Laravel is an open-source web application framework with expressive, elegant syntax. We believe development must be an enjoyable, creative experience to be truly fulfilling. Laravel attempts to take the pain out of development by easing common tasks used in the majority of web projects.
- Mobile responsive website design and development
- Cloud-based architecture
- Cloud hosting through GCloud approved partners (Rackspace, Memset, AWS, etc)
- Ecommerce strategy and planning consultancy
- Bespoke application development
- Business process to web application development
- Secure coding by design
- State of the art PHP frameworks
- Cutting edge front-end frameworks
- License-free cloud hosted software with 99.9% network uptime guarantee available
- User friendly web based administration system
- Mobile and tablet responsive
- Backwards compatible & future-proof technologies.
£425 to £1200 per person per day
- Education pricing available
Juicy Media Ltd.
0161 464 9252
|Software add-on or extension||No|
|Cloud deployment model||Public cloud|
|Email or online ticketing support||Email or online ticketing|
|Support response times||Based on SLA|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||WCAG 2.0 AAA|
|Phone support availability||24 hours, 7 days a week|
|Web chat support||Web chat|
|Web chat support availability||9 to 5 (UK time), 7 days a week|
|Web chat support accessibility standard||WCAG 2.0 AAA|
|Web chat accessibility testing||N/A|
|Onsite support||Yes, at extra cost|
|Support levels||Typically we provide SLA's starting from 1 day per month to manage design and technical aspects of the complete Laravel delivery.|
|Support available to third parties||Yes|
Onboarding and offboarding
Client specification analysis and knowledge transfer
|End-of-contract data extraction||The content for this platform uses standard data storage mechanisms allowing extraction of content using standard tools.|
Design & development of a fully operational site.
Ongoing development at additional cost post-contract
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||As with any web based application with responsive design some functionality may be reduced.|
|Accessibility standards||WCAG 2.0 AAA|
|Accessibility testing||We install and implement BrowserAloud to ensure accessibility with screen-readers.|
|What users can and can't do using the API||API functionality is provided on a per application basis which depends upon project requirements.|
|API documentation formats||
|API sandbox or test environment||Yes|
|Description of customisation||Fully customisable to meet client requirements.|
|Independence of resources||
Depending on the hosting package for the service you will be on a segregated network and hosting architecture.
We also provide monitoring of all elements of the architecture, allowing us to identify bottlenecks and ongoing capacity planning tasks.
|Service usage metrics||Yes|
Web Server Analytics.
|Supplier type||Reseller providing extra features and support|
|Organisation whose services are being resold||Laravel|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Managed by a third party|
|Penetration testing frequency||At least every 6 months|
|Penetration testing approach||‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider|
|Protecting data at rest||
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||
API end points are made available for extracting data in a REST format.
CSV format or custom export such as; XML, EDI.
|Data export formats||
|Other data export formats||
|Data import formats||
|Other data import formats||
|Data protection between buyer and supplier networks||
|Data protection within supplier network||
Availability and resilience
|Guaranteed availability||We provide an SLA covering 99% - 99.999% depending on requirements.|
|Approach to resilience||Available on request.|
|Outage reporting||Client dependant a choice of: a public dashboard, an API or email alerts.|
Identity and authentication
|User authentication needed||Yes|
|Other user authentication||Yubikey|
|Access restrictions in management interfaces and support channels||
Our Laravel development operates in a flat network so separate management interface is not required.
Depending on client requirements the server architecture can have separate network connections or segregated network for management interfaces.
|Access restriction testing frequency||At least once a year|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||Yes|
|Any other security certifications||Cyber Essentials|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||
|Other security governance standards||Cyber Essentials Plus|
|Information security policies and processes||
We follow the security policy framework in our processes and practices.
Further details are available upon request.
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||Further information is available upon request.|
|Vulnerability management type||Undisclosed|
|Vulnerability management approach||
We gather our intelligence in regard to potential threats from multiple open-source and paid for routes.
We utilise an in-house asset management tool that can be deployed to client architectures which uses industry standard tools for vulnerability assessment and management.
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||
We have an incident response team covering cyber security.
Further details can be supplied upon request.
|Incident management type||Supplier-defined controls|
|Incident management approach||
We have a dedicated incident management team responsible for generating and distributing reports.
Common event notification is an automated process further details can be supplied upon request.
|Approach to secure software development best practice||Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)|
Public sector networks
|Connection to public sector networks||Yes|
|Price||£425 to £1200 per person per day|
|Discount for educational organisations||Yes|
|Free trial available||No|
|Pricing document||View uploaded document|
|Skills Framework for the Information Age rate card||View uploaded document|
|Terms and conditions document||View uploaded document|