Skip to main content

Help us improve the Digital Marketplace - send your feedback

Gitansh Software Solutions Limited

Cloud Software Services

Our organisation is an expert in providing Cloud Software Products, Cloud software architecture, technology development, and services.
We have enormous experience in building Prototyping, Building and Testing as per the Public Sector Guidelines and Standards.

Our softwares are fully compliant to the Standards and Security.

Features

  • Master Data Management
  • Complex Integrations
  • API as a Service
  • Data Security
  • Architecture Development
  • Product Development
  • Systems Integration
  • API Documentation
  • Service Support
  • Standard Frameworks

Benefits

  • User Experience
  • Data Quality
  • Real Time Data flows
  • Real Time Dashboards
  • Faster Development
  • Reduce the cost.
  • Data Integrations
  • Data Analytics
  • Data Lineage
  • Easy to implement

Pricing

£100 to £500 a unit

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at babu.gumpu@gmail.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 4 8 0 6 7 2 3 4 0 1 9 1 8 8

Contact

Gitansh Software Solutions Limited Babu Gumpu
Telephone: 07581470833
Email: babu.gumpu@gmail.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
No
System requirements
  • Scalable
  • Highly Secure
  • Robust Platform

User support

Email or online ticketing support
Email or online ticketing
Support response times
Turn around times vary depending on the project and the environment.
It starts from 2 hrs to 24hrs SLA
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AAA
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Onsite support
Support levels
Support Levels are different for each customer. We are very flexible in adopting customer needs.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
1. We provide comprehensive documentation and FAQs that address common questions and issues users might encounter. This can include written guides, video tutorials, and troubleshooting tips.

2. Guide users through a step-by-step onboarding process that introduces them to the key features and functionalities of the service. This can include tutorials, interactive guides, or tooltips to explain various aspects.

3. Offer a demo version or a trial period for users to explore the service before committing to a subscription or purchase. This allows users to familiarise themselves with the features and benefits firsthand.
Service documentation
Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction
1. Data Export Tools: Provide users with built-in tools or functionalities within the service that allow them to easily export their data in a standardized format.
2. API Access: Offer users access to an API (Application Programming Interface) that enables programmatic extraction of their data.
3. Data Transfer Assistance: Provide assistance or support to users who require help with extracting their data.
4. Data Deletion Options: Alongside data extraction, ensure that users have the option to permanently delete their data from the service's servers if they so choose.
5. Clear Documentation: Offer clear documentation and instructions outlining the steps involved in data extraction, including any prerequisites, limitations, or special considerations.
6. Timely Communication: Proactively communicate with users as they approach the end of their contract or subscription period, reminding them of their right to extract their data and providing guidance on how to do so.
7. Data Security Measures: Implement robust security measures to safeguard users' data during the extraction process, including encryption, access controls, and audit trails to track data access and ensure compliance with security standards.
End-of-contract process
Notification: The service provider notifies the user in advance of the contract's expiration date. This notification may include details such as the date of contract termination, any applicable renewal options, and instructions on how to proceed.
Review of Terms: Both parties review the terms and conditions of the contract to understand their rights and obligations upon termination. This includes any clauses related to data ownership, termination fees, or post-contract obligations.
Data Backup and Extraction: The user may be provided with tools or assistance to back up and extract their data from the service, ensuring they retain access to their information after the contract ends. This can include exporting data in a standard format or transferring it to another service provider.
Transition Planning: If the user is transitioning to a different service provider or discontinuing certain services, both parties may engage in transition planning to minimise disruptions. This can involve coordinating timelines, transferring assets, and providing support during the transition period.
Closure of Accounts: Once the contract expires, the service provider may deactivate the user's account or access to the service, depending on the terms of the agreement. This helps ensure that no unauthorised access occurs after the contract has ended.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
It does support all browsers Mobile browsers as well as Desktop Browsers.
Service interface
Yes
User support accessibility
WCAG 2.1 AAA
Description of service interface
We build the service interfaces based on the customer's needs. Example API Interfaces, User Interfaces..etc
Accessibility standards
WCAG 2.1 AAA
Accessibility testing
Product testing as per the security standards and guidelines.
API
Yes
What users can and can't do using the API
Users can access APIs using the designed architecture. API access is based on security authentication and authorisation.
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • PDF
API sandbox or test environment
Yes
Customisation available
No

Scaling

Independence of resources
Scalability: Design the service's infrastructure to be scalable.
Load Balancing: Implement load balancing mechanisms to distribute incoming requests evenly across multiple servers or resources.
Monitoring and Alerting: Continuously monitor the service's performance and health to proactively identify any issues or bottlenecks.

