Magento is the most popular commerce platform in the world, with more than 250,000 merchants around the globe selling more and driving innovation.
Juicy Media provide bespoke design and development for Magento Enterprise or Community.
- Mobile responsive website design and development
- Cloud-based architecture
- Cloud hosting through GCloud approved partners (Rackspace, Memset, AWS, etc)
- Ecommerce strategy and planning consultancy
- License-free cloud hosted software with 99.9% network uptime guarantee available
- User friendly web based administration system
- Mobile and tablet responsive
£425 to £1200 per person per day
- Education pricing available
Juicy Media Ltd.
0844 482 0152
|Software add-on or extension||No|
|Cloud deployment model||Public cloud|
|Email or online ticketing support||Email or online ticketing|
|Support response times||Based on SLA|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||Web chat|
|Web chat support availability||9 to 5 (UK time), 7 days a week|
|Web chat support accessibility standard||None or don’t know|
|How the web chat support is accessible||Cloud-based software|
|Web chat accessibility testing||N/A|
|Onsite support||Yes, at extra cost|
|Support levels||Typically we provide SLA's starting from 1 day per month to manage design and technical aspects of the complete WordPress delivery.|
|Support available to third parties||No|
Onboarding and offboarding
Client specification analysis and knowledge transfer
|End-of-contract data extraction||The content for this e-commerce platform uses standard data storage mechanisms allowing extraction of content using standard tools.|
Design & development of a fully operational site.
Ongoing development at additional cost post-contract
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||As with any web based application with responsive design some functionality may be reduced.|
|Accessibility standards||WCAG 2.0 AAA|
|Accessibility testing||We install and implement BrowserAloud to ensure accessibility with screen-readers.|
|Description of customisation||Fully customisable to meet client requirements.|
|Independence of resources||
Depending on the hosting package for the service you will be on a segregated network and hosting architecture.
We also provide monitoring of all elements of the architecture, allowing us to identify bottlenecks and ongoing capacity planning tasks.
|Service usage metrics||Yes|
Web Server Analytics.
|Supplier type||Reseller providing extra features and support|
|Organisation whose services are being resold||WordPress|
|Staff security clearance||Staff screening not performed|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Managed by a third party|
|Penetration testing frequency||At least every 6 months|
|Penetration testing approach||‘IT Health Check’ performed by a CHECK service provider|
|Protecting data at rest||
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||CSV format or custom export such as; XML, EDI.|
|Data export formats||
|Other data export formats||
|Data import formats||
|Other data import formats||
|Data protection between buyer and supplier networks||
|Data protection within supplier network||
Availability and resilience
|Guaranteed availability||We provide an SLA covering 99% - 99.999% depending on requirements.|
|Approach to resilience||Available on request.|
|Outage reporting||Client dependant a choice of: a public dashboard, an API or email alerts.|
Identity and authentication
|User authentication needed||Yes|
|Other user authentication||Yubikey|
|Access restrictions in management interfaces and support channels||
Magento operates in a flat network so separate management interface is not required.
Depending on client requirements the server architecture can have separate network connections or segregated network for management interfaces.
|Access restriction testing frequency||At least once a year|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security accreditations||No|
|Named board-level person responsible for service security||Yes|
|Security governance accreditation||Yes|
|Security governance standards||
|Other security governance standards||Cyber Essentials Plus|
|Information security policies and processes||
We follow the security policy framework in our processes and practices.
Further details are available upon request.
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||Further information is available upon request.|
|Vulnerability management type||Undisclosed|
|Vulnerability management approach||
We gather our intelligence in regard to potential threats from multiple open-source and paid for routes.
We utilise an in-house asset management tool that can be deployed to client architectures which uses industry standard tools for vulnerability assessment and management.
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||
We have an incident response team covering cyber security.
Further details can be supplied upon request.
|Incident management type||Supplier-defined controls|
|Incident management approach||
We have a dedicated incident management team responsible for generating and distributing reports.
Common event notification is an automated process further details can be supplied upon request.
|Approach to secure software development best practice||Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)|
Public sector networks
|Connection to public sector networks||Yes|
|Price||£425 to £1200 per person per day|
|Discount for educational organisations||Yes|
|Free trial available||No|
|Pricing document||View uploaded document|
|Terms and conditions document||View uploaded document|