Discovery and Software development
Unlocking potential through discovery services and bespoke software development, we offer a comprehensive solution tailored to your needs. Our team delves deep to understand your goals, crafting innovative software solutions that propel your business forward. Elevate your project with our seamless integration of discovery and development expertise.
Features
- Tableau developement
- Data visualisation
- Business analysis
- Product management
- Product Ownership
- Data analysis
Benefits
- Flexible skill set match project demands
- Customisable solutions - tailored SAAS offerings
- Analytics and reporting empower clients with actionable data
Pricing
£500 to £1,000 a unit a day
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 1 7 1 2 3 1 3 5 5 3 4 1 9 3
Contact
JESU LIMITED
Maria Cruz
Telephone: 07872010809
Email: maria@integratedsoftware.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- We are a small software development company that offers software development services. We are flexible on skill set for tenders and we are not bound to a permanent workforce. We have the ability to help with any software, we just need to understand what the technical stack looks like and what the requirements are.
- System requirements
-
- N/A
- N/A
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
-
If its within working our - response will be issued during the day
If its outside 9-5pm the response will be issued during the next working day. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- No
- Web chat support
- No
- Onsite support
- No
- Support levels
-
Support can be provided virtually - on a teams/slack/zoom calls.
JIRA is used as a ticketing system. Once a ticket is raised it will be investigated to understand the detail of the problem with the person that has logged the issue. Once the problem is clearly understood, support will be provided. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
With clear communication about what our IT services offers, we are able to explain how the user can benefit from being involved with our IT services.
By using simple language and avoiding to much technical jargon that might be confusing to non-technical users. We are able to ensure that our services have strong user-friendly interfaces that are easy and intuitive to navigate.
This could involve designing a clean simpler user interface for the users website or other IT applications with clear training provided to support with the following areas for example.
Onboarding Documentation
Customer Support
Training Sessions (Live online training or recorded training session)
Feedback Mechanism (Like surveys, feedback forms, or direct communication with the support team. We can then use this feedback to continuously improve our IT services and address any issues that arise.
In summary - we will only provide training online. There will be no face to face training offered. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- The plan is to make sure of the clients preferred software tools. In the event that a tool is absent, we will make use of what we have to fill the gaps and upload evidence to the clients preferred collaboration software. However should the client use our software tools we will enable users to export their data in common formats such as CSV (for tabular data) or PDF (for documents).
- End-of-contract process
- The handover process would involve a meeting with the client making sure their is a smooth transfer of knowledge, tasks, and responsibilities to help minimise disruption and maintain business continuity. The session will be recorded and will be followed up with an email with links to where all the documentation had been stored on the clients preferred collaboration software tool for example sharepoint. There would be a methodical approach to outline files and folders with names and titles and a brief description as to what was stored in these files. This will be showcased to the client on a recorded call.
Using the service
- Web browser interface
- No
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- The business model is set up to hire contractual staff to meet the needs and skill set of the tender. We are not locked into the use of a permanent workforce. Scaling up will mean us working with reputable recruitment agents where relationships have already been establish through previous contracts that have already been completed in the public sector.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Power BI/Tableau/CSV will be used to analyse and display performance metrics patterns, trends and effectiveness of a product. Real time dashboards can be set up depending on the requirements from the client at the time.
- Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- Never
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- User will need to select the appropriate method for exporting their data based on the system's capabilities and requirements. Common export methods are included in most system a built-in tools or features for exporting data. This could include options to export data in various formats such as CSV, Excel, or PDF.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- Private network or public sector network
- Data protection within supplier network
- Other
- Other protection within supplier network
- MFA - Multifactor authentication along with the recent implementation of VPN
Availability and resilience
- Guaranteed availability
- Availability is Monday to Friday 09:00am to 16:00pm If we our unable to adhere to these hours it will be picked up and addressed the next working day
- Approach to resilience
- Available on request
- Outage reporting
- A public dashboard - a notification will be received via email to us.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
-
Access Logging and Monitoring: Logging and monitoring access attempts to management interfaces and support channels can help detect and respond to unauthorised access in real-time. This includes tracking login attempts, changes made to system configurations, and other relevant activities like who might be currently log in. As well as
(RBAC) Role based access control, Utilising RBAC helps to define roles with specific sets of permissions, This ensures that individuals only have access to the functionalities and data necessary for their roles. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- GDPR (General Data Protection Regulation): GDPR is a European Union regulation that governs the protection of personal data. It imposes requirements on organisations that process personal data of EU residents, including data protection principles, data subject rights, and data breach notification obligations.
