Secure Cloud Services
Secure Cloud Services offers a comprehensive suite of secure, cloud-based software solutions for the UK public sector. Supporting product, software development, and digital service delivery, our hardened services on public and sovereign platforms ensure compliance and security for sensitive data and projects.
Features
- Secure Video Service: Browser-based video chat with Jitsi Meet
- Secure Chat/Messaging: Secure chat across browsers, mobile,desktop (Zulip)
- Secure Coder/Remote Developer Desktop: Browser-based development environment (Coder)
- Secure Agile Management: Project management (OpenProject)
- Secure GitOps Platform: Managed Git service via Gitlab
- Secure CD/CI Automation: Continuous integration and deployment using Gitlab runners.
- Secure Cloud Storage: high-availability collaboration storage (Nextcloud).
- Secure Cloud Backup/Archiver: Comprehensive cloud backup solution (Urbackup)
- Container and VM delivered over Public or Sovereign hosting.
- Hardened platforms to meet compliance needs.
Benefits
- Enhances collaboration with secure, multi-platform communication tools.
- Streamlines development workflows with integrated environments and tools
- Safeguards sensitive data with advanced security protocols.
- Supports remote work with reliable, secure access options.
- Boosts productivity with resilient, collaborative working
- Efficient project management with shared planning
- Offers flexibility with both public and sovereign cloud options.
- Reduces IT overhead with fully managed service components.
- Ensures business continuity with robust backup and archiving solutions.
- Provides peace of mind with dedicated technical support.
Pricing
£2 a user a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 0 0 3 2 6 4 1 2 2 5 9 4 8 2
Contact
Cloud-Dog Engineering
Sales
Telephone: 0203 411 4229
Email: sales@cloud-dog.io
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- No Service constraints. On-site support available as a service option.
- System requirements
-
- Docker Environment needed for Private Cloud Services.
- Git based repository for configuration management
- Client Certificates to identify and secure internal services (optional)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Three levels of support are provided; UK working Hours, extended - "6x12", and “24x7”. 1st-Line queries raised by registered users by email, web-chat, directly via portal/phone. 2nd line support responses provide support to named staff /incident agents . 3rd Line support queries raised by named support agents, with and additional option to enable direct contact to engineers if required. P1 & P2 incidents have an SLA to be assessed and responded to within 30mins of notification/alert. The SLA for P3 & P4 incidents is 4 hours to confirm assessment/scheduling. P5 or Change Requests are responded within 2 working days.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 A
- Web chat accessibility testing
- We offer technical support via both MS Teams and Slack. Slack usability testing and guidelines can be found at https://slack.com/intl/en-gb/accessibility. There is no official MS Teams assessment, however MS Teams adopts the underlying desktop Operating System theme. Independent assessment has been assessed to be WCAG 2.0, Conformance Level AA.
- Onsite support
- Yes, at extra cost
- Support levels
- Our cloud support includes an Account Manager as your Single Point of Contact (SPOC) for efficient escalation. We offer three support levels tailored to your needs: standard, extended, and 24/7 coverage, with P1/P2 incidents receiving 24/7 response, ensuring urgent issues are promptly addressed. Users can report 1st Line support issues through email, web-chat, the portal, or phone. 2nd Line support, for more complex issues, is accessible to support staff via the same channels. 3rd Line support, for the most technical challenges, is available to named agents with the option for direct engineer contact. We prioritise incidents based on severity: P3 and P4 within four hours for triage, and P1 and P2 incidents are responded to within 30 minutes. P5 incidents or change requests are addressed within two working days. A named Solution or Technical Lead complements the Account Manager, ensuring comprehensive service delivery. Our incident response framework is clearly defined from P1 to P5, designed for rapid and effective resolution. For detailed information on support options and pricing, please refer to our Service Pricing Document.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
To ensure a smooth start with our cloud services, we offer a structured on-boarding process tailored to your specific needs. At the outset, we assign an account/solution lead and a technical specialist to serve as your Single Points of Contact (SPOCs). These experts work closely with your team, fostering confidence and facilitating the transfer of knowledge essential for leveraging our services effectively.
The on-boarding process includes a comprehensive service setup, where we detail the requirements, configure the service according to your local environment, and establish clear success criteria. An assessment of user needs is conducted early on to ensure that training is aligned with your team's specific requirements.
