Kentico 13 Development
We help client understand and analyse their business problems and develop CMS solutions using Kentico 13.
We also support clients in their journey of migration of old Kentico solutions to Kentico 13
Features
- real-time reporting
- web access
Benefits
- Quick to configure
Pricing
£600 to £900 a person a day
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 0 8 1 0 7 3 8 5 4 1 7 3 4 8
Contact
Quantum Byte Technologies Limited
Yatish Ram
Telephone: 07943408694
Email: Yatish.kumar@gmail.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- No
- System requirements
- Pay per seat
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- Depends on service agreement. Option s for 1 hour turnaround available . Basic package involves an answer in 1 working day.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- Using third party integration. Over shelf products available as part of popular ticketing software.
- Onsite support
- Onsite support
- Support levels
-
2 Levels
On phone and by email for reporting issues
If can't be resolved then second level technical support gets involved - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Onsite training, online training, or user documentation
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
- Data can be exported in csv format
- End-of-contract process
- Service account will be active after the end of contract, but functionality will be limited to exporting the data only.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- NA
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AAA
- Description of service interface
- Web APIs available to interface with service
- Accessibility standards
- None or don’t know
- Description of accessibility
- NA
- Accessibility testing
- NA
- API
- Yes
- What users can and can't do using the API
- Available over web, REST operations available
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Services can be customised on user requirements. Customization is done by development team.
Scaling
- Independence of resources
- Service is hosted in cloud, and can scale as and when needed. Performance based matric are used to dynamically scale the service. So as soon as the load goes up, resources are increased.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Data usage
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Go to admin section and click on export to csv format,
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- SLAs are guaranteed by cloud provider
- Approach to resilience
- It's hosted on enterprise cloud and are fail safe with automatic fail over mechanism
- Outage reporting
-
A public dashboard
an API
email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Using set of defined roles and logging every access
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We follow all data security guidelines and measures
- Information security policies and processes
- As mentioned by data protection act. Regularly audited by external auditors.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Using enterprise cloud hosted source control
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Regular audit of service and testing
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Defined internal process
- Incident management type
- Supplier-defined controls
- Incident management approach
- Defined internal process
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Be energy efficient. Avoid paper wastage. Allow remote working to avoid unnecessary travelsCovid-19 recovery
Considerate towards employees when they are sick and need supportTackling economic inequality
Ensuring fair treatment and payments for every employee. Making sure every one is paid fairly.Equal opportunity
Provide everyone with equal opportunity for every employee. No one should feel left out.Wellbeing
Considerate towards employees and making sure they are looked after
Pricing
- Price
- £600 to £900 a person a day
- Discount for educational organisations
- Yes
- Free trial available
- No