Microsoft .Net Core Open Source Custom Development (Azure IaaS, PaaS, SaaS)
Bridgeall builds custom software solutions for organisations. We use Microsoft .Net core, utilising open source and hosted on Azure.
Bridgeall was founded on our ability to build market critical solutions with minimum bugs using .Net. Bridgeall has a long history of developing custom applications in .Net our customers.
Features
- Custom development in the cloud with .Net
- Utilising the best IaaS or PaaS development platforms
- Incorporating class leading test driven development approaches
- Open Source solutions to save custom development time and budget
- User driven design and testing approach with .Net
- Custom development on Microsoft Azure with .Net
- UK .Net development team
- ISO9001
- ISO27001
- Agile, Waterfall, Prince2 approach to .Net
Benefits
- Highest quality custom development approach
- Reduced support and bug fixes required
- Fully scalable solution with .Net via Microsoft Azure
- Local .Net development resources
- Leading Microsoft Gold partner
- Market leading application development platform via .NET core
- UK .Net Development team
Pricing
£450 to £1,650 a unit a year
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 2 6 0 3 3 0 5 9 6 7 3 9 8 2
Contact
Bridgeall Limited
Andrew Hart
Telephone: 01412126400
Email: tenders@bridgeall.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- None
- System requirements
- Microsoft Azure Cloud IaaS, PaaS, SaaS
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 15 mins
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- Microsoft Teams & Skype have been developed to meet accessibility standards.
- Onsite support
- Yes, at extra cost
- Support levels
-
Azure services are available 24 x 7
99.9% availability
Our SLA’s can be tailored and agreed to customer requirements, and flexed on a daily bases, as business requirements dictate - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Tailored to customer’s requirements
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Tailored to customer’s requirements
- End-of-contract process
- Tailored to customer’s requirements
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- None
- Service interface
- No
- User support accessibility
- WCAG 2.1 AAA
- API
- Yes
- What users can and can't do using the API
- Users can use the API for the transfer of data and integration to other products
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Subject to customer business requirements and contract discussion
Scaling
- Independence of resources
- Backed by Microsoft's Investment and SLA's
Analytics
- Service usage metrics
- Yes
- Metrics types
- SSRS or PowerBI
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Microsoft Azure Managed Services, Consultancy and our own Software IPR
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Tailored to customer’s requirements
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Bonded fibre optic connections
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- 99.99
- Approach to resilience
- Failover Data Centres - 3 across the UK.
- Outage reporting
- Public dashboard, API, email alerts, SMS
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Active Directory Services and Azure AD Connect
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- QEC
- ISO/IEC 27001 accreditation date
- 10 May 2021
- What the ISO/IEC 27001 doesn’t cover
- NA
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- ISO 9001
- Subject to the Return on Investement model ROI
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- ISO/IEC 27001
- Information security policies and processes
- ISO27001 and Cyber Security
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
The CMDB data is maintained by leveraging the request and change management processes, dedicated modules in the Service Desk suite, which are fully integrated into the CMDB. There is a dedicated change management module within the Bridgeall Service Desk, integrated with the configuration, knowledge base, incident and service request modules. The process provides the following core activities through the ITILV3 Service Desk:
• Initiate change request
• Validate change request including security
• Assess and plan change (operational)
• Approve change implementation
• Execute and complete change
• Status reporting
• Review post implementation and close change. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Follow the ITIL process for Vulnerability Management processes, as well as applying our Quality ISO9001 and Security ISO27001 processes. Bridgeall will coordinate and perform regular IT health checks and audits, that provide the interface for vulnerability management. The process shall provide the following core activities:
• Preparation
• Vulnerability scan
• Define remediating actions
• Implement remediating actions
• Rescan
We utilise several proprietary tools provided by Nessus, Qualys and Verisign and work with CREST approved NCC Group. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Environments are monitored extensively for both the application and infrastructure covering system availability, performance and automated system jobs.
Automatic monitoring is conducted at regular intervals depending. Alerts are raised by email with customisable multi-user notification escalations available.