Analytics

Service usage metrics
Yes
Metrics types
Built-in analytics tools that provide usage metrics to users. These metrics can include information such as:
Number of Users: Total number of users who have accessed the service within a specified period.
Active Users: Number of users who have interacted with the service within a specific timeframe, indicating engagement.
Session Duration: Average time users spend during each session or visit to the service.
Page Views: Total number of pages or screens users view within the service.
API Monitoring and Usage Analytics.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
Never
Protecting data at rest
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
1.Identify Data Types: Identify the types of data users may want to export from your service. This could include user-generated content, account information, transaction history, preferences, and any other relevant data stored within platform.
2.Select Export Formats: Determine the formats in which users can export their data. Common formats include CSV (Comma-Separated Values) for tabular data, JSON (JavaScript Object Notation) for structured data, XML (eXtensible Markup Language), or proprietary formats specific to your service's data structure.
3.Develop Export Functionality: Implement export functionality within your platform's interface.
4.Provide Download Options: generate the data files in the selected format
Data export formats
  • CSV
  • Other
Other data export formats
  • Xml
  • Json
Data import formats
  • CSV
  • Other
Other data import formats
  • Xml
  • Json

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Our Software products are developed based on the cloud-based architecture principles and guidelines.
SLAs for availability often include metrics such as:
Uptime Percentage: This represents when the service is available within a given period. For example, a service with a 99.9% uptime guarantee should be available for 99.5% to 99.9% of the time in a specified timeframe.
Downtime Allowance: SLAs may specify the maximum allowable downtime within a defined period. If the service experiences downtime beyond this limit, customers may be eligible for compensation or service credits.
Response Times: Besides uptime guarantees, SLAs may include commitments to respond to customer inquiries or support requests within a certain timeframe, ensuring timely assistance in case of issues.
Approach to resilience
Our Product resilience is typically ensured:

Redundancy:

Fault Tolerance
Scalability
Monitoring and Alerting
Disaster Recovery
Security Measures
Regular Testing and Maintenance
Outage reporting
We design common methods to report our service outages:
Status Page,
Email Notifications,
In-App Notification

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
We have defined Role Based Access Controls.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Some of the key information security policies and processes are:

1. GDPR
2. National Cyber Security Guidelines
3. Data Protection Policy
4. Access Control Policy
5.Secure Software Development Lifecycle (SDLC)
6. Data Retention Polkicy

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We have a defined change management process to manage the change without impacting the users, and we follow various deployment techniques to maintain the standard. Our commitment is zero downtime, proper end-to-end testing, and perfect rollback steps in place.
Change Documentation and Tracking, Product or API Versioning.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We have desined a proper vulnerability management process to identifying, assessing, prioritising, and mitigating security vulnerabilities within an organization's IT infrastructure, systems, and software.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We have a complete monitoring and alerting process using various industry standard tools.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
ITSM Process is defined, and we will define the process for each customer based on their needs and support.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Equal opportunity
  • Wellbeing

Fighting climate change

We are trying to reduce the carbon footprint of our Software system usage.
We primarily host our products within the AWS Cloud environment, and we maintain the standards provided by the AWS.

Equal opportunity

We have an Equal opportunity policy in place. We make sure that is being adhered across the organisation opportunities.

Wellbeing

We have a wellbeing policy in place. We take responsibility for the employees' well-being and provide comprehensive guidance for them.

Pricing

Price
£100 to £500 a unit
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
We provide an initial trial version to explore the product based on certain agreements.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at babu.gumpu@gmail.com. Tell them what format you need. It will help if you say what assistive technology you use.