Mphasis Modern Engineering Platform
Unlock the potential of your engineering endeavors with Mphasis's Modern Engineering Platform (MEP). This is designed to enhance productivity and elevate engineering experience. Construct a secure and sustainable path to production in multi-cloud environments. Leverage cutting-edge Gen.AI models and advanced tooling for collaborative engineering.
Features
- Single Pane of Glass: Comprehensive view from concept to production.
- Catalog and Knowledge Management: Centralized repository for knowledge and reusability
- Pre-configured Templates: Ready-to-use templates for swift deployment.
- Cloud Native Patterns: Utilize modern cloud-native design patterns.
- Mphasis Accelerators: Access specialized tools and accelerators for efficiency.
- Service Reliability: Ensure high reliability and observability of services.
- Automation Enablement: Automate routine tasks securely.
- Legacy Modernization: Scale legacy systems to modern standards.
- Composable Platforms: Design adaptable and modular platforms.
Benefits
- Accelerated Cloud Adoption: Speed up transition to cloud environments.
- Digital Transformation: Drive forward digital transformation initiatives.
- Secured Supply Chain: Ensure security across the supply chain.
- AI Integration: Incorporate AI for enhanced business insights.
- Service Efficiency: Improve overall service delivery efficiency.
- Contact Centre Modernization: Modernize contact center operations.
- COE Design Acceleration: Expedite the design and adoption of COEs.
Pricing
£650 to £1,487 a unit a day
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 8 8 2 2 3 2 6 7 0 6 4 0 2 2
Contact
Mphasis UK Limited
Gaurav Singh
Telephone: +447424958499
Email: Gaurav.Singh1@mphasis.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- Only planned maintenance for updates to the application. These are done in conjunction with the customer's requirements
- System requirements
- Support all cloud Platform (AWS, Azure, GCP, Hybrid)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Support can be provided 24/7 or 9 to 5 according to project requirement. We work with the client to agree on the SLAs required
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- Support can be provided 24/7 or 9 to 5 according to project requirement. We work with the client to agree on the SLAs required
- Onsite support
- Onsite support
- Support levels
- Support services are limited to the Software Solution that is hosted on Cloud. Any Cloud related issues will be handled by Cloud Vendor.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide a mix of training options for users from onsite user based training, train the trainer, on line user documentation and web based eLearning style training courses. We also provide Masterclasses for ongoing training and exposure to new functionality as it is released.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- The users data will be sat in their own personal workspace and this data can be copied to a new location upon termination of the contract
- End-of-contract process
- We provide facilitation for clients to manage the platform independently. End date of contract can be agreed at the time of contract.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The solution is based on web browser functionality and so there are no differences between the mobile and desktop service. The form factor of smaller mobile devices such as smart phones don't lend themselves to the solution due to the amount of screen information.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AAA
- API
- No
- Customisation available
- Yes
- Description of customisation
- The Service can be customised interms of the look at feel for each customer. The solution is also Modular so each customer can take the components they require initially and then add at a later date. Some self service customisation can be included in some of the modules and this can be explored upon request
Scaling
- Independence of resources
- We will survey the users you have and the type of licenses they need.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Azure Monitor enables you to consume telemetry to gain visibility into the performance and health of your workloads on Azure. The most important type of Azure telemetry data is the metrics (also called performance counters) emitted by most Azure resources. Azure Monitor provides several ways to configure and consume these metrics for monitoring and troubleshooting. Metrics are a valuable source of telemetry and enable you to do the following tasks: Track the performance of your resource (such as a VM, website, or logic app) by plotting its metrics on a portal chart and pinning that chart to a dashboards.
- Reporting types
-
- API access
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- At all times during the term of Customer’s subscription, Customer will have the ability to access and extract Customer Data stored in each Online Service.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- XLS
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Other
- Other protection between networks
- In our partnership with preferred Cloud platform we can provide infrastructure that is controlled and monitored 24 hours a day, seven days a week.
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
-
Cloud Vendor uses several network security technologies to protect your cloud services and data, and block attacks.
•Firewalls and perimeter firewalls
•Intrusion detection systems/intrusion prevention systems detect and identify suspicious or undesirable activities that indicate intrusion
•Partitioned LANs
•Multi-tier topology
•Traffic isolation
•Cross-premises connectivity enables you to establish connections between a virtual network and multiple on-premises sites, or other virtual networks in Azure, by using VPN gateways or third-party virtual appliances.
•Access Control Lists
•Azure Security Center provides a centralized portal from which you can secure resources you place in Azure
Availability and resilience
- Guaranteed availability
- Can be confirmed on agreement with client.
- Approach to resilience
- This is available upon request .
- Outage reporting
- https://azure.microsoft.com/en-gb/support/trust-center/
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Identity federation with existing provider (for example Google Apps)
- Access restrictions in management interfaces and support channels
- https://azure.microsoft.com/en-gb/support/trust-center/
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Public key authentication (including by TLS client certificate)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Lloyd’s Register
- ISO/IEC 27001 accreditation date
- 28/05/2018
- What the ISO/IEC 27001 doesn’t cover
- Available on Request
- ISO 28000:2007 certification
- No
- CSA STAR certification
- Yes
- CSA STAR accreditation date
- 31/12/2016
- CSA STAR certification level
- Level 2: CSA STAR Attestation
- What the CSA STAR doesn’t cover
- https://azure.microsoft.com/en-gb/support/trust-center/
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- ISO/IEC 27001
- Information security policies and processes
- https://azure.microsoft.com/en-gb/support/trust-center/
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Can be confirmed on agreement with client.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- https://azure.microsoft.com/en-gb/support/trust-center/
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- https://azure.microsoft.com/en-gb/support/trust-center/
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- https://azure.microsoft.com/en-gb/support/trust-center/
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- Public Services Network (PSN)
- NHS Network (N3)
- Scottish Wide Area Network (SWAN)
- Health and Social Care Network (HSCN)
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Equal opportunity
- Wellbeing
Fighting climate change
Mphasis takes climate change seriously and has created Climate emergency policies as part of our broader Health, Environment and Safety goals. We will ensure that in the course of our business activities, we will not only minimise our impact on the environment, but also enable each employee to contribute under the guidelines documented.Equal opportunity
We practice gender-neutral policies related to recruitment, compensation, career progression and rewards & recognition. This is reflected through: 1. We have clear guidelines for determining salaries and pay scales, ensuring that compensation is based on objective criteria such as skills, experience, and job responsibilities. Transparency in salary structures allows our employees to have a better understanding of how their pay is determined, reducing the risk of pay disparities. Also, we keep promotions, rewards and pay rises are transparent. 2. Additionally, to identify and rectify gender pay disparities, we conduct regular pay equity audits. These audits involve analysing compensation data across distinct roles and levels, considering variables such as gender, race, and age. By identifying any unjustifiable pay gaps, we take corrective measures to ensure fair and equal compensation for all employees. 3. We encourage women leadership development by providing opportunities for skill-building, mentorship, and sponsorship, we support women's advancement into leadership positions. This not only bridges the gender pay gap but also enhances overall workplace diversity and inclusivity.Wellbeing
Our dedicated D&I team runs various initiatives to provide further support for mental and physical wellbeing of our staff , their families and clients. We conduct various initiatives that gives the comprehensive view of the support that our staff are able to access.
Pricing
- Price
- £650 to £1,487 a unit a day
- Discount for educational organisations
- No
- Free trial available
- No