Our training programs are flexible, combining online and offline methods to accommodate different learning preferences and schedules. These sessions range from general product/service overviews to deep dives into specific skills and solutions, ensuring that every user, regardless of their technical background, can maximise the benefits of our services. In addition, we provide extensive user documentation and awareness materials, offering a valuable reference for users.
This comprehensive approach ensures that from the moment you choose our services, you have the support, resources, and training necessary to achieve success and meet your business objectives. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
-
When a contract concludes, we ensure a seamless process for users to extract their data, emphasising security and convenience. All client data becomes available for download via a secure web service, designed to protect the integrity and confidentiality of your information. This service facilitates the extraction of backup archives, application files, and database extracts, catering to the diverse needs of our clients.
Understanding the importance of data preservation, we offer access to these extracts for up to one year following the service termination. This extended period allows our clients ample time to plan and execute their data migration strategies without haste, ensuring no critical information is lost in the transition.
Furthermore, our dedicated support team is available to assist with the data extraction process, providing guidance on best practices and troubleshooting any challenges that may arise. This support includes detailed documentation on how to access and download your data, ensuring you have all the necessary tools at your disposal.
Our commitment to facilitating a smooth end-of-contract transition reflects our dedication to client satisfaction and data stewardship, ensuring your information remains accessible and secure, even after our services conclude. - End-of-contract process
- At the conclusion of a contract, the exit process is designed to ensure a smooth and secure transition for our clients. Guided by a dedicated Account Manager, we facilitate every step of the service life-cycle, including the end-of-contract phase, focusing on seamless service transition, data assurance, and clear communication. Key actions and assurances, included in the contract price: 1. Data Extraction: All client data, including backup archives, application files, and database extracts, are made available via a secure web service, ensuring data integrity and security. 2. Extended Access: Clients can access their data for up to one year post-contract, providing ample time for a thoughtful transition. 3. Support and Guidance: The Account Manager provides personalised support, coordinating with clients to address any concerns and assist with the transition process. Additional Services 4. For clients requiring extra support, professional services such as technical assistance and project management for transitioning to a new service are available as additional catalogue items. This comprehensive approach ensures clients have the necessary resources, support, and assurances for a confident and secure transition, highlighting our commitment to client satisfaction, data security, and transparent communication throughout the end-of-contract process.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 A
- Description of service interface
- Our Service interface provides service owners with control over essential service aspects. The Service Interface functionality is dependent on the deployment pattern and service specifics, This user-friendly web interface provides access to critical service data, including service reports, initiate service requests, and where appropriate manage key setup and configuration details (e.g. domain names, keys, and certificates). In some circumstances, the interface provides options for customising service branding and identity, offering a tailored experience that aligns with the client’s branding requirements. Our approach provides an efficient management experience, accessible securely to service owners.
- Accessibility standards
- WCAG 2.1 A
- Accessibility testing
- The Service Interface has been built to meet the Web Content Accessibility Guidelines, ensuring broad accessibility for all users, including those who rely on assistive technologies. Developed with inclusivity in mind, These interfaces employ frameworks and design principles proven to meet usability and accessibility standards. These services work with screen readers, keyboard-only navigation, and contrast adjustment tools, to ensure a seamless experience for users with diverse needs. The Service Interface ensures that all service owners can navigate, understand, and interact with the service effectively.
- API
- Yes
- What users can and can't do using the API
- The Service API provides a RESTful interface, to enable service teams to interact with the platform and its service efficiently. Depending on the configuration and deployment pattern, it is possible through the API, to create roles, configure users, and apply RBAC. In certain configurations, the API can also support the configuration of service-defining criteria, accessing service reports and data, logs, managing service tickets, service status/availability, and viewing billing information. Authentication is secured through shared web tokens, ensuring that interactions with the API are protected and verified. Certain advanced configurations or deep customisation may still require direct interaction with the service interface or support from our technical team. In these situations, direct engagement with our service interface or in consultation with our technical support team is provided.
