Custom Software Development (Mobile, Server, Web, APIs)
Custom Software Development services. Turn key solutions to convert ideas and business requirements into practical solutions. Our team designs, develops and provides support for internal or external applications. Legacy system modernisation and migration. Our team of experts support you to build the user journey from ideation to In-life support.
Features
- Web and Mobile development, Consultancy and Advisory
- API development and API integration services
- Wireframes and prototypes
- NET, PHP, HTML, CSS software application development
- Ecommerce application design and development
- Full stack development and Blockchain development
- Data Migration services
- Design, UX, CX
- Maintenance & support
- Technical Due Diligence
Benefits
- Modernise business processes
- Built to your requirements
- Improve security by migrating legacy applications
- Innovation and Digitilisation
Pricing
£250 to £1,200 a unit
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 6 5 9 8 4 1 5 7 9 2 6 0 3 3
Contact
Cykube Ltd
Sharjil
Telephone: 07766305704
Email: Sharjil.ahmed@cykube.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- We provide add on extensions to industry applications.
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- None, but can we evaluated as part of project due diligence.
- System requirements
- Requirements can vary as per project requirements
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
24x7
SLA's are provided based on customer requirements. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Through our customer support portal.
- Web chat accessibility testing
- NA
- Onsite support
- Yes, at extra cost
- Support levels
-
24x7
Response times and SLA's available as per project. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide full training and documentation on the developed product.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Data is fully accessible to the customer.
- End-of-contract process
- End of each of contract is determined by the scope of work and handover of necessary documentation.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Dependent on the customer application.
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Dependent on the customer application.
- Accessibility standards
- None or don’t know
- Description of accessibility
- Development for browser or desktop application which provide a service interface.
- Accessibility testing
- NA
- API
- Yes
- What users can and can't do using the API
- Dependent on the customer application.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- The entire application development process is customizable.
Scaling
- Independence of resources
- We have dedicated resources for each project.
Analytics
- Service usage metrics
- Yes
- Metrics types
- It is dependent on application being developed.
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- It is dependent on the application being built.
- Data export formats
-
- CSV
- Other
- Other data export formats
- Database exports
- Data import formats
-
- CSV
- Other
- Other data import formats
- Dependent on customer current application format.
Data-in-transit protection
- Data protection between buyer and supplier networks
- IPsec or TLS VPN gateway
- Data protection within supplier network
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- This is dependent on each project.
- Approach to resilience
- Each application is built as per customer requirements and resilience is built accordingly.
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Access is restricted by roles and can also be customised to customer specific requirements.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
Our Information security policy is created and reviewed by the Cyber Security Manager. This includes induction and annual training on Information Security and GDPR.
The policy is available to all team members. - Information security policies and processes
- Our Cyber Security policy.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Our Change management follows the ITIL process. Changes are executed once approved by the CAB (Change Advisory Board) which has a weekly cadence and can be convened earlier is needed.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Vulnerability analysis is done regularly. As vulnerabilities are identified they are rectified based on the criticality of each vulnerability. In general monthly updates are provided once a solution is in production.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Comprehensive testing is done and if required a defined cadence of penetration and vulnerability testing is done as per customer requirements.
- Incident management type
- Supplier-defined controls
- Incident management approach
- All incidents are reported to our support services desk by the customer or solution generated alerts. Once an incident is reported the Level 1 team investigates and escalates to Level 2 and 3 teams as necessary.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Tackling economic inequality
From inception as a company we have ensured economic equality by ensuring we have clear and transparent policy for all employees. We have been engaging with many educational institutes across UK to help students from all walks of life to get opportunities in the FinTech sector either with our company or through our company with other organizations. Details of such engagement can be provided if requested.Equal opportunity
We are an equal opportunities employer. At Cykube we do not discriminate on age, disability, gender, colour, nationality and ethnic or national origins, religion or belief.Wellbeing
Employee well being is at the core of what we do. As a services organisation it is crucial that our employees get support, guidance and information on health, wellbeing, financial wellbeing. A big part of this is to work life balance for which the team has flexibility on place of work. As part of this initiative we hold regular events based on feedback from employees on activities they like to do as a team.
Pricing
- Price
- £250 to £1,200 a unit
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- 1 or 2 day consulting workshop