Business Process Modeling for Cloud Services
Our multi-site management platform accessed through a browser-based interface to build and manage sites. Our Web Service subscriptions allow customers to perform administrative actions such as create, duplicate and export websites through BFTTT platform management dashboard. Users can configure, customize, and publish sites through customer code theme with ease
Features
- Assist your different units and participants within your organisation
- Facilitate understanding, performance and collaboration
- Support the management of your business processes
- Ensure the semantics of complex processes are made relatively easy
- Reduce misinterpretation of communication between your process design stage
- Reduce misinterpretation of communication between your process implementation stage
Benefits
- Implement solutions-based on business requirements
- Provide improvements to business processes and workflows
- Identify cost effective solutions in respects of business requirements
- Ensure concise gap analysis to maximum business potential
Pricing
£600 to £1,200 a unit a day
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 8 0 5 0 2 3 9 1 6 1 0 3 3 0
Contact
BFTTT RESOURCES INC LTD.
Ade Osideinde
Telephone: +447470362281
Email: adeosideinde@bfttt.co.uk
Service scope
- Service constraints
- None
- System requirements
- None
User support
- Email or online ticketing support
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
1st, 2nd and 3rd line support is provided by our cloud support engineers and in some cases a technical account manager is assigned.
All calls are processed and managed based on our standard P1, P2, P3, P4 classifications with defined SLAs. Our support channels includes web, phone and email. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provides a range of resources to help customers get started on its services. These include comprehensive documentation (in multiple formats), introductory videos, hands-on labs, online and in-person training, and access to support from the GCP/AZURE/AWS public sector account team.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Data could be extracted via secure gateway connection and in compliance with GDPR.
- End-of-contract process
-
The Buyer may terminate the relationship with the Supplier for any reason by (i) providing the Supplier with notice and (ii) closing the Buyer's account for all services for which Supplier provides an account closing mechanism.
Administrative fee with be included in the SLA
Using the service
- Web browser interface
- Yes
- Using the web interface
- Deploy, scale and diagnose issues via a simple web based interface. You can securely manage and monitor everything that powers your cloud application via: https://cloud.google.com/cloud-console
- Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- For many of our support clients, we configure private chat groups to allow the client real-time access to the support team.
- Web interface accessibility testing
- Currently, we have not performed any web chat testing with assistive technology users.
- API
- Yes
- What users can and can't do using the API
- All these services can be fully configured through the AWS API. See https://docs.aws.amazon.com/index.html#user_guides for the full list of API interfaces. There are no limitations to how the service is configured via the API.
- API automation tools
-
- Ansible
- Chef
- OpenStack
- SaltStack
- Terraform
- Puppet
- Other
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
-
- Automatic
- Manual
- Independence of resources
- Through load balancing.
- Usage notifications
- Yes
- Usage reporting
-
- SMS
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
-
- Real-time dashboards
- Regular reports
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Users can recover backups themselves
- Multiple data centers with disaster recovery
- Under user control, depending on buyer requirements
- Under user control, depending on buyer requirements
- Backup through a web interface
- Backup controls
- User have the flexibility to backup based on their own preference
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Users schedule backups through a web interface
- Backup recovery
- Users can recover backups themselves, for example through a web interface
Data-in-transit protection
- Data protection between buyer and supplier networks
- Private network or public sector network
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
-
The AWS Business Continuity plan details the process that AWS follows in the case of an outage, from detection to deactivation. AWS has developed a three-phased approach: Activation and Notification Phase, Recovery Phase, and Reconstitution Phase. This approach ensures that AWS performs system recovery and reconstitution efforts in a methodical sequence, maximizing the effectiveness of the recovery and reconstitution efforts and minimizing system outage time due to errors and omissions.
AWS maintains a ubiquitous security control environment across all regions. Each data centre is built to physical, environmental, and security standards in an active-active configuration, employing an n+1 redundancy model, ensuring system availability in the event of component failure. Components (N) have at least one independent backup component. All data centres are online and serving traffic. In case of failure, there is sufficient capacity to enable traffic to be load-balanced to the remaining sites.
Customers are responsible for implementing contingency planning, training, and testing for their systems hosted on AWS. AWS provides customers with the capability to implement a robust continuity plan, including the utilization of frequent server instance back-ups, data redundancy replication, and the flexibility to place instances and store data within multiple geographic regions across multiple Availability Zones. - Approach to resilience
- This is available on request.
