Azdio Limited Cloud Software Project Management Services
Azdio Limited provides a full suite of Cloud Software Project Management Services, including scoping, UI, data import/export, application analytics/scaling, in-transit/operational/staff security/asset protection, availability/resilience, identity/authentication support in a secure/certified and documented way, training/demonstrations as required, and ongoing support of products it builds along with its partners'/other selected products.
Features
- Full featured support across the Project Management and Planning spectrum
- Latest tools/techniques supporting Agile programme Management/Scrum coaching are supported
- End-to-end support of lifecycle Planning and Project Management
- Lifecycle Cloud Project Management Software as a Service (SaaS)
- Cloud Project Management Software planing and design
- Cloud Project Management Software set up/build and configuration
- Cloud Project Management Software Documentation and Training
- Cloud Project Management Software Security
- Cloud Project Management Software On-Going Support
Benefits
- Fewer suppliers/less integration needed on path to full spectrum support
- Best of Breed Agile Project Management/Scrum Coarching approaches supported
- A Focus on leveraging Scrum/Standup disciplines to optimize project effectiveness
- Manage Cloud Project Management Software services with "end in mind"
- Cloud Project Management Software benefits/risks/costs are clearly understood
- Cloud Project Management Software products/services work as designed
- Cloud Project Management Software services are well understood and used
- Secure Cloud Project Management Software services are provided
- Business critical use of Cloud Project Management Software services supported
Pricing
£800 a person a day
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 2 3 1 0 5 2 2 6 1 7 3 0 2 7
Contact
Azdio Limited
Katya Travnikova
Telephone: +442070971559
Email: katya@azdio.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- No specific constraints - generally, our constraints are those that our client sets (cost, time, usage criteria, etc.)
- System requirements
-
- AWS Cloud Services
- MS Azure Services
- IBM Cloud Services
- Client's own Cloud or physical services
- Our Cloud or physcial services
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- See following for general definitions of Azdio's three service levels (Standard, Silver and Gold). Azdio Standard Support means that Azdio will provide an Initial Response and Acknowledgement for issues over an email during working hours and working days only without specific commitment on time of response and will provide Software updates, when available. For Azdio Silver or Azdio Global Support, Azdio will respond to support requests and will provide workarounds or fixes in accordance with agreed priority: Initial Response & Acknowledgment: P1, 4 hours, P2, Next business day. Targeted Fix Date or Workaround: P1, 1 day, P2, 1 week
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Azdio web chat service is available to all our customers once a trouble ticket is placed.
- Web chat accessibility testing
- We have performed basic testing to ensure that assistive technology users can have basic access to our web chat.
- Onsite support
- Yes, at extra cost
- Support levels
-
Again, Azdio Limited provides one of three levels of Support: Standard, Silver or Gold. Every level of Azdio Support provides email and a web-based portal for submitting cases and tracking case status. In the case of Standard Support, and in addition to the above, next business day support will be provided during normal business days. In the case of Silver Support, and in addition to the above, same business day support will be provided during normal business days. In case of Gold Support, and in addition to the above, 24x7x365 phone-based support will be provided by Azdio Limited. Pricing is dependent on the nature of the platform(s) and/or infrastructure being supported, obviously differ between standard, silver and gold support levels.
Generally Azdio Limited will provide a technical account manager to provide a single interface for a client's support matters - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Generally, what we provide depends on the product or service being provided to a client and the client's needs in getting to have the product/service well understood and used for its users and/or customers. Documentation is usually provided (user guides, operations guides, high-level design documents, code frameworks, etc.), along with demonstrations, on-site and/or on-line training that through experience gets the client to the adoption level they want by a certain time.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- Other
- Other documentation formats
-
- Word Docs
- Powerpoint
- Visio
- End-of-contract data extraction
- Generally, we will provide data extraction methods and directly support this activity set as our client directs.
- End-of-contract process
- Generally, what is included is specific to the product or service we are providing the client, ranging from performing activities for the client as a finished service to assisting them with performing these activities themselves. What is included and what is at addional cost is as contractually negotiated.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Generally, the UI for our application designs are responsive, so that they can be used on both mobile and desktop services.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 A
- Description of service interface
- The service interface depends on the product or service we provide to our client, but generally this is provided for all of them.
