Cloud Software Development Service
As a Service company therefore, we have set our infrastructure in such a way that could help us provide wide range of services like Digital Transformation, Development and Strategy in Digital, Delivery Management, Cloud Migration, E2E Service Management, Application support & Cyber security.
Features
- Software Scalability
- Software Reliability
- Software Security
- Software Integration
- Backup and disaster recovery
Benefits
- Scalable Software, enable business to adjust resources to optimise costs
- Provide reliability to ensure high availability
- Implement advance security measures
- Integrate seamlessly with other applications and services
- Built in backup and disaster capability for quick restore
Pricing
£500 to £2,000 a unit a day
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 6 3 4 2 2 4 6 8 4 5 3 2 6 4
Contact
SS Technologies
Lakshmi Pedamallu
Telephone: 07961860483
Email: admin@sstechnologies.co.uk
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- It can be integrated with Cloud hosting i.e. Infrastructure and underlying tool building
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- No but we provide support for a broad spectrum of software development across different architectures and cloud hosting platforms
- System requirements
-
- Operating System Compatibility
- Hardware Resources
- Security Protocols
- Integration Compatibility
- Compliance requirements or regulations
User support
- Email or online ticketing support
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
-
We support 3 level of assistance.
L1 Support is the initial point of contact for users seeking assistance, typically handles basic inquiries and troubleshooting. Involve providing access to online documentation and basic troubleshooting steps. Response times are relatively quick.
L2 Support provides more in-depth technical assistance. Involve troubleshooting more complex issues, performing system diagnostics & configuration updates - some times workarounds. Response times are typically faster than L1 support.
L3 Support is the highest level of technical support and is reserved for the most complex and critical issues that can’t be resolved by L1 & L2 support, such software bugs as a fix, performance optimisation, and system integrations. Most of the time they work with development team as design need to aligned with current development cycle (if any). Response time may vary based on severity, priority as fix/change need to be agreement with other parties.
Cost, L1/L2/L3 support typically comes with different pricing structures based on factors such as response times, availability, and the level of expertise required, that could be based on Key Performance Indicator (KPIs) - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Using a cloud software application involves several key steps
Users sign up for the service, offer onboarding resources and training materials to help users get started.
Likes of migrating from an existing system, users may need to transfer data with the provider's assistance and configurations to the new cloud software application, that often offers tools or assistance to facilitate a smooth migration process.
For customisation and integration options allow users to tailor the software to their workflow and integrate with other tools if needed. Throughout the process, technical support is available to address any questions or issues. - Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
-
- Wiki
- Confluence
- End-of-contract data extraction
-
With a cloud software service comes to an end, the process of extracting data is crucial to ensure that valuable information isn't lost, we can offer several methods.
Built-in data export tools. These tools empower users to download their data in various standard formats such as CSV, XML, or JSON.
Application Programming Interfaces (APIs) provided by cloud software services enable users to programmatically access and retrieve their data. This method is particularly useful for users with technical expertise, as it allows for the extraction of structured data which can be used for analysis, integration with other systems.
Backup and restore functionality. - End-of-contract process
-
At the conclusion of a contract with a cloud software service, several critical procedures ensure a seamless transition and safeguard the user's data and interests.
Firstly, comprehensive documentation is paramount. This documentation encompasses both business and technical perspectives of the software. From a business standpoint, it includes detailed business scenarios and insights gathered from engagements with business Subject Matter Experts (SMEs). These documents articulate the business requirements, objectives, and any bespoke configurations implemented during the contract tenure. From a technical viewpoint, designs such as High-Level Design (HLD) and Low-Level Design (LLD), along with precise technical specifications, are meticulously documented. This comprehensive documentation ensures a clear understanding of the software's architecture, functionality, and alignment with business needs.
Furthermore, Knowledge Transfer (KT) sessions play a pivotal role in ensuring knowledge continuity. These sessions are meticulously crafted to provide stakeholders with a deep understanding of the software's functionalities, configurations, and potential technical intricacies. Both business and technical aspects are covered comprehensively, ensuring users are equipped to effectively leverage the software and manage any technical nuances that may arise.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- If the requirement to access the service via mobile, we make sure UI/UX & accessibility aspect are as per mobile screen, so that all functionalities are covered.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AAA
- API
- Yes
- What users can and can't do using the API
- API can be defined and developed as per client needs, as our API services can be REST/SOPA/XML can also do transformation.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- User can customise fully based on there requirements, we do build services from scratch.
Scaling
- Independence of resources
-
We can provide like Scalable Infrastructure, Load Balancing, Resource Isolation, Performance Monitoring and Optimisation, Quality of Service (QoS) Guarantees & Capacity Planning and Forecasting which will not impact the demand growth.
We can further tailor the services based on End user requirement and targets.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We can provide user metrics in many forms based on requirements, such as Analytics Dashboards, Reports and Insights, Alerts and Notifications & API Access.
- Reporting types
-
- API access
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
-
Built-in export tools accessible through their user interfaces. These tools allow users to export data in various formats such as CSV, XLSX, JSON, or PDF. Users can select specific datasets, reports, or entire databases to export based on their needs.
Backup and restore functionality.
Application Programming Interfaces (APIs) that enable programmatic access to data. Users with technical expertise can utilize these APIs to extract data in a structured format, facilitating integration with other systems or applications. - Data export formats
-
- CSV
- Other
- Other data export formats
-
- JSON
- XLSX
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- JSON
- XLSX
- XML
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
-
As a common SLA guarantee 99.9% uptime and it can be agreed in time based on customer bespoke requirement along with load.
If the cloud software service fails to meet the agreed-upon uptime guarantees outlined in the SLA, users may be entitled to refunds or service credits as compensation for the downtime experienced. The specific refund or credit policies vary depending on the provider and the terms outlined in the SLA. - Approach to resilience
- We can put in place various resilient approaches like Redundancy, Load Balancing, Failover Mechanisms, Data Replication, Automated Monitoring and Alerting, Disaster Recovery Planning to ensure uninterrupted service delivery and mitigate the impact of potential failures or disruptions.
- Outage reporting
- Via public dashboard using monitoring & alerting along with email alerts.
Identity and authentication
- User authentication needed
- No
- Access restrictions in management interfaces and support channels
- We use Role-Based Access Control, Multi-Factor Authentication.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- CSA CCM version 3.0
- Information security policies and processes
- Information Security Policy, Data Classification and Handling, Identity and Access Management (IAM), Data Encryption and Key Management, Incident Response and Management.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Can be tailored based on client needs.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Based on client needs.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Based on client needs.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Based on client needs.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Equal opportunity
- Wellbeing
Equal opportunity
As an organisation, we are committed to equality, believing that opportunities should be equal and free from discrimination based on gender, race, or any other factorsWellbeing
As an organisation, prioritizing wellbeing involves fostering a supportive and healthy work environment that promotes physical, mental, and emotional wellness among employees.
Pricing
- Price
- £500 to £2,000 a unit a day
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- We can provide PoC