Skip to main content

Help us improve the Digital Marketplace - send your feedback

Shelton Development Services Limited

SDS Sequel

Sequel is a property project management software platform designed to help housing professionals financially monitor and track the build phase of social housing schemes.

Manage the build phase of housing on an intuitive platform. From the moment you identify land that presents an opportunity, to the completion of the scheme.

Features

  • Real-time reporting
  • Microsoft SQL Server data storage
  • Open API
  • Centralised data storage for schemes
  • Customisable inputs for bepoke data capture
  • Customisable functions for bespoke calculations

Benefits

  • Quickly reforecast cashflows
  • Compare approved and actual spend
  • Import actual spend from finance system
  • Control and audit changes to schemes
  • Quickly import and export data
  • Update multiple items simultaneously
  • All scheme and property data held in one place
  • At a glance view of problems in schemes
  • Easily share information across all departments
  • Seamless transfer of data to other systems

Pricing

£1,800 to £5,000 a user a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ricky.prota@s-d-s.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

6 8 2 0 2 4 5 8 7 2 4 8 6 7 6

Contact

Shelton Development Services Limited Ricardo Prota
Telephone: 07944849302
Email: ricky.prota@s-d-s.co.uk

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Sequel should be combined with ProVal. The software comes with an interface to allow you to share relevant data. The typical data flow is Appraisal data from ProVal to Sequel.
Cloud deployment model
Private cloud
Service constraints
None.
System requirements
Internet Browser Access Required with a standard PC

User support

Email or online ticketing support
Email or online ticketing
Support response times
First Response is 4 hours.

Support is provided in accordance with the terms of our standard Support Agreement and encompasses.

Support opening hours:

Monday – Friday

9am – 5pm
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
No
Web chat support
No
Onsite support
Onsite support
Support levels
All support is local; we do not use third-party agencies or remote call centres.

Support is provided in accordance with our standard Support SLA included within the terms and conditions and encompasses:

Email queries where you'll deal with an experienced member of our team.

Screen-to-screen access to provide support directly onto your machine.
Tutorials and real-time demonstrations over the web.
Reviews of your work to check for possible errors(chargeable)
Application updates to meet changes in business practices
Face to face
Annual regional user meetings
Account Review Meetings

Priority
1

Urgent request for support, help,
assistance, development or advice

4 hour
response
5-day fix

4-hour response
4-week fix

Priority
2

Moderate request for support, help,
assistance, development or advice

Same day
response
10-day fix

Same day
response
6-week fix

Priority
3

Low request for support, help,
assistance, development or advice

Next day
response
15-day fix

Next day response
8-week fix

Priority
4
Feature request Programmed and
scheduled by
agreement with
SDS and the
Customer
Support available to third parties
No

Onboarding and offboarding

Getting started
Full Training is part of the package. The training is currently delivered live by one of our accredited trainers for each customer in an online classroom setting. We are currently investigating the use of an online Learning Management System as well. This would compliment the live training, consisting of a number of remote online interactive courses with tests/quizzes and actual operation of the software. The benefit of the Learning Management System would be to offer greater flexibility of timing/delivery, along with the ability to re-visit the courses as and when required. There are a range of training options available giving varying levels of insight as to the operation of Sequel (see Pricing), that include: ADMIN - The Sequel Administrator training is aimed at those people who are responsible for setting defaults, administering the system and/or training others in the team; END USER: Covers the operation of the cashflow, including creating projects, setting up and managing a cashflow, importing appraisals and running reports.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
The database will be downloaded and provided to the customer.
End-of-contract process
Once the customer has confirmed receipt of the required database and has what they need we will delete the online version of the database.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Chrome
Application to install
No
Designed for use on mobile devices
No
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
No restrictions are placed in the API, customer must liaise with SDS to ensure a suitable script is written and maintained
API documentation
Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
Sequel is a highly configurable application with bespoke reporting features. A wide range of project, property, cashflow, workflow and people attributes can be created to suit your financial project management requirements. The configuration process will be covered as part of our training programme, but there are also options for SDS to configure the software to the specifications of the user. Please note we do not allow customers to customise the underlying software code / functionality in a bespoke way, however, we do of course collect feature requests and other feedback from users, and these are managed in the product feature pipeline.

Scaling

Independence of resources
Each company will have their own server. Any strain can be identified and resourced accordingly.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
Never
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users can export data through reporting outputs which can be saved and copied to their local machine.
Data export formats
  • CSV
  • Other
Other data export formats
CSV, EXCEL, PDF, HTML
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
Our SLA is guaranteed at 99.99% up time.
Approach to resilience
We use AWS servers which will be set up to high standards of resilience. Further information is available on request.
Outage reporting
SDS will be notified if there is an outage via an email and SMS alert, and will let the customer know straight away (also via email).

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Access within the software is based on roles. Users are given access to a particular role or security level which then determines their ability to access the different features or data in the software. Access to support channels is managed via our FreshDesk support system, which contains all our customer contact and purchase information. We plan to move this to another system called Jira and align to our parent company
Access restriction testing frequency
Less than once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Citation
ISO/IEC 27001 accreditation date
22/11/2022
What the ISO/IEC 27001 doesn’t cover
All SDS Business practice and approach to InfoSec conforms to ISO27001
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
All staff are organised into teams with level of access to information based on their requirements in their roles. Network drives and other information sources are centrally administrated and our Software IT director takes responsibility for maintenance and security of IT systems. Software code is stored in secure locations and the development of our software follows a standard approach, with each coding change being recorded in the case management system, following an agreed process of requirement, coding, code review and testing. All our staff are trained on GDPR regulations and we document their responsibilities with regards to data and privacy in our staff handbook

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
All code is recorded using a branch methodology, with each change being subject to our secure development process. Changes to software must go through a multistage process including design, review and testing ahead of the change being merged into the master branch code
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
SDS employ ISO 27001 methodology and Infosec protocol when navigating potential security risks, all operating systems and software versions are kept up to date and we use anti-virus software protection as appropriate. All our records systems are online and we do not generally use physical storage.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
If our security is compromised we would assess the potential impact at SLT level. Measures appropriate to the scale of the incident would be determined at the time, and we are aware of (and comply with) our statutory obligations under GDPR to notify users and the ICO. We would immediately notify users. We would also follow our BCP which formed part of our ISO submission
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
SDS employ ISO 27001 methodology and Infosec protocol when navigating potential security risks, all operating systems and software versions are kept up to date and we use anti-virus software protection as appropriate.If and when our security is compromised we will assess the potential impact at the SLT level. Measures appropriate to the scale of the incident would be determined at the time, and we are aware of (and comply with) our statutory obligations under GDPR to notify users and the ICO. We would immediately notify users. Follow our BCP Plan

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Equal opportunity

Equal opportunity

SDS is committed to providing equal employment opportunities to all employees and applicants without regard to race,colour,religion,sex, national origin,age,disability, or any other protected status.

Pricing

Price
£1,800 to £5,000 a user a year
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ricky.prota@s-d-s.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.