- API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Scope of Audit
Scope of Device/Hosts under review
Sources for Vulnerabilities
Types/Styles of Alerting
Reporting
Thresholds and Trigger levels
Scaling
- Independence of resources
- We provide a range of options to suit differing business and budget needs, offering both shared and dedicated resource options. Where required, client service ‘s are architected to ensure the independence of resources and guarantee that there is no effected from the demand from others. We offer a range of deployment patterns, and where appropriate the cloud infrastructure can be structured to elastically allocate resources based on real-time demand, enabling each user's experience to remain unaffected by spikes in usage elsewhere. Where appropriate, we can also implement resource quotas and auto-scaling capabilities to maintain optimal performance and service availability.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Where available, service metrics offer client’s comprehensive insights into performance and usage. Accessible to authorised users through the API or service portal, it can provide access to vital data, which can be used to create customised service dashboards and specific utilisation reports. This empowers service managers with the ability to monitor performance metrics, identify trends, and make informed decisions. Additionally, for specialised needs, we offer custom or ad-hoc reporting service as a catalogue item. This ensures that clients can tailor reporting to their specific requirements, enhancing their ability to manage and optimise their service experience effectively.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Our export approach offers clients flexibility and security, allowing them to export data in a manner that best suits their needs. Exports include options for database backups, application file extracts in native formats, backup archives in TAR format, or directly via the application's API where available. This variety ensures compatibility with different systems and preferences, facilitating a seamless transition and archive process. Each option supports data integrity and security, providing clients with reliable options for gaining their data exports. Comprehensive guidance and support is available, ensuring users can efficiently and confidently export their data without technical difficulties.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- Xlsx
- Xml
- Json
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- RESTful API
- TXT
- Json
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Bonded fibre optic connections
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- The high availability for our services is underscored by our software service level agreement (SLA) which guarantees 99.5% availability during contracted support hours. This translates to a maximum downtime of 3.65 hours per month. Should we fail to meet this benchmark, we offer a service credit for the affected month as compensation to our users. Moreover, in instances of partial loss of service or any reduction in quality—measured at the support boundary—a proportional or pro rata credit up to the monthly service cost is provided. It's important to note that this SLA excludes periods of agreed change windows or emergency patching required to address vulnerabilities. Our SLA is designed to give users peace of mind, knowing that we are committed to maintaining the highest levels of service availability. In the rare event that these levels are not met, our transparent refund policy ensures that users are compensated accordingly, reflecting our dedication to customer satisfaction and trust. This approach underlines our commitment to providing reliable, uninterrupted service, enabling our users to focus on their core activities without concern for the availability of their cloud services.
- Approach to resilience
- Our cloud software design patterns are designed to provide uninterrupted service and data protection through the use of data centre locations that prioritise physical stability, adhere to the relevant legal frameworks, to ensure compliance with data governance and security needs. To safeguard against unauthorised access and physical threats, service locations will use the right security controls, including biometric access controls and surveillance systems. We employ advanced encryption for data at rest and transit, ensuring data confidentiality and integrity. Our services include data sanitisation and equipment disposal practices, with the permanent deletion of all sensitive information when hardware is decommissioned. Where appropriate, the solution includes log shipping, database replication, and file mirroring across geographically dispersed sites, achieving minimal Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). During service setup, standby systems may be established in alternate locations or across multiple providers, enhancing resilience against significant outages. To maintain operational integrity, we deploy both internal and external monitoring tools, alongside our SIEM system, providing real-time alerts on any abnormal activities or failures. Our integrated approach to service management, combining a dedicated Service Desk, Network Operations (NetOps) and Security Operations (SecOps), ensures a coordinated and rapid response to any service disruptions.
