Custom API Development and Management
We develop application programming interfaces (APIs) on the public cloud, specifically Amazon Web Services (AWS), which enables us to deliver secured and custom endpoints. Our consultants review your existing system and requirements to ensure the deliverables are scalable and integrate neatly without experiencing downtime.
Features
- API Development Web Services —REST API, OAuth authentication, JSON, XML
- API Development and Amazon Web Services (REST and OAuth Authorisation)
- API Development Leveraging API Gateway
- REST, JSON integration and other APIs with API Development Service
- API development securely exposes APIs to mobile and client applications
- Tailor APIs for different use cases through API development
- API development includes automated performance monitoring of APIs
- API development based on AWS cloud platform features
- Full software development lifecycle for with API development
- API development includes scalable API solutions for temporary demand peaks
Benefits
- Scalable, reliable and resilient API development
- High-quality delivery with DevOps and automation with API development
- API development includes high availability of AWS hosting platform
- Custom SDK Development
- Publish APIs to multiple channels, securely with API development
Pricing
£300 to £1,200 a user a day
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 7 2 9 2 6 4 1 6 9 7 6 2 9 5
Contact
HORI SYSTEMS LIMITED
Abiodun Oketunji
Telephone: 07908560703
Email: tech@horisystems.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Custom Software Development Kit (SDK) and Bespoke Software Development
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- No immediate constraints.
- System requirements
-
- Dependency that appropriate licensing is procured.
- System requirements are dependent on each individual project.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Yes, we do provide email support to our users. If you have any queries or issues, you can reach out to us via email, and we will assure you of a response within our Service Level Agreement (SLA) timeframe of 24 to 48 hours. Please note that this SLA applies to all days, including weekends, so you can always expect a timely response, no matter when you need assistance.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
We understand that support needs vary from business to business, so we offer two primary support levels to cater to our clients' requirements.
1. Standard Support: This is available to all customers at no additional cost. It includes access to our extensive online knowledge base and email support with 24-48 hours of response time.
2. Premium Support: We offer our Premium Support package for clients needing more dedicated assistance. The cost for this varies depending on the size and requirements of the business. With Premium Support, you'll receive priority email support with a faster response time within 12 hours, access to phone support during business hours, and a designated technical account manager.
The technical account manager is your primary contact for any technical issues or queries. They work closely with you to understand your business's unique needs, provide personalized support, and ensure you get the most from our service.
Furthermore, irrespective of the support level chosen, our team of cloud support engineers is always behind the scenes, monitoring system performance and ensuring uptime for a seamless user experience. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Key on-boarding tasks include:
• Governance Model – agreement on the most suitable governance model to meet the requirements of the engagement;
• Delivery approach – agreement on whether an agile, waterfall or hybrid approach is best suited to the project;
• Elaboration – engagement with suitably empowered individuals from our Customer with whom we can capture functional and non-functional requirements;
• Commercial – finalise the commercial terms of the engagement with the Customer including agreement on delivery milestones.
Hori Systems provides on-site, remote/online and documented training dependant on the requirements of each individual customer.
Our standard method of training is to adopt a train the trainer approach allowing knowledge to cascade throughout the organisation to all users. This approach can be delivered on-site or remotely via video conferencing facilities. In addition, we provide User Guides specific to the needs of the individual customer and project, including details of any specific customisations agreed as part of the project scope. - Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
- All existing and created data in relation to the services in question will remain the property of the customer. Data will be extracted in an agreed format and within agreed timescales as specified in Hori Systems Exit Plan issued at the start of each project.
- End-of-contract process
- Upon service commencement, Hori Systems provides an agreed and complete Exit Plan tailored to the specific requirements of each individual customer including details of any additional costs and payment principals. All costs associated with the specified services will be articulated and approved with the customer upon project commencement.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- Hori Systems provides a flexible and scalable service in order to meet the fluctuations in demand for each individual service. These services are underpinned by a set of pre-agreed SLAs with each individual customer, ensuring continuity of the services being provided.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Service Metrics and reporting is agreed with customers in line with their individual requirements.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- In the context of API development, data export in the traditional sense is not applicable. As the API is a real-time service that provides tax-related data when requested, it does not store any user data that would require exporting. Users interact with the API to retrieve data as needed, and any storing, managing or exporting of the retrieved data, the user's systems handle.
- Data export formats
- Other
- Other data export formats
-
- JSON
- XML
- Data import formats
- Other
- Other data import formats
- Not Applicable
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Hori Systems provides up to 99.99% availability. All availability requirements, including SLAs are agreed with customers in line with their individual requirements.
- Approach to resilience
- This information is available upon request.
- Outage reporting
- Outage reporting methods include but are not limited to Public Dashboards, APIs and Email Alerts. All reporting arrangements are agreed with customers in line with their individual requirements.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Other
- Other user authentication
- User Authentication is not specific to this service offering and will be discussed and agreed in line with each customer’s specific requirement.
- Access restrictions in management interfaces and support channels
-
It is standard Hori Systems policy to define and implement access restrictions in management interfaces and support channels.
with each customer’s specific requirement. - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
While our security governance is not directly certified to a specific standard like CSA CCM version 3.0 or ISO/IEC 27001, we have built our service on AWS Public Cloud, which has a robust, industry-recognised, and certified security infrastructure.
Our approach to security governance is thorough and robust. We leverage AWS's advanced security features, such as data encryption, network security, access control, and security monitoring.
Even without direct certification, we strongly emphasise ongoing risk assessment, proactive threat monitoring, and swift incident response. Our team is trained in security awareness and is committed to maintaining high-security standards. - Information security policies and processes
-
Our information security policy ensures all data's confidentiality, integrity, and availability in our care. This policy aligns with industry best practices and covers access control, data encryption, incident response, and regular security audits.
