Skip to main content

Help us improve the Digital Marketplace - send your feedback

SS Technologies

Cloud Software Development Service

As a Service company therefore, we have set our infrastructure in such a way that could help us provide wide range of services like Digital Transformation, Development and Strategy in Digital, Delivery Management, Cloud Migration, E2E Service Management, Application support & Cyber security.

Features

  • Software Scalability
  • Software Reliability
  • Software Security
  • Software Integration
  • Backup and disaster recovery

Benefits

  • Scalable Software, enable business to adjust resources to optimise costs
  • Provide reliability to ensure high availability
  • Implement advance security measures
  • Integrate seamlessly with other applications and services
  • Built in backup and disaster capability for quick restore

Pricing

£500 to £2,000 a unit a day

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at admin@sstechnologies.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

3 6 3 4 2 2 4 6 8 4 5 3 2 6 4

Contact

SS Technologies Lakshmi Pedamallu
Telephone: 07961860483
Email: admin@sstechnologies.co.uk

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
It can be integrated with Cloud hosting i.e. Infrastructure and underlying tool building
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
No but we provide support for a broad spectrum of software development across different architectures and cloud hosting platforms
System requirements
  • Operating System Compatibility
  • Hardware Resources
  • Security Protocols
  • Integration Compatibility
  • Compliance requirements or regulations

User support

Email or online ticketing support
No
Phone support
No
Web chat support
No
Onsite support
Onsite support
Support levels
We support 3 level of assistance.

L1 Support is the initial point of contact for users seeking assistance, typically handles basic inquiries and troubleshooting. Involve providing access to online documentation and basic troubleshooting steps. Response times are relatively quick.

L2 Support provides more in-depth technical assistance. Involve troubleshooting more complex issues, performing system diagnostics & configuration updates - some times workarounds. Response times are typically faster than L1 support.

L3 Support is the highest level of technical support and is reserved for the most complex and critical issues that can’t be resolved by L1 & L2 support, such software bugs as a fix, performance optimisation, and system integrations. Most of the time they work with development team as design need to aligned with current development cycle (if any). Response time may vary based on severity, priority as fix/change need to be agreement with other parties.

Cost, L1/L2/L3 support typically comes with different pricing structures based on factors such as response times, availability, and the level of expertise required, that could be based on Key Performance Indicator (KPIs)
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Using a cloud software application involves several key steps

Users sign up for the service, offer onboarding resources and training materials to help users get started.

Likes of migrating from an existing system, users may need to transfer data with the provider's assistance and configurations to the new cloud software application, that often offers tools or assistance to facilitate a smooth migration process.

For customisation and integration options allow users to tailor the software to their workflow and integrate with other tools if needed. Throughout the process, technical support is available to address any questions or issues.
Service documentation
Yes
Documentation formats
  • PDF
  • Other
Other documentation formats
  • Wiki
  • Confluence
End-of-contract data extraction
With a cloud software service comes to an end, the process of extracting data is crucial to ensure that valuable information isn't lost, we can offer several methods.

Built-in data export tools. These tools empower users to download their data in various standard formats such as CSV, XML, or JSON.

Application Programming Interfaces (APIs) provided by cloud software services enable users to programmatically access and retrieve their data. This method is particularly useful for users with technical expertise, as it allows for the extraction of structured data which can be used for analysis, integration with other systems.

Backup and restore functionality.
End-of-contract process
At the conclusion of a contract with a cloud software service, several critical procedures ensure a seamless transition and safeguard the user's data and interests.

Firstly, comprehensive documentation is paramount. This documentation encompasses both business and technical perspectives of the software. From a business standpoint, it includes detailed business scenarios and insights gathered from engagements with business Subject Matter Experts (SMEs). These documents articulate the business requirements, objectives, and any bespoke configurations implemented during the contract tenure. From a technical viewpoint, designs such as High-Level Design (HLD) and Low-Level Design (LLD), along with precise technical specifications, are meticulously documented. This comprehensive documentation ensures a clear understanding of the software's architecture, functionality, and alignment with business needs.

Furthermore, Knowledge Transfer (KT) sessions play a pivotal role in ensuring knowledge continuity. These sessions are meticulously crafted to provide stakeholders with a deep understanding of the software's functionalities, configurations, and potential technical intricacies. Both business and technical aspects are covered comprehensively, ensuring users are equipped to effectively leverage the software and manage any technical nuances that may arise.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
If the requirement to access the service via mobile, we make sure UI/UX & accessibility aspect are as per mobile screen, so that all functionalities are covered.
Service interface
No
User support accessibility
WCAG 2.1 AAA
API
Yes
What users can and can't do using the API
API can be defined and developed as per client needs, as our API services can be REST/SOPA/XML can also do transformation.
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • PDF
  • Other
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
User can customise fully based on there requirements, we do build services from scratch.

Scaling

Independence of resources
We can provide like Scalable Infrastructure, Load Balancing, Resource Isolation, Performance Monitoring and Optimisation, Quality of Service (QoS) Guarantees & Capacity Planning and Forecasting which will not impact the demand growth.

We can further tailor the services based on End user requirement and targets.

Analytics

Service usage metrics
Yes
Metrics types
We can provide user metrics in many forms based on requirements, such as Analytics Dashboards, Reports and Insights, Alerts and Notifications & API Access.
Reporting types
  • API access
  • Real-time dashboards
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Built-in export tools accessible through their user interfaces. These tools allow users to export data in various formats such as CSV, XLSX, JSON, or PDF. Users can select specific datasets, reports, or entire databases to export based on their needs.

Backup and restore functionality.
Application Programming Interfaces (APIs) that enable programmatic access to data. Users with technical expertise can utilize these APIs to extract data in a structured format, facilitating integration with other systems or applications.
Data export formats
  • CSV
  • Other
Other data export formats
  • JSON
  • XLSX
  • PDF
Data import formats
  • CSV
  • Other
Other data import formats
  • JSON
  • XLSX
  • XML

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
As a common SLA guarantee 99.9% uptime and it can be agreed in time based on customer bespoke requirement along with load.

If the cloud software service fails to meet the agreed-upon uptime guarantees outlined in the SLA, users may be entitled to refunds or service credits as compensation for the downtime experienced. The specific refund or credit policies vary depending on the provider and the terms outlined in the SLA.
Approach to resilience
We can put in place various resilient approaches like Redundancy, Load Balancing, Failover Mechanisms, Data Replication, Automated Monitoring and Alerting, Disaster Recovery Planning to ensure uninterrupted service delivery and mitigate the impact of potential failures or disruptions.
Outage reporting
Via public dashboard using monitoring & alerting along with email alerts.

Identity and authentication

User authentication needed
No
Access restrictions in management interfaces and support channels
We use Role-Based Access Control, Multi-Factor Authentication.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
CSA CCM version 3.0
Information security policies and processes
Information Security Policy, Data Classification and Handling, Identity and Access Management (IAM), Data Encryption and Key Management, Incident Response and Management.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Can be tailored based on client needs.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Based on client needs.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Based on client needs.
Incident management type
Supplier-defined controls
Incident management approach
Based on client needs.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Equal opportunity
  • Wellbeing

Equal opportunity

As an organisation, we are committed to equality, believing that opportunities should be equal and free from discrimination based on gender, race, or any other factors

Wellbeing

As an organisation, prioritizing wellbeing involves fostering a supportive and healthy work environment that promotes physical, mental, and emotional wellness among employees.

Pricing

Price
£500 to £2,000 a unit a day
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
We can provide PoC

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at admin@sstechnologies.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.