Project Staffing
GS Solutions are specialists in the design and delivery of end-to-end staffing solutions, supporting some of the market’s premier providers of IT and Digital Transformation services. Experts in the technical and security requirements of mission-critical IT projects, supported by a community of SC and DV-cleared professionals.
Features
- recruitment, Staffing
- recruitment, Staffing
- recruitment, Staffing
- recruitment, Staffing
- recruitment, Staffing
- recruitment, Staffing
- recruitment, Staffing
- recruitment, Staffing
- recruitment, Staffing
- recruitment, Staffing
Benefits
- recruitment, Staffing
- recruitment, Staffing
- recruitment, Staffing
- recruitment, Staffing
- recruitment, Staffing
- recruitment, Staffing
- recruitment, Staffing
- recruitment, Staffing
- recruitment, Staffing
- recruitment, Staffing
Pricing
£0 to £0 a unit a quarter
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 6 1 9 2 6 0 5 0 9 3 5 4 6 3
Contact
GS TECHNICAL SOLUTIONS LTD
Kieran Goodchild
Telephone: 07557667350
Email: kieran.goodchild@gs-solutions.io
Service scope
- Service constraints
- N/a
- System requirements
-
- N/a
- N/a
- N/a
- N/a
- N/a
- N/a
- N/a
- N/a
- N/a
- N/a
User support
- Email or online ticketing support
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- No
- Support levels
- Recruitment Service, at pre-agreed fee structures
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We offer consultation and requirement gathering sessions
- Service documentation
- No
- End-of-contract data extraction
- Via Request
- End-of-contract process
- A rebate period is on offer after final invoice
Using the service
- Web browser interface
- No
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- No
- Independence of resources
- We offer models with agreed SLA's
- Usage notifications
- Yes
- Usage reporting
-
- SMS
Analytics
- Infrastructure or application metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Backup and recovery
- Backup and recovery
- No
Data-in-transit protection
- Data protection between buyer and supplier networks
- Private network or public sector network
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
12 week sliding scale rebate period (Negotiable)
30 day free replacement
Mutual agreed SLA's - Approach to resilience
- N/a
- Outage reporting
- Emails
Identity and authentication
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- 3rd party management
- Access restriction testing frequency
- Less than once a year
- Management access authentication
- Username or password
- Devices users manage the service through
- Dedicated device over multiple services or networks
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- No
- Security governance certified
- No
- Security governance approach
- 3rd party
- Information security policies and processes
- By following required procedures, depending on client request
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Recruitment check up meetings
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Via 3rd party reviews
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- 3rd party management
- Incident management type
- Undisclosed
- Incident management approach
- 3rd party management
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
We provide an equal opportunity service, adhering to diversity prerequisites
Pricing
- Price
- £0 to £0 a unit a quarter
- Discount for educational organisations
- No
- Free trial available
- No