2ABLE LTD

WordPress Web Design and Development

The team at 2able have lived and breathed WordPress since 2010. In that time we’ve worked on 100’s of WordPress websites, both direct for organisations and on behalf of other Digital Agencies. As you can imagine, this has been across a variety of sectors with varying needs.

Features

  • Working with WordPress since 2010
  • WordPress technical issues
  • Wordpress multi-lingual websites
  • Mobile first WordPress websites
  • WordPress Core and Plugin issues
  • Security assistance and WordPress hardening
  • WordPress page speed assistance
  • WordPress Child Theme assistance
  • WordPress hosting solutions and advice
  • WordPress Backup strategies

Benefits

  • Over 10 years WordPress experience
  • Freeing you up to focus on what you do best
  • Present your WordPress site in other languages
  • Device-friendly solutions
  • Security is fully-managed
  • Ultra-fast website speeds for Google
  • Trusted by other Digital Agencies with their WordPress needs
  • Reduced down-time with safe update practices
  • Wide-range of hosting options
  • Multi-location backups for safety reasons

Pricing

£75 a unit an hour

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ben.c@2able.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

1 9 1 5 5 3 0 3 4 0 6 9 8 7 1

Contact

2ABLE LTD Ben Crowley
Telephone: 01202 237 891
Email: ben.c@2able.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
None
System requirements
  • PHP version 7.4+
  • MySQL 5.6+

User support

Email or online ticketing support
Email or online ticketing
Support response times
Emergency issues within 1 hour. Standard response within 8 hours. SLAs can be tailored to meet the needs of the client.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Yes, at an extra cost
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 A
Web chat accessibility testing
This has been extensively tested by the developers.
Onsite support
Yes, at extra cost
Support levels
Support levels are customised to the clients needs.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We initially assess the requirements of the client through questions around their website requirements. We then recommend a solution accordingly, which can include training and documentation if required.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
We supply WordPress website files and databases at the end of the contract.
End-of-contract process
Providing WordPress site files and databases is included in the price.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Mobile and desktop visual designs will be provided to the client for approval, before the site is developed.
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
WordPress back-end interface for editing the front-end content
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
WordPress aims to make the WordPress Admin and bundled themes fully WCAG 2.0 AA compliant where possible.

All new and updated code released in WordPress must conform with these guidelines as per the WordPress Accessibility Coding Standards.
API
Yes
What users can and can't do using the API
Full details are available at https://developer.wordpress.org/rest-api/
API documentation
Yes
API documentation formats
Open API (also known as Swagger)
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
This can be defined in the scoping of the project.

Scaling

Independence of resources
We have monitoring in place and have low thresholds. Should these thresholds be breached, we respond accordingly.

Analytics

Service usage metrics
Yes
Metrics types
We provide 3rd party tools such as Google Analytics. Raw logs can also be provided.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Depending on the hosting solution chosen, they can either request this from us, obtain from backups, or access themselves via the WordPress back-end.
Data export formats
  • CSV
  • ODF
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
100% network uptime. If this is not achieved, a refund is given for the length of time the outage occurs.
Approach to resilience
Catalyst2 10G network is designed to be completely redundant from the ground up, every element of their core network is duplicated. They don’t just deploy one switch/router/firewall, they deploy two. catalyst2 ensure that even if the hardware fails, they have a spare ready to automatically take over, or right beside it to be plugged in, with the result being minimal or no impact on your service.
Outage reporting
This can be customised to the clients needs, such as emails and SMS alerts.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels
We provide user levels based on requirements. WordPress admin access is restricted to 2able only.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
Cyber Essentials
Information security policies and processes
2able follow GDPR requirements for all areas of our business.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Configuration management is managed by third parties.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
We provide these services through an approved supplier.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
This is managed by our supplier.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Our supplier has operational ISO27001-complaint processes and systems for incident response.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Fighting climate change

Fighting climate change

2able are carbon neutral

Pricing

Price
£75 a unit an hour
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ben.c@2able.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.