AWS Unstructured Data Search
Unstructured data search using Volume
Features
- Business analysis to explore best-fit cloud-based hosting and migration options.
- Requirements gathering, analysis and articulation and benefits mapping.
- DevSecOps support to options (vendor) analysis as proofs of concepts.
- Agile and SDLC P3M tailored to ways of working.
- System definition and design with appropriate architecture analysis.
- Template Deployment Engine analysis and support to migration.
- Deployment management and testing including IDAM and security accreditation support.
- Critical customer friend supporting third-party migration and/or managing suppliers.
- Effective RAIDO management to deliver to time, cost and quality.
Benefits
- Strong leadership for successful delivery of challenging IT projects.
- Iterative delivery of value providing increased, early realisation of benefits.
- Customer value appreciation for synergistic benefit delivery.
- Improved ways of working leading to smarter outcomes.
- Reduced risk exposure through dynamic risk management.
- Effective communications to improve change success.
- Impartial, independent and innovative delivery resulting in increased cost savings.
- Increased understanding of requirements for limited expenditure.
- Strategic alignment and coherence across the portfolio reducing waste.
- Benefits realisation mapping and transition and implementation planning.
Pricing
£535.00 to £1,110.00 a unit a day
- Education pricing available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at consulting@mmcgconsulting.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 13
Service ID
6 1 5 8 6 8 6 0 7 3 6 5 2 7 6
Contact
MMCG Consultancy Services Ltd
Malcolm McGeoch
Telephone: 07866499959
Email: consulting@mmcgconsulting.co.uk
Service scope
- Service constraints
- There are no service constraints.
- System requirements
-
- AWS Lambda
- Volume software license
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- Within 2 hours during the week and within 8 hours on weekends.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- There has been no requirement to date to conduct web chat testing with assistive technology users.
- Onsite support
- Yes, at extra cost
- Support levels
-
Basic support.
Email and ticketing 5 days a week Monday - Friday 9am - 5pm . Costings as per rate card filed.
Phone support 24/7
Yes, technical account manager & cloud support engineer included in costing as per rate card. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Can provide onsite, online and user documentation as required.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- We will work through the preferred with the customer to see how they want to achieve this.
- End-of-contract process
- End of contract review and any clear down activities are included at no extra cost. Anything else is considered an additional cost as per the rate card.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Users can set up everything and change everything through the web interface without any limitations.
- Web interface accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web interface accessibility testing
- There has been no requirement to date to conduct web interface testing with assistive technology users.
- API
- Yes
- What users can and can't do using the API
- Users can set up everything and change everything through the API without any limitations.
- API automation tools
-
- Ansible
- Chef
- OpenStack
- SaltStack
- Terraform
- Puppet
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- MacOS
- Using the command line interface
- Users can set up everything and change everything through the command line interface without any limitations.
Scaling
- Scaling available
- Yes
- Scaling type
-
- Automatic
- Manual
- Independence of resources
- Run dedicated tenancies and operate on a serverless model to ensure service demand is not affected by unrelated users.
- Usage notifications
- Yes
- Usage reporting
-
- SMS
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Failsoft Ltd
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Files
- Databases
- Configurations
- Users
- Teams
- Metrics
- Logs
- Backup controls
- Backup schedules can be configured via the web interface, command line interface and API.
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Users schedule backups through a web interface
- Backup recovery
-
- Users can recover backups themselves, for example through a web interface
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- 99.9997% availability, users are compensated in credit based on license cost and total downtime.
- Approach to resilience
- Available upon request.
- Outage reporting
- Public dashboard and email alerts.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Software based RBAC (role based access control).
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Dedicated device on a government network (for example PSN)
- Dedicated device over multiple services or networks
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
All users of any MMCG systems must, as a minimum, either be Baseline Personnel Security Standard (BPSS) screened or have undergone pre-employment checks that meet BS7858:2019. This is the minimum standard for accessing OFFICIAL information on MMCG systems when providing support to a client.
Access to some Client systems and information may additionally require Security Check (SC) or Developed Vetting (DV) clearance obtained through the United Kingdom Security Vetting (UKSV) organisation. Where this is required, MMCG will engage with the Authority and a third-party List X facility for provision and storage of clearances.
Security clearances and/or employment checks held by Associates must be communicated to MMCG SSO prior to a new account being authorised, and additional guidance will be provided by the SSO on a case-by-case basis if higher clearances are required.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
The CSO is overall responsible for the overall management of the configuration and change management approach working closely with MMCGs PMO for recording all changes outside of scope.
Once the change has been agreed the appropriate change control procedure will be agreed between all relevant stakeholders and assessed for any potential security impact. Once this has been decided the relevant documentation will be distributed and agreed by all parties before implementation. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Automated pen tests will assess for potential threats with patch tests deployed within 72 hours. Information about the potential threats are obtained through the automated pens.
