MMCG Consultancy Services Ltd

AWS Unstructured Data Search

Unstructured data search using Volume

Features

  • Business analysis to explore best-fit cloud-based hosting and migration options.
  • Requirements gathering, analysis and articulation and benefits mapping.
  • DevSecOps support to options (vendor) analysis as proofs of concepts.
  • Agile and SDLC P3M tailored to ways of working.
  • System definition and design with appropriate architecture analysis.
  • Template Deployment Engine analysis and support to migration.
  • Deployment management and testing including IDAM and security accreditation support.
  • Critical customer friend supporting third-party migration and/or managing suppliers.
  • Effective RAIDO management to deliver to time, cost and quality.

Benefits

  • Strong leadership for successful delivery of challenging IT projects.
  • Iterative delivery of value providing increased, early realisation of benefits.
  • Customer value appreciation for synergistic benefit delivery.
  • Improved ways of working leading to smarter outcomes.
  • Reduced risk exposure through dynamic risk management.
  • Effective communications to improve change success.
  • Impartial, independent and innovative delivery resulting in increased cost savings.
  • Increased understanding of requirements for limited expenditure.
  • Strategic alignment and coherence across the portfolio reducing waste.
  • Benefits realisation mapping and transition and implementation planning.

Pricing

£535.00 to £1,110.00 a unit a day

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at consulting@mmcgconsulting.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

6 1 5 8 6 8 6 0 7 3 6 5 2 7 6

Contact

MMCG Consultancy Services Ltd Malcolm McGeoch
Telephone: 07866499959
Email: consulting@mmcgconsulting.co.uk

Service scope

Service constraints
There are no service constraints.
System requirements
  • AWS Lambda
  • Volume software license

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Within 2 hours during the week and within 8 hours on weekends.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AAA
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Yes, at an extra cost
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AAA
Web chat accessibility testing
There has been no requirement to date to conduct web chat testing with assistive technology users.
Onsite support
Yes, at extra cost
Support levels
Basic support.

Email and ticketing 5 days a week Monday - Friday 9am - 5pm . Costings as per rate card filed.

Phone support 24/7

Yes, technical account manager & cloud support engineer included in costing as per rate card.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Can provide onsite, online and user documentation as required.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
We will work through the preferred with the customer to see how they want to achieve this.
End-of-contract process
End of contract review and any clear down activities are included at no extra cost. Anything else is considered an additional cost as per the rate card.

Using the service

Web browser interface
Yes
Using the web interface
Users can set up everything and change everything through the web interface without any limitations.
Web interface accessibility standard
WCAG 2.1 AA or EN 301 549
Web interface accessibility testing
There has been no requirement to date to conduct web interface testing with assistive technology users.
API
Yes
What users can and can't do using the API
Users can set up everything and change everything through the API without any limitations.
API automation tools
  • Ansible
  • Chef
  • OpenStack
  • SaltStack
  • Terraform
  • Puppet
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • PDF
Command line interface
Yes
Command line interface compatibility
  • Linux or Unix
  • Windows
  • MacOS
Using the command line interface
Users can set up everything and change everything through the command line interface without any limitations.

Scaling

Scaling available
Yes
Scaling type
  • Automatic
  • Manual
Independence of resources
Run dedicated tenancies and operate on a serverless model to ensure service demand is not affected by unrelated users.
Usage notifications
Yes
Usage reporting
  • Email
  • SMS

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Failsoft Ltd

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • Files
  • Databases
  • Configurations
  • Users
  • Teams
  • Metrics
  • Logs
Backup controls
Backup schedules can be configured via the web interface, command line interface and API.
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Users schedule backups through a web interface
Backup recovery
  • Users can recover backups themselves, for example through a web interface
  • Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
99.9997% availability, users are compensated in credit based on license cost and total downtime.
Approach to resilience
Available upon request.
Outage reporting
Public dashboard and email alerts.

