Hosted Platforms
Provision database platforms and virtual servers.
Features
- Applications Hosting
Benefits
- Cheaper to manage, eg buyer need not worry about maintenance.
- Applications accessible 24/7.
- Buyer need not worry about technical setups.
- User pays only for what they use
- User need not worry of how to discard redundant equipment
Pricing
£0 to £0 a unit
- Education pricing available
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at martinmubaiwa@tekhnologic.com.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 13
Service ID
6 4 7 9 7 5 5 0 3 4 9 3 7 7 3
Contact
tekhnologic
Software Applications Development
Telephone: 07511772865
Email: martinmubaiwa@tekhnologic.com
Service scope
- Service constraints
-
Constraints always vary from time to time.
Any adverse conditions, notices or constraints prevailing during a particular time will be displayed on the service page.
In addition, users can be notified directly in advance. - System requirements
- Requirements are dependant on buyer requirements
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- Immediately
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Technical account manager and/or cloud support engineer is provided depending on user requirements and hosted application type.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Onsite and online training as well as documentation.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
- Plain text
- End-of-contract data extraction
- User downloads data in their chosen format.
- End-of-contract process
- User closes their account.
Using the service
- Web browser interface
- Yes
- Using the web interface
- The web interface displays available service types and/or functions available. Users are be able to choose and do things within parameters of their chosen application, for example setting their own account.
- Web interface accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web interface accessibility testing
- None
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- No
- Independence of resources
-
By making sure users have to contact support for scaling up, it is guaranteed that whatever demands are placed on the service, there are always enough resources available for demand prevailing at any particular time.
In other words resource availability is always watched against performance and load. - Usage notifications
- Yes
- Usage reporting
-
- SMS
- Other
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- Memory
- Number of active instances
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- Never
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Files
- Databases
- Backup controls
- They choose to backup through their account.
- Datacentre setup
- Single datacentre
- Scheduling backups
- Users schedule backups through a web interface
- Backup recovery
-
- Users can recover backups themselves, for example through a web interface
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
- Other
- Other protection within supplier network
- By implementing security strategies and tools, for example intrusion detection and prevention, anti-virus software.
Availability and resilience
- Guaranteed availability
- No SLAs at present
- Approach to resilience
- Available on request
- Outage reporting
- A public dashboard or email alerts.
Identity and authentication
- User authentication
- Other
- Other user authentication
- Available on request.
- Access restrictions in management interfaces and support channels
- Available on request.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Other
- Description of management access authentication
- Available on request.
- Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users receive audit information on a regular basis
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users receive audit information on a regular basis
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Guided by best practice.
- Information security policies and processes
- Available on request.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Available on request.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Available on request.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Available on request.
- Incident management type
- Undisclosed
- Incident management approach
- Available on request.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- KVM hypervisor
- How shared infrastructure is kept separate
- Available on request.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- Available on request.
Social Value
- Fighting climate change
-
Fighting climate change
Minimising emissions. - Covid-19 recovery
-
Covid-19 recovery
Practising social distancing and wearing of masks where applicable. - Tackling economic inequality
-
Tackling economic inequality
Providing employment to disadvantaged groups. - Equal opportunity
-
Equal opportunity
Providing opportunities based on merit only. - Wellbeing
-
Wellbeing
Encourage those we work with to develop their careers and achievement of goals.
Pricing
- Price
- £0 to £0 a unit
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Available on request.
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at martinmubaiwa@tekhnologic.com.
Tell them what format you need. It will help if you say what assistive technology you use.