We regularly review and update our security policies and processes to adapt to evolving threats and technology landscapes. All changes are communicated promptly to all team members, and regular training sessions ensure that everyone understands their roles and responsibilities in maintaining security.
Reporting potential security incidents is encouraged and can be done through several channels. We have a dedicated security team, and any potential breaches or incidents are escalated to them immediately for investigation and resolution.
Adherence to our security policies and processes is mandatory for all team members. Compliance is monitored and enforced by our security team, and violations are dealt with seriously, up to and including termination of employment. Our commitment to security is not just a policy but a fundamental part of our company culture.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- We follow a systematic approach to configuration and change management. All our service components are tracked through a CMDB (Configuration Management Database) across their lifecycle. Change requests are performed via a Change Advisory Board (CAB). These requests are examined for potential security impacts through a systematic process involving risk assessments, peer reviews and extensive testing. Only approved changes are implemented, post which they are audited and documented to ensure traceability and accountability.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Our organisation complies with several recognised standards for vulnerability management. We follow the Cloud Security Alliance's Cloud Controls Matrix (CSA CCM) v3.0, which provides a comprehensive framework for assessing the overall security risk of a cloud system. We also adhere to SSAE-16/ISAE 3402 auditing and control practices standards. In addition, our vulnerability management processes include regular system scanning, patching, and remediation alongside a thorough threat intelligence system to identify potential vulnerabilities and ensure our systems are continually secure.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Our organisation complies with several recognised standards for protective monitoring, including the Cloud Security Alliance's Cloud Controls Matrix (CSA CCM) v3.0 for a comprehensive framework to ensure the security risk of our cloud system. Further, we adhere to the SSAE-16/ISAE 3402 standards covering auditing and control practices. Our protective monitoring processes include 24/7 real-time monitoring, automated log analysis, suspicious behaviour detection, and incident response mechanisms. We use the latest tools and technology to detect and neutralise any threats, ensuring the integrity of our systems and the data they hold.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Our organisation adopts multiple recognised standards for incident management. We comply with the Cloud Security Alliance's Cloud Controls Matrix (CSA CCM) v3.0, providing a comprehensive guideline for cloud infrastructure security. Additionally, we abide by ISO/IEC 27035:2011 standards for security incident management, which include mechanisms for incident detection, reporting, assessment, response, and learning. We also adhere to SSAE-16/ISAE 3402 standards covering management's operational controls. Our approach is proactive and focused on minimising impact, containing the incident, and implementing measures to prevent recurrence.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Our G-Cloud service actively fights climate change by reducing the carbon footprint associated with conducting business. As a cloud-based solution, our service eliminates the need for on-premise servers, which consume significant energy. It results in direct energy savings and reduces the indirect emissions associated with manufacturing, transporting, and disposing of hardware. Additionally, our data centres employ energy-efficient technologies and are powered by renewable energy wherever possible. We are committed to continuously optimising the energy efficiency of our operations and actively seeking opportunities to reduce our environmental impact further.Covid-19 recovery
Our G-Cloud service is critical in COVID-19 recovery by enabling seamless remote work capabilities and business continuity. As a cloud-based solution, organisations can maintain operations regardless of location, reducing the disruption caused by lockdowns or quarantine measures. It also facilitates collaboration by providing secure access to data, tools, and applications from anywhere, anytime. Moreover, our scalable and pay-as-you-go model allows businesses to adapt to fluctuating demands and financial constraints, benefiting organisations recovering and restructuring after COVID-19.Tackling economic inequality
Our G-Cloud service plays a significant role in tackling economic inequality by enabling affordable access to advanced technology. Our cloud service's scalability and pay-as-you-go nature make it accessible for organisations of all sizes, including small businesses and start-ups that traditionally might not have the investment capacity for high-end IT infrastructure. By offering the same high-quality resources and tools regardless of an organisation's size or financial standing, we level the playing field and enable economic growth and opportunity for a broader range of businesses.Equal opportunity
Our G-Cloud service fosters equal opportunity by making advanced technology accessible to all businesses, regardless of size or location. The flexible and scalable nature of cloud computing breaks down barriers to entry, enabling smaller businesses to compete on a more equal footing with more giant corporations. Further, our commitment to diversity and inclusion in our workforce ensures that we create and deliver services that meet various needs and perspectives.Wellbeing
Our G-Cloud service contributes to wellbeing by creating a more flexible, responsive, and less stressful work environment. Cloud computing allows employees to work from anywhere, providing them the flexibility to maintain a healthy work-life balance. It reduces commuting stress and allows more time for personal and family activities, thus enhancing overall wellbeing.
Beyond flexibility, our service also promotes wellbeing by reducing the burden of IT management. Our comprehensive support and automated updates relieve employees from daunting and time-consuming technical tasks, enabling them to focus on their core responsibilities and reducing work-related stress.
Furthermore, we are committed to creating a safer digital environment. We continuously invest in top-notch security measures to protect user data and privacy, providing peace of mind to our customers. Our transparent policies and procedures ensure users feel comfortable and secure using our services.
Our organisation prioritises employee wellbeing by fostering a positive work culture, offering wellness programs and promoting mental health awareness. We understand that a happy and healthy workforce translates into better service delivery.
In summary, our G-Cloud service aims to enhance wellbeing by providing a stress-free, flexible work environment, reducing the burden of technical tasks, ensuring data security and privacy, and maintaining a healthy workforce.
Pricing
- Price
- £300 to £1,200 a user a day
- Discount for educational organisations
- No
- Free trial available
- No