- Outage reporting
- Email alerts.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Access restrictions in management interfaces and support channels
-
Role-Based Access Control (RBAC)
Attribute-Based Access Control (ABAC)
Discretionary Access Control (DAC)
Policy-Based Access Control (PBAC) - Access restriction testing frequency
- At least every 6 months
- Management access authentication
- 2-factor authentication
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Dedicated device on a government network (for example PSN)
Audit information for users
- Access to user activity audit information
- Users receive audit information on a regular basis
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users receive audit information on a regular basis
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- ISO/IEC 27001
- Information security policies and processes
- Policies, processes, and tools designed and deployed to protect sensitive business information and data assets from unauthorised access. There are three core aspects of information security: confidentiality, integrity, and availability.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
This is in accordance with AWS Framework configuration approach.
Feature flags
A/B testing
Debugging and logging attributes
Allow lists or deny lists
Operational tuning (throttling limits, connection limits, URIs)
Database failover configuration - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Our vulnerability management is used to identify, analyze, and manage vulnerabilities within client operating environment. Inventory of assets Configuration standards are adhered to Vulnerability, DAST, and SAST scanning Risk assessment Employee training Penetration testing We deploy patched immediately we discover the issue. We check the following: Insecure code Unpatched software Cloud misconfigurations Lack of encryption Default authentication Lack of security awareness and training Improper internal controls Weak or missing policies
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Our vulnerability management is used to identify, analyze, and manage vulnerabilities within client operating environment. Inventory of assets Configuration standards are adhered to Vulnerability, DAST, and SAST scanning Risk assessment Employee training Penetration testing We deploy patched immediately we discover the issue. We check the following: Insecure code Unpatched software Cloud misconfigurations Lack of encryption Default authentication Lack of security awareness and training Improper internal controls Weak or missing policies
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Our vulnerability management is used to identify, analyze, and manage vulnerabilities within client operating environment.
Inventory of assets
Configuration standards are adhered to
Vulnerability, DAST, and SAST scanning
Risk assessment
Employee training
Penetration testing
We deploy patched immediately we discover the issue.
We check the following:
Insecure code
Unpatched software
Cloud misconfigurations
Lack of encryption
Default authentication
Lack of security awareness and training
Improper internal controls
Weak or missing policies
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- VMware
- How shared infrastructure is kept separate
- This is included in our SLA agreement
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- We adhere strictly to European Code of Conduct for Energy Efficiency in Data Centres.
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Fighting climate change
At BFTTT we’re committed to reducing our environmental impact on our planet. We try our very best to reduce the amount of waste we produce by
re-using products and recycling products where possible; use energy and water in an efficient way and reduce printing in our offices.
We are an advocate of reducing vehicle emissions by encouraging the use of sustainable modes of transport and discouraging meetings that require transport unless there is an overriding benefit; provide advice and update our team on issues that encourage good environmental practice; make sure we fully comply with environmental legislation.
Everyone at BFTTT Resource Inc., Ltd is asked to only print when essential, use print preview and double-sided printing as much as possible to minimise paper use; recycle empty cans, bottles, glass and card in the recycle bins provided throughout the offices; put food waste in the caddies provided in the kitchens; purchase recycled paper products where possible; purchase environmentally friendly hygiene products where possible.Covid-19 recovery
Covid-19 recovery
BFTTT Resource Inc., Ltd closed our offices in favour of remote working in mid-March prior to government lockdowns and furloughed no staff members. Remote or hybrid working remains for all employees. We reopened our offices when restrictions permitted, to provide a safe environment for staff members who are unable or struggle to work remotely due to physical or psychological wellbeing reasons. who are unable or struggle to work remotely due to physical or psychological wellbeing reasons. The offices have been rigorously risk assessed to allow remote working including our clients.Tackling economic inequality
Tackling economic inequality
BFTTT Resource Inc., Ltd has achieved significant growth over the last 8 years by placing great importance on recruitment from the surrounding areas including employment of employees regardless of race, gender, ethnic background.
We are active in our commitment to improving social mobility within our community and took part in the employee seminars and public speaking to develop the framework for Software Engineering degree level BSc (Hons) apprenticeship in London and suburb, which aims to deliver degrees through employment to those who may not have been able to follow a traditional route into higher education.
We are actively involved in delivering IT training in the Hackney Borough in partnership with nonprofit organisations.Equal opportunity
Equal opportunity
We also conduct anonymous survey to comprehend the wellbeing through questioners where results of these surveys are monitored and measured annually.
Our main focus is in these areas: age; disability; race; religion; Women in Technology.Wellbeing
Wellbeing
Our HR practices are designed to support employees and protect those who may have care responsibilities or health issues that may leave them vulnerable to unemployment. We have flexible start and finishing hours, hybrid working for the vast majority of roles, wheelchair access throughout our offices, work station assessments and remote working opportunities available prior to and post the pandemic.
We have a slogan “Speak Out” encourage our team to speak openly about mental health issues, to allow us to provide both and external support, which we hope will reduce the risk of escalating mental health concerns.
Pricing
- Price
- £600 to £1,200 a unit a day
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Further detail will be provided during consultation with our sales team.