tekhnologic

Hosted Platforms

Provision database platforms and virtual servers.

Features

  • Applications Hosting

Benefits

  • Cheaper to manage, eg buyer need not worry about maintenance.
  • Applications accessible 24/7.
  • Buyer need not worry about technical setups.
  • User pays only for what they use
  • User need not worry of how to discard redundant equipment

Pricing

£0 to £0 a unit

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at martinmubaiwa@tekhnologic.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

6 4 7 9 7 5 5 0 3 4 9 3 7 7 3

Contact

tekhnologic Software Applications Development
Telephone: 07511772865
Email: martinmubaiwa@tekhnologic.com

Service scope

Service constraints
Constraints always vary from time to time.

Any adverse conditions, notices or constraints prevailing during a particular time will be displayed on the service page.

In addition, users can be notified directly in advance.
System requirements
Requirements are dependant on buyer requirements

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Immediately
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Technical account manager and/or cloud support engineer is provided depending on user requirements and hosted application type.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Onsite and online training as well as documentation.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
Plain text
End-of-contract data extraction
User downloads data in their chosen format.
End-of-contract process
User closes their account.

Using the service

Web browser interface
Yes
Using the web interface
The web interface displays available service types and/or functions available. Users are be able to choose and do things within parameters of their chosen application, for example setting their own account.
Web interface accessibility standard
WCAG 2.1 AA or EN 301 549
Web interface accessibility testing
None
API
No
Command line interface
No

Scaling

Scaling available
No
Independence of resources
By making sure users have to contact support for scaling up, it is guaranteed that whatever demands are placed on the service, there are always enough resources available for demand prevailing at any particular time.
In other words resource availability is always watched against performance and load.
Usage notifications
Yes
Usage reporting
  • Email
  • SMS
  • Other

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • Memory
  • Number of active instances
Reporting types
Real-time dashboards

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
Never
Protecting data at rest
Encryption of all physical media
Data sanitisation process
No
Equipment disposal approach
In-house destruction process

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • Files
  • Databases
Backup controls
They choose to backup through their account.
Datacentre setup
Single datacentre
Scheduling backups
Users schedule backups through a web interface
Backup recovery
  • Users can recover backups themselves, for example through a web interface
  • Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection within supplier network
By implementing security strategies and tools, for example intrusion detection and prevention, anti-virus software.

Availability and resilience

Guaranteed availability
No SLAs at present
Approach to resilience
Available on request
Outage reporting
A public dashboard or email alerts.

Identity and authentication

User authentication
Other
Other user authentication
Available on request.
Access restrictions in management interfaces and support channels
Available on request.
Access restriction testing frequency
At least every 6 months
Management access authentication
Other
Description of management access authentication
Available on request.
Devices users manage the service through
Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users receive audit information on a regular basis
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users receive audit information on a regular basis
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Guided by best practice.
Information security policies and processes
Available on request.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Available on request.
Vulnerability management type
Undisclosed
Vulnerability management approach
Available on request.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Available on request.
Incident management type
Undisclosed
Incident management approach
Available on request.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Supplier
Virtualisation technologies used
KVM hypervisor
How shared infrastructure is kept separate
Available on request.

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
Available on request.

Social Value

Fighting climate change

Fighting climate change

Minimising emissions.
Covid-19 recovery

Covid-19 recovery

Practising social distancing and wearing of masks where applicable.
Tackling economic inequality

Tackling economic inequality

Providing employment to disadvantaged groups.
Equal opportunity

Equal opportunity

Providing opportunities based on merit only.
Wellbeing

Wellbeing

Encourage those we work with to develop their careers and achievement of goals.

Pricing

Price
£0 to £0 a unit
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Available on request.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at martinmubaiwa@tekhnologic.com. Tell them what format you need. It will help if you say what assistive technology you use.