Cloud Software Services
Infotel UK is an IT Consultancy based in Newcastle Upon Tyne with expertise in Java, DevOps, Testing, Data Science, AI & Machine Learning, Kafka, Event Driven Architecture, Cloud Based Solutions, Event Based Solutions, Web Development, Agile Methodologies and Project Management.
Features
- Incident management.
- IT Service Management, ITSM
- Data deletions
- Real-time reporting
- Maintenance and Support
- Software Development
- Kafka
- Event Based Architecture
- Event Based Solutions
- AI & Machine Learning
Benefits
- cloud hosted software as a service
- maintenance and support agreements available
- Kafka development expertise
- robust event based architecture design
- Event Based Solutions
- Cloud Based Solutions
- bespoke software solutions tailored to your requirements
- use AI to solve the most complicated use cases
- manage your data compliance
- anonymise and redact PII
Pricing
£200 a unit a day
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
3 4 3 6 0 2 0 0 5 6 4 4 5 1 5
Contact
Infotel UK
Mundeep Nayyar
Telephone: 0191 2708800
Email: mundeep.nayyar@infotel.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Hybrid cloud
- Service constraints
- Bespoke solutions dependent on customer needs/requirements means constraints would be discussed on a per-project basis.
- System requirements
- Bespoke solutions dependent on customer needs/requirements
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Bespoke solutions dependent on customer needs/requirements would change the support levels we'd offer. This can be discussed.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
- Bespoke solutions dependent on customer needs/requirements would change the support levels we'd offer. This can be discussed.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Bespoke solutions dependent on customer needs/requirements would entail learning groups, training days and/or initial support calls, etc.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Bespoke solutions dependent on customer needs/requirements would facilitate the extraction of data when a contract ends.
- End-of-contract process
- Bespoke solutions dependent on customer needs/requirements would change the pricing and terms of any contracts entered.
Using the service
- Web browser interface
- No
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- Bespoke solutions dependent on customer needs/requirements
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- No
- Customisation available
- No
Scaling
- Independence of resources
- Bespoke solutions dependent on customer needs/requirements would ensure the independence of resources is managed and offset against any other resource usage.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Performance metrics
- Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Bespoke solutions dependent on customer needs/requirements would alter the exporting of data in relation to the services/software being used.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- XML
- JSON
- Excel
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- XML
- JSON
- Excel
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- Bespoke solutions dependent on customer needs/requirements would dictate any SLAs put in place.
- Approach to resilience
- This information would be available on request.
- Outage reporting
- This could be done in any of the three listed or other ways, dependent on the needs of the customer and a predefined agreement as part of any project planning
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Bespoke solutions dependent on customer needs/requirements would define the levels of restriction to access for any system/software/application.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users receive audit information on a regular basis
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users receive audit information on a regular basis
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- AFNOR Certification
- ISO/IEC 27001 accreditation date
- 01/04/2019
- What the ISO/IEC 27001 doesn’t cover
- Not Applicable, Fully covered
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- This reporting structure can be changed/tailored to customer needs based on predefined agreements.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Bespoke solutions dependent on customer needs/requirements would mean this could be changed and discussed prior to any engagement with a customer.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Bespoke solutions dependent on customer needs/requirements would necessitate the level of management on this being discussed and agreed upon prior to customer engagement.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- This is done through various sanity checks and these can be tailored to a customer's preferred methods of working.
- Incident management type
- Undisclosed
- Incident management approach
- A generic manner for this is usually, discovery, report, plan, action, post-script report. This can be discussed and changed based on user/customer requirements for any contract/engagement.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
More detail available on request. - Covid-19 recovery
-
Covid-19 recovery
More detail available on request. - Tackling economic inequality
-
Tackling economic inequality
More detail available on request. - Equal opportunity
-
Equal opportunity
More detail available on request. - Wellbeing
-
Wellbeing
More detail available on request.
Pricing
- Price
- £200 a unit a day
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- We can supply a proof of concept where required.