i3 Digital

i3 G-Cloud Kentico Web Content Management AWS Cloud

Kentico Enterprise marketing solution hosted on i3 Digital's ISO27001 G-Cloud platform is an all in one CMS, E-commerce and Online Marketing platform providing:
• Web content Management
• Online marketing
• E-commerce
• Online Communities
• Intranet & Collaboration
• Platform for web development and Integration
• 99.999% availability guarantee

Features

  • Secure Fully Managed Kentico CMS Platform
  • ISO27001 (IL2 equivalent)
  • 24x7x365 monitoring, alerting and proactive support
  • Data back ups
  • Disaster Recovery & Business Continuity options
  • All in one CMS, E-Commerce, marketing platform
  • Intranet, Collaboration
  • On line communities
  • Includes MS licensing

Benefits

  • Out of the box functionality
  • Better productivity with Workflow engine
  • Improved Engagement
  • Quick to deploy and update content
  • Secure, scalable Platform
  • Onboarding and Exit Management included

Pricing

£5000 per instance per year

Service documents

G-Cloud 9

789008660220707

i3 Digital

i3 Digital Limited

02074708884

diarmuid@i3digital.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints Scheduled maintenance and planned outages are in line with agreed maintenance Service Level Agreements.

Customisation of the service is in line with the agreed requirements for each client specification
System requirements
  • Windows 7 Service Pack 1 (32bit or 64bit) and above
  • Microsoft .NET Framework 4.5 or 4.6.
  • Microsoft Internet Information Services
  • Microsoft SQL Server 2008 R2, 2012, 2014
  • Chrome 15+
  • Microsoft Edge 38+
  • Internet Explorer 9+
  • Firefox 8.0+
  • Safari 5.0.6+ on Mac OS

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Response to critical severity case:
2 hours (Standard) 1 hours(Premium) 0.5 hours(Premium Plus)
Response to moderate severity case:
4 hours(Standard) 2 hours(Premium) 1 hours(Premium Plus)
Response to low severity case:
8 hours(Standard) 6 hours (Premium) 3 hours (Premium Plus)
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels Standard - Normal Working Hours – Mon to Fri 9:00am to 5:30pm excluding bank holidays and public holidays

Premium - Includes standard hours support and allows scheduling of maintenance outside normal hours

Premium Plus - Includes Premium hours support and also includes weekends, bank holidays and public holidays.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started I3 Digital provides training both onsite and offsite with full easy to understand documentation.

Kentico also provides a portal where they can access a full suite of self learn how to's with step by step guidance.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Client data can be exported at the end of contract.
End-of-contract process Kentico is supported from over 1200 partners and we provide if required a zipped file of the code for clients to give to new partners.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10+
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service None the mobile version is fully optomised
Accessibility standards WCAG 2.0 AA or EN 301 549
Accessibility testing We have integrated Browsealoud into our solutions, which has been tested by users of assistive technology.
API Yes
What users can and can't do using the API Kentico offers a complete feature set for all your website needs and also many ways for customising and enhancing the standard platform. With the Kentico open API, you can create your own web parts, modules, providers, event handlers, and other extensions to achieve specific requirements.
Every feature in Kentico can be accessed through its Application Programming Interface (API). It means you can call Kentico features from your code to read or modify the content, user accounts, site configuration, or any other settings.

You can find many code examples in the Kentico Developer's Guide. - https://devnet.kentico.com/documentation/kentico-10
API documentation Yes
API documentation formats PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Kentico is fully customisable providing buyers have been through the training provided by i3 Digital.

Scaling

Scaling
Independence of resources Microsoft Hyper-V ensures that client server memory for individual virtual servers is not shared at the hardware level.

Analytics

Analytics
Service usage metrics No

Resellers

Resellers
Supplier type Reseller providing extra features and support
Organisation whose services are being resold Kentico and AWS

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Supplier-defined controls
Penetration testing frequency Never
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach The system allows you to export entire websites including their settings and related objects (such as document types, workflows, web parts, page templates, etc.) into a single file archive. You can then import the archive on any Kentico instance.
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Legacy SSL and TLS (under version 1.2)
Data protection within supplier network Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability The target uptime for primary services is 99.9% each month (corresponding to no more than a downtime of 45 minutes in a calendar month).This uptime refers to the availability of all network connectivity, hardware devices and firewall systems that i3 Digital Ltd manages for the Customer. Periods for which Services are not available because of scheduled outages or outages, which can reasonably be determined as resulting from the Customers action is not included in a determination of downtime and i3 Digital Ltd shall have no liability therefore.
Approach to resilience This information is available on request.
Outage reporting Outages are reported to clients via e-mail and telephone.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Management interfaces can be restricted to public IP addresses provided by the client.
Access restriction testing frequency At least once a year
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information No audit information available
Access to supplier activity audit information No audit information available
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 SGS (UK) Limited
ISO/IEC 27001 accreditation date 10/07/2008
What the ISO/IEC 27001 doesn’t cover Our ISO 27001 Certification covers all aspects of the business.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation Yes
Security governance standards ISO/IEC 27001
Information security policies and processes ISO/IEC 27001

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Before completing any change to the setup, a change request must be completed and approved by the i3 Digital server management team and an appointed client contact. The RFC document must include and appropriate test process with requested outcomes along with relevant information for roll back in the event of a change failing to complete.
Vulnerability management type Undisclosed
Vulnerability management approach Operating System Patches are applied each month following successful testing on our development systems.
Protective monitoring type Undisclosed
Protective monitoring approach Service level alerts are automatically fed back to our management team. Alerts are processed immediately and appropriate action taken where necessary. In the event of a Services failure during Business Hours the Customer shall be notified within an estimated 15 minutes of the incident being identified. After 30 minutes, we shall use reasonable commercial effort to notify the Customer of progress at regular intervals until resolution. Any incident that has adversely impacted on our operations, we shall provide a report to the Customer outlining the results of an investigation of the cause and measures introduced to prevent reoccurrence.
Incident management type Supplier-defined controls
Incident management approach Service level alerts are automatically fed back to our management team. Alerts are processed immediately and appropriate action taken where necessary. In the event of a Services failure during Business Hours the Customer shall be notified within an estimated 15 minutes of the incident being identified. After 30 minutes, we shall use reasonable commercial effort to notify the Customer of progress at regular intervals until resolution. Any incident that has adversely impacted on our operations, we shall provide a report to the Customer outlining the results of an investigation of the cause and measures introduced to prevent reoccurrence.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £5000 per instance per year
Discount for educational organisations No
Free trial available No

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Terms and conditions document View uploaded document
Return to top ↑