- Outage reporting
- Our service employs a multifaceted approach to outage reporting, ensuring that our clients are promptly informed of any service disruptions through several communication channels. Firstly, we provide a Service Desk dashboard accessible to authenticated users. This dashboard offers real-time visibility into service status and any ongoing outages, allowing users to monitor the health of their services effectively. Additionally, we offer customised Slack or Teams notifications for support groups. This feature enables immediate alerts to be sent directly to designated teams, facilitating swift awareness and response to outages. For broader communication, email alerts are dispatched to Service Managers, providing detailed information about the nature, scope, and expected resolution time of any service interruptions. For clients seeking deeper integration with their internal monitoring systems, we support the use of web-hooks. This allows for seamless integration into client service tooling, enabling automated alerts within their existing operational frameworks. Our commitment to comprehensive and accessible outage reporting reflects our dedication to maintaining high levels of service reliability and client satisfaction.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Other
- Other user authentication
- Our service offers a range of standard and client specific authentication methods, to match business needs and client risk posture. Options include: - MFA/2-factor authentication - Public key authentication, including TLS client certificates - Identity federation with established providers (Google Apps,Auth0, Internal IDAM) - Limited access through government networks/IP Range (eg PSN) - Dedicated links, including VPN(s) - Standard username and password, - Optional dedicated/integrated Identity and Access Management (IDAM) service. Our cloud software solution provides tailored, flexible, secure authentication options that will meet your service requirements.
- Access restrictions in management interfaces and support channels
- Access to management interfaces and support channels is controlled to ensure only authorised access to privileged information or services.. We employ multiple layers of security, including: - Mandatory Multi-Factor Authentication (MFA) to verify user identities. - Public key authentication and TLS client certificates - Identity federation with internal systems or trusted providers - Restricted access via government networks or specified IP ranges - Secure, dedicated connections such as VPNs - Strong, managed usernames and passwords, with enforcement of enhanced policies. These safeguards collectively ensure that access to critical systems is securely managed and monitored, minimising the risk of unauthorised access.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Other
- Description of management access authentication
- To authenticate management access to our service, we implement security controls to ensure only authorised users can gain entry. This includes: - Enforcing Multi-Factor Authentication (MFA) - Utilising public key authentication alongside TLS client certificates - Identity federation, integrating with internal/trusted IDAM systems - Restrictions access through known networks or specific IP ranges - Establishing secure, dedicated connections, such as VPNs - Time-Limited, strong usernames and passwords, supported by stringent policy enforcement. - Additional restrictions that are available: controlled access from authorised end-points, locations, channels. Collectively these measures help safeguard management access, maintaining the integrity and security of your service.
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Our ISO/IEC 27001 ISMS is currently undergoing certification.
- Information security policies and processes
- Our commitment to information security is managed through our ISMS, aligned to the ISO/IEC 27000 standard, ensuring a comprehensive security regime) that spans all facets of our operations. This includes platform provisioning, management, software engineering, service management, and asset protection. Our ISMS incorporates a robust framework of administrative, physical, and technical controls across the ISO 27001 control sets, focusing on data protection, personnel security, asset management, access control, cryptography, and securing physical environments. The execution is integrated within our organisation's service management processes, establishing clear ownership and accountability. Responsibilities are meticulously managed and escalated through our service management structure, culminating at the board level. The Chief Security Officer (CSO) oversees the ISMS, ensuring alignment with our overarching security objectives. To maintain the relevancy and efficacy of our ISMS, we conduct regular reviews, assessing performance and making necessary adjustments to reflect evolving security landscapes and operational feedback. Following any significant security incidents, our incident response includes reviews to glean lessons learned, feeding insight back into our ISMS to enhance our security posture. This structured approach to information security governance ensures our policies and processes are enforced, maintaining the highest standards of data protection and system integrity for our clients.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Our approach to configuration and change management is rooted in ITIL best practices, ensuring secure and efficient service modifications. Through 'Infrastructure-as-Code' (IaC), we automate and track system deployments, enhancing configuration clarity and asset management. Changes undergo rigorous evaluation by the Change Manager, assessing security impacts and service quality implications. This process includes detailed risk analysis, testing in staging environments, and client consultations to ensure comprehensive oversight. Our methodical approach ensures all service components are meticulously managed throughout their life-cycle, maintaining the highest standards of security and reliability with minimal disruption to our clients.