Cloud Software Services
Infotel UK is an IT Consultancy based in Newcastle Upon Tyne with expertise in Java, DevOps, Testing, Data Science, AI & Machine Learning, Kafka, Event Driven Architecture, Cloud Based Solutions, Event Based Solutions, Web Development, Agile Methodologies and Project Management.
Features
- Incident management.
- IT Service Management, ITSM
- Data deletions
- Real-time reporting
- Maintenance and Support
- Software Development
- Kafka
- Event Based Architecture
- Event Based Solutions
- AI & Machine Learning
Benefits
- cloud hosted software as a service
- maintenance and support agreements available
- Kafka development expertise
- robust event based architecture design
- Event Based Solutions
- Cloud Based Solutions
- bespoke software solutions tailored to your requirements
- use AI to solve the most complicated use cases
- manage your data compliance
- anonymise and redact PII
Pricing
£200 a unit a day
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 1 3 1 6 9 8 0 1 3 5 4 5 7 3
Contact
Infotel UK
Mundeep Nayyar
Telephone: 0191 2708800
Email: mundeep.nayyar@infotel.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Hybrid cloud
- Service constraints
- Bespoke solutions dependent on customer needs/requirements means constraints would be discussed on a per-project basis.
- System requirements
- Bespoke solutions dependent on customer needs/requirements
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Bespoke solutions dependent on customer needs/requirements would change the support levels we'd offer. This can be discussed.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
- Bespoke solutions dependent on customer needs/requirements would change the support levels we'd offer. This can be discussed.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Bespoke solutions dependent on customer needs/requirements would entail learning groups, training days and/or initial support calls, etc.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Bespoke solutions dependent on customer needs/requirements would facilitate the extraction of data when a contract ends.
- End-of-contract process
- Bespoke solutions dependent on customer needs/requirements would change the pricing and terms of any contracts entered.
Using the service
- Web browser interface
- No
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- Bespoke solutions dependent on customer needs/requirements
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- No
- Customisation available
- No
Scaling
- Independence of resources
- Bespoke solutions dependent on customer needs/requirements would ensure the independence of resources is managed and offset against any other resource usage.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Performance metrics
- Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Bespoke solutions dependent on customer needs/requirements would alter the exporting of data in relation to the services/software being used.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- XML
- JSON
- Excel
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- XML
- JSON
- Excel
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- Bespoke solutions dependent on customer needs/requirements would dictate any SLAs put in place.
- Approach to resilience
- This information would be available on request.
- Outage reporting
- This could be done in any of the three listed or other ways, dependent on the needs of the customer and a predefined agreement as part of any project planning
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Bespoke solutions dependent on customer needs/requirements would define the levels of restriction to access for any system/software/application.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users receive audit information on a regular basis
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users receive audit information on a regular basis
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- AFNOR Certification
- ISO/IEC 27001 accreditation date
- 01/04/2019
- What the ISO/IEC 27001 doesn’t cover
- Not Applicable, Fully covered
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- This reporting structure can be changed/tailored to customer needs based on predefined agreements.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Bespoke solutions dependent on customer needs/requirements would mean this could be changed and discussed prior to any engagement with a customer.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Bespoke solutions dependent on customer needs/requirements would necessitate the level of management on this being discussed and agreed upon prior to customer engagement.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- This is done through various sanity checks and these can be tailored to a customer's preferred methods of working.
- Incident management type
- Undisclosed
- Incident management approach
- A generic manner for this is usually, discovery, report, plan, action, post-script report. This can be discussed and changed based on user/customer requirements for any contract/engagement.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Equal opportunity
Fighting climate change
Environment
With a strong commitment to environmental sustainability, the Infotel Group actively works towards reducing its energy footprint and minimizing carbon emissions. Operating in a world where environmental and digital transitions are in progress, we have implemented the Responsible Digital label, complementing our environmental management system based on the ISO 14001 standard. Through various initiatives, such as the development of a responsible purchasing policy and the analysis of product and service life cycles, we strive for greater efficiency and aim to meet the expectations of our stakeholders.
In line with our Corporate Social Responsibility (CSR) policy, the Infotel Group has received a Silver assessment and is actively pursuing the Gold level, reflecting our continuous efforts towards sustainability and responsible practices.
Digital Sobriety
As a key player in the digitalization and technical innovation market, the Infotel Group is deeply committed to promoting digital sobriety. We have demonstrated this commitment through our participation in the Planet Tech Care Manifesto and the adoption of Responsible Digital labelling. The integration of this responsible digital initiative into our company’s management system exemplifies its importance as a fundamental component of our comprehensive CSR policy.Equal opportunity
Social Policy
Infotel UK Consulting aligns with the aspirations of the Infotel Group. We are dedicated to fostering inclusive social policies that benefit all our employees. To gain a deeper understanding of our commitments pertaining to remuneration, quality of work-life, gender equality, Anti-slavery and human trafficking policy and our disability policy, we encourage you to explore the relevant sections in our company reports. These reports provide comprehensive insights into our initiatives and progress in these areas.
Digital Accessibility
The mission of digital accessibility is to ensure that individuals with disabilities can fully access and use online services, products, and functions. At Infotel Group, we are committed to promoting inclusivity and recognising the importance of accommodating diverse needs. As part of our disability policy, we recognise the necessity of having a website that complies with the RGAA digital accessibility standard. We are proud to announce that Infotel Group has achieved level 1 compliance with the RGAA for the design and development of our website and mobile applications, further emphasising our dedication to providing an accessible digital experience for all users.
Pricing
- Price
- £200 a unit a day
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- We can supply a proof of concept where required.