Cloud hosted web applications design and development
We offer specialized cloud hosting services tailored for the design and development of web applications.Employing Agile methodologies,we deliver a comprehensive suite of services including hosting,discovery, analysis,design,development,support,and maintenance for cloud and web-based solutions.As a Microsoft partner, we excel in Microsoft .NET Core (MVC,C#), web services,XML,XSLT,HTML5,React,Angular, JavaScript,JQuery,AJAX,SQL,SharePoint,Umbraco, zure,full-stack Java, AI, ML,and more
Features
- Hosting, development, support, and maintenance for secure cloud web apps
- Configuration, development, and integration of SQL Cloud database.
- Responsive UX design with flexible reporting and business intelligence
- Secure data exchange with automated data validation processes.
- Integration with social media and mobile web applications.
- Utilizing Azure services like App Service and Functions.
- Azure Cloud App Service and API for secure authorization
- Mapping solutions including Leaflet, ESRI, Google, and Bing
Benefits
- Alignment with GOV.UK Open Standards, Government Digital Service Standard
- Compliance with WCAG 2.1 and W3C accessibility standards.
- Integration of systems including CRM, MS Dynamics, Office, SharePoint.
- Hosted on Microsoft Azure, Office365, Rackspace Cloud, Amazon Web Services.
- Cost-effective rapid delivery through reusable open-source component
- Utilization of Agile Scrum and PRINCE2 methodologies
- Collaborative design, delivery, and implementation using Azure DevOps
- Specialization in education, data capture, validation, reporting, search systems.
- Web applications developed following OWASP recommendations for configuration and security
Pricing
£300 a unit
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 0 4 5 4 7 4 7 6 3 7 7 7 7 9
Contact
KJR Software Services Ltd
Purnachander Rao Kode
Telephone: 07545291687
Email: pcrao@kjrsoftwareservices.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Depends on requirement
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- While we typically don't anticipate constraints, we'll assess each requirement individually and we'll thoroughly analyze
- System requirements
- Depends on client needs
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We provide 24x7 Email or ticketing support.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
- Target response/resolution times depend on the priority level of the request are as follows Target response times: • High – 1 hour* • Medium – 4 hours • Low – 8 hours • Enquiries – 45 hours Target resolution times: • High – 8hours • Medium – 18 hours • Low – 45 hours • Enquiries – 72 hours note: *hour = working hour
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Request details on user training programs, documentation, and support resources provided to facilitate a smooth transition. Ask for specifics on personalized assistance, tutorials, and any other initiatives aimed at helping users quickly and effectively utilize the service
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- The data is fully available at all times. After the customer has extracted the data, we will ensure that the disks are wiped securely
- End-of-contract process
- After the customer has extracted their data, we will ensure that the disks are wiped securely.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Not all features are available on mobile devices. Some features are limited.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- Facilitates seamless integration, allowing disparate systems to exchange data and functionality effectively while maintaining independence and scalability
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- Interface testing with users of assistive technology involves evaluating accessibility features like screen readers and alternative input methods. It ensures digital interfaces are navigable and usable for individuals with disabilities, gathering feedback to enhance accessibility and user experience, ultimately promoting inclusivity and compliance with accessibility standards
- API
- Yes
- What users can and can't do using the API
- Most of the tools in the solution like JIRA, Conflunce, etc. provide an API that provides most functionality available through the web interface
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Additional products can be configured on request. Many of the tools in the solution offer the possibility to install add-ons without any support involvement
Scaling
- Independence of resources
- This is handled by the underlying cloud provider
Analytics
- Service usage metrics
- Yes
- Metrics types
- Some of the tools provide user access metrics. We can supply infrastructure metrics on request
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
- Other
- Other data at rest protection approach
- Data isolation is handled by the underlying cloud provider. On customer request we can provide volume encryption.
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Data can be exported via the web interface or via command line tools, depending upon the product within the solution
- Data export formats
-
- CSV
- Other
- Other data export formats
- Json
- Data import formats
-
- CSV
- Other
- Other data import formats
- Json
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- 99.99%
- Approach to resilience
- Handled by the underlying cloud provider.
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Handled by the underlying cloud provider
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We are working towards attaining ISO27001
- Information security policies and processes
- We are working towards attaining ISO27001 and ISO9001
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- ITIL compliant
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Regular scans and Intrusion tests
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- We use standard IDS mechanisms any compromise found would be reported to the customer immediately.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- We maintain a defined process for handling outages, keeping clients informed through agreed-upon methods. Outage reports are then finalized within 24 hours of resolution and distributed
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
We prioritize remote work wherever feasible, minimizing in-person meetings and transportation to combat climate change. This approach reflects our commitment to reducing carbon emissions and promoting environmentally sustainable practicesCovid-19 recovery
We honor the preferences of our employees and clients, prioritizing measures to minimize direct contact and office attendance, thereby reducing the risk of exposure to Covid-19.Tackling economic inequality
our organizations tackle economic inequality of our employees through various strategies like implementing fair wage policies, offering equitable benefits and opportunities for advancement, providing financial literacy programs, and fostering inclusive workplace cultures. By addressing disparities in compensation and access to resources, companies promote greater financial stability and equality among their workforceEqual opportunity
Our organizations promoting equal opportunity strive to eliminate discrimination based on factors like race, gender, or socioeconomic status. we offer fair hiring practices and inclusive policies to create environments where everyone has a chance to succeed based on merit and ability, fostering diversity and innovationWellbeing
We prioritize employee wellbeing by offering health and wellness programs, flexible work arrangements, mental health support, and a positive work environment. we promote work-life balance, encourage open communication, and provide resources for stress management and personal development, fostering a culture of care and resilience among employees
Pricing
- Price
- £300 a unit
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- We are always happy to provide prototypes