Provision of Product, Software and APIs Development services
We specialize in design, development, and implementation of tailored software solutions, including standalone products and APIs that facilitate seamless integration and functionality across diverse platforms and systems, enhancing operational efficiency and user experience.
Features
- Multi-cloud Compatibility
- API Integration
- Load Balancing
- 24/7 Monitoring
- Compliance Management
- Automated Backups
- Encryption and Security
- Scalability
- Remote Access
- Containerization Support
Benefits
- Reduce manual workloads with automated processes, boosting efficiency.
- Update and control content remotely, saving time and increasing productivity.
- Protect critical information with advanced security measures.
- Make informed decisions with user-friendly analytics interfaces.
- Use resources efficiently with AI-driven demand forecasting.
- Deliver tailored interactions that increase satisfaction and loyalty.
- Minimize service interruptions, ensuring continuous operation.
- Meet regulatory standards effortlessly with built-in compliance tools.
- Enhance team synergy with tools that support real-time collaboration.
- Facilitate faster, more informed decisions with real-time data synchronization
Pricing
£150.00 a unit an hour
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 5 5 1 5 7 5 7 7 2 0 3 7 4 5
Contact
SCUBE LIMITED
Praveen Matam
Telephone: 07766242865
Email: praveen.matam@scubedimensions.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Service constraints
- Service Level Agreements, Feature Availability, Planned Maintenance, Integration Constraints, Data Storage and Handling, Geographic Restrictions.
- System requirements
-
- Requires at least 4GB RAM and a dual-core processor
- Stable internet connection with minimum speed of 10 Mbps required
- Requires active license for Microsoft 365.
- Existing APIs must support RESTful integration
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Our response times are usually in 24 hours. At present we do not operate on the weekends but if the service demands us to do so we are very much capable of providing similar response times even during the weekends.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- We started of by creating scenarios that cover all typical interactions with the chat bot in house and then we tested with some of the assistive technology users to understand the difficulties they encounter.
- Onsite support
- Onsite support
- Support levels
- We will be providing a cloud support engineer who will be assisting in setting up and integrating the services.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide easy to understand user documentation and wherever needed we include video walk-throughs for the same.
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- We typically notify the users well in advance, giving them ample time to extract the data in common file formats such as CSV, JSON, or XML.
- End-of-contract process
- The basic features and functionalities specified in the service description with basic customer support and maintenance of the service is included in the price. Access to premium features, extended support, customization of the service will be availed at an additional cost.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The functionality when it comes to the end user across the desktop and mobile is very similar but we do have more support for our team to use like maintenance etc on our desktop service.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- Yes
- What users can and can't do using the API
- Users must pass through the authentication to interact with the API.
- API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
- By utilizing virtualization and containerization technologies, we aim to isolate resources per user or per group. We employ advanced load balancers that distribute incoming service requests evenly across multiple servers or instances. We will continuously monitor performance and automated systems in place to adjust resources or balance loads as needed. We will design the systems to be inherently scalable, either vertically or horizontally. Also by establishing robust fail-over mechanisms that automatically redirect traffic from overloaded servers to underutilized ones.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Uptime/Availability, Response Time, Error Rates, Traffic, Customer Satisfaction, Throughput, Latency, Resource Utilization.
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Following our step by step guide will make the process of extracting the data easier. Data can be exported through our interface in various formats such as CSV, JSON, XML. In some complex situations where needed while working with other companies, we will give the opportunity to transfer the data through API's.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- JSON
- XML
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- JSON
- XML
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Our service is guaranteed to be available 99.9% of the time, excluding scheduled maintenance windows, as measured over a calendar month. If availability falls below the guaranteed level, customers will receive service credits equivalent to 10% of their monthly fee for each hour of downtime beyond the agreed level.
- Approach to resilience
- We will host our services in cloud providers including but not limited to AWS, Azure and GCP. We aim to make our service resilient by carefully architecting our service by creating failover mechanisms and following the technology standards where needed.
- Outage reporting
- Our service will automatically report any outage to the concerned users through email.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- 2-factor authentication
- Access restrictions in management interfaces and support channels
- We rigorously restrict access through stringent authentication protocols, which include multifactor authentication and role-based access controls. This ensures that only authorized personnel can access sensitive areas. We regularly audit these access controls to adapt to evolving security needs, maintaining a secure environment for our management and support infrastructure. This layered security approach is vital to protecting our operations and the data entrusted to us by our clients.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- CSA CCM version 3.0
- Information security policies and processes
-
A comprehensive information security structure includes a detailed policy framework aligned with standards like CSA CCM v3.0. Regular employee training on security awareness is crucial. The Chief Information Security Officer oversees the implementation and compliance of these policies, reporting directly to senior management. Security teams manage daily operations, while specialized incident response teams handle breaches.
