Skip to main content

Help us improve the Digital Marketplace - send your feedback

RJY LTD (Managed IT SERVICE PROVIDER)

RJY

We focus on providing software development and implementation services for both the Oracle cloud and on-premise platforms. Our areas of expertise encompass the implementation of Oracle Fusion HR and Payroll, Oracle Apex, and the development of integrations for Oracle Cloud Infrastructure (OCI).

Features

  • Cloud Integration
  • BI reporting
  • Apex dashboards
  • HCM cloud configuraton
  • Oracle implementations
  • Networking Solutions
  • Oracle Software development
  • Support and maintenance
  • Bug tracking
  • Data obfuscation

Benefits

  • Oracle cloud integration enables thirdparty applications connected Oracle fusion.
  • BI publishes data in formats (word,pdf,excel etc).
  • With Apex very powerful dashboards can be produced.
  • HR&Payroll can be configured as per the business need.
  • Oracle database implementation enable users to automate processes.
  • Networking connect to various parts of the departments and locations.
  • Oracle software development can assist developing bespoke software solutions
  • Support and maintenance give peace of mind to the businesses.
  • Effective bug tracking tool helps to identify progress
  • Live data is protected by data obfuscation process

Pricing

£1,000 to £1,200 a unit a day

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at <removed>@cdc6d952-af6f-4988-b4bc-3f88043a3cc2.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

2 7 8 3 6 8 7 4 6 0 4 8 2 1 8

Contact

RJY LTD (Managed IT SERVICE PROVIDER) <removed>
Telephone: <removed>
Email: <removed>@cdc6d952-af6f-4988-b4bc-3f88043a3cc2.com

Service scope

Software add-on or extension
Yes
What software services is the service an extension to
One of our service is extension/customisation to Oracle HCM fusion.
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
No
System requirements
Oracle and other oracle tools

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 32 hrs between Mon-Friday (9am to 5.30pm).
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Level 1/Level2/Level3
We will provide cloud support analyst.
Support available to third parties
No

Onboarding and offboarding

Getting started
Onsite and online training. Full user documentation will be available.
Service documentation
Yes
Documentation formats
  • PDF
  • Other
Other documentation formats
WORD
End-of-contract data extraction
A secure FTP location will be provided.
End-of-contract process
Additional cost to provide data in a specific format and specification.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
No
Service interface
No
User support accessibility
None or don’t know
API
No
Customisation available
Yes
Description of customisation
Look and feel. Create their own reports and modify the existing reports. Application can be customised as per the business need.

Scaling

Independence of resources
A regular review will be in place to make sure users are getting the best service.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least every 6 months
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
In CSV format
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
The service is assuredly available from 9am to 5.30pm. Users will not incur any charges for service interruptions, unless they are caused by the user themselves.
Approach to resilience
Available on request.
Outage reporting
Email alerts.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Access restrictions are enforced by setting up clear roles and responsibilities.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
With tight inhouse measures.
Information security policies and processes
Meet with divisional leaders to ensure the policies and procedures being created are feasible for individual departments.
Determine the best format of policies for different audiences.
Make Policies and Procedures easily accessible to employees.
Set deadlines for each policy and procedure to be acknowledged.
Determine the best way to measure the understanding employees have of policies and procedures.
Support Analyst and Configuration consultant report to Technical Architect. Technical Architect reports to the Director.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
This occurs after completing any IT project or process, including software code updates or hardware upgrades.
Minor changes: A single person, who is often also responsible for implementing the change, usually carries out these changes. They require minimal time and effort and can often be performed without much planning.
Major changes: These are changes that require more planning, including collaboration between teams or departments within an organization.
Configuration management is about making sure that changes are made correctly. It occurs before a change and helps prevent errors in configuration. A thorough QA will be done on configuration management.
Vulnerability management type
Undisclosed
Vulnerability management approach
A classical vulnerability management lifecycle is comprised of five principal stages, as listed below:
Asset Discovery and Vulnerability Assessment.
Prioritization of Identified Vulnerabilities.
Remediation and Mitigation Actions.
Validation and Monitoring.
Reporting and Improvement.
We will deploy the patches as quickly as possible (overnight to minimise the service disruption).
Information about potential threat will come regular assessment of the service. Community forums who are using the similar products.
Protective monitoring type
Undisclosed
Protective monitoring approach
Protective monitoring include the inspection of firewall logs, the investigation of security alerts, and monitoring of intrusion detection systems.
Assess your current situation.
Define your security monitoring scope.
Select your security monitoring tools.
Establish your security monitoring roles and responsibilities.
Develop your security monitoring procedures and workflows.
Implement and maintain your security monitoring plan.
Incident management type
Undisclosed
Incident management approach
FAQ will be published for commonly occurred events.
All faults and configuration requests should be reported via email.
All incidents relating to the service detected by end users must be reported to the RJY team for
further diagnosis. The support team member will log a task on our in-house Incident Management System.
The support team will receive an email/telephone call of any reported incidents.
The support team will log the incident with the customer contact who has reported the issue.
Support team will email the report back to the raiser and provide an update on the portal.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Wellbeing

Fighting climate change

We need to cut man-made greenhouse gas emissions drastically, phase out fossil fuels and move to renewable energy. We need to be more efficient and use less energy.

Wellbeing

Personal well-being is a particularly important dimension which we define as how satisfied we are with our lives, our sense that what we do in life is worthwhile, our day to day emotional experiences (happiness and anxiety) and our wider mental wellbeing.

Pricing

Price
£1,000 to £1,200 a unit a day
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Free demo and Proof of concept in some cases.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at <removed>@cdc6d952-af6f-4988-b4bc-3f88043a3cc2.com. Tell them what format you need. It will help if you say what assistive technology you use.