Identity and authentication

User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Software based RBAC (role based access control).
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device on a government network (for example PSN)
  • Dedicated device over multiple services or networks
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
All users of any MMCG systems must, as a minimum, either be Baseline Personnel Security Standard (BPSS) screened or have undergone pre-employment checks that meet BS7858:2019. This is the minimum standard for accessing OFFICIAL information on MMCG systems when providing support to a client.
Access to some Client systems and information may additionally require Security Check (SC) or Developed Vetting (DV) clearance obtained through the United Kingdom Security Vetting (UKSV) organisation. Where this is required, MMCG will engage with the Authority and a third-party List X facility for provision and storage of clearances.
Security clearances and/or employment checks held by Associates must be communicated to MMCG SSO prior to a new account being authorised, and additional guidance will be provided by the SSO on a case-by-case basis if higher clearances are required.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
The CSO is overall responsible for the overall management of the configuration and change management approach working closely with MMCGs PMO for recording all changes outside of scope.

Once the change has been agreed the appropriate change control procedure will be agreed between all relevant stakeholders and assessed for any potential security impact. Once this has been decided the relevant documentation will be distributed and agreed by all parties before implementation.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Automated pen tests will assess for potential threats with patch tests deployed within 72 hours. Information about the potential threats are obtained through the automated pens.

MMCGs security teams will work with suppliers, developers and all relevant key stakeholders to ensure that regular touch points are included in Stand Ups to ensure that regular vulnerability scanning and patching is conducted reviewing risk as required.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
The CSO is responsible for ensuring that the Protective Monitoring Policy for each MMCG system is enforced, and incidents are reported to the CIO. By conducting regular logging and monitoring enables the identification of regular patterns of customer activity which in turn will assist with the identification of potential compromises. As soon as an issue is raised it will be immediately actioned by the CSO and actioned accordingly following the Protective Monitoring Strategy.
Incident management type
Supplier-defined controls
Incident management approach
MMCG have a security incident management policy which all employees will use in any security incident. Users can raise the issue with any MMCG employee who will deal and raise the incident to the appropriate level. management will determine the appropriate course of action and the required resources needed to limit the impact of the breach. Reports as a minimum will include;
● The nature of the incident, e.g. theft, loss, hacking, etc;
● What type of data was involved;
● Details of any third parties involved.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
No

Energy efficiency

Energy-efficient datacentres
No

Social Value

Fighting climate change

Fighting climate change

This Carbon Reduction Plan is intended to show that MMCG Consultancy Services Ltd and all its users, are committed to being Net Zero by 2050, in line with GHG (Green House Gas) Protocol, it is also in place to show the means of which we are going to achieve this. SMEs (Small and Medium Sized Enterprises) account for 90% of all businesses, to achieve Net Zero by 2050, all SMEs must lower their carbon emissions. “Setting a net zero target that requires reduction of emissions, aligned with pathways that limit warming to 1.5°C, and balancing any remaining emissions by use of carbon removal.” Every employee and individual acting on behalf of MMCG Consultancy Services Ltd is responsible to follow this policy so that we can ensure that we remain an ethical and morally conscious organisation. It is MMCG Consultancy Services employees (MMCG) who must act in an environmentally conscious manner. MMCG has a duty, under the Paris Climate Agreement (Paris Accords 2015), to help in the reduction of carbon emissions, to ensure that the global temperature increase does not exceed 2°C, and if possible limit it to 1.5°C. Members of MMCG and all other users (staff, students, visitors, contractors, and others) of the MMCG's facilities are bound by the provisions of its policies in addition to this Carbon Reduction Plan. To become Net Zero by 2050, we must: 1. Actively seek out Eco-friendly alternatives within the business and our personal lives. 2. Push forward ideas of ways in which we can achieve a lower carbon footprint. 3. Follow government set out guidelines (such as the GHG Protocol).
Covid-19 recovery

