Application Development
Bespoke web design, application development, deployment, maintenance and technical consultancy in all kind of web application. We specialise in high traffic, bespoke platforms that require high scalability and performance hosting in cloud.
Features
- Website Design and Development
- Contenet Management
- Mobile Apps Design and Development
- Data migration / restore and disaster recovery
- Agile development
- Cyber Security
- Application PEN Testing
- Project Management
- DevSecOps Services
- 100% automated deployment pipeline for application CI/CD
Benefits
- Design high standard, responsive sites
- Manage content via bespoke CMS
- Morden mobile apps design and development
- Faster development using agile methodologies
- Build end to end secure applications
- End to end project management
- QA and Security testing for applications
- Hosting support and maintenance
- Monitoring live services 24x7
Pricing
£200 to £600 a person a day
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
5 6 2 8 9 7 7 3 1 5 3 7 9 8 1
Contact
MS INFOTECH LTD.
Shital Jamod
Telephone: +44 020 807 93093
Email: contact@msit.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- None
- System requirements
- None
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- All kind of support provided based on support agreement, SLA defined based on priority of requests. For example ( High - within 2 hours, medium within 8 hours and low within 2-3 days)
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- We have chatbot service, we can allocate dedicated staff based on project requirement to provide web support.
- Web chat accessibility testing
- We have few clients who are currently enrolled for this service and have chatbot accounts provided to them.
- Onsite support
- Onsite support
- Support levels
- We provide dedicated full time support or part time support based on project. Support levels can be defined based on project requirements. Resources can be assigned based on complexity of the project as well as based on delivery timeline.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide a dedicated engagement manager to support business requirements and allocate/deallocate resources based on it at a different stage of the application.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Customer defined
- End-of-contract process
- Customer defined
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
Responsive templates
Less data caching - Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Based on customer requirement
- Accessibility standards
- None or don’t know
- Description of accessibility
- Via web interface compliant to government accessibility standard
- Accessibility testing
- None
- API
- Yes
- What users can and can't do using the API
- We provide full documentation for all API's we expose for each service
- API documentation
- Yes
- API documentation formats
-
- HTML
- ODF
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- We can customise based on client requirements
Scaling
- Independence of resources
- We do load testing and stress testing for all kind of services we provide
Analytics
- Service usage metrics
- Yes
- Metrics types
- Metrices can be designed can developed based on customer requirements
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Data can be exported in customer defined format
- Data export formats
-
- CSV
- ODF
- Data import formats
-
- CSV
- ODF
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Highly available application deployment pattern
24x7 application monitoring
Strict SLAs defined in the call of contract documents - Approach to resilience
- Deployed on cloud via cloud deployment best practices
- Outage reporting
- Via email or phone call
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Customer defined based on requirements
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users receive audit information on a regular basis
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users receive audit information on a regular basis
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We follow security best practices
- Information security policies and processes
- We have a full set of security policies and procedures. All staff are required to follow the procedure.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Out process are complient with ITIL standards.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Our 24x7 monitoring services enables us to capture any kind of vulnerability immediately.
Received vulnerabilities are alerted via tools like Pager Duty and actec quickly - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- 24x7 application monitoring and automated alert enables us to find potential compromises quickly and acted based on alert type. Critical alerts are acknowledged immediately by the support team and acted on high priority by the relevant team
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
We have defined process for each incident types
Customers can define and customized based on requirements
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Covid-19 recovery
-
Covid-19 recovery
We have trained employees to work on covid situations and provided all support they need - Tackling economic inequality
-
Tackling economic inequality
we have created employment opportunities, particularly for those who face barriers to employment and/or who are located in deprived areas. - Equal opportunity
-
Equal opportunity
we follow government guidelines to support equal opportunities - Wellbeing
-
Wellbeing
we support the health and wellbeing, including physical and mental health, in the contract workforce.
Pricing
- Price
- £200 to £600 a person a day
- Discount for educational organisations
- Yes
- Free trial available
- No