Data / AI and Process Professional services
Synvert-TCM provides Cloud/Data/AI and Process Automation Professional Services that enable clients to navigate complex digital transformations successfully. Our comprehensive approach from Advisory to Governance, Execution and beyond, is designed to deliver value from technology investments throughout.
Features
- Advisory
- Governance
- Build
- Run
- Support
- Data
- AI
- Process
Benefits
- Increase and Optimise Business Value
- Reduce and Manage Risk
- Reduce and Optimise Cost
Pricing
£580 to £1,250 a unit a day
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 4 4 6 1 1 8 9 2 1 5 5 5 3 7
Contact
SYNVERT TCM LIMITED
Charles Kavanagh-Brown
Telephone: +44 (0) 7967 555226
Email: charles.kavanagh-brown@synvert-tcm.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Data Governance Software, Data Integration Software, Data Lake / Lakehouse Software, Data Warehouse Software, Master Data Management Software, Machine Learning / AI Software, Process Automation Software, Process Mining Software
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- Not applicable.
- System requirements
- Not Applicable
User support
- Email or online ticketing support
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- No
- Support levels
- Support is provided through the project phase, and a design provided for BAU support processes and practices.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
At Synvert-TCM, we understand that every client is unique, with distinct challenges and goals. We are collaborative from the very start, working closely with our clients to understand their organisation, processes, and desired outcomes. Our proven methodology ensures we hit the ground running.
We begin with in-depth discovery to gather insights into your current state, pain points, and future vision. Our consultants conduct a comprehensive assessment, leveraging cutting-edge tools and techniques to analyse your systems, data, and workflows. This allows us to identify opportunities and design a tailored transformation roadmap aligned with your strategic objectives whilst optimising value, managing risk and optimising cost throughout.
Once the roadmap is agreed upon, we present an implementation plan outlining milestones, timelines, and resource requirements. Our cross-functional teams then execute the plan, delivering innovative solutions that drive operational excellence and ROI.Throughout the engagement, we foster a true partnership through continuous knowledge transfer sessions, empowering your teams to own and sustain the transformation long after our consultants have left. At Synvert-TCM, we don't just implement change; we ensure you have the capabilities to embrace it wholeheartedly. - Service documentation
- No
- End-of-contract data extraction
- All data remains the property of the client, and is stored from the outset in their environment.
- End-of-contract process
- TBC
Using the service
- Web browser interface
- No
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- Synvert-TCM's architects use proven cloud principles to ensure that resource independence is maintained at all times.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- All data is held in the client environment, and remains their property throughout.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
- JSON
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
- JSON
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Defined and agreed at project start-up.
- Approach to resilience
- Defined and agreed at project start-up.
- Outage reporting
- Defined and agreed at project start-up.
Identity and authentication
- User authentication needed
- No
- Access restrictions in management interfaces and support channels
- Access management is defined in the project start-up phase.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Cyber Essentials. Currently undergoing Cyber Essentials Plus accreditation.
- Information security policies and processes
- Direct line to Board of Directors.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Defined and agreed at project startup, and monitored throughout by oversight and management committees.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- RB to define
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Defined at project startup and monitored throughout.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Defined at project start-up and monitored throughout.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- Public Services Network (PSN)
- Police National Network (PNN)
- NHS Network (N3)
- Joint Academic Network (JANET)
- Scottish Wide Area Network (SWAN)
- Health and Social Care Network (HSCN)
Social Value
- Social Value
-
Social Value
- Equal opportunity
- Wellbeing
Equal opportunity
We employ people based on the principals of Equal Opportunities regardless of Gender, Race, Religion etc.Wellbeing
We are a people business and as such we have a wellbeing programme for our staff that monitors overall staff wellbeing and individual staff wellbeing.
Pricing
- Price
- £580 to £1,250 a unit a day
- Discount for educational organisations
- No
- Free trial available
- No