Cloud Data engineering in cloud, we provide one stop solution for analysis, migration, analytics or for any purpose data cleansing, data engineering, data science - entire data service in the cloud using AWS, Google and Azure with top notch data protection and security of data in place.
- Process data from anywhere
- Access your data anywhere
- Fully encrypted your data from source to target
- Ease of processing
- Voice commands
- Data protection compliant
- Disaster recovery
- Load balancing
- Highly scalable
- Analyse any KPI required based on your data
- Removes maintenance and IT overheads
- Your database migrated to Cloud of your choice
- Get data is as clean and integrated as required
- Protect your data at highest standard
- Let you migrate your applications to cloud
- Let you focus more other than IT
- Publish contents from any mobile or non-mobile device
- Manages contents and office on move
- Provides cloud based web application
£9000 to £500000 per transaction per month
- Education pricing available
- Free trial available
|Service constraints||All our services are based on cloud and open source software technologies ,We use AWS, AZURE and Google Clouds . Our server uptime are dependant on these major providers uptime.|
|Email or online ticketing support||Yes, at extra cost|
|Support response times||
On Weekends, We support personally only very important tickets, otherwise automated supports are provided.Following is the default SLA of weekend, unless special SLA agreed with buyer.
If Priority 1 tickets - 4-6 hrs. Upon receiving email followed by call.
On Weekdays Default SLA's are:
Priority 1 : 2-4 hrs
Priority 2 : 4-8 hrs
Priority 3 : 2-3 days
Priority 4 : 1 Week
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||WCAG 2.0 A|
|Phone support availability||9 to 5 (UK time), 7 days a week|
|Web chat support||Web chat|
|Web chat support availability||24 hours, 7 days a week|
|Web chat support accessibility standard||WCAG 2.0 A|
|Web chat accessibility testing||Yes, It has been tested with most of scenarios.|
|Onsite support||Yes, at extra cost|
We provide extensive support including training, development, design, deployment, customising, assisting buyer to buy similar service, working along with the buyer.
Cost of support are not fixed, Its fully dependant on the nature of the support required and how long it takes to develop or resolve. however guide rate are £400-700/day
We provide cloud support engineer.
|Support available to third parties||Yes|
Onboarding and offboarding
|Getting started||We provide documentation, online training and also upon request onsite training.|
|End-of-contract data extraction||
By default, We provide data in CSV format and also assist users in migrating to newer platform if required.
However upon request, we do provide Json, XML or database file format.
At the end of contract, We provide all the buyers data in the default format or in any requested format. And we delete all of customers data upon final agreement with customer.
We do ensure, we don't retain any of buyers data other than legally and commercially required, however it's disclosed and agreed with user, what kind of information will be retained.
Using the service
|Web browser interface||Yes|
|Using the web interface||
Once buyers have signed up our services, we provide them web link with activation instructions.
Lead/Admin/organisation users are allowed to add and remove extra users
There are some limitations on what users can/can't do. We do have role based management that can restrict users - what and how much they are restricted ?
|Web interface accessibility standard||WCAG 2.0 A|
|Web interface accessibility testing||We have done automatic testing of our application to provide equal opportunity to assistive technology users.|
|Command line interface||No|
|Independence of resources||We Configure separate VPC and virtual machine to every business. every business are using there own private environment in the cloud. We do provide matrix and analytics of uses. It's always pre-agreed with customer if auto scaling is required to be configured for their application. It's mostly used when customer need to run some specific marketing camping that can surge the demand.|
|Infrastructure or application metrics||Yes|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Security Clearance (SC)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||Less than once a year|
|Penetration testing approach||‘IT Health Check’ performed by a CHECK service provider|
|Protecting data at rest||Encryption of all physical media|
|Data sanitisation process||Yes|
|Data sanitisation type||
|Equipment disposal approach||A third-party destruction service|
Backup and recovery
|Backup and recovery||Yes|
|What’s backed up||
|Backup controls||Backups are standard and it's automatic process; it's part of our offering. It can be tailored to users specific requirements.|
|Datacentre setup||Multiple datacentres with disaster recovery|
|Scheduling backups||Supplier controls the whole backup schedule|
|Data protection between buyer and supplier networks||
|Data protection within supplier network||
Availability and resilience
Our availability is inline with AWS, AZURE and Google Cloud's availability 99% availability
We would refund automatically reasonable fee on pro-rata bases; if service is not available in agreed SLA.
