|Vulnerability management type||Undisclosed|
|Vulnerability management approach||
We gather our intelligence in regard to potential threats from multiple open-source and paid for routes.
We utilise an in-house asset management tool that can be deployed to client architectures which uses industry standard tools for vulnerability assessment and management.
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||
We have an incident response team covering cyber security.
Further details can be supplied upon request.
|Incident management type||Supplier-defined controls|
|Incident management approach||
We have a dedicated incident management team responsible for generating and distributing reports.
Common event notification is an automated process further details can be supplied upon request.
|Approach to secure software development best practice||Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)|
Public sector networks
|Connection to public sector networks||Yes|
|Price||£425 to £1200 per person per day|
|Discount for educational organisations||Yes|
|Free trial available||No|
|Pricing document||View uploaded document|
|Terms and conditions document||View uploaded document|