Skip to main content

Help us improve the Digital Marketplace - send your feedback

MS INFOTECH LTD.

Application Development

Bespoke web design, application development, deployment, maintenance and technical consultancy in all kind of web application. We specialise in high traffic, bespoke platforms that require high scalability and performance hosting in cloud.

Features

  • Website Design and Development
  • Contenet Management
  • Mobile Apps Design and Development
  • Data migration / restore and disaster recovery
  • Agile development
  • Cyber Security
  • Application PEN Testing
  • Project Management
  • DevSecOps Services
  • 100% automated deployment pipeline for application CI/CD

Benefits

  • Design high standard, responsive sites
  • Manage content via bespoke CMS
  • Morden mobile apps design and development
  • Faster development using agile methodologies
  • Build end to end secure applications
  • End to end project management
  • QA and Security testing for applications
  • Hosting support and maintenance
  • Monitoring live services 24x7

Pricing

£200 to £600 a person a day

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at contact@msit.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

5 6 2 8 9 7 7 3 1 5 3 7 9 8 1

Contact

MS INFOTECH LTD. Shital Jamod
Telephone: +44 020 807 93093
Email: contact@msit.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
None
System requirements
None

User support

Email or online ticketing support
Email or online ticketing
Support response times
All kind of support provided based on support agreement, SLA defined based on priority of requests. For example ( High - within 2 hours, medium within 8 hours and low within 2-3 days)
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
We have chatbot service, we can allocate dedicated staff based on project requirement to provide web support.
Web chat accessibility testing
We have few clients who are currently enrolled for this service and have chatbot accounts provided to them.
Onsite support
Onsite support
Support levels
We provide dedicated full time support or part time support based on project. Support levels can be defined based on project requirements. Resources can be assigned based on complexity of the project as well as based on delivery timeline.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide a dedicated engagement manager to support business requirements and allocate/deallocate resources based on it at a different stage of the application.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Customer defined
End-of-contract process
Customer defined

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Responsive templates
Less data caching
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
Based on customer requirement
Accessibility standards
None or don’t know
Description of accessibility
Via web interface compliant to government accessibility standard
Accessibility testing
None
API
Yes
What users can and can't do using the API
We provide full documentation for all API's we expose for each service
API documentation
Yes
API documentation formats
  • HTML
  • ODF
  • PDF
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
We can customise based on client requirements

Scaling

Independence of resources
We do load testing and stress testing for all kind of services we provide

Analytics

Service usage metrics
Yes
Metrics types
Metrices can be designed can developed based on customer requirements
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
Less than once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
No
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Data can be exported in customer defined format
Data export formats
  • CSV
  • ODF
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Highly available application deployment pattern
24x7 application monitoring
Strict SLAs defined in the call of contract documents
Approach to resilience
Deployed on cloud via cloud deployment best practices
Outage reporting
Via email or phone call

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Customer defined based on requirements
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users receive audit information on a regular basis
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users receive audit information on a regular basis
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
We follow security best practices
Information security policies and processes
We have a full set of security policies and procedures. All staff are required to follow the procedure.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Out process are complient with ITIL standards.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Our 24x7 monitoring services enables us to capture any kind of vulnerability immediately.
Received vulnerabilities are alerted via tools like Pager Duty and actec quickly
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
24x7 application monitoring and automated alert enables us to find potential compromises quickly and acted based on alert type. Critical alerts are acknowledged immediately by the support team and acted on high priority by the relevant team
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
We have defined process for each incident types
Customers can define and customized based on requirements

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Covid-19 recovery

Covid-19 recovery

We have trained employees to work on covid situations and provided all support they need
Tackling economic inequality

Tackling economic inequality

we have created employment opportunities, particularly for those who face barriers to employment and/or who are located in deprived areas.
Equal opportunity

Equal opportunity

we follow government guidelines to support equal opportunities
Wellbeing

Wellbeing

we support the health and wellbeing, including physical and mental health, in the contract workforce.

Pricing

Price
£200 to £600 a person a day
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at contact@msit.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.