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- The vulnerability management process outlined in our ISMS is a comprehensive approach that includes assessing potential threats through risk-based reviews, regular technical/security evaluations, and monitoring industry and government advisories such as NIST NVD/CVEs and NCSC. Where appropriate, vendor-specific channels are also used. Security patches are deployed swiftly (platform patches typically automated) to ensure protection; with non-critical patches follow a monthly schedule. For container and application vulnerabilities, deployment is managed through risk assessment, considering testing, criticality, and vulnerability. Emergency patches critical to services are risk assessed, communicated/reviewed with the client's Single Point of Contact (SPOC), ensuring services are resilient and maintained.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Our protective monitoring is governed by an ISO27001 compliant ISMS, utilising advanced SIEM technology for baseline management and anomaly detection. We integrate performance monitoring with our service desk, alerting to abnormal behaviours, and employ host-based firewalls, intrusion detection, application whitelisting, and antivirus solutions for comprehensive security. Our team monitors security events, responding swiftly to potential compromises. Incidents are prioritised by severity (P1-P5 impact levels), ensuring prompt, effective action. This robust framework enables us to quickly identify and mitigate security incidents, maintaining the integrity and reliability of our services while safeguarding client data.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Our incident management process, aligned with ITIL and NIST SP 800-61, is embedded in our ISO27001 compliant ISMS, ensuring swift and efficient handling of security and service incidents. This streamlined process covers everything from initial triage to resolver allocation, resolution, and communication. Users can report incidents 24x7 through various channels, including telephone, email (directly into our Service Desk tool), our web interface, or Slack/Teams chat. The status of incidents can be monitored via the Service Desk web interface or through email updates. For significant incidents (P1 & P2), detailed Incident Reports are provided, offering transparency in our response.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Our cloud services are meticulously designed to support the government's social value agenda, especially in the battle against climate change. Recognising the environmental impact of digital services, we are committed to sustainable practices. This begins with an assessment at the start of each service delivery, pinpointing areas for consideration, and establishing relevant goals and KPIs. This evaluative process, shared with the client, outlines key stakeholders and responsibilities, ensuring a transparent and collaborative approach from the outset.
Our services are designed to leverage green initiatives, services and data centres available to public sector clients, prioritising energy efficiency,and reducing carbon footprint of digital activities. By offering solutions that encourage clients to move to cloud-based systems, we aid in the delivery of environmental goals, providing tools for energy consumption monitoring and reduction.
We pledge ongoing improvement in sustainability, aligning our operations with the latest environmental standards. This commitment includes regular assessments against the project's KPIs and quality criteria, ensuring we meet our environmental objectives and contribute positively to the government's agenda against climate change. Through this dedicated approach, we not only deliver high-quality cloud services but also foster environmental stewardship, reinforcing our role in the global effort to mitigate climate change. A statement of our Social Value and Climate Change policy is published on our website.Covid-19 recovery
Our cloud services are designed to align with the government's social value agenda on supporting recovery efforts from the Covid-19 pandemic. Understanding the pivotal role technology plays in post-pandemic recovery, we begin each project with Social Value assessment, identifying how our services can best contribute to recovery objectives. This process includes setting clear goals and KPIs in consultation with our clients, pinpointing key stakeholders, and assigning responsibilities to ensure a collaborative approach throughout the delivery.
We recognise the critical need for digital infrastructure that not only facilitates remote work and education but also strengthens the resilience of public systems and services. Our solutions are crafted to enhance connectivity, scalability, and security, enabling organisations to adapt swiftly to changing needs and ensuring uninterrupted service delivery to the public. By providing robust, scale-able cloud infrastructure, we empower public sector organisations to efficiently manage increased demands on services, facilitate remote learning and working, and support the digital transformation of public services, contributing significantly to the Covid-19 recovery process.
Moreover, our commitment to ongoing assessment and improvement ensures that our projects remain aligned with the evolving recovery landscape, allowing us to adapt strategies and objectives as necessary. Through these dedicated efforts, our cloud services not only meet the immediate needs of our clients but also support broader recovery goals, fostering resilience, innovation, and inclusivity in the aftermath of the Covid-19 pandemic. Our approach underscores our commitment to contributing positively to the government's social value agenda, ensuring that our technology solutions play a key role in the national recovery effort.
A statement of our Social Value policy is published on our website.Tackling economic inequality
Our cloud services are intricately designed to align with the government's social value agenda including the focus on tackling economic inequality. At the core of our approach is the initial Design phase, which includes an assessment where we identify opportunities to support economic inclusivity. This phase identifies and sets specific goals and KPIs, engaging clients and stakeholders in a transparent dialogue to ensure shared objectives are well-defined and achievable.
