Agile Software Engineering
Endava help you deliver effective, high-quality software, predictably, using modern software development processes, practices and tools. Our engineering-led approach means that our software is well-built and forms a solid, sustainable base for the success of your business.
Features
- Application Architecture
- Cross-functional scrum teams including Quality Assurance
- Distributed Agile development methodology from nearshore delivery centres
- Continuous Integration and Deployment
- Secure SDLC
- Rroven TEAM and TEAS methods for running large software projects
- International, engineering-oriented culture
Benefits
- Focus on delivery value early
Pricing
£320 to £1,300 a unit a day
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 8 6 4 2 6 9 6 0 3 5 0 5 4 4
Contact
Endava (UK) Limited
Jelena Jecmenic
Telephone: +38651360032
Email: jelena.jecmenic@endava.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Product Strategy, Digital Design
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- None.
- System requirements
- No system requirements
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Support is tailored to specific services, and can be close to real-time.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- We can provide up to third line support, although we try to fix as many issues as possible at the point of first contact.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We begin the process with a short Discovery phase to engage with the business users, to fully understand what the problem is that we are trying to solve.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- Other
- Other documentation formats
-
- Confluence
- Sharepoint
- Architecture tools like Sparx EA and client tools
- End-of-contract data extraction
- All data is sole property of the customer and can be retrieved at any time.
- End-of-contract process
- We will make the contract work for the customer and be clear about the scope of services.
Using the service
- Web browser interface
- No
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Our services are interface agnostic.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AAA
- API
- Yes
- What users can and can't do using the API
- We usually build our solutions with an API, and make the API as comprehensive as possible.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Our digital product offerings are often bespoke, and thereby fully customisable.
Scaling
- Independence of resources
- This is not usually a problem in our product strategy engagements.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We design the usage metrics depending on the application. We will have a specific workshop to discuss the relevant metrics.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Other
- Other data at rest protection approach
- We will use whichever standard is relevant for a digital product strategy engagement.
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- We will design an export function in the most suitable format.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
- Any bespoke format relevant for the application.
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
- Any format that is relevant for the application.
Data-in-transit protection
- Data protection between buyer and supplier networks
- Other
- Other protection between networks
- We will use whichever standard is relevant for a digital product strategy engagement.
- Data protection within supplier network
- Other
- Other protection within supplier network
- We will use whichever standard is relevant for a digital product strategy engagement.
Availability and resilience
- Guaranteed availability
- We will use whichever SLA is relevant for a digital product strategy engagement.
- Approach to resilience
- We will use whichever level of resilience is relevant for a digital product strategy engagement.
- Outage reporting
- This is not usually relevant for a digital product strategy engagement.
Identity and authentication
- User authentication needed
- No
- Access restrictions in management interfaces and support channels
- Authentication will depend on the specific digital product.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- SRAC as an IQNET Partner
- ISO/IEC 27001 accreditation date
- 04/10/2019
- What the ISO/IEC 27001 doesn’t cover
- None
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- ISO 22301 certification
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- The Information Security function is under the direction of the Chief Information Security Officer, who reports to the Chief Information Officer. The Cyber Security department develops policies and standards for the company’s operations which are ratified by the Controls and Policies Committee. All employees are required to affirm their understanding of and compliance with security policies at on boarding and on an annual basis. A variety of technical controls are in place to enforce policy compliance; other policies are directive controls. Violation of information security policies is treated as a severe infraction and can lead to disciplinary action or termination.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
For Fixed Price contract deliveries – after the change is agreed and signed-off, there may be a contract modification required, depending on the terms of the contract.
For Time & Materials contract deliveries – the adjustment may be contained within the budget-holder’s remit but it is possible that a variation note is required for T&M work. - Vulnerability management type
- Undisclosed
- Vulnerability management approach
-
The vulnerability management process should follow the following journey:
1. Vulnerabilities assessment
2. Triage vulnerabilities
3. Prioritise vulnerabilities
4. Action on the treatment strategy (patch, fix, compensate etc)
5. Validate the security control - Protective monitoring type
- Undisclosed
- Protective monitoring approach
- The four golden signals of monitoring are latency, traffic, errors and saturation. We follow Google’s SRE (Site Reliability Engineering) teams best practice for protective monitoring. The protective monitoring approach will often be defined in the product strategy.
- Incident management type
- Undisclosed
- Incident management approach
- The incident management process will often be defined in the product strategy.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
On climate change We identify aspects of our business that impact the environment and comply with all relevant legislation and regulatory controls in each of our locations. We consume material goods in moderation, extend the lifecycle of our IT equipment, and thoughtfully manage and reduce waste. We also play our part in tackling broader environmental issues by supporting local community projects. Our Environmental Reporting Steering Committee is a management level body responsible for managing day-to-day activities related to Endava’s environmental performance and mitigating environment and climate-related risks. This committee meets on a monthly basis and discusses and signs off on processes, controls and strategy as well as on environmental reporting methodology. It is also responsible for providing regular updates to the Endava Board. The Committee includes senior management from across Endava, including the CFO, Group General Counsel and Head of ESG. Endava We Care (Sustainability Report) - https://www.endava.com/who-we-are/sustainability-at-endavaCovid-19 recovery
Endava’s people volunteer their time and expertise to local causes, bringing our values to life in practical ways. In response to COVID-19, they stepped up, including by helping local communities build health and safety digital solutions, creating 3D printed face mask components when personal protective equipment (PPE) was in short supply, and organising a global fundraising campaign to support hospitals and charities. Endava We Care (Sustainability Report) - https://www.endava.com/who-we-are/sustainability-at-endavaTackling economic inequality
As good corporate citizens, we are passionate about partnerships that support the communities where we live and work and the broader technology and services industry – it’s how we meaningfully bring our values to life. We are immensely proud of our social impact work over the past two decades – especially in our Central European locations, where we have supported local growth by providing sustainable career opportunities and joined local community projects. Endava We Care (Sustainability Report) - https://www.endava.com/who-we-are/sustainability-at-endavaEqual opportunity
Endava is a place where we can all be authentic and inspired and collaborate across boundaries as part of highly effective teams. Our aim is to create a working environment that offers both equality and equity of career opportunity based on merit, powered by development opportunities such as the Endava University learning platform, Pass It On sessions, and regular employee engagement by our CEO and senior leaders. Endava We Care (Sustainability Report) - https://www.endava.com/who-we-are/sustainability-at-endavaWellbeing
To enable our people to grow and stay connected, we introduced Endava Wellbeing in 2020. The programme brings together a wealth of tools and resources organised around four key pillars – Mind, Body, Home and Community. The programme encourages exploration of the mechanics of the Mind, discovering the most critical steps in taking care of the Body, examining the need for digital detoxing at Home and learning about the important role Community plays in having a sense of belonging. Endava We Care (Sustainability Report) - https://www.endava.com/who-we-are/sustainability-at-endava
Pricing
- Price
- £320 to £1,300 a unit a day
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- We can run an idea workshop at no cost. This is around 2 days of preparation, a day for the workshop, and a day to write up the notes.