Agile Experts

Scrum Master

Coaching covering tools and techniques to help teams build services

- meet the needs of your users
- are easy and convenient for people to use
- you can change easily, eg policy changes
- you can keep improving, eg on user feedback
- cost less and are more accountable


  • Use of Agile Tools and Techniques
  • Collobarative working environment
  • Short Iterative and Incremental working
  • Short feedback loops
  • Aligns with Digital Service Standard


  • Meet the needs of the users
  • Deliver services in a less costly and more accountable way
  • Keep improving based on feedback
  • provide a better working environment for teams


£650 to £1000 per person per day

  • Education pricing available

Service documents

G-Cloud 9


Agile Experts

Kram Ali


Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints There are no constraints unless requested by the client.
System requirements
  • TFS
  • Jira

User support

User support
Email or online ticketing support No
Phone support Yes
Phone support availability 9 to 5 (UK time), 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels Ongoing onsite support is part and parcel of daily routine. Full support (9-5) for projects. On call or out of hours support is available on request but will incur additional costs and is subject to fully understanding requirements.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Onsite workshops and documentation at the request of the client. Documentation is provided at the behest of the client, in the form of wiki pages or a format that suits the client. Workshops are designed to give an overview and allow the client to raise questions.
Service documentation Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction Any documentation requirements will be met at the time of contract. Copies of the documentation can be obtained on request.
End-of-contract process Onsite work is included in the price. During the handover period, ( 2 weeks prior to completion ) documentation is consolidated as requested. At the end of the contract pricing can be introduced for ongoing support and additional work as agreed by the parties.

Using the service

Using the service
Web browser interface No
Application to install No
Designed for use on mobile devices No
Accessibility standards None or don’t know
Description of accessibility N/A
Accessibility testing N/A
Customisation available Yes
Description of customisation T


Independence of resources We run an associate model where the organisation can scale up or down depending on the demand for the service.


Service usage metrics No


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations No
Datacentre security standards Supplier-defined controls
Penetration testing frequency Less than once a year
Penetration testing approach In-house
Protecting data at rest Scale, obfuscating techniques, or data storage sharding
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach N/A
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Private network or public sector network
Data protection within supplier network IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Available as requested. If unavailable, substitution can be put in place to suit
Approach to resilience We run an associate model whereby we can scale up or down depending on service requirements.
Outage reporting Email alerts

Identity and authentication

Identity and authentication
User authentication needed No
Access restrictions in management interfaces and support channels N/A
Access restriction testing frequency At least every 6 months
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users receive audit information on a regular basis
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation No
Security governance approach In conjunction with the buyer and on mutual agreement.
Information security policies and processes Based on a mutual non disclosure agreement between parties

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach TFS, JIRA
Vulnerability management type Supplier-defined controls
Vulnerability management approach N/A
Protective monitoring type Supplier-defined controls
Protective monitoring approach Immediate response to incidents
Incident management type Supplier-defined controls
Incident management approach Supplier Driven

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £650 to £1000 per person per day
Discount for educational organisations Yes
Free trial available No


Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