Skip to main content

Help us improve the Digital Marketplace - send your feedback

Cykube Ltd

Custom Software Development (Mobile, Server, Web, APIs)

Custom Software Development services. Turn key solutions to convert ideas and business requirements into practical solutions. Our team designs, develops and provides support for internal or external applications. Legacy system modernisation and migration. Our team of experts support you to build the user journey from ideation to In-life support.

Features

  • Web and Mobile development, Consultancy and Advisory
  • API development and API integration services
  • Wireframes and prototypes
  • NET, PHP, HTML, CSS software application development
  • Ecommerce application design and development
  • Full stack development and Blockchain development
  • Data Migration services
  • Design, UX, CX
  • Maintenance & support
  • Technical Due Diligence

Benefits

  • Modernise business processes
  • Built to your requirements
  • Improve security by migrating legacy applications
  • Innovation and Digitilisation

Pricing

£250 to £1,200 a unit

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Sharjil.ahmed@cykube.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

3 6 5 9 8 4 1 5 7 9 2 6 0 3 3

Contact

Cykube Ltd Sharjil
Telephone: 07766305704
Email: Sharjil.ahmed@cykube.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
We provide add on extensions to industry applications.
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
None, but can we evaluated as part of project due diligence.
System requirements
Requirements can vary as per project requirements

User support

Email or online ticketing support
Email or online ticketing
Support response times
24x7
SLA's are provided based on customer requirements.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Through our customer support portal.
Web chat accessibility testing
NA
Onsite support
Yes, at extra cost
Support levels
24x7
Response times and SLA's available as per project.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide full training and documentation on the developed product.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Data is fully accessible to the customer.
End-of-contract process
End of each of contract is determined by the scope of work and handover of necessary documentation.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Chrome
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Dependent on the customer application.
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
Dependent on the customer application.
Accessibility standards
None or don’t know
Description of accessibility
Development for browser or desktop application which provide a service interface.
Accessibility testing
NA
API
Yes
What users can and can't do using the API
Dependent on the customer application.
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • PDF
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
The entire application development process is customizable.

Scaling

Independence of resources
We have dedicated resources for each project.

Analytics

Service usage metrics
Yes
Metrics types
It is dependent on application being developed.

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
Encryption of all physical media
Data sanitisation process
No
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
It is dependent on the application being built.
Data export formats
  • CSV
  • Other
Other data export formats
Database exports
Data import formats
  • CSV
  • Other
Other data import formats
Dependent on customer current application format.

Data-in-transit protection

Data protection between buyer and supplier networks
IPsec or TLS VPN gateway
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
This is dependent on each project.
Approach to resilience
Each application is built as per customer requirements and resilience is built accordingly.
Outage reporting
Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Access is restricted by roles and can also be customised to customer specific requirements.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Our Information security policy is created and reviewed by the Cyber Security Manager. This includes induction and annual training on Information Security and GDPR.

The policy is available to all team members.
Information security policies and processes
Our Cyber Security policy.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Our Change management follows the ITIL process. Changes are executed once approved by the CAB (Change Advisory Board) which has a weekly cadence and can be convened earlier is needed.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Vulnerability analysis is done regularly. As vulnerabilities are identified they are rectified based on the criticality of each vulnerability. In general monthly updates are provided once a solution is in production.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Comprehensive testing is done and if required a defined cadence of penetration and vulnerability testing is done as per customer requirements.
Incident management type
Supplier-defined controls
Incident management approach
All incidents are reported to our support services desk by the customer or solution generated alerts. Once an incident is reported the Level 1 team investigates and escalates to Level 2 and 3 teams as necessary.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Tackling economic inequality

From inception as a company we have ensured economic equality by ensuring we have clear and transparent policy for all employees. We have been engaging with many educational institutes across UK to help students from all walks of life to get opportunities in the FinTech sector either with our company or through our company with other organizations. Details of such engagement can be provided if requested.

Equal opportunity

We are an equal opportunities employer. At Cykube we do not discriminate on age, disability, gender, colour, nationality and ethnic or national origins, religion or belief.

Wellbeing

Employee well being is at the core of what we do. As a services organisation it is crucial that our employees get support, guidance and information on health, wellbeing, financial wellbeing. A big part of this is to work life balance for which the team has flexibility on place of work. As part of this initiative we hold regular events based on feedback from employees on activities they like to do as a team.

Pricing

Price
£250 to £1,200 a unit
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
1 or 2 day consulting workshop

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Sharjil.ahmed@cykube.com. Tell them what format you need. It will help if you say what assistive technology you use.