Creative, Design & Publishing
Digital design and content creation expertise for a range of digital transformation requirements. Services/Experience includes: Web Design, Digital Content Production, Search Engine Optimisation (SEO), Digital Marketing, Internal/External Content Creation, User Experience Specialists, User Journey Mapping, Accessibility Standards and GDS Standards
Features
- Extensive network of experienced and highly skilled resources
- Interim resources provided UK wide for short/long term assignments
- Experience with high volume / high traffic sites
- UX/UI specialists
- Experience with design and tone of UKPS sites
- Technical expertise in digital design and development
Benefits
- Improved engagement with strategic online services
- Access to knowledge of the latest front end technologies
- Alignment with GDS guidelines
- Specialists in UK public sector delivery
- SC / DV cleared professionals
Pricing
£325 to £875 a person a day
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 8 7 7 2 9 2 2 7 1 4 1 2 7 3
Contact
Henderson Scott
David Potter
Telephone: 07540 974 378
Email: PMO@hendersonscott.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- No service constraints
- System requirements
- No specific system requirements
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Responses within 3 hours, including weekends.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
-
Response to requests within 3 hours, including weekends.
Standard support hours are 8.30am to 6.00pm Monday to Friday (24/7 and extended support also available on request)
We provide a dedicated account manager on all G-Cloud accounts to manage and support the recruitment process. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We provide a User Documentation pack for users of our Services.
All staff performing services have received extensive onsite training. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Users may take advantage of our online data tool or make a request and data will be provided to them.
- End-of-contract process
-
A full off-boarding process is implemented.
All services are included in the price of the contract, there is no additional cost.
Using the service
- Web browser interface
- No
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Services can be accessed either via our website or via email requests which is available on both mobile and desktop platforms.
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- Yes
- Description of customisation
-
We are able to work to any SLA and have an extensive network of Cloud professionals who we can provide on a custom basis.
All users may request a customisation of the services, and this can be discussed with the User Account Manager prior to implementation.
Scaling
- Independence of resources
-
We have dedicated Account Teams, headed up by Senior Managers to ensure that the volume of requests from users is managed efficiently and the service provided is at the exceptional level that we have become known for in the industry.
The Account Leads have regular contact and communication with both Users and internal managers so demand can be communicated and managed efficiently.
Analytics
- Service usage metrics
- Yes
- Metrics types
- All services are recorded and metrics can be provided based on any area of Supplier delivery at the User's request.
- Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Users may take advantage of our online data tool or make a request and data will be provided to them.
- Data export formats
-
- CSV
- Other
- Other data export formats
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
We agree to work with any level of SLA that the user may require, and can arrange these on request.
If services are not performed to the satisfaction of the User, a full refund may be agreed on a case by case basis. - Approach to resilience
- Available on request
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- IP restrictions, two factor authentication of approved users and protective monitoring/logging.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Work to GDPR standards, and are in the process of implementing.
- Information security policies and processes
-
We work to GDPR levels of security, and all Information Security Policies and Processes are well documented.
Authorised users have thorough training on these policies, and we conduct regular security checks to ensure that these are being followed completely.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Work to recognised standards, details available on request.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Work to recognised standards.
Sensitive information, details available on request. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Work to recognised standards.
Sensitive information, details available on request. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Work to recognised standards, details available on request.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Wellbeing
Fighting climate change
Sustainability is at the core of everything we do at Henderson Scott. Our actions today shape the world of tomorrow, and we are committed to a journey that balances business success with environmental responsibility and social contribution. Environmental stewardship - We actively manage our environmental impact, focusing on reducing emissions and resource consumption. We have committed to Net Zero by 2050, reducing our carbon footprint by 50% by 2030 and have taken positive climate action by carbon offsetting in 2023 therefore we are now operating as a certified carbon neutral business.Tackling economic inequality
Henderson Scott are committed to tackling economic inequality and our G-Cloud service provision is further enabling us to take positive action. For example, in respect of creating new businesses, new jobs and new skills. Under the Armed Forces Covenant Employer Recognition Scheme we hold a Bronze Award Certificate for our committed to aiding Veterans with the transition into civilian careers and have a particular track record in supporting individuals to transition into project/programme management focused roles within the Security Cleared space, supporting our projects with Central Government and Defence customers. The Henderson Scott team regularly attend schools, colleagues, universities and career fairs promoting roles within the Cloud space and have a particular emphasis on addressing the gender gap in Cloud/IT professionals by hosting events with female leaders such as our Women in Tech Events which we ran in London, Glasgow, Edinburgh and Manchester. We regularly host workshops on Interview Skills to assistant prospective talent to develop the interview skills they need to secure a role in the Cloud/Technology sector.Wellbeing
Henderson Scott places significant focus on supporting the health and wellbeing of our workforce. Our G-Cloud service provision will further support our efforts in this space. We currently provide and would be able to continue to invest in ensuring Mental Health First Aiders are available in all of our physical locations in the UK and that remote staff including those deployed to our Customer sites would have the ability to utilise the services of our Mental Health First Aiders. All staff have access to additional, specialist mental health support via their private medical insurance which is provided for all staff post probation. We also provide and would continue to provide access to private GP services, ensuring our staff can access support when they need it. We have automated alerts prompting staff to consider a day off if they haven't taken annual leave for 60 consecutive days as part of our efforts to protect our workforce from employee burnout. All employees supporting our G-Cloud Service Provision would receive the above alongside additional wellbeing support, full details of which can be provided where additional word count permits.
Pricing
- Price
- £325 to £875 a person a day
- Discount for educational organisations
- No
- Free trial available
- No