Bancstreet Capital Partners Ltd

Axellera Rapid Application Delivery Cloud Platform for Digital Transformation

The Axellera RAD Platform allows organisations to rapidly create, deploy and cloud host complete applications which require complex time critical
workflows, have to integrate many with complex data sources/systems/external workflows and provide all the
enterprise class attributes like auditability, fine grain role based access
control, integration into corporate authentication systems...


  • Create complete applications quickly through configurations and building blocks
  • Generates readable SQL, code and workflow definitions you can edit
  • Easily create user defined data sets, actions, reports, dashboards...
  • Powerful Workflow and Case (CMMN) modelling allows rapid development
  • Powerful semantic data-dictionary allows apps defined in users language
  • Intelligent data discovery for quick and easy setup and operation
  • Granular role based permissioning on all fields, actions and objects
  • Authentication easily integrated with your organisations authentication methods
  • Open APIs for easy integration to other systems
  • Using open standards like Java/Scala/JVM, SQL, Hadoop, Spark etc


  • Create enterprise grade applications quickly without compromising on quality
  • Evolve your applications easily without disruptions and or major costs
  • Meet tough compliance requirements on permissioning, authentication, auditability....
  • Smart, automated data cleaning, data provenance and data compliance
  • Public, private or hybrid cloud – yours or ours
  • Smart, automated data compliance and data cleaning
  • Easy integration to other systems including legacy data silos
  • Easy interfacing to industry standard analytics and business intelligence tools
  • No need for specialist Spark/Hadoop/Big Data skills
  • Secure to government standards


£500 per terabyte per month

  • Education pricing available

Service documents

G-Cloud 10


Bancstreet Capital Partners Ltd

Marcelle von Wendland

+44 (0) 7801 829 544

Service scope

Service scope
Service constraints Please see our Service Definition document for details of the service. This includes a section on customer technical requirements and also details support and maintenance arrangements
System requirements
  • Browser as per our browser specification
  • Reasonably modern PC/mobile device
  • Sufficient bandwidth to access the service

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Response times will depend on the priority of the issue and support arrangement agreed. We have a reputation for highly responsive support and references can be provided on request. We can also provide custom support arrangements that meet your specific requirements
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels We customise our support arrangements according to your individual needs. Support can be provided on either an SLA or capped effort basis, with support hours and SLA terms agreed according to your specific requirements. Support is provided by an expert team, and we have a reputation for building systems that in any case are easy to use and require little support. Please see our Service Definition document and Pricing for further details of our support arrangements
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Our service is designed to be extremely easy to use, to the extent that some customers do not feel any need to train their staff to use it. We can however provide training, train-the-trainer support for in-house training, and relevant documentation as needed. We can also provide a full range of onboarding, configuration and other implementation services. Please see our Service Definition and Pricing documents for details
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction We can provide an extract of the database in XML, CSV or ODF format and any stored files in their provided document format. Alternatively, users can directly extract all customer data and files using the service's API
End-of-contract process Please see the Exit Plan section of our Service Definition document

Using the service

Using the service
Web browser interface Yes
Using the web interface The web interface allows upload of configuration changes that can then be deployed via the web interface.
Web interface accessibility standard None or don’t know
How the web interface is accessible The web interface is accessible via supported browsers and can be used by authorised users to upload configuration changes and deploy any such changes.
Web interface accessibility testing N/A
What users can and can't do using the API Our API allows full integration with other systems exposing all key system functionality.
API automation tools
  • Ansible
  • Chef
  • Puppet
  • Other
API documentation Yes
API documentation formats PDF
Command line interface Yes
Command line interface compatibility Linux or Unix
Using the command line interface The command line allows upload of configuration changes that can then be deployed via the web interface.


Scaling available Yes
Scaling type
  • Automatic
  • Manual
Independence of resources We provide SLA Monitoring react accordingly providing advice to customers when experiencing unexpected loads.
Usage notifications Yes
Usage reporting
  • API
  • Email
  • SMS


Infrastructure or application metrics Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations Yes
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach In-house destruction process

Backup and recovery

Backup and recovery
Backup and recovery Yes
What’s backed up
  • Databases
  • Block / Object / File Storage
  • Configurations
  • Logs
Backup controls Automatic settings or customer overides.
Datacentre setup
  • Multiple datacentres with disaster recovery
  • Multiple datacentres
  • Single datacentre with multiple copies
  • Single datacentre
Scheduling backups Supplier controls the whole backup schedule
Backup recovery Users contact the support team

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability We offer different availability levels. With multi-data centre redundancy we can offer availability is 99.9% or better by SLA.
Approach to resilience Our platform offers automated redundancy for all elements of the system including storage, middle-ware, database, metadata, etc. This allows transparent hot-hot fail overs. Lower levels of redundancy or no redundancy services can also be provisioned
Outage reporting Email and API Alerts.

Identity and authentication

Identity and authentication
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google apps)
Access restrictions in management interfaces and support channels For our standard service, the AWS / Microsoft Azure Management Portal is used to manage the Azure accounts and requires 2 factor authentication. Support access to the AWS / Azure infrastructure and servers is via 2-factor authentication across a VPN connection. This VPN is established using public key authentication. Username and password are required for access into the active directory domain. Where hosting with an alternative cloud provider or on premise is requested, access arrangements will be agreed with the customer
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device over multiple services or networks
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)

Audit information for users

Audit information for users
Access to user activity audit information Users receive audit information on a regular basis
How long user audit data is stored for User-defined
Access to supplier activity audit information Users receive audit information on a regular basis
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Our Service Delivery Partner Organisation is accredited to the ISO27001 ISMS standard, with a regular programme of internal and external (independent) audit to monitor and maintain compliance.Our Service Delivery Partner Organisation is also accredited to the ISO9001 quality management standard, and is registered with the Information Commissioner's Office for data protection

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach Changes come from three sources: users/customers, the product manager and the dev/QA team. Configuration and development requirements are specified by a business analyst. The changes are prioritised by a Change Advisory Board. Jira is used to track the lifecycle of these changes. Implementation approaches are reviewed by a solutions architect and a code review takes place during the development process. These reviews ensure that the code is functionally robust and secure. The QA team tests the code before release. We agree UAT, change and release management processes flexibly with individual customers to fit in with their own processes
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach We undertake threat reviews when we make changes to our software or infrastructure and when new threats are made public. We carry out regular penetration testing and our CSO monitors security information sources. Our VP Engineering is responsible for addressing any vulnerabilities identified. The speed of patching is proportionate to the level of threat identified
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach We have an IDS/IPS in place and anti-malware software on all Windows servers. We collate log files centrally from all relevant system components, and these are reviewed daily by the devops team. When unusual activity is identified, it is escalated to our VP Engineering who, in consultation with our CSO, will determine the appropriate course of action. AWS and Microsoft's Azure's Operations Management System and Security Centre are also used for monitoring.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach When incidents occur, they are triaged by a Service Manager who co-ordinates the response in accordance with our ISO27001 policies and procedures. Our team and customers may report incidents by phone or email, or enter them directly into our helpdesk system. Major incidents will be escalated immediately to Director level. The Service Manager provides regular updates and an incident report on resolution

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart Yes
Who implements virtualisation Third-party
Third-party virtualisation provider AWS, Microsoft Azure
How shared infrastructure is kept separate All customer environments can be fully protected within a customers own Virtual Private Cloud (VPC). The Platform provides all the necessary isolation from other virtual networks inside the provider cloud and the wider internet.

Energy efficiency

Energy efficiency
Energy-efficient datacentres Yes


Price £500 per terabyte per month
Discount for educational organisations Yes
Free trial available No


Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