Rapid application platform
Rapid is an easy to use open source platform for creating powerful web, mobile, and form applications. It lowers the skillset required to build applications and supports collaboration, re-use and sharing, radically reducing development time and cost. It is highly flexible and any integration is possible.
Features
- Drag and drop, low code, application development
- 100% browser-based, nothing to install
- Easily create and integrate responsive web applications
- Easily create offline mobile applications and progressive web apps
- Easily create complex forms with save, resume, and summary
- Open legacy systems with integration and modern UI
- Easy to extend with custom code
- Strong security with user roles and integration, for example AD
- Modern reusable languages - HTML5, CSS3, JavaScript, jQuery, Java
- Produces highly optimised code for scalability
Benefits
- Reduce time and cost of creating software
- Create in house using less-skilled workers to produce amazing results
- Keep full control of your software
- Mobile working, integration, automation
- Open and extend legacy systems
- Supports agile, rapid prototyping, and remote working
- Single platform for web, offline mobile, forms, webservice APIs
- Quickly create applications for web, mobile, forms, and webservice APIs
- Reduces overheads due to free / open source software
- Radically reduces time to live for shorter development cycles
Pricing
£20,000 a licence a year
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
4 1 2 3 0 7 3 0 7 6 9 8 1 7 3
Contact
Rapid Information Systems Ltd.
Rapid Information Systems
Telephone: +7739998228
Email: info@rapid-is.co.uk
Service scope
- Service constraints
- None
- System requirements
- Chrome 20+, Firefox 17+, IE9+, Safari 6+
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 30 minutes 9-5, Monday to Friday. Weekend and out of hours support response within 1 hour, available at extra cost.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Users can chat, upload files, initiate screen share.
- Web chat accessibility testing
- None.
- Onsite support
- Yes, at extra cost
- Support levels
- Priority 1: Business Critical – The client requires urgent support to perform its statutory duties. Priority 2: Material Fault ‐ Interruption to normal service – The client is still able to perform the majority of the statutory duties. Priority 3: Cosmetic Fault Priority 4: Change Request No additional cost per standard levels. Engineer provided as necessary.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide onsite training, user documentation, and videos. Each new user receives a minimum of 2 days complimentary consultancy to help them make best use of the product.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Users can extract data with typical remote access tools: MySQL Workbench, MS SQL Management Studio, TOAD, etc. Applications made on the platform are exported in .zip files.
- End-of-contract process
- The contract includes annual support and maintenance. Additional costs can include bespoke build support (requiring investigation into customers' build or data), and any additional consultancy or training.
Using the service
- Web browser interface
- Yes
- Using the web interface
- There is a secure administrative area where privileged users can monitor and administrate the service in considerable detail.
- Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- There is a secure administrative area where privileged users can monitor and administrate the service in considerable detail.
- Web interface accessibility testing
- None.
- API
- Yes
- What users can and can't do using the API
- There are a number of tools within Rapid to create APIs. In addition existing Rapid actions can be called as webservices. This allows the setup of users, creation of apps, etc.
- API automation tools
- Other
- Other API automation tools
- APIs can be called in RESTful JSON, XML, and SOAP
- API documentation
- Yes
- API documentation formats
-
- HTML
- Other
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- Most instances are single-tenant.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- HTTP request and response status
- Network
- Number of active instances
- Reporting types
-
- API access
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Databases
- Application files
- Virtual machines
- Backup controls
- Users can select when to backup applications and to download and archive them, themselves.
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Users contact the support team to schedule backups
- Backup recovery
-
- Users can recover backups themselves, for example through a web interface
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
- Other
- Other protection within supplier network
- Data-in-transit within the network is not currently protected. Should it be required by customers it would be TLS.
Availability and resilience
- Guaranteed availability
- Rapid aims for 99.95 percent uptime. Refunds on downtime can be negotiated.
- Approach to resilience
- This is dependent on configuration/request. Loadbalancing, clusters, and fail-over are all supported.
- Outage reporting
- Email alerts
Identity and authentication
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google apps)
- Dedicated link (for example VPN)
- Username or password
- Other
- Other user authentication
- In addition to username and password IP address and user-agent string can be included in authentication as well as mac address, IMEI, IMSI, and SIMNO on mobile devices.
- Access restrictions in management interfaces and support channels
- Username, password, IP address, user-agent string, mobile device ID
- Access restriction testing frequency
- Less than once a year
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Other
- Description of management access authentication
- Rapid is a flexible solution with various adaptors/plugins. Authentication adaptors can be created that support any mechanism. In addition to username and password IP address and user-agent string can be included in authentication as well as mac address, IMEI, IMSI, and SIMNO on mobile devices.
- Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We adhere to customer requirements.
- Information security policies and processes
- The CEO is ultimately responsible for the Information Security and thus also for the implementation of this policy. Responsibility for the implementation may be delegated to a named Information Security Responsible [e.g., Finance/Operations/IT]. The Information Security Responsible is responsible for the determination of which (if any) regulatory or other compliance requirements apply to the Company (e.g., PCI, HIPAA, GLBA, DFARS), as well as maintenance of documentation, implementation of the Policy and fulfilling the regulatory/compliance requirements of the Company. The individual manager/team leader is responsible for compliance with the Policy, procedures and guidelines within his/her own group of personnel. The individual employee is responsible for working within the rules of the Policy to protect the Company's data. Every individual in the Company is tasked with immediately reporting any potential infringement of the Policy to the next available supervisor.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- The product produces a report of all files including a hash to compare configurations. These reports are saved at each modification to produce a history. Security impact is considered as part of regular penetration testing,
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Operating system security patches are applied automatically. Respective server webpages (generally Apache Tomcat) are monitored for reported on new patched vulnerabilities. Depending on the severity of the vulnerability patches are applied as soon as possible, or regularly every 6 months.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Tools psad and fail2ban are installed on all servers for automated scanning of log files and blocking of suspect IP addresses. In addition emails are sent which we investigate as soon as possible.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Users report events via our support portal. Incidents are investigated and users regularly communicated with as to progress. Reports are provided as the incident is closed.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- We use AWS datacentres which adhere to the EU Code of Conduct for Energy Efficient datacentres
Social Value
- Covid-19 recovery
-
Covid-19 recovery
Multiple post-COVID new and remote ways of working, digital transformation. - Tackling economic inequality
-
Tackling economic inequality
Open source software, working to fix the plumbing, and end anti-competitive locked-in proprietary software which is a source of economic inequality. - Equal opportunity
-
Equal opportunity
Open source software, working to fix the plumbing, and end anti-competitive locked-in proprietary software to increase equal opportunities, especially access to solutions, tools and technology. Equal opportunity employer too.
Pricing
- Price
- £20,000 a licence a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- The community edition can be installed and used for free. It includes all features required to make applications but does not include extra features like AD integration, connection pooling, address search, etc.
- Link to free trial
- https://github.com/RapidInfoSys/Rapid/releases