Cloud Development & DevOps Continues Delivery Service
As a Service company therefore, we have set our infrastructure in such a way that could help us provide wide range of services like Digital Transformation, Development and Strategy in Digital, Delivery Management, Cloud Migration, E2E Service Management, Application support & Cyber security.
Features
- Scalability
- Reliability
- Security
- Integration
- Backup and disaster recovery
Benefits
- enable business to adjust resources to optimise costs
- Provide reliability to ensure high availability
- Implement advance security measures
- Integrate seamlessly with other applications and services
- Built in backup and disaster capability for quick restore
Pricing
£500 to £2,000 a unit a day
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 7 1 0 6 8 7 3 2 8 7 1 0 0 7
Contact
SS Technologies
Lakshmi Pedamallu
Telephone: 07961860483
Email: admin@sstechnologies.co.uk
Service scope
- Service constraints
- Yes, but can also be used as a standalone service
- System requirements
-
- Operating System Compatibility
- Hardware Resources
- Security Protocols
- Integration Compatibility
- Compliance requirements or regulations
User support
- Email or online ticketing support
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
- We support 3 level of assistance. L1 Support is the initial point of contact for users seeking assistance, typically handles basic inquiries and troubleshooting. Involve providing access to online documentation and basic troubleshooting steps. Response times are relatively quick. L2 Support provides more in-depth technical assistance. Involve troubleshooting more complex issues, performing system diagnostics & configuration updates - some times workarounds. Response times are typically faster than L1 support. L3 Support is the highest level of technical support and is reserved for the most complex and critical issues that can’t be resolved by L1 & L2 support, such software bugs as a fix, performance optimisation, and system integrations. Most of the time they work with development team as design need to aligned with current development cycle (if any). Response time may vary based on severity, priority as fix/change need to be agreement with other parties. Cost, L1/L2/L3 support typically comes with different pricing structures based on factors such as response times, availability, and the level of expertise required, that could be based on Key Performance Indicator (KPIs)
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Using a cloud software involves several key steps Users sign up for the service, offer onboarding resources and training materials to help users get started. Likes of migrating from an existing system, users may need to transfer data with the provider's assistance and configurations to the new cloud software application, that often offers tools or assistance to facilitate a smooth migration process. For customisation and integration options allow users to tailor the software to their workflow and integrate with other tools if needed. Throughout the process, technical support is available to address any questions or issues.
- Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
-
- Wiki
- Confluence
- End-of-contract data extraction
- When service comes to an end, the process of extracting data is crucial to ensure that valuable information isn't lost, we can offer several methods. Built-in data export tools. These tools empower users to download their data in various standard formats such as CSV, XML, or JSON. Application Programming Interfaces (APIs) provided by cloud software services enable users to programmatically access and retrieve their data. This method is particularly useful for users with technical expertise, as it allows for the extraction of structured data which can be used for analysis, integration with other systems. Backup and restore functionality.
- End-of-contract process
- At the conclusion of a contract with a cloud software service, several critical procedures ensure a seamless transition and safeguard the user's data and interests. Firstly, comprehensive documentation is paramount. This documentation encompasses both business and technical perspectives of the software. From a business standpoint, it includes detailed business scenarios and insights gathered from engagements with business Subject Matter Experts (SMEs). These documents articulate the business requirements, objectives, and any bespoke configurations implemented during the contract tenure. From a technical viewpoint, designs such as High-Level Design (HLD) and Low-Level Design (LLD), along with precise technical specifications, are meticulously documented. This comprehensive documentation ensures a clear understanding of the software's architecture, functionality, and alignment with business needs. Furthermore, Knowledge Transfer (KT) sessions play a pivotal role in ensuring knowledge continuity. These sessions are meticulously crafted to provide stakeholders with a deep understanding of the software's functionalities, configurations, and potential technical intricacies. Both business and technical aspects are covered comprehensively, ensuring users are equipped to effectively leverage the software and manage any technical nuances that may arise.
Using the service
- Web browser interface
- No
- API
- Yes
- What users can and can't do using the API
- API can be defined and developed as per client needs, as our API services can be REST/SOPA/XML can also do transformation.
- API automation tools
-
- Ansible
- Terraform
- Puppet
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- Other
- Command line interface
- Yes
- Command line interface compatibility
- Linux or Unix
- Using the command line interface
- That can be agreed by the client requirements
Scaling
- Scaling available
- Yes
- Scaling type
-
- Automatic
- Manual
- Independence of resources
- Via auto scaling and again this can be tailored based on client requirement and usage as the infrastructure can varies with volumes.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
-
- API access
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Automated Backup
- Snapshotting
- Disaster Recovery (DR)
- Backup controls
- Yes we can support various backup strategise based on client needs
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
-
- Users can recover backups themselves, for example through a web interface
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- As a common SLA guarantee 99.9% uptime and it can be agreed in time based on customer bespoke requirement along with load. If the cloud software service fails to meet the agreed-upon uptime guarantees outlined in the SLA, users may be entitled to refunds or service credits as compensation for the downtime experienced. The specific refund or credit policies vary depending on the provider and the terms outlined in the SLA.
- Approach to resilience
- We can put in place various resilient approaches like Redundancy, Load Balancing, Failover Mechanisms, Data Replication, Automated Monitoring and Alerting, Disaster Recovery Planning to ensure uninterrupted service delivery and mitigate the impact of potential failures or disruptions.
- Outage reporting
- Via public dashboard using monitoring & alerting along with email alerts.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- We use Role-Based Access Control, Multi-Factor Authentication.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Dedicated device on a government network (for example PSN)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- CSA CCM version 3.0
- Information security policies and processes
- Information Security Policy, Data Classification and Handling, Identity and Access Management (IAM), Data Encryption and Key Management, Incident Response and Management.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Can be tailored based on client needs.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Based on client needs.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Based on client needs.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Based on client needs.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- VMware
- How shared infrastructure is kept separate
- Different organisations sharing the same infrastructure are kept apart through various mechanisms designed to ensure isolation, security, and resource allocation like Virtualisation, Resource Allocation, Network Segmentation, Storage Separation.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- We use AWS or Azure
Social Value
- Social Value
-
Social Value
- Equal opportunity
- Wellbeing
Equal opportunity
As an organisation, we are committed to equality, believing that opportunities should be equal and free from discrimination based on gender, race, or any other factorsWellbeing
As an organisation, prioritizing wellbeing involves fostering a supportive and healthy work environment that promotes physical, mental, and emotional wellness among employees.
Pricing
- Price
- £500 to £2,000 a unit a day
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- We can provide PoCs