|Approach to resilience||We do configure every buyer's VPC in multiple availability zone in UK and if feasible UK & EU|
|Outage reporting||Email alerts and Dashboard|
Identity and authentication
|Access restrictions in management interfaces and support channels||We follow role based approach, separate management VPN, including management interface commands to restrict access in management interfaces and support channels.|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||
|Devices users manage the service through||Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)|
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users have access to real-time audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||
We set and manage accountability and decision rights with the Data governance Officer
Assign and asses acceptable risk
Enable risk control
Assure control effectiveness
|Information security policies and processes||
Policies and processes:
1. Information will be protected in line with all relevant GDPR policies and legislation, notably those relating to data protection, human rights and freedom of information.
2. Each information asset will have a nominated owner who will be assigned responsibility for defining the appropriate uses of the asset and ensuring that appropriate security measures are in place to protect the asset.
3. Information will be made available solely to those who have a legitimate need for access.
4. All information will be classified according to an appropriate level of security.
5. The integrity of information will be maintained.
6. It is the responsibility of all individuals who have been granted access to information to handle it appropriately in accordance with its classification.
7. Information will be protected against unauthorised access.
8. Compliance with the Information Security Policy will be enforced.
More detailed policies and processes are available upon request.
|Configuration and change management standard||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Configuration and change management approach||
Configuration management comes after a project baseline is set. Once the project has been defined, configuration management does the following:
1. Evaluates each system, resource, and component of the project.
2. Coordinates who will approve or disapprove change and what processes will be utilised to configure change.
3. Coordinates who will ensure changes are realised along with accountability.
4.Coordinates who will implement or request the change
5. Provides documentation, or a library of sorts, specific to project on how controls were set, defined, implemented and documented.
|Vulnerability management type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Vulnerability management approach||
Our vulnerability management process consists of five phases:
2. Vulnerability scan
3. Define remediating actions
4.Implement remediating actions
We deploy patches asap, mostly within 24-48hrs
Once the scan is complete, scan results are available through the “Reports” this is how we get if vulnerabilities have been detected in our system
|Protective monitoring type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Protective monitoring approach||We collect, monitor and act on timestamped logs, generate alerts on suspect, record data back up status, record suspicious activities, network statistics, VPN connection monitoring and provides system audit reports|
|Incident management type||Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402|
|Incident management approach||
Our Incident management process:
1. Incident identification
2. Incident logging
3. Incident categorisation
6.Escalation, as necessary, to level 2 support
9.Communication with the user community throughout the life of the incident
We have online system to report incident and check progress of it.
We have incident dashboard which can give insight of any Incident.
|Approach to secure software development best practice||Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)|
Separation between users
|Virtualisation technology used to keep applications and users sharing the same infrastructure apart||Yes|
|Who implements virtualisation||Supplier|
|Virtualisation technologies used||Hyper-V|
|How shared infrastructure is kept separate||Private cloud service or Penetration testing|
|Price||£9000 to £500000 per transaction per month|
|Discount for educational organisations||Yes|
|Free trial available||Yes|
|Description of free trial||
1. Requirement gathering
2. Prototyping the solution - tailer made
What isn't included:
1. Trial only with dummy or public data
|Pricing document||View uploaded document|
|Skills Framework for the Information Age rate card||View uploaded document|
|Terms and conditions document||View uploaded document|