Access control policies enforce minimal necessary access, strengthened by rigorous authentication methods. Compliance is ensured through regular internal and external audits, alongside routine compliance checks. Technological tools such as SIEM, DLP, and IAM automate monitoring and enforcement. An anonymous reporting system allows employees to report security concerns discreetly.
Our policies are dynamic, updated regularly to reflect emerging threats and changes in technology and business operations. This structured approach ensures robust protection against security threats, maintaining a secure IT environment.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Each proposed change undergoes a thorough security impact assessment, incorporating risk analysis and validation testing to ensure compliance with our rigorous security protocols. Our configuration and change management strategy meticulously tracks each component of our services across their entire lifecycle using a Configuration Management Database (CMDB). This systematic approach ensures that any adjustments uphold our high security standards, thereby safeguarding service integrity and minimizing vulnerabilities.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Our vulnerability management strategy includes constant surveillance to detect and evaluate threats to our services. We utilize advanced scanning tools and integrate information from trusted sources like CVE databases and security advisories to assess risks. Critical vulnerabilities are addressed within 24 hours through rapid patch deployment, ensuring robust defense against potential security threats. This ensures continuous protection and service integrity.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- We assure you that our protective monitoring system is robust and agile. We employ advanced detection technologies and continuous surveillance to swiftly identify any signs of potential security breaches. Once we detect a potential compromise, our dedicated incident response team is activated immediately to mitigate any risks involved. Our goal is to respond to security incidents within hours, ensuring minimal impact and maintaining the security integrity of our services. This proactive security posture is fundamental to protecting our operations and our clients' interests.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- We have established predefined processes for responding to common incidents, ensuring a swift and coordinated reaction. Our clients can report incidents through a dedicated support channel that is monitored around the clock. Following any incident, we provide detailed reports that outline the nature of the incident, the steps taken to resolve it, and measures implemented to prevent future occurrences. This transparent reporting is part of our commitment to maintaining trust and ensuring continuous improvement in our security practices.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Equal opportunity
- Wellbeing
Fighting climate change
We are deeply committed to tackling climate change through comprehensive and sustainable corporate practices. We're reducing our carbon footprint by enhancing energy efficiency in our operations and shifting towards renewable energy sources. We also promote sustainable practices throughout our supply chain, choosing environmentally friendly materials and minimizing waste. Innovation plays a key role; we're fostering developments that lessen environmental impacts and investing in clean technologies. Engaging our employees in sustainability efforts and raising environmental awareness is another critical component. Moreover, we collaborate with various stakeholders to collectively address environmental challenges, emphasizing transparency in our environmental initiatives by regularly reporting on our progress. Our approach demonstrates that sustainable business practices are not only feasible but also beneficial for both the planet and profitability.Equal opportunity
We Implement transparent and unbiased recruitment processes using standardized interview questions and ensuring that decisions are based on skills, qualifications, and relevant experience without regard to personal characteristics unrelated to the job.
We Provide regular training for all employees, including management, to raise awareness about unconscious biases and teach skills for fostering an inclusive environment.
We will develop and enforce clear policies that prohibit discrimination and outline consequences for such behaviors, covering all possible grounds including race, gender, religion, and disability.
We regularly review and adjust compensation and benefits to eliminate unjustified disparities, ensuring fairness in pay across similar roles and responsibilities.
We offer transparent career progression paths and equal access to professional development, including training programs and mentorships, ensuring all employees have the opportunity to advance.
We aim to support diverse work-life balance needs through flexible working hours, remote work options, and family leave policies.
We will utilize surveys and feedback tools to regularly assess the workplace culture and effectiveness of existing diversity policies, allowing for continuous improvement.Wellbeing
Our comprehensive well-being strategy integrates several core elements designed to support our employees holistically:
We provide access to mental health support and counseling services to help employees manage stress, anxiety, and other personal challenges. This includes confidential assistance programs and regular wellness workshops.
Our health benefits include gym memberships, fitness challenges, and health screenings to encourage a healthy lifestyle. We believe physical health is critical to maintaining overall well-being.
We support flexible working arrangements such as remote work options and flexible schedules to help employees balance their personal and professional lives. This flexibility is crucial in today’s dynamic work environment.
Continuous learning and development are key to employee satisfaction. We offer various training programs, mentorships, and opportunities for career advancement, ensuring that our employees feel valued and invested in.
Encouraging social interaction and community involvement is important for emotional well-being. We organize regular team-building activities and community service events that foster a sense of belonging and purpose.
We regularly seek input from our team on how to improve our workplace and well-being initiatives. This feedback is vital for us to evolve our strategies effectively.
Our leadership is dedicated to implementing these practices not just as policies, but as fundamental aspects of our corporate culture. We are committed to ensuring that all employees have the resources they need to thrive both personally and professionally.
Pricing
- Price
- £150.00 a unit an hour
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Prototype Functionality or Proof of Concept Functionality