Cloud CMS software
Gulp Digital will help you implement and support open source and enterprise content management systems (CMS) and platforms. Our experience spans a range of CMS platforms including Wordpress, Drupal, Umbraco, and Obtree, additionally we have headless CMS experience including, Contentful, Kentico, Strapi, Wagtail and Directus including custom CMS development work.
Features
- Custom content models; define/shape content based on needs
- Workflows/revision history; keep on top of changes and revisions
- Headless CMS options; content is reusable/untethered to the main
- Roles, groups and permissions; decide who get access
- Multi-language and internationisation support (e.g. English/Cymru)
- Global reach; content delivery network with global footprint
- Interoperable through APIs and connectors (CRM, Payments, GIS, etc)
- Encourages microservice architecture
Benefits
- Create and deliver content based on your users’ needs
- Content in one place; simple workflow integrates with websites/apps/social media
- Scalable service that delivers content through a well-considered user experience
- Easy content management at the core of your service
- Intuitive user interface and workflow for increased user efficiency
- Dedicated infrastructure with customisable networking ensures policy adherence and security
- Hosted on accredited global infrastructure, scalable for business goals/users needs
- Customisable infrastructure ensures policy adherence and security
Pricing
£3,600.00 an instance a year
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
9 3 2 9 5 7 5 2 5 1 8 3 7 4 5
Contact
Gulp Digital
Onkar Chiroma
Telephone: 0330 223 5582
Email: info@gulpdigital.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- N/A
- System requirements
- N/A
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Gulp Digital provides support and management for the service 09:00 to 17:00, Monday to Friday, excluding holidays.
Urgent support enquiries which are within Gulp Digital’s control that prevent system usage will be responded to within 24 hours and addressed immediately.
Non-urgent support enquiries which are within Gulp Digital’s control that do not prevent system usage, will be responded to within 48 hours and where appropriate added to the product backlog, prioritised and scheduled for resolution. - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- From proactive support services through to reactive emergency support, we can offer tailored support packages based on your needs. Our support costs are calculated based on our rate card, the type of support services your require, the support level you require and the systems / teams / infrastructure that require support. We can provide technical account managers, cloud support engineers and other support personnel including, content, design, development and delivery specialists.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Based on your user requirements and needs, we can provide onsite training, online training, or user documentation.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Database backups can be made available as well as static copies of the websites where practical.
- End-of-contract process
- Much like our onboarding process, we will work collaboratively with you as part of the data extraction process and handover.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Our CMS software is entirely mobile responsive and has been intended to work on mobile devices; however, some functionality may be reduced owing to device-specific limits.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- Yes
- What users can and can't do using the API
- Our CMS platform has API support out of the box, which may be expanded based on your needs. Managing users, groups, and roles; managing content; editing, updating, and publishing material are some examples.
- API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Infrastructure and scaling can be customised based on your needs.
Additionally, customisable networking is available and ensures policy adherence and security for your peace of mind.
Admin interfaces and user controls can be customised based on your needs.
Scaling
- Independence of resources
- We provide scalable resilience by hosting on market-leading global infrastructure that can scale based on business goals and users needs. Each instance is on dedicated infrastructure; therefore, external user demand does not impact on your service availability.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Based on the service needs, we can provide usage metrics and insights including, uptime, bandwidth and user numbers.
- Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Other
- Other data at rest protection approach
- Our platform is hosted on Microsoft, Azure or Amazon Web Services. As part of this, all data at rest is encrypted using keys and is physically secure/protected as part of Microsoft's and AWS' regulatory compliance.
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Database backups can be made available as well as static copies of the websites where practical.
- Data export formats
- Other
- Other data export formats
-
- Database backups
- Static website files (html)
- Data import formats
- Other
- Other data import formats
- Manually via UI
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Availability to be agreed based on customer requirements.
- Approach to resilience
- Our platform is designed for scalable resilience, hosted on Microsoft Azure and Amazon Web Services (AWS), which can be scaled based on business goals and users needs. The dedicated infrastructure offers customisable networking ensuring policy adherence and security.
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Username or password
- Access restrictions in management interfaces and support channels
- Access in management channels is restricted via fully-configurable roles and groups. Support channels are accessed directly via email, and are therefore validated and authenticated.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- Public key authentication (including by TLS client certificate)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- Cyber Essentials
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Cloud security is our highest priority. We use Microsoft and AWS infrastructure meaning our customers will benefit from a data centre and network architecture built to meet the requirements of the most security-sensitive organisations.
- Information security policies and processes
- Gulp Digital recognises how critical information security is for all clients, and public sector organisations in particular. We take information security seriously, and underpin our service delivery model with comprehensive internal information security policies and processes. Our policies dictate how we work with you and your data. Should you have a need to store sensitive data, our consultants will work with you to establish that the appropriate security mechanisms are in place.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Feature and patches deployment is underpinned by a robust source-controlled multi-environment development pipeline. Any changes will undergo rigorous testing and quality assurance prior to deployment.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We continuously monitor potential threats to our service via horizon- scanning for risks, as well as leveraging third-party vulnerability scanning tools. Following threat identification, we will apply fixes in a sanitised environment to ensure there is no degradation to service prior to patch release. We will endeavor to fix, patch and release immediately following issue identification.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We continuously monitor potential compromises to our service via horizon- scanning for risks, as well as leveraging third-party vulnerability scanning tools. Following threat identification, we will apply fixes in a sanitised environment to ensure there is no degradation to service prior to patch release. We will endeavor to fix, patch and release immediately following identification of potential compromise.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Users can report incidents via email or phone. Reported incidents trigger our defined incident management and escalation processes and procedures. Our process comprises the following steps: validate the incident, prioritise the incident and schedule incident mitigation. Regarding scheduling, the timescales of the mitigation process will be scaled up or down depending on the severity of the incident. Incident reports will be communicated via email.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Wellbeing
-
Wellbeing
We support wellbeing within our immediate workforce, our associate network, customer stakeholders, and third-party network. We promote flexible working and provide various tools to support this to ensure communication paths, collaboration and connectivity drive positive wellbeing in the workplace. We work openly with shared calendars to ensure colleagues have full visibility of availability to contact any of the Senior Leadership Team for either informal or formal catch ups on work or personal life chats. We have an open door policy to wellbeing and support and prioritise this, with all teams members being aware the Senior Leadership Team will always make time despite prior commitments. We regularly attend webinars and events to keep up to date with wellbeing practices, to keep wellbeing at the forefront of our work and to maintain our knowledge of health and wellbeing, both physical and mental. As an example, we recently participated in ACAS’s mental health at work webinar. We have open dialogue with all our colleagues to ascertain what support can help, whether that be reduced workload, change in hours or time off. We also discuss wider support, such as whether they have support at home, caring responsibilities, sought GP or medical advice. We also have weekly team lunches which are dedicated to connecting, catching up with each other and having some downtime. This allows us to check in on everyone in an informal setting. We also ensure there are regular planned catch-ups in place which address work and wellbeing. It also influences staff, suppliers, customers and communities through the delivery of the contract to support health and wellbeing, including physical and mental health. We also have mental health first aiders who work proactively to ensure mental wellbeing is supported throughout the organisation and projects.
Pricing
- Price
- £3,600.00 an instance a year
- Discount for educational organisations
- Yes
- Free trial available
- No