Covid-19 recovery

COVID-19 has affected our lives and challenged us all. Despite the pandemic, we have continued to provide all our services in the P3M space. Our continued support to the public sector including our continued service to Accelerated Capability Environment (ACE) and the Home Office has seen us delivery on Portfolios such as the Wastewater Based Epidemiology (WBE) during the pandemic. We have also worked in collaboration with many other companies within the UK helping us sustain and build on our success providing more jobs and opportunities moving forward. MMCG’s priority continues to be the safety and wellbeing of our Team Members and customers, whilst ensuring we continue to deliver an exceptional level of service to keep our promise of quality first time every time. When commencing any level of commission, a thorough risk assessment is conducted and continued throughout, with capability in reserve for the option to reach back and provide mutual support to our customers and team members should the worst happen. We understand that to many businesses we are a vital component and are proud to support industry as we help to re-build and get things back to normal. With this in mind, we have produced a detailed Recovery Plan, which has been developed by a dedicated group of experts from around our business. We have considered a wide range of issues and scenarios that may affect our customers and how we will continue to help you keep your business running. We will also share the actions we have taken with our own business to maintain our operations; this is intended to give you total confidence in the services we provide.
Tackling economic inequality

Tackling economic inequality

MMCG strive to do its part in tackling social inequality, trying to achieve the difficult balance between economic growth and greater equality. Adopting an intentional diverse and people-centred approach is the corner stone for MMCGs approach to trying to tackle this. Providing opportunities throughout the UK and not just geographically skewed towards London but keeping the same even salary structure regardless of location. Investing in people through training, shares and investment opportunities, flexible working hours, funding for self-development and in house training days provides the opportunity for everyone to develop as the business expands climbing the so-called ladder regardless of social or economic background. MMCG are an advocate of increasing the supply chain resilience and capacity delivering successful collaborations with start-up and SME’s. Recent collaborations have seen innovation delivered to the Cabinet Office and Counter Terrorism Police for competitive costs. A significant amount of time has also been co-invested for delivering potential solution on real life policing issues working in collaboration with numerous stakeholders in association with the Accelerated Capability Environment (ACE) at no cost.
Equal opportunity

Equal opportunity

MMCG welcomes diversity in many different forms. Inclusive, but not limited to, gender identity, race, sexual orientation, social and economic class, religion, and mental and physical ability. We believe that a diverse range of employees and associates will help MMCG to realise different perspectives on issues and challenges. This will further allow the team to have a broad range of viewpoints when tackling a problem and help induce innovative ideas and solutions. As an MMCG employee, or associate, you are empowered to speak out on social issues. Be open, honest, and truthful and above all respect others and you will not fall foul of our zero-tolerance policy.
Wellbeing

Wellbeing

MMCG are enthusiastic advocates in championing many social and ethical challenges in today’s society, such as, climate change, volunteering and donating to charities, the economy, and employee wellbeing. We encourage any MMCG employee in these areas and are open and available for discussion on supporting such endeavours. Under no circumstances is discriminatory behaviour or harassment tolerated. This includes interactions within the MMCG employee and associate team, clients, and stakeholders. At MMCG we all depend on each other to produce the best work we can as a company. Our decisions affect clients and colleagues, and we take those consequences into account when making decisions. An environment where people feel uncomfortable or threatened is not a productive or creative one. Promoting a good working environment to collaborate will also promote positive mental health for not only team members but suppliers and customers alike. We always aim to conduct ourselves professionally, be kind to others and never put each other down. Harassment and exclusionary behaviours are not acceptable. These include but are not limited to.
• Threats of violence. • Insubordination. • Discriminatory jokes and language. • Sharing sexually explicit or violent material via electronic devices or other means. • Personal insults, especially those using racist or sexist terms. • Unwelcome sexual attention. • Advocating for, or encouraging, any of the above behaviour.

Pricing

Price
£535.00 to £1,110.00 a unit a day
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at consulting@mmcgconsulting.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.