Simply Zesty Limited

Kentico Web Content Management System

Kentico Enterprise marketing solution hosted on Tibus ISO27001 G-Cloud platform is an all in one CMS, E-commerce and Online Marketing platform providing: Web content Management; Online marketing; E-commerce; Online Communities; Intranet & Collaboration; Platform for web development and Integration 99.999% availability guarantee.

Features

  • Secure Fully Managed Kentico CMS Platform
  • 24x7x365 monitoring, alerting and proactive support
  • ISO27001 (IL2/IL3 equivalent)
  • Data back ups
  • Disaster Recovery & Business Continuity options

Benefits

  • Easy to use out of box functionality
  • Fast website deployment
  • Update content quickly
  • Manage Your Website from Any Computer
  • Self-contained system no HTML editing software required
  • Secure Platform that can scale as required

Pricing

£2599 to £30438 per unit per year

Service documents

G-Cloud 11

982475448103711

Simply Zesty Limited

Darren Richardson

02890334044

rfp@simplyzesty.com

Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to Website design, development and support services
Cloud deployment model Private cloud
Service constraints None
System requirements Internet Access

User support

User support
Email or online ticketing support Email or online ticketing
Support response times See Terms and Conditions
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels Clients have access to the Service Desk and a dedicated cloud support engineer as standard from 0800 - 1800 normal working days.
Email access to support desk is available 24x7x365.
Service is proactively monitored 24x7x365.
Out of normal business hours emergency telephone support is an additional cost of £100/MONTH.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Onsite training and user documentation available.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction As part of our Exit Management process we will provide a snapshot of the latest data once contract ends.
End-of-contract process Kentico Cloud Software Templates.

Additional services:
Technical Design
Project Management
Service Design
Configuration and Support
Application Support
Programmer
UX User Consultancy
Migration Services

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • MacOS
  • Windows
Designed for use on mobile devices Yes
Differences between the mobile and desktop service None
API Yes
What users can and can't do using the API Kentico has a documented and robustly integrated API / Web Service layer as part of the core platform, and has a working relationship with Salesforce, Microsoft Dynamics, SAP and SharePoint which has resulted in modules for integration being developed to allow standards driven deployment into these systems using the Integration Bus. Additionally we can provide custom code integration.
API documentation Yes
API documentation formats HTML
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Users can use Kentico to customise web pages, functionality and content.

Scaling

Scaling
Independence of resources Each instance is dedicated specifically for the client. As part of our Capacity Management process we will upgrade infrastructure as we approach 70% of overall resource

Analytics

Analytics
Service usage metrics Yes
Metrics types We monitor the performance metrics of key hardware, operating systems, databases and application software. We will respond to any detected issues and report them immediately to the Client. Real time monitoring is available to the Client.
Reporting types Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach ‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Data is exported as either an XML or CSV File
Data export formats
  • CSV
  • Other
Other data export formats XML
Data import formats
  • CSV
  • Other
Other data import formats XML

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability We provide a 99.999% availability supported by service credits. If unavailable for over 0.001% time within a month, upon the Customer's request, we will credit the Customer's account the pro-rated cost for one-day's charges for each hour of unavailability, up to a maximum of 1 week’s charges within any one month. For the purpose of this Service Availability Commitment Remedy, a Week shall mean the period from 12:00:01 AM Monday, until 12:00:00 AM the following Sunday.
Approach to resilience Cloud and hosting services are delivered from our Tier 3 and 4 ISO 27001 accredited datacenters. All datacenters operate to ISO27001, ISO22301, ISO 50001, ISO9001, ISO 14001, OHAS 18001, PCI DSS standards and are audited and operated to the EU Code of Conduct’s best practice for datacenters. VESDA detection technology is installed and all infrastructure monitored 24x7x365 by the Network Operations Centre (NOC). There are dual 10G connections between each of our datacentres for resilience and we peer with 5 different Tier 1 telecoms to provide for the best connectivity and internet routes worldwide. In addition we are a member of INEX, LINX and LONAP for further capacity and resilience. There are no single points of failure, with redundancy built in at every layer of the load balanced platform, as well as within the core.