MMCGs security teams will work with suppliers, developers and all relevant key stakeholders to ensure that regular touch points are included in Stand Ups to ensure that regular vulnerability scanning and patching is conducted reviewing risk as required. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- The CSO is responsible for ensuring that the Protective Monitoring Policy for each MMCG system is enforced, and incidents are reported to the CIO. By conducting regular logging and monitoring enables the identification of regular patterns of customer activity which in turn will assist with the identification of potential compromises. As soon as an issue is raised it will be immediately actioned by the CSO and actioned accordingly following the Protective Monitoring Strategy.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
MMCG have a security incident management policy which all employees will use in any security incident. Users can raise the issue with any MMCG employee who will deal and raise the incident to the appropriate level. management will determine the appropriate course of action and the required resources needed to limit the impact of the breach. Reports as a minimum will include;
● The nature of the incident, e.g. theft, loss, hacking, etc;
● What type of data was involved;
● Details of any third parties involved.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Fighting climate change
-
Fighting climate change
This Carbon Reduction Plan is intended to show that MMCG Consultancy Services Ltd and all its users, are committed to being Net Zero by 2050, in line with GHG (Green House Gas) Protocol, it is also in place to show the means of which we are going to achieve this. SMEs (Small and Medium Sized Enterprises) account for 90% of all businesses, to achieve Net Zero by 2050, all SMEs must lower their carbon emissions. “Setting a net zero target that requires reduction of emissions, aligned with pathways that limit warming to 1.5°C, and balancing any remaining emissions by use of carbon removal.” Every employee and individual acting on behalf of MMCG Consultancy Services Ltd is responsible to follow this policy so that we can ensure that we remain an ethical and morally conscious organisation. It is MMCG Consultancy Services employees (MMCG) who must act in an environmentally conscious manner. MMCG has a duty, under the Paris Climate Agreement (Paris Accords 2015), to help in the reduction of carbon emissions, to ensure that the global temperature increase does not exceed 2°C, and if possible limit it to 1.5°C. Members of MMCG and all other users (staff, students, visitors, contractors, and others) of the MMCG's facilities are bound by the provisions of its policies in addition to this Carbon Reduction Plan. To become Net Zero by 2050, we must: 1. Actively seek out Eco-friendly alternatives within the business and our personal lives. 2. Push forward ideas of ways in which we can achieve a lower carbon footprint. 3. Follow government set out guidelines (such as the GHG Protocol). - Covid-19 recovery
-
Covid-19 recovery
COVID-19 has affected our lives and challenged us all. Despite the pandemic, we have continued to provide all our services in the P3M space. Our continued support to the public sector including our continued service to Accelerated Capability Environment (ACE) and the Home Office has seen us delivery on Portfolios such as the Wastewater Based Epidemiology (WBE) during the pandemic. We have also worked in collaboration with many other companies within the UK helping us sustain and build on our success providing more jobs and opportunities moving forward. MMCG’s priority continues to be the safety and wellbeing of our Team Members and customers, whilst ensuring we continue to deliver an exceptional level of service to keep our promise of quality first time every time. When commencing any level of commission, a thorough risk assessment is conducted and continued throughout, with capability in reserve for the option to reach back and provide mutual support to our customers and team members should the worst happen. We understand that to many businesses we are a vital component and are proud to support industry as we help to re-build and get things back to normal. With this in mind, we have produced a detailed Recovery Plan, which has been developed by a dedicated group of experts from around our business. We have considered a wide range of issues and scenarios that may affect our customers and how we will continue to help you keep your business running. We will also share the actions we have taken with our own business to maintain our operations; this is intended to give you total confidence in the services we provide. - Tackling economic inequality
-
Tackling economic inequality
MMCG strive to do its part in tackling social inequality, trying to achieve the difficult balance between economic growth and greater equality. Adopting an intentional diverse and people-centred approach is the corner stone for MMCGs approach to trying to tackle this. Providing opportunities throughout the UK and not just geographically skewed towards London but keeping the same even salary structure regardless of location. Investing in people through training, shares and investment opportunities, flexible working hours, funding for self-development and in house training days provides the opportunity for everyone to develop as the business expands climbing the so-called ladder regardless of social or economic background. MMCG are an advocate of increasing the supply chain resilience and capacity delivering successful collaborations with start-up and SME’s. Recent collaborations have seen innovation delivered to the Cabinet Office and Counter Terrorism Police for competitive costs. A significant amount of time has also been co-invested for delivering potential solution on real life policing issues working in collaboration with numerous stakeholders in association with the Accelerated Capability Environment (ACE) at no cost. - Equal opportunity
-
Equal opportunity
MMCG welcomes diversity in many different forms. Inclusive, but not limited to, gender identity, race, sexual orientation, social and economic class, religion, and mental and physical ability. We believe that a diverse range of employees and associates will help MMCG to realise different perspectives on issues and challenges. This will further allow the team to have a broad range of viewpoints when tackling a problem and help induce innovative ideas and solutions. As an MMCG employee, or associate, you are empowered to speak out on social issues. Be open, honest, and truthful and above all respect others and you will not fall foul of our zero-tolerance policy. - Wellbeing
-
Wellbeing
MMCG are enthusiastic advocates in championing many social and ethical challenges in today’s society, such as, climate change, volunteering and donating to charities, the economy, and employee wellbeing. We encourage any MMCG employee in these areas and are open and available for discussion on supporting such endeavours. Under no circumstances is discriminatory behaviour or harassment tolerated. This includes interactions within the MMCG employee and associate team, clients, and stakeholders. At MMCG we all depend on each other to produce the best work we can as a company. Our decisions affect clients and colleagues, and we take those consequences into account when making decisions. An environment where people feel uncomfortable or threatened is not a productive or creative one. Promoting a good working environment to collaborate will also promote positive mental health for not only team members but suppliers and customers alike. We always aim to conduct ourselves professionally, be kind to others and never put each other down. Harassment and exclusionary behaviours are not acceptable. These include but are not limited to.
• Threats of violence. • Insubordination. • Discriminatory jokes and language. • Sharing sexually explicit or violent material via electronic devices or other means. • Personal insults, especially those using racist or sexist terms. • Unwelcome sexual attention. • Advocating for, or encouraging, any of the above behaviour.
Pricing
- Price
- £535.00 to £1,110.00 a unit a day
- Discount for educational organisations
- Yes
- Free trial available
- No
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at consulting@mmcgconsulting.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.