RJY
We focus on providing software development and implementation services for both the Oracle cloud and on-premise platforms. Our areas of expertise encompass the implementation of Oracle Fusion HR and Payroll, Oracle Apex, and the development of integrations for Oracle Cloud Infrastructure (OCI).
Features
- Cloud Integration
- BI reporting
- Apex dashboards
- HCM cloud configuraton
- Oracle implementations
- Networking Solutions
- Oracle Software development
- Support and maintenance
- Bug tracking
- Data obfuscation
Benefits
- Oracle cloud integration enables thirdparty applications connected Oracle fusion.
- BI publishes data in formats (word,pdf,excel etc).
- With Apex very powerful dashboards can be produced.
- HR&Payroll can be configured as per the business need.
- Oracle database implementation enable users to automate processes.
- Networking connect to various parts of the departments and locations.
- Oracle software development can assist developing bespoke software solutions
- Support and maintenance give peace of mind to the businesses.
- Effective bug tracking tool helps to identify progress
- Live data is protected by data obfuscation process
Pricing
£1,000 to £1,200 a unit a day
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 7 8 3 6 8 7 4 6 0 4 8 2 1 8
Contact
RJY LTD (Managed IT SERVICE PROVIDER)
<removed>
Telephone: <removed>
Email: <removed>@cdc6d952-af6f-4988-b4bc-3f88043a3cc2.com
Service scope
- Software add-on or extension
- Yes
- What software services is the service an extension to
- One of our service is extension/customisation to Oracle HCM fusion.
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- No
- System requirements
- Oracle and other oracle tools
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 32 hrs between Mon-Friday (9am to 5.30pm).
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Level 1/Level2/Level3
We will provide cloud support analyst. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Onsite and online training. Full user documentation will be available.
- Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
- WORD
- End-of-contract data extraction
- A secure FTP location will be provided.
- End-of-contract process
- Additional cost to provide data in a specific format and specification.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- Yes
- Description of customisation
- Look and feel. Create their own reports and modify the existing reports. Application can be customised as per the business need.
Scaling
- Independence of resources
- A regular review will be in place to make sure users are getting the best service.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- In CSV format
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- The service is assuredly available from 9am to 5.30pm. Users will not incur any charges for service interruptions, unless they are caused by the user themselves.
- Approach to resilience
- Available on request.
- Outage reporting
- Email alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Access restrictions are enforced by setting up clear roles and responsibilities.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- With tight inhouse measures.
- Information security policies and processes
-
Meet with divisional leaders to ensure the policies and procedures being created are feasible for individual departments.
Determine the best format of policies for different audiences.
Make Policies and Procedures easily accessible to employees.
Set deadlines for each policy and procedure to be acknowledged.
Determine the best way to measure the understanding employees have of policies and procedures.
Support Analyst and Configuration consultant report to Technical Architect. Technical Architect reports to the Director.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
This occurs after completing any IT project or process, including software code updates or hardware upgrades.
Minor changes: A single person, who is often also responsible for implementing the change, usually carries out these changes. They require minimal time and effort and can often be performed without much planning.
Major changes: These are changes that require more planning, including collaboration between teams or departments within an organization.
Configuration management is about making sure that changes are made correctly. It occurs before a change and helps prevent errors in configuration. A thorough QA will be done on configuration management. - Vulnerability management type
- Undisclosed
- Vulnerability management approach
-
A classical vulnerability management lifecycle is comprised of five principal stages, as listed below:
Asset Discovery and Vulnerability Assessment.
Prioritization of Identified Vulnerabilities.
Remediation and Mitigation Actions.
Validation and Monitoring.
Reporting and Improvement.
We will deploy the patches as quickly as possible (overnight to minimise the service disruption).
Information about potential threat will come regular assessment of the service. Community forums who are using the similar products. - Protective monitoring type
- Undisclosed
- Protective monitoring approach
-
Protective monitoring include the inspection of firewall logs, the investigation of security alerts, and monitoring of intrusion detection systems.
Assess your current situation.
Define your security monitoring scope.
Select your security monitoring tools.
Establish your security monitoring roles and responsibilities.
Develop your security monitoring procedures and workflows.
Implement and maintain your security monitoring plan. - Incident management type
- Undisclosed
- Incident management approach
-
FAQ will be published for commonly occurred events.
All faults and configuration requests should be reported via email.
All incidents relating to the service detected by end users must be reported to the RJY team for
further diagnosis. The support team member will log a task on our in-house Incident Management System.
The support team will receive an email/telephone call of any reported incidents.
The support team will log the incident with the customer contact who has reported the issue.
Support team will email the report back to the raiser and provide an update on the portal.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Wellbeing
Fighting climate change
We need to cut man-made greenhouse gas emissions drastically, phase out fossil fuels and move to renewable energy. We need to be more efficient and use less energy.Wellbeing
Personal well-being is a particularly important dimension which we define as how satisfied we are with our lives, our sense that what we do in life is worthwhile, our day to day emotional experiences (happiness and anxiety) and our wider mental wellbeing.
Pricing
- Price
- £1,000 to £1,200 a unit a day
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Free demo and Proof of concept in some cases.