Web & Mobile Development
Application Development Services for Cloud Users. Services: Technical Direction, Architecture and Management, SharePoint, Front End / Back End Development, UX/UI Specialists, Core Java Design, Systems Administration. Technologies: iOS, Android, PHP, .Net, Zend, CodeIgniter, CakePHP, Symfony, AngularJS, NodeJS, Python, Django, Ruby, Groovy /Grails, Big Data, Hadoop, H-Base, Hive, MongoDB, Apache Cassandra.
Features
- OO JavaScript and Frameworks JQuery, AngularJS, BackboneJS, EmberJS
- Development in Java/.Net/Python/Django/Ruby/Rails/JavaScript/Node.js
- HTML5, HTTP, CSS3, JavaScript, PHP, Front End, Scripting, Digital Content
- Passionate Open Source Contributors - Github/Code Samples available from contractors
- MVC, WCF, API, Drupal, Symfony, Zend, Ajax, Wordpress
- Shared Services, Web Development, User Experience, User Centric, User Interface
- UX/UI Design & Implementation services
- Core Java Design services
- Technical Direction, Architecture & Management
- Latest Development practices, in particular Agile Methodologies (SCRUM, Kanban etc.)
Benefits
- Technical Direction/Management - Provision of experienced and capable resource
- Applications Architecture services - Capability and capacity
- SharePoint Specialisation - Experience
- Front/Back End Web Development services - Capability and capacity
- UX/UI Design services - Capability and capacity
- Core Java Design services - Capability and capacity
- DevOps/WebOps Engineering - Capability and capacity
- Systems Administration services - Provision of experienced and capable resource
- Experts in public sector delivery and IR35 compliance
- SC / DV security cleared professionals
Pricing
£350 to £950 a person a day
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
6 2 6 9 3 0 2 1 4 7 0 5 2 4 4
Contact
Henderson Scott
David Potter
Telephone: 07540 974 378
Email: PMO@hendersonscott.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- No service constraints
- System requirements
- No specific system requirements
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Response times within 3 hours, including weekends.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
-
Response to requests within 3 hours, including weekends.
Standard support hours are 8.30am to 6.00pm Monday to Friday (24/7 and extended support also available on request)
We provide a dedicated account manager on all G-Cloud accounts to manage and support the recruitment process. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We provide a User Documentation pack for users of our Services.
All staff performing services have received extensive onsite training. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Users may take advantage of our online data tool or make a request and data will be provided to them.
- End-of-contract process
-
A full off-boarding process is implemented.
All services are included in the price of the contract, there is no additional cost.
Using the service
- Web browser interface
- No
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Services can be accessed either via our website or via email requests which is available on both mobile and desktop platforms.
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- Yes
- Description of customisation
-
We are able to work to any SLA and have an extensive network of Cloud professionals who we can provide on a custom basis.
All users may request a customisation of the services, and this can be discussed with the User Account Manager prior to implementation.
Scaling
- Independence of resources
-
We have dedicated Account Teams, headed up by Senior Managers to ensure that the volume of requests from users is managed efficiently and the service provided is at the exceptional level that we have become known for in the industry.
The Account Leads have regular contact and communication with both Users and internal managers so demand can be communicated and managed efficiently.
Analytics
- Service usage metrics
- Yes
- Metrics types
- All services are recorded and metrics can be provided based on any area of Supplier delivery at the User's request.
- Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Users may take advantage of our online data tool or make a request and data will be provided to them.
- Data export formats
-
- CSV
- Other
- Other data export formats
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
We agree to work with any level of SLA that the user may require, and can arrange these on request.
If services are not performed to the satisfaction of the User, a full refund may be agreed on a case by case basis. - Approach to resilience
- Available on request
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- IP restrictions, two factor authentication of approved users and protective monitoring/logging.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- PRINCE 2
- ITIL
- MSP
- APM
- PMP
- Six Sigma
- ISEB
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Work to GDPR standards, and are in the process of implementing.
- Information security policies and processes
-
We work to GDPR levels of security, and all Information Security Policies and Processes are well documented.
Authorised users have thorough training on these policies, and we conduct regular security checks to ensure that these are being followed completely.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Work to recognised standards, details available on request.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Work to recognised standards.
Sensitive information, details available on request. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Work to recognised standards.
Sensitive information, details available on request. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Work to recognised standards, details available on request.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
We’re environmentally conscious.
We are excited to announce the charities we have partnered with Ecologi.
Ecologi are an organisation dedicated to fighting climate change and greenhouse gas emissions. It’s now common knowledge that one of the best tools to tackle the climate crisis and keep our temperatures from rising is to plant trees, therefore this year Henderson Scott will be planting and funding our very own mini forest which currently hosts over 50 trees already! - Tackling economic inequality
-
Tackling economic inequality
Henderson Scott proactively partners with buyers to ensure there is full understanding, engagement and commitment to reducing economic inequality. All of our third-party suppliers are screened and engaged fairly and we are committed to tackling the subject with a number of processes and policy's in place. - Equal opportunity
-
Equal opportunity
Henderson Scott is an Equal Opportunities Employer and will only partner with and support organisations that commit to doing the same. We work with clients to educate and train in this area. - Wellbeing
-
Wellbeing
Henderson Scott has a robust and regularly reviewed EVP which is focused around employee wellbeing. We also offer review / guidance to our clients.
Pricing
- Price
- £350 to £950 a person a day
- Discount for educational organisations
- No
- Free trial available
- No