Tibus can facilitate any frequency of backups e.g. hourly, daily or anything in between. All data, including server configuration, application data and configuration, is backed up on minimum a daily basis, and retained for a minimum of 30 days.
Outage reporting Email alerts.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Our Access Control Policy ensure that the principles of ‘least privilege’ and ‘need to know’ are applied consistently across the management of authorised access to information assets including management interfaces and support channels.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 Certification Europe
ISO/IEC 27001 accreditation date 14/01/2015
What the ISO/IEC 27001 doesn’t cover All hosting and cloud infrastructure business processes are covered by ISO27001.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Secure Engineering Principles
Supplier Assurance
Training and Awareness
Information Security Metrics & KPIs
Remote Working
Removeable Media
Security Education and Awareness
Access Control Policy
Accounting and Audit
Anti Malware
Operating System Hardening
Business Security Continuity Management
Business Security Continuation Plan
Change Management Policy
Cryptography Policy
Customer Access Management
Email Usage
Forensic Readiness
IA Policy
Incident Identification Reporting and Management
Information Classification
Information Security in Project Management
Information System Backup
Information Transfer
Internal Audit
IT Account Management - Users
IT Account Policy – Administrator
Mobile Device and Telephony
Network Security
Patch Management
Physical and Environmental Controls
Secure Information Asset Disposal
Virtual Private Network
Document Control
Employee Arrivals
Employee Exit
Employee Movers
Security Operating Procedures
Corrective Action

There is a IT Security Working group chaired by the SIRO and including ITSO, Change Managers, Systems Manager. Reporting structure is available as an Organisational Chart detailing ISMS.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach We have a bespoke change management tool to enable all change requests to be logged, tracked, approved/rejected and reported on. The change management process includes:
• Documented Change Requests;
• Identification, prioritisation and initiation of change;
• Proper authorisation of change;
• Requirements analysis;
• Inter-dependency and compliance analysis;
• Business Impact Assessment;
• Change approach;
• Change testing;
• UAT and approval;
• Implementation, release planning and roll back procedures;
• Documentation;
• Change monitoring;
• Defined responsibilities of all users and IT personnel;
• Emergency change parameters.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Patch management is part of our ISO27001 ISMS.To assist the System Manager, there are a number of resources available for monitoring the status of vulnerabilities and patches including vendor/3rd party websites, mailing lists, vulnerability databases, Network management tools to scan for vulnerabilities on computers, provide information regarding needed patches and other software updates on those computers. Patch deployment should be conducted under direction of the Change Manager. They must be applied in a structured and methodical way, based on a determination of priority and within pragmatic timeframes: Emergency 24 hours, High priority 7 days, Medium within 30 days.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Systems are in place to alert NOC to potential issues as soon as they develop. The G Cloud platform sits behind perimeter enterprise-class, redundant core routers, firewalls and intrusion prevention systems. This includes Syslog, Netflow use of MD5 passwords. Perimeter firewalls are configured with ports locked down. Other ports are locked down to individual fixed IP addresses. Cisco IPS provides for real-time traffic analysis and packet logging on our IP networks to perform protocol analysis, content searching/matching to detect buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting. Regular vulnerability assessments of core network are undertaken.
Incident management type Supplier-defined controls
Incident management approach We provide a consolidated incident management process. The primary objective of the process is to restore normal operation as soon as possible, in accordance with service levels. The Incident Manager responsibilities include:

o Ensuring that issues are accurately recorded and that investigation is undertaken in a timely manner;
o Agreeing an appropriate priority with impacted users;
o Communicating relevant information about the incident and resolution progress to impacted users;
o Ensuring that business and technical escalations are managed in line with agreed best practice and service level targets;
o Communicating, resolution and closure of the incident to impacted users.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £2599 to £30438 per unit per year
Discount for educational organisations No
Free trial available No

Service documents

pdf document: Pricing document pdf document: Terms and conditions
Service documents
Return to top ↑