Public Cloud Strategy and Enablement
Side8 provide strategic consultancy support, working with users to shape and deliver business objectives.
Features
- Product strategy and roadmapping
- Product Operating Model
- Contemporary practices and patterns
- Cloud Native expertise
- Data product and strategy
- Product Portfolio Management
Benefits
- Ensure alignment across all levels of the organisation
- Effectively manage and enable teams
- Realise ROI within funding timeline
Pricing
£300 to £1,500 a unit
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at jp@side8.io.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
9 3 4 8 4 4 7 3 2 7 3 4 1 7 9
Contact
SIDE8 LTD
JP Hamilton Savory
Telephone: 07815309971
Email: jp@side8.io
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- None
- System requirements
- N/A
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Consultancy support is available when needed and levels can be negotiated to meet user needs.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
For consultancy work we provide support as and when needed.
Further details can be provided as part of detailed quotations - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We work closely with users through a discovery phase.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- This will be discussed and agreed as part of the associated statement of work.
- End-of-contract process
- This will be discussed and agreed as part of the associated statement of work.
Using the service
- Web browser interface
- No
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- Yes
- Description of customisation
- Any consultancy services can be optimised to meet needs by discussion.
Scaling
- Independence of resources
- We ensure that we understand and resolve any possible conflicts prior to commencing work. When needed we can leverage an extended associate network.
Analytics
- Service usage metrics
- Yes
- Metrics types
- These would be agreed as part of the SOW and contract.
- Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- This will be discussed and agreed as part of the associated statement of work.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- JSON
- XML
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- JSON
- XML
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- IPsec or TLS VPN gateway
- Data protection within supplier network
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- We will work within SLAs agreed with the user.
- Approach to resilience
- Available on request
- Outage reporting
- As agreed with the user and the required SLAs.
Identity and authentication
- User authentication needed
- No
- Access restrictions in management interfaces and support channels
- Two factor authentication of approved users on a case by case basis.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Limited access network (for example PSN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- GDPR
- Information security policies and processes
- Internally developed processes to comply with GDPR
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- We utilise industry standard patterns and practices. Details are available on request.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We utilise industry standard patterns and practices. Details are available on request.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We utilise industry standard patterns and practices. Details are available on request.
- Incident management type
- Supplier-defined controls
- Incident management approach
- We utilise industry standard patterns and practices. Details are available on request.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
We encourage and support flexible working practices and ensure that both asynchronous and remote working practices are available to users and those within our organisation.
Where possible we operate a remote first policy to reduce the impact of commuting/travel.Covid-19 recovery
We encourage and support flexible working practices and ensure that both asynchronous and remote working practices are available to users and those within our organisation.Tackling economic inequality
We have provided employment opportunities for those who face barriers/challenges to employment and/or who are located in deprived areas.Equal opportunity
We actively support and encourage those who are under represented within the technology/digital sector.Wellbeing
We ensure that those within our network are able to openly discuss/share any challenges they are facing. We operate a "no questions asked" policy when it comes to people requiring time off in order to improve their wellbeing.
Pricing
- Price
- £300 to £1,500 a unit
- Discount for educational organisations
- No
- Free trial available
- No
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at jp@side8.io.
Tell them what format you need. It will help if you say what assistive technology you use.