Bespoke Software Development (Mobile, Server, Web, APIs)
Development of bespoke software for mobile, server, web and APIs
.
We can build your vision and make it a reality, from a mobile application to a complete enterprise software solution integrated with different parties.
With a team of over 20 years of software development experience.
Features
- Create your business application how your want it, your vision
- Totally bespoke software
- End-to-End full stack, from mobile to APIs
- You own the software (source provided)
- Fully supported
Benefits
- Drive business efficiency
- Reduced labour costs through automation
- Modernise existing business processes
- Information Security from inception
- Host on-premise or in the cloud
- UK based data storage
- UK Developers
- Choice of cloud providers (Azure, Google, AWS)
Pricing
£80 to £110 a unit an hour
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
6 0 9 5 1 0 6 6 3 7 9 3 3 2 7
Contact
Solutionlabs Ltd
Solutions Team
Telephone: 01273789320
Email: solutions@solutionlabs.co.uk
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- The developed solution can extend or replace your existing software.
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- Some older technologies for example browsers such as Internet Explorer 11 and lesser will not be supported.
- System requirements
- No specific requirements
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Urgent support tickets are responded to in one working hour with an aim to resolve the same day.
Standard tickets are responded to in 8 hours, with an aim to resolve in 24 working hours. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Online support is via our office team via the ticketing system (clients/buyers) - there is no cost for this support.
For any onsite visits, we will bill for out of pocket, travel, accommodation and out of hours salary. (location dependant). - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Full Training is provided as the project develops with on-site available if appropriate or required.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Buyers will have access to their data, if required we can provide a data extract and secure transfer or with a large dataset on portable media.
- End-of-contract process
- At the end of the contract, we will provide the client with a data extract and access to source code, any bespoke services required outside of this may incur a charge to cover time and development costs.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Other
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Yes, we provide development for mobile-specific applications
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Yes, we provide development for browser or desktop application which provide a service interface
- Accessibility standards
- WCAG 2.1 A
- Accessibility testing
- User testing; continual development for accessibility
- API
- Yes
- What users can and can't do using the API
- We can develop or integrate with APIs based on the project requirements
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
All developed software is bespoke to the buyer's requirements.
Our goal is to build your vision.
Scaling
- Independence of resources
- Each project is run independently of any other project ensuring total independence.
Analytics
- Service usage metrics
- Yes
- Metrics types
- The software usage can be monitored using standard development tools or dashboards can be developed as part of the project.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- When the software is develop the buyer can advise how they would like their data exported and in which format.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- JSON
- XLSX
- Tab delimited
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- JSON
- XLSX
- Tab delimited
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
If we host the software with a leading cloud provider, they have a 99.99999% uptime SLA.
The bespoke software is developed using Test Driven Development methodology to reduce any unexpected bugs, SLAs on levels can be discussed in project scoping. - Approach to resilience
- Available on request
- Outage reporting
-
Any outage is required via:
-> Email
-> Manager dashboard notification
-> SMS
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Role-based access is implemented into our development process.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Cyber Essentials Plus
- Information security policies and processes
-
Our Information security policy is created and reviewed by the Technical Director and compliance manager.
The compliance manager provides training at induction and every 3 months on Information Security and GDPR best practices.
The policy is available to all staff members on the internal intranet and on any changes, they are provided train with a quiz to confirm understanding.
The information security policy is available at request.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Any changes to the software or underlaying server configuration are tested in our sandbox environment to ensure there are bugs introduced or data flow changes (restrictions or open), this includes test-driven development, code review and automated testing before changes are pushed live.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Our independent partner Security Metric scans our software and server configuration and looks for vulnerabilities.
Google Container Registrary also scan docker containers for new known vulnerabilities so if new vulnerabilities are found the containers are updated, tested and rolled out. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
We use Google monitoring tools to alert us of software, server and service failures.
The monitoring tools also advise of any suspicious activity on the network and suspected compromised user/service accounts are disabled pending review.
Monitoring alerts are treated as urgent so we respond in one working hour if not sooner. - Incident management type
- Supplier-defined controls
- Incident management approach
- If an incident occurs, the incident is assessed for customer, client and business impacted, depending on the urgency, the incident is escalated from support to management to directors, with an escalation priority and targeted resolution timeframe.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
If we are hosting software where possible we are switching services over to low CO2 or carbon-free services as they become available.
For example Google Cloud Services:
https://cloud.google.com/sustainability/region-carbon
Pricing
- Price
- £80 to £110 a unit an hour
- Discount for educational organisations
- Yes
- Free trial available
- No