Cloud Software
Change is the only constant. It drives the need for digital transformation, rethinking how your business uses technology and processes to continuously evolve. We help businesses manage change and become more efficient by finding the right possibilities, using new and evolving technology to achieve digital transformation.
Features
- Digital Transformation
- Application Modernisation
- Software Project Rescue
- Dedicated Developer Resources
- Software Consultancy
- Cloud Consultancy
- Bespoke Software Development
- Web Development
- App Development
- Software Testing
Benefits
- We help businesses manage change and become more efficient
- Specialist software expertise on demand
- Improved user experiences
- Helping businesses evolve and grow using technology
- Experts across existing and new technologies
- Rescue failing projects and turn them into a success
Pricing
£100 a unit an hour
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 8 7 1 8 6 3 9 8 3 9 5 9 3 7
Contact
PROPEL TECH LTD
Wil Jones
Telephone: 01727 537627
Email: sales@propeltech.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- No
- System requirements
- We provide bespoke solutions so no system requirements
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Our basic SLA has a 2 hour response fix during working hours. Premium out of hours can be purchased as an extra cost.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Not sure as a 3rd party plug in
- Web chat accessibility testing
- None
- Onsite support
- Onsite support
- Support levels
- As we provide bespoke software we dont have a standard price. Variables for pricing include Technology, Support Hours, Location & System Age. We would provide a technical account manager and engineers on demand.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- We would typically go through an onboarding process so our staff can learn about the clients business and/or software.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Typically the data would reside with the client.
- End-of-contract process
- We can provide knoweledge handover for subsequent suppliers on a day rate basis.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The differences would depend on the bespoke requirements.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- No
- Customisation available
- Yes
- Description of customisation
- Everything within our service offering is bespoke.
Scaling
- Independence of resources
- The design of the cloud architecture would mitigate this.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Weekly/Monthly Status Reports
- Reporting types
- Regular reports
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Would depend on the service/bespoke software.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- Database Backups
- APIs
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- XML
- JSON
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Bonded fibre optic connections
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- 99.99% uptime
- Approach to resilience
- Each individual application would be a bespoke design.
- Outage reporting
-
An API
email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- We would normally work to the client's requirements.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- British Assessment Bureau
- ISO/IEC 27001 accreditation date
- 03/04/2023
- What the ISO/IEC 27001 doesn’t cover
-
Our scope is as written on our certificate “Provision of software development, designing innovative bespoke software services consultancy, application maintenance services worldwide”.
Everything else is outside of the scope and not covered.
We also have 27001:2017 and working towards 27001:2022. - ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- CE+
- Information security policies and processes
- Internally defined security policy and process.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Each client would dictate this on us.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Each client would dictate this on us.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Each client would dictate this on us.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Each client would dictate this on us.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
We can carbon offset cloud software to combat climate change.
Pricing
- Price
- £100 a unit an hour
- Discount for educational organisations
- No
- Free trial available
- No