Agile Experts

Design, development, code integration and deployment

Design business model using BDD or TDD approach, architecting the domain model and unit testing based on business requirements, this may include extending the current systems or greenfield projects.


  • Develop bussiness driven domain model coding standard
  • Accessibility compliance, including assistive technologies
  • Developing hybrid apps to support multiple platforms


  • Building modules and components for reusability and extendability
  • Accessibility that covers assistive technology
  • Align design standards with inhouse design and standard patterns


£650 per person

  • Education pricing available

Service documents

G-Cloud 9


Agile Experts

Kram Ali


Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints There are no constraints unless requested by the client
System requirements Text editors eg notepad or notepad++

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Requests are managed by SLA based approach based on priority, the normal standard SLA include 8hours resolution for P1, 5Days resolution for P2 and 15days for P3 incidents/Changes subjective to systems and agreement. Out of hours support is subjected to an additional cost.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Most of the times work is done remotely unless until client request for on site visit to carry out scope of the work or actual work with subjected to additional cost
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Onsite workshops and documentation. at the request of the client. Documentation is provided at the behest of the client, in the form of wiki pages or a format that suits the client. Workshops are designed to give an overview and allow the client to raise questions
Service documentation Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction The data is stored in relation database in the form of tables the data can be extracted or exported to required format based on relevant tools to do so if requested by clients.
End-of-contract process Onsite work is included in the price. During the handover period, ( 2 weeks prior to completion ) documentation and final code are consolidated as requested. At the end of the contract pricing can be introduced for ongoing support and additional work as agreed by the parties.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10+
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • Windows
  • Windows Phone
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Functionality wise same its just the look and feel difference in UI
Accessibility standards WCAG 2.0 AA or EN 301 549
Accessibility testing Service interface testing
Customisation available Yes
Description of customisation An admin module will be provided to the applications to administer all application related configurations and settings by users


Independence of resources Based on users demand the service can be scalable to meet expectations


Service usage metrics No


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Supplier-defined controls
Penetration testing frequency Less than once a year
Penetration testing approach In-house
Protecting data at rest Scale, obfuscating techniques, or data storage sharding
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Scripts or SSIS packages will be provided to export their data to third party systems if required by the client.
Data export formats
  • CSV
  • Other
Other data export formats
  • Excel
  • .bak files
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability Available as requested. If unavailable, substitution can be put in place to suit
Approach to resilience Service is code based, and not "physical" - so is as resilient as meets the needs of the buyer
Outage reporting Email alerts

Identity and authentication

Identity and authentication
User authentication needed No
Access restrictions in management interfaces and support channels Supplier control
Access restriction testing frequency Never
Management access authentication Dedicated link (for example VPN)

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information No audit information available
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation No
Security governance approach In conjunction with the buyer and on mutual agreement
Information security policies and processes Based on a mutual non disclosure agreement between parties

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach If the product is inhouse development there will be change management process to release new features and bug fixes through out the life time of the applications
Vulnerability management type Supplier-defined controls
Vulnerability management approach Threats are identified by penetration testing and fixes are applied accordingly to meet the compliance standards for local authorities and private sector clients.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Immediate response to incidents, utilise backups, version control.
Incident management type Supplier-defined controls
Incident management approach Incidents are log in ticket log system providing a ref to a request via email service and dealt accordingly by assigned engineer. Monthly reports produced and send to client meetings

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £650 per person
Discount for educational organisations Yes
Free trial available No


Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