By providing scale-able and accessible cloud solutions, with embedded knowledge transfer, we aim to democratise access to technology, enabling public organisations of all sizes to leverage advanced digital tools and services. Our approach looks to bring small enterprises (SMEs) and startups to the delivery, fostering innovation, agility and value-for-money across delivery. Our cloud solutions support remote working and learning, essential elements in modernising employment and education opportunities, thus contributing to reducing economic disparities.
Our commitment extends beyond initial implementation; we ensure ongoing assessment against the project’s KPIs and quality criteria, focusing on enhancing digital literacy and access. Through this continuous evaluation, we aim to adjust and refine our strategies to meet evolving needs, ensuring our services remain effective in promoting economic equality.
Furthermore, by facilitating the digital transformation of public services, we support more efficient resource allocation and service delivery, which in turn can lead to improved economic conditions for under-served communities. Our cloud services not only provide the technological backbone for innovation and growth but also embody our dedication to fostering an inclusive digital economy, directly contributing to the government’s efforts to tackle economic inequality. A statement of our Social Value policy is published on our website.Equal opportunity
Our organisation and service delivery is crafted to meet the government's social value agenda, particularly in promoting equal opportunity. During the design stage, requirements with initial assessments look to identify strategies that will support or champion diversity and inclusion, setting clear goals and KPIs within the delivery. This approach aims to ensure our projects support gender racial and sexual equality, through equitable recruitment practices, actively seeking to eliminate bias, and support the fostering of a diverse delivery team that reflects the communities we serve.
We leverage our cloud own technologies to create more inclusive work environments, enabling flexible working arrangements that accommodate diverse needs and life circumstances. This flexibility is crucial for supporting all individuals, ensuring that everyone has the opportunity to contribute to and benefit from digital transformation.
Our internal and project-related processes are designed to encourage and support professional development for all team members, with a particular focus on underrepresented groups. We implement mentorship programs, professional development opportunities, and inclusive leadership training to ensure that every project member (both client and supply side) can advance and thrive. By actively addressing gender bias, race, and sexual equality within our workforce, we not only enrich our company culture but also enhance the quality and creativity of the solutions we provide to clients.
In alignment with the government's agenda, our services play a role in breaking down barriers to equal opportunity, using technology as a force for social change. Through deliberate and thoughtful practices in recruitment, project execution, and ongoing workforce development, we are committed to fostering an environment where diversity is celebrated, and every individual has the chance to succeed.
A statement of our Social Value and Equal Opportunity policy is published on our website.Wellbeing
Aligning delivery with the social value and Wellbeing agenda.
In every service delivery, During the mobilisation stage, we will initiate with simple assessment, pinpointing how our offerings and delivery approach can enhance the wellbeing of both the delivery and the client's team. This involves setting requirements, revising delivery processes, setting goals and aligning KPIs , so that focus is on creating a positive, supportive work environment, fostering a sense of community and belonging among all stakeholders.
We understand that the wellbeing of the delivery team is closely linked to the work environment and access to supportive technologies. Our ways-of-working and cloud solutions facilitate remote and flexible working arrangements, allowing individuals to balance professional responsibilities with personal health and family commitments. This flexibility is crucial in reducing stress and promoting a healthier work-life balance, contributing significantly to overall wellbeing.
Our delivery process emphasises collaboration and inclusion, ensuring that all team members feel valued and heard. We engage in regular dialogue with our clients and their teams, offering training and support that empower them to make the most of the cloud services we provide. This approach not only enhances technical skills but also boosts confidence and job satisfaction, which are essential for mental and emotional wellbeing.
Our delivery approach includes the ongoing evaluation and feedback mechanisms, allowing us to adjust ways of working and processes to better meet the needs of all team members. By prioritising wellbeing in our service delivery, we aim to create a more positive, productive, and healthy work environment, directly supporting the government’s agenda to promote wellbeing across the workforce. Through these concerted efforts, we contribute to a culture that values and nurtures the wellbeing of every individual involved.
Pricing
- Price
- £2 a user a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Free trials of the solution is available to evaluate functionality and service quality. Some client specific setup and integration may be available to enable testing (possibly across a sub-set of users, devices or locations). Trial periods will typically be time limited, for sufficient time for the client to conclude evaluation/testing.