Skip to main content

Help us improve the Digital Marketplace - send your feedback

SCUBE LIMITED

Provision of Product, Software and APIs Development services

We specialize in design, development, and implementation of tailored software solutions, including standalone products and APIs that facilitate seamless integration and functionality across diverse platforms and systems, enhancing operational efficiency and user experience.

Features

  • Multi-cloud Compatibility
  • API Integration
  • Load Balancing
  • 24/7 Monitoring
  • Compliance Management
  • Automated Backups
  • Encryption and Security
  • Scalability
  • Remote Access
  • Containerization Support

Benefits

  • Reduce manual workloads with automated processes, boosting efficiency.
  • Update and control content remotely, saving time and increasing productivity.
  • Protect critical information with advanced security measures.
  • Make informed decisions with user-friendly analytics interfaces.
  • Use resources efficiently with AI-driven demand forecasting.
  • Deliver tailored interactions that increase satisfaction and loyalty.
  • Minimize service interruptions, ensuring continuous operation.
  • Meet regulatory standards effortlessly with built-in compliance tools.
  • Enhance team synergy with tools that support real-time collaboration.
  • Facilitate faster, more informed decisions with real-time data synchronization

Pricing

£150.00 a unit an hour

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at praveen.matam@scubedimensions.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

7 5 5 1 5 7 5 7 7 2 0 3 7 4 5

Contact

SCUBE LIMITED Praveen Matam
Telephone: 07766242865
Email: praveen.matam@scubedimensions.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
Service constraints
Service Level Agreements, Feature Availability, Planned Maintenance, Integration Constraints, Data Storage and Handling, Geographic Restrictions.
System requirements
  • Requires at least 4GB RAM and a dual-core processor
  • Stable internet connection with minimum speed of 10 Mbps required
  • Requires active license for Microsoft 365.
  • Existing APIs must support RESTful integration

User support

Email or online ticketing support
Email or online ticketing
Support response times
Our response times are usually in 24 hours. At present we do not operate on the weekends but if the service demands us to do so we are very much capable of providing similar response times even during the weekends.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
We started of by creating scenarios that cover all typical interactions with the chat bot in house and then we tested with some of the assistive technology users to understand the difficulties they encounter.
Onsite support
Onsite support
Support levels
We will be providing a cloud support engineer who will be assisting in setting up and integrating the services.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide easy to understand user documentation and wherever needed we include video walk-throughs for the same.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
We typically notify the users well in advance, giving them ample time to extract the data in common file formats such as CSV, JSON, or XML.
End-of-contract process
The basic features and functionalities specified in the service description with basic customer support and maintenance of the service is included in the price. Access to premium features, extended support, customization of the service will be availed at an additional cost.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
The functionality when it comes to the end user across the desktop and mobile is very similar but we do have more support for our team to use like maintenance etc on our desktop service.
Service interface
No
User support accessibility
WCAG 2.1 AA or EN 301 549
API
Yes
What users can and can't do using the API
Users must pass through the authentication to interact with the API.
API documentation
Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Yes
Customisation available
No

Scaling

Independence of resources
By utilizing virtualization and containerization technologies, we aim to isolate resources per user or per group. We employ advanced load balancers that distribute incoming service requests evenly across multiple servers or instances. We will continuously monitor performance and automated systems in place to adjust resources or balance loads as needed. We will design the systems to be inherently scalable, either vertically or horizontally. Also by establishing robust fail-over mechanisms that automatically redirect traffic from overloaded servers to underutilized ones.

Analytics

Service usage metrics
Yes
Metrics types
Uptime/Availability, Response Time, Error Rates, Traffic, Customer Satisfaction, Throughput, Latency, Resource Utilization.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Following our step by step guide will make the process of extracting the data easier. Data can be exported through our interface in various formats such as CSV, JSON, XML. In some complex situations where needed while working with other companies, we will give the opportunity to transfer the data through API's.
Data export formats
  • CSV
  • Other
Other data export formats
  • JSON
  • XML
Data import formats
  • CSV
  • Other
Other data import formats
  • JSON
  • XML

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Our service is guaranteed to be available 99.9% of the time, excluding scheduled maintenance windows, as measured over a calendar month. If availability falls below the guaranteed level, customers will receive service credits equivalent to 10% of their monthly fee for each hour of downtime beyond the agreed level.
Approach to resilience
We will host our services in cloud providers including but not limited to AWS, Azure and GCP. We aim to make our service resilient by carefully architecting our service by creating failover mechanisms and following the technology standards where needed.
Outage reporting
Our service will automatically report any outage to the concerned users through email.