- Information security policies and processes
-
Access Control Policy:
1. Defines who has access to what systems, data, and resources.
2. Role-based access controls (RBAC) to limit access to authorised personnel.
3. Multi-factor authentication (MFA).
Security Awareness Training:
1. Provide regular training to all employees on security best practices, including phishing awareness and social engineering.
2. Ensure employees understand their roles in maintaining security and reporting any suspicious activity.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Configuration Management:
A. Baseline: Baseline configuration for each service, documenting its initial state and all changes.
B. Asset Inventory: Maintain an up-to-date inventory of all hardware and software assets, including licenses and dependencies.
Change Management:
A. Change Request Process - reviewing, and approving changes to the services. This process includes documentation requirements and risk assessment.
B. Change Authorisation - stakeholders, such as project managers to review document before implementing changes.
C. Change Implementation: Coordinate the approved changes, ensuring they are properly tested, documented, and communicated to relevant stakeholders.
D. Change Review /Closure: UAT sign off and closure. Conduct retrospectives. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
We Identify threats with regular checks for potential problems with our systems by looking at security warnings and reports.If we have an alert we use tools to search for the problems or problem in our software and systems. Figure out how bad it is and fix it quickly, focusing on fixing the most serious problems first, so we can keep our systems safe. We then make sure our software and security alerts is up-to-date by installing the latest fixes and patches preventing further problems or attacks.
By following these steps, we work to keep our systems safe from cyber threats. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
We continuously monitor our systems, networks, and applications for suspicious activities and indicators of compromise.
This involves analysing logs, and system events to detect anomalies or unauthorised access attempts or potential threats.
If we detect a potential compromise, we immediately investigate the incident to determine the scope and severity of the threat. Isolating affected systems or networks to prevent further damage or unauthorised access. We then notify relevant stakeholders, including IT teams, management, and legal or regulatory authorities, as necessary.
We aim to respond to security incidents promptly, typically within minutes or hours of detection. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Regarding pre-defined processes for common events we have step-by-step instructions for dealing with common issues like system problems or security breaches.
Users can report issues through our website, email, or by contacting our support team directly.
Once we resolve an issue, we share a report with details about what happened, and what we did to fix it, and how we'll prevent it happening in the future.
Our goal is to quickly address problems and keep everyone informed about what's going on in a timely manner.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Covid-19 recovery
- Wellbeing
Covid-19 recovery
Skills training and employment opportunities : training programs and employment opportunities specifically targets towards those who have lost their jobs due to the pandemic. This means skills development workshops, job placements services and mentorship programs to help individuals re-enter the workforce.
Supporting local businesses: Collaborating with other micro businesses to promote economic recovery within the community. This would involve sourcing services or partnering on initiatives to work together to achieve a common goal.Wellbeing
At Integrated Software we understand the critical role technology plays in facilitating Covid-19 recovery and promoting overall wellbeing within communities. Our G-Cloud service provision is strategically designed to address these pressing societal needs, thereby delivering significant social value.
Wellbeing:
Promoting wellbeing is at the core of our mission. Our SaaS solutions are designed with user experience and accessibility in mind, prioritising intuitive and inclusive interfaces regardless of ability can effectively utilise our tools. By streamlining workflows and reducing administrative burdens, our services alleviate stress and improve work-life balance for public sector employees, thereby fostering a culture of wellbeing within organisations. Moreover, our platform offers features tailored to support employee mental health and wellness, such as task prioritisation tools and mindfulness resources. By nurturing a supportive and inclusive work environment, we contribute to the holistic wellbeing of public sector employees, ultimately enhancing productivity and job satisfaction.
Pricing
- Price
- £500 to £1,000 a unit a day
- Discount for educational organisations
- No
- Free trial available
- No