Critical Alerts
• Ping/Port Availability Checks
• HTTP on all sites
• SMTP Service Check
• Database Service Check
• URL Availability Check
Trend Alerts
• CPU Usage
• Memory Usage
• Storage Capacity
• Disk I/O
• Disk Read/Write Times
URL Response/Wait Times - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Our ITIL V3 Service Desk manages incidents and escalations until resolution. The Service Desk acts as the end user single point of contact for incident restoration, including requests for information and issues. The Service Desk monitors outstanding trouble tickets or records until they are resolved.
We provide the following activities:
Detection and recording
Classification and initial support
Investigation and diagnosis
Resolution and recovery
Tracking and communication.
Major Incident Process:
Follow procedures
Communication
Defines incident severities,
Escalations
Roles and responsibilities - internal and external organisations
Review process and issue a report - actions taken, lessons learned.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- Public Services Network (PSN)
- NHS Network (N3)
- Scottish Wide Area Network (SWAN)
- Health and Social Care Network (HSCN)
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Wellbeing
Fighting climate change
Bridgeall is committed to achieving net zero CO2e emissions. We have appropriate steps to measure our CO2 emissions and take into consideration changing business circumstances, an evolving supplier landscape and flexible employee working habits to refine emissions figures and targets on an ongoing basis. We regularly review and, when necessary, update carbon reduction and environmental initiatives to continue progress towards net zero. We are committed to monitoring and reducing our environmental impact through measures like reducing energy use at our premises and for business travel, reusing and recycling materials, and considering environmental factors when purchasing. Our office segregates waste for recycling through William Tracey Group. We also comply with the ISO14001 standard for environmental management systems.
Our senior management team regularly meet to discuss targets for reducing energy consumption and our carbon footprint in delivery. Our staff primarily work from home, reducing commuting impact by 60% compared to pre-Covid. We encourage public transport for client site visits.
Through our waste partner, we fully recycle redundant hardware per best practice from Zero Waste Scotland and SEPA. We utilise specialist recycling to collect and process IT waste compliantly with WEEE regulations. Hard drives undergo secure NSA-approved destruction or UK government NCSC certified data erasure.
Our use of cloud computing provides significant energy savings through reduced hardware needs. We have extended server lifespans by repurposing older models, reducing new server purchases by 80% over 3 years. Virtualised Cloud/Virtual Desktop PCs will extend desktop/laptop lifespans also.Wellbeing
Bridgeall firmly believes in supporting the health and wellbeing of our employees and the wider community. We have robust policies and initiatives in place to promote physical, mental, and emotional wellness.
Our comprehensive health and wellbeing policies encompass various aspects such as mental health support, stress management, work-life balance, and access to resources. These policies undergo regular reviews to align with best practices and evolving needs. We actively promote a culture of openness and support through regular communications highlighting available resources, wellness events, relaxation techniques, and tips for maintaining a healthy work-life balance.
Mental health is a key priority for Bridgeall. We have a dedicated intranet site serving as a central hub for mental health resources, information, and support services. Employees can access articles, guidance, and tools to enhance their mental wellbeing. Additionally, some select staff are trained Mental Health First Aiders who can provide a confidential listening ear and suggest appropriate support options when needed.
Bridgeall encourages a healthy work-life balance through flexible work arrangements, enabling employees to strike an equilibrium between professional commitments and personal lives. We conduct training and awareness programmes to equip our team with knowledge and strategies for self-care and overall wellbeing.
Extending our commitment beyond our workforce, Bridgeall actively supports community engagement and integration. Our approach is flexible and responsive, supporting community-led initiatives that align with our values and objectives.
Bridgeall believes in continuous improvement and collaboration. We are dedicated to sharing our experiences, evaluating outcomes, identifying areas of success, and exploring opportunities to grow and enhance our health and wellbeing initiatives for the greatest impact on the communities we serve.
Pricing
- Price
- £450 to £1,650 a unit a year
- Discount for educational organisations
- Yes
- Free trial available
- No