Identity and authentication

User authentication needed
Yes
User authentication
2-factor authentication
Access restrictions in management interfaces and support channels
We rigorously restrict access through stringent authentication protocols, which include multifactor authentication and role-based access controls. This ensures that only authorized personnel can access sensitive areas. We regularly audit these access controls to adapt to evolving security needs, maintaining a secure environment for our management and support infrastructure. This layered security approach is vital to protecting our operations and the data entrusted to us by our clients.
Access restriction testing frequency
At least every 6 months
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
CSA CCM version 3.0
Information security policies and processes
A comprehensive information security structure includes a detailed policy framework aligned with standards like CSA CCM v3.0. Regular employee training on security awareness is crucial. The Chief Information Security Officer oversees the implementation and compliance of these policies, reporting directly to senior management. Security teams manage daily operations, while specialized incident response teams handle breaches.
Access control policies enforce minimal necessary access, strengthened by rigorous authentication methods. Compliance is ensured through regular internal and external audits, alongside routine compliance checks. Technological tools such as SIEM, DLP, and IAM automate monitoring and enforcement. An anonymous reporting system allows employees to report security concerns discreetly.
Our policies are dynamic, updated regularly to reflect emerging threats and changes in technology and business operations. This structured approach ensures robust protection against security threats, maintaining a secure IT environment.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Each proposed change undergoes a thorough security impact assessment, incorporating risk analysis and validation testing to ensure compliance with our rigorous security protocols. Our configuration and change management strategy meticulously tracks each component of our services across their entire lifecycle using a Configuration Management Database (CMDB). This systematic approach ensures that any adjustments uphold our high security standards, thereby safeguarding service integrity and minimizing vulnerabilities.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Our vulnerability management strategy includes constant surveillance to detect and evaluate threats to our services. We utilize advanced scanning tools and integrate information from trusted sources like CVE databases and security advisories to assess risks. Critical vulnerabilities are addressed within 24 hours through rapid patch deployment, ensuring robust defense against potential security threats. This ensures continuous protection and service integrity.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
We assure you that our protective monitoring system is robust and agile. We employ advanced detection technologies and continuous surveillance to swiftly identify any signs of potential security breaches. Once we detect a potential compromise, our dedicated incident response team is activated immediately to mitigate any risks involved. Our goal is to respond to security incidents within hours, ensuring minimal impact and maintaining the security integrity of our services. This proactive security posture is fundamental to protecting our operations and our clients' interests.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
We have established predefined processes for responding to common incidents, ensuring a swift and coordinated reaction. Our clients can report incidents through a dedicated support channel that is monitored around the clock. Following any incident, we provide detailed reports that outline the nature of the incident, the steps taken to resolve it, and measures implemented to prevent future occurrences. This transparent reporting is part of our commitment to maintaining trust and ensuring continuous improvement in our security practices.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Equal opportunity
  • Wellbeing

Fighting climate change

We are deeply committed to tackling climate change through comprehensive and sustainable corporate practices. We're reducing our carbon footprint by enhancing energy efficiency in our operations and shifting towards renewable energy sources. We also promote sustainable practices throughout our supply chain, choosing environmentally friendly materials and minimizing waste. Innovation plays a key role; we're fostering developments that lessen environmental impacts and investing in clean technologies. Engaging our employees in sustainability efforts and raising environmental awareness is another critical component. Moreover, we collaborate with various stakeholders to collectively address environmental challenges, emphasizing transparency in our environmental initiatives by regularly reporting on our progress. Our approach demonstrates that sustainable business practices are not only feasible but also beneficial for both the planet and profitability.

Equal opportunity

We Implement transparent and unbiased recruitment processes using standardized interview questions and ensuring that decisions are based on skills, qualifications, and relevant experience without regard to personal characteristics unrelated to the job.
We Provide regular training for all employees, including management, to raise awareness about unconscious biases and teach skills for fostering an inclusive environment.
We will develop and enforce clear policies that prohibit discrimination and outline consequences for such behaviors, covering all possible grounds including race, gender, religion, and disability.
We regularly review and adjust compensation and benefits to eliminate unjustified disparities, ensuring fairness in pay across similar roles and responsibilities.
We offer transparent career progression paths and equal access to professional development, including training programs and mentorships, ensuring all employees have the opportunity to advance.
We aim to support diverse work-life balance needs through flexible working hours, remote work options, and family leave policies.
We will utilize surveys and feedback tools to regularly assess the workplace culture and effectiveness of existing diversity policies, allowing for continuous improvement.

Wellbeing

Our comprehensive well-being strategy integrates several core elements designed to support our employees holistically:
We provide access to mental health support and counseling services to help employees manage stress, anxiety, and other personal challenges. This includes confidential assistance programs and regular wellness workshops.
Our health benefits include gym memberships, fitness challenges, and health screenings to encourage a healthy lifestyle. We believe physical health is critical to maintaining overall well-being.
We support flexible working arrangements such as remote work options and flexible schedules to help employees balance their personal and professional lives. This flexibility is crucial in today’s dynamic work environment.
Continuous learning and development are key to employee satisfaction. We offer various training programs, mentorships, and opportunities for career advancement, ensuring that our employees feel valued and invested in.
Encouraging social interaction and community involvement is important for emotional well-being. We organize regular team-building activities and community service events that foster a sense of belonging and purpose.
We regularly seek input from our team on how to improve our workplace and well-being initiatives. This feedback is vital for us to evolve our strategies effectively.
Our leadership is dedicated to implementing these practices not just as policies, but as fundamental aspects of our corporate culture. We are committed to ensuring that all employees have the resources they need to thrive both personally and professionally.

Pricing

Price
£150.00 a unit an hour
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Prototype Functionality or Proof of Concept Functionality

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at praveen.matam@scubedimensions.com. Tell them what format you need. It will help if you say what assistive technology you use.