Skip to main content

Help us improve the Digital Marketplace - send your feedback

SYNVERT TCM LIMITED

Data / AI and Process Professional services

Synvert-TCM provides Cloud/Data/AI and Process Automation Professional Services that enable clients to navigate complex digital transformations successfully. Our comprehensive approach from Advisory to Governance, Execution and beyond, is designed to deliver value from technology investments throughout.

Features

  • Advisory
  • Governance
  • Build
  • Run
  • Support
  • Data
  • AI
  • Process

Benefits

  • Increase and Optimise Business Value
  • Reduce and Manage Risk
  • Reduce and Optimise Cost

Pricing

£580 to £1,250 a unit a day

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at charles.kavanagh-brown@synvert-tcm.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 4 4 6 1 1 8 9 2 1 5 5 5 3 7

Contact

SYNVERT TCM LIMITED Charles Kavanagh-Brown
Telephone: +44 (0) 7967 555226
Email: charles.kavanagh-brown@synvert-tcm.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Data Governance Software, Data Integration Software, Data Lake / Lakehouse Software, Data Warehouse Software, Master Data Management Software, Machine Learning / AI Software, Process Automation Software, Process Mining Software
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
Not applicable.
System requirements
Not Applicable

User support

Email or online ticketing support
No
Phone support
No
Web chat support
No
Onsite support
No
Support levels
Support is provided through the project phase, and a design provided for BAU support processes and practices.
Support available to third parties
No

Onboarding and offboarding

Getting started
At Synvert-TCM, we understand that every client is unique, with distinct challenges and goals. We are collaborative from the very start, working closely with our clients to understand their organisation, processes, and desired outcomes. Our proven methodology ensures we hit the ground running.

We begin with in-depth discovery to gather insights into your current state, pain points, and future vision. Our consultants conduct a comprehensive assessment, leveraging cutting-edge tools and techniques to analyse your systems, data, and workflows. This allows us to identify opportunities and design a tailored transformation roadmap aligned with your strategic objectives whilst optimising value, managing risk and optimising cost throughout.

Once the roadmap is agreed upon, we present an implementation plan outlining milestones, timelines, and resource requirements. Our cross-functional teams then execute the plan, delivering innovative solutions that drive operational excellence and ROI.Throughout the engagement, we foster a true partnership through continuous knowledge transfer sessions, empowering your teams to own and sustain the transformation long after our consultants have left. At Synvert-TCM, we don't just implement change; we ensure you have the capabilities to embrace it wholeheartedly.
Service documentation
No
End-of-contract data extraction
All data remains the property of the client, and is stored from the outset in their environment.
End-of-contract process
TBC

Using the service

Web browser interface
No
Application to install
No
Designed for use on mobile devices
No
Service interface
No
User support accessibility
None or don’t know
API
No
Customisation available
No

Scaling

Independence of resources
Synvert-TCM's architects use proven cloud principles to ensure that resource independence is maintained at all times.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
All data is held in the client environment, and remains their property throughout.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
JSON
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
JSON

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Defined and agreed at project start-up.
Approach to resilience
Defined and agreed at project start-up.
Outage reporting
Defined and agreed at project start-up.

Identity and authentication

User authentication needed
No
Access restrictions in management interfaces and support channels
Access management is defined in the project start-up phase.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
Cyber Essentials. Currently undergoing Cyber Essentials Plus accreditation.
Information security policies and processes
Direct line to Board of Directors.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Defined and agreed at project startup, and monitored throughout by oversight and management committees.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
RB to define
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Defined at project startup and monitored throughout.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Defined at project start-up and monitored throughout.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
Yes
Connected networks
  • Public Services Network (PSN)
  • Police National Network (PNN)
  • NHS Network (N3)
  • Joint Academic Network (JANET)
  • Scottish Wide Area Network (SWAN)
  • Health and Social Care Network (HSCN)

Social Value

Social Value

Social Value

  • Equal opportunity
  • Wellbeing

Equal opportunity

We employ people based on the principals of Equal Opportunities regardless of Gender, Race, Religion etc.

Wellbeing

We are a people business and as such we have a wellbeing programme for our staff that monitors overall staff wellbeing and individual staff wellbeing.

Pricing

Price
£580 to £1,250 a unit a day
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at charles.kavanagh-brown@synvert-tcm.com. Tell them what format you need. It will help if you say what assistive technology you use.