Cloud Software Services
Our organisation is an expert in providing Cloud Software Products, Cloud software architecture, technology development, and services.
We have enormous experience in building Prototyping, Building and Testing as per the Public Sector Guidelines and Standards.
Our softwares are fully compliant to the Standards and Security.
Features
- Master Data Management
- Complex Integrations
- API as a Service
- Data Security
- Architecture Development
- Product Development
- Systems Integration
- API Documentation
- Service Support
- Standard Frameworks
Benefits
- User Experience
- Data Quality
- Real Time Data flows
- Real Time Dashboards
- Faster Development
- Reduce the cost.
- Data Integrations
- Data Analytics
- Data Lineage
- Easy to implement
Pricing
£100 to £500 a unit
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 4 8 0 6 7 2 3 4 0 1 9 1 8 8
Contact
Gitansh Software Solutions Limited
Babu Gumpu
Telephone: 07581470833
Email: babu.gumpu@gmail.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- No
- System requirements
-
- Scalable
- Highly Secure
- Robust Platform
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Turn around times vary depending on the project and the environment.
It starts from 2 hrs to 24hrs SLA - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
- Support Levels are different for each customer. We are very flexible in adopting customer needs.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
1. We provide comprehensive documentation and FAQs that address common questions and issues users might encounter. This can include written guides, video tutorials, and troubleshooting tips.
2. Guide users through a step-by-step onboarding process that introduces them to the key features and functionalities of the service. This can include tutorials, interactive guides, or tooltips to explain various aspects.
3. Offer a demo version or a trial period for users to explore the service before committing to a subscription or purchase. This allows users to familiarise themselves with the features and benefits firsthand. - Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
-
1. Data Export Tools: Provide users with built-in tools or functionalities within the service that allow them to easily export their data in a standardized format.
2. API Access: Offer users access to an API (Application Programming Interface) that enables programmatic extraction of their data.
3. Data Transfer Assistance: Provide assistance or support to users who require help with extracting their data.
4. Data Deletion Options: Alongside data extraction, ensure that users have the option to permanently delete their data from the service's servers if they so choose.
5. Clear Documentation: Offer clear documentation and instructions outlining the steps involved in data extraction, including any prerequisites, limitations, or special considerations.
6. Timely Communication: Proactively communicate with users as they approach the end of their contract or subscription period, reminding them of their right to extract their data and providing guidance on how to do so.
7. Data Security Measures: Implement robust security measures to safeguard users' data during the extraction process, including encryption, access controls, and audit trails to track data access and ensure compliance with security standards. - End-of-contract process
-
Notification: The service provider notifies the user in advance of the contract's expiration date. This notification may include details such as the date of contract termination, any applicable renewal options, and instructions on how to proceed.
Review of Terms: Both parties review the terms and conditions of the contract to understand their rights and obligations upon termination. This includes any clauses related to data ownership, termination fees, or post-contract obligations.
Data Backup and Extraction: The user may be provided with tools or assistance to back up and extract their data from the service, ensuring they retain access to their information after the contract ends. This can include exporting data in a standard format or transferring it to another service provider.
Transition Planning: If the user is transitioning to a different service provider or discontinuing certain services, both parties may engage in transition planning to minimise disruptions. This can involve coordinating timelines, transferring assets, and providing support during the transition period.
Closure of Accounts: Once the contract expires, the service provider may deactivate the user's account or access to the service, depending on the terms of the agreement. This helps ensure that no unauthorised access occurs after the contract has ended.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- It does support all browsers Mobile browsers as well as Desktop Browsers.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AAA
- Description of service interface
- We build the service interfaces based on the customer's needs. Example API Interfaces, User Interfaces..etc
- Accessibility standards
- WCAG 2.1 AAA
- Accessibility testing
- Product testing as per the security standards and guidelines.
- API
- Yes
- What users can and can't do using the API
- Users can access APIs using the designed architecture. API access is based on security authentication and authorisation.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
-
Scalability: Design the service's infrastructure to be scalable.
Load Balancing: Implement load balancing mechanisms to distribute incoming requests evenly across multiple servers or resources.
Monitoring and Alerting: Continuously monitor the service's performance and health to proactively identify any issues or bottlenecks.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Built-in analytics tools that provide usage metrics to users. These metrics can include information such as:
Number of Users: Total number of users who have accessed the service within a specified period.
Active Users: Number of users who have interacted with the service within a specific timeframe, indicating engagement.
Session Duration: Average time users spend during each session or visit to the service.
Page Views: Total number of pages or screens users view within the service.
API Monitoring and Usage Analytics. - Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- Never
- Protecting data at rest
-
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
1.Identify Data Types: Identify the types of data users may want to export from your service. This could include user-generated content, account information, transaction history, preferences, and any other relevant data stored within platform.
2.Select Export Formats: Determine the formats in which users can export their data. Common formats include CSV (Comma-Separated Values) for tabular data, JSON (JavaScript Object Notation) for structured data, XML (eXtensible Markup Language), or proprietary formats specific to your service's data structure.
3.Develop Export Functionality: Implement export functionality within your platform's interface.
4.Provide Download Options: generate the data files in the selected format - Data export formats
-
- CSV
- Other
- Other data export formats
-
- Xml
- Json
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- Xml
- Json
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Our Software products are developed based on the cloud-based architecture principles and guidelines.
SLAs for availability often include metrics such as:
Uptime Percentage: This represents when the service is available within a given period. For example, a service with a 99.9% uptime guarantee should be available for 99.5% to 99.9% of the time in a specified timeframe.
Downtime Allowance: SLAs may specify the maximum allowable downtime within a defined period. If the service experiences downtime beyond this limit, customers may be eligible for compensation or service credits.
Response Times: Besides uptime guarantees, SLAs may include commitments to respond to customer inquiries or support requests within a certain timeframe, ensuring timely assistance in case of issues. - Approach to resilience
-
Our Product resilience is typically ensured:
Redundancy:
Fault Tolerance
Scalability
Monitoring and Alerting
Disaster Recovery
Security Measures
Regular Testing and Maintenance - Outage reporting
-
We design common methods to report our service outages:
Status Page,
Email Notifications,
In-App Notification
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- We have defined Role Based Access Controls.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Some of the key information security policies and processes are:
1. GDPR
2. National Cyber Security Guidelines
3. Data Protection Policy
4. Access Control Policy
5.Secure Software Development Lifecycle (SDLC)
6. Data Retention Polkicy
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
We have a defined change management process to manage the change without impacting the users, and we follow various deployment techniques to maintain the standard. Our commitment is zero downtime, proper end-to-end testing, and perfect rollback steps in place.
Change Documentation and Tracking, Product or API Versioning. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We have desined a proper vulnerability management process to identifying, assessing, prioritising, and mitigating security vulnerabilities within an organization's IT infrastructure, systems, and software.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We have a complete monitoring and alerting process using various industry standard tools.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- ITSM Process is defined, and we will define the process for each customer based on their needs and support.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Equal opportunity
- Wellbeing
Fighting climate change
We are trying to reduce the carbon footprint of our Software system usage.
We primarily host our products within the AWS Cloud environment, and we maintain the standards provided by the AWS.Equal opportunity
We have an Equal opportunity policy in place. We make sure that is being adhered across the organisation opportunities.Wellbeing
We have a wellbeing policy in place. We take responsibility for the employees' well-being and provide comprehensive guidance for them.
Pricing
- Price
- £100 to £500 a unit
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- We provide an initial trial version to explore the product based on certain agreements.