RADD SOLUTIONS LIMITED
Software Solution Engineering
Design, Planning, Development and Delivery of bespoke Software Solutions to meet client requirements.
Features
- Collaborative design of tailored solution based on client's workflows
- End to End development of bespoke software
- Secure Managed Hosting
- Integration with client's O365/Entra Authentication or existing single-sign-on solutions
- Secure lifecycle maintenance, including updates and patches
- Managed changes to an established deployment
- Integrations with third party systems
- Expertise in railway industry
- Custom reporting
Benefits
- Solutions customised to address client challenges
- Solutions bespoke to client's business operations
- No need to alter working practices to fit solution
- Complete end to end management of solution
- Scalability and Flexibility to request future changes
- Business workflow optimisation
- Version control and change management
- Custom data flows and third party integrations
Pricing
£95 a unit an hour
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at info@raddsolutions.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
2 8 9 5 9 1 2 6 5 0 1 6 5 1 6
Contact
RADD SOLUTIONS LIMITED
Richard Potter
Telephone: 07813490246
Email: info@raddsolutions.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- No
- System requirements
- Dependant on client requirements
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- As per individual contract
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- As per individual contract
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- All solutions include implementation support of all types depending on agreed contract.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Determined by individual contract.
- End-of-contract process
- Determined by individual contract.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- As defined by bespoke design in collaboration with client.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- Dependant on client requirements.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- The level of accessibility is defined by the client requirement; however, we have worked with disability working groups to ensure solution appropriate considerations are implemented.
- API
- Yes
- What users can and can't do using the API
- Dependant on client requirements
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Solutions are bespoke
Scaling
- Independence of resources
- User demand is evaluated during analysis and requirements gathering phase and an appropriate solution is designed and implemented to support the required demand. If software as a service is required RADD will provide an appropriate level of hosting.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Determined by individual contract.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Dependant on client requirements.
- Data export formats
-
- CSV
- Other
- Other data export formats
- JSON
- Data import formats
-
- CSV
- Other
- Other data import formats
- Dependant on client requirement
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection between networks
- We use the best level of protection suitable for the bespoke solution being delivered.
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- Determined by individual contract.
- Approach to resilience
- Determined by criticality reflected in individual contract.
- Outage reporting
- Email alerts unless otherwise specified by the client.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Other
- Other user authentication
- Determined by individual contract and as appropriate for the solution. Typically we integrate with clients' existing Microsoft Entra to authenticate users.
- Access restrictions in management interfaces and support channels
- Determined by client requirements.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Other
- Description of management access authentication
- Determined by individual contract.
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Follow ISO 27001 with qualified in house auditor
- Information security policies and processes
- All systems comply with Cyber essentials with Managing Director ultimately responsible for security but with specialist security technician responsible on a day to day basis.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- SNYK and Cloudflare WAF automated monitoring of emerging threats and vulnerabilities (CSVs) are resolved as soon as practicable on a maintenance agreement. Other changes go through the clients CAB process and require investigation and estimation.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- SNYK and Cloudflare WAF automated monitoring of emerging threats and vulnerabilities (CSVs) are resolved as soon as practicable on a maintenance agreement. We also monitor cyber security alerts from various sources including UK Government and NHS, CISA and the ACSC.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- SNYK and Cloudflare WAF automated monitoring of emerging threats and vulnerabilities (CSVs) are resolved as soon as practicable on a maintenance agreement.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Determined by individual contract.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Equal opportunity
- Wellbeing
Fighting climate change
Software is developed to reflect the clients values and requirements. Our chosen hosting provider is committed to green energy and reduction in carbon foot print. https://www.akamai.com/site/en/documents/akamai/akamai-2022-esg-impact-report.pdfEqual opportunity
We are a fully remote organisation that allows staff to work in an environment they are already comfortable in. As such job suitability is entirely based on qualifications and ability.Wellbeing
We are champions of mental health and put our staff first.
Pricing
- Price
- £95 a unit an hour
- Discount for educational organisations
- No
- Free trial available
- No
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at info@raddsolutions.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.