- Accessibility standards
- None or don’t know
- Description of accessibility
- Our solutions are designed and developed based on specific customer requirements and as such the accessible features and design of them is based on specific customer requirements
- Accessibility testing
-
We peform significant testing on all UI developed including:
1- Usability testing
2- Friendly Trials
3- Performance Testing
4- Resilience testing
5- Regression tests for after any change no matter how minor - API
- Yes
- What users can and can't do using the API
- Generally this is defined as part of the product or service we provide to our client, and all user functionality is emulated on the API.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- ODF
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- We will support any customer need to modify a "standard" service we provide to support their specific requirements.
Scaling
- Independence of resources
- Generally, our products and services are specific to a particular client. We do have services for specific clients that are shared within that client's users, which are designed to meet SLA's as the customer requires (see following).
Analytics
- Service usage metrics
- Yes
- Metrics types
- The usage metrics we provide are usually specific to the product or service we are providing to our client, ranging general login/frequency counters to how specific functions are used.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Other
- Other data at rest protection approach
- Generally, we support the protection methods as specified by our clients for the products and service we provide them. We have used most physical (e.g., SSAE-16) and logical (sharding) known today as required.
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Data export methods that we support vary widely based on the product or service we are providing to the client, ranging form simple, delimited flat files to specific databased export/import constructs.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
- On request, specific database export constructs
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
- On request, specific database import construct(s)
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- The SLA's we provide are specific to the product or service we are providing to a client, but generally supports the client's availability metrics where practical. Compensation for not meeting SLA's is contractually agreed, and varies from service credits or re-working unsatisfactory output(s).
- Approach to resilience
- This information is proprietary, but can be made available on request once the need to know is understood and agreed.
- Outage reporting
- Outage reporting is a part of how we support our products and services provided to our clients. We can and have used single- and multi-channel methods to report outages, including dashboards, API's, e-mails, SMS, etc., all tailored to our clients' needs.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Limited access network (for example PSN)
- Username or password
- Access restrictions in management interfaces and support channels
- We generally restrict access to management interfaces and support channels based on the customers requirements (most common methods is user id/password along with a second factor authentication method like Authy), with the main goal of ensuring the person/device requesting access is who they say the are.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Limited access network (for example PSN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- We have own Security Model that we certify against
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Generally, we support security governance as directed by our clients for their products and services.
- Information security policies and processes
- Again and in general, we follow the policies and reporting structure(s) as directed by our clients for their products and services
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
We are specialized in Agile development methodologies within a fixed scope (and/or deadline). We use Github Workflow (and other standards-based tool kits) for development feature, release and hot-fix branches. We are focused on output quality, assured by static code analysis tool (Sonar), code review process and automation tests. We are DevOps-based, and employ:
- Continuous integration and delivery processes based on Jenkins, with
- Pipelines for build/test/deploy,
- Nightly builds, and
- Structured Release promotion (e.g. UAT to PROD)
- A Simplified, well-tested release process based on Docker images
This approach is security assessed at least yearly - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- This is proprietary information, but can be shared on request and when the need for it is understood and agreed
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- On Compromises, this is proprietary information, but this can be shared when requested and the need is understood and agreed, Please see the follow concerning response times.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Again, Azdio Limited provides one of three levels of Support: Standard, Silver or Gold. Every level of Azdio Support provides email and a web-based portal for submitting cases and tracking case status. In the case of Standard Support, and in addition to the above, next business day support will be provided during normal business days. In the case of Silver Support, and in addition to the above, same business day support will be provided during normal business days. In case of Gold Support, and in addition to the above, 24x7x365 phone-based support will be provided by Azdio Limited.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Tackling economic inequality
Cloud technology has a potential for creating training opportunities and supporting local businesses.Equal opportunity
As an employer and a suppler of the Services to the market we care about potential for creating equal opportunities.Wellbeing
Cloud service enable processing wast segments of information which leads to having a clear picture as to outcomes, costs and implementation
Pricing
- Price
- £800 a person a day
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- If there is a sub-service we've previously built for another client, we will consider a free trial to others for up to three (3) months.
- Link to free trial
- Link(s) provided on request.