Skip to main content

Help us improve the Digital Marketplace - send your feedback

SIDE8 LTD

Public Cloud Strategy and Enablement

Side8 provide strategic consultancy support, working with users to shape and deliver business objectives.

Features

  • Product strategy and roadmapping
  • Product Operating Model
  • Contemporary practices and patterns
  • Cloud Native expertise
  • Data product and strategy
  • Product Portfolio Management

Benefits

  • Ensure alignment across all levels of the organisation
  • Effectively manage and enable teams
  • Realise ROI within funding timeline

Pricing

£300 to £1,500 a unit

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at jp@side8.io. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

9 3 4 8 4 4 7 3 2 7 3 4 1 7 9

Contact

SIDE8 LTD JP Hamilton Savory
Telephone: 07815309971
Email: jp@side8.io

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
None
System requirements
N/A

User support

Email or online ticketing support
Email or online ticketing
Support response times
Consultancy support is available when needed and levels can be negotiated to meet user needs.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
For consultancy work we provide support as and when needed.

Further details can be provided as part of detailed quotations
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We work closely with users through a discovery phase.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
This will be discussed and agreed as part of the associated statement of work.
End-of-contract process
This will be discussed and agreed as part of the associated statement of work.

Using the service

Web browser interface
No
Application to install
No
Designed for use on mobile devices
No
Service interface
No
User support accessibility
None or don’t know
API
No
Customisation available
Yes
Description of customisation
Any consultancy services can be optimised to meet needs by discussion.

Scaling

Independence of resources
We ensure that we understand and resolve any possible conflicts prior to commencing work. When needed we can leverage an extended associate network.

Analytics

Service usage metrics
Yes
Metrics types
These would be agreed as part of the SOW and contract.
Reporting types
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
This will be discussed and agreed as part of the associated statement of work.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • JSON
  • XML
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • JSON
  • XML

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • IPsec or TLS VPN gateway
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
We will work within SLAs agreed with the user.
Approach to resilience
Available on request
Outage reporting
As agreed with the user and the required SLAs.

Identity and authentication

User authentication needed
No
Access restrictions in management interfaces and support channels
Two factor authentication of approved users on a case by case basis.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
GDPR
Information security policies and processes
Internally developed processes to comply with GDPR

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We utilise industry standard patterns and practices. Details are available on request.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We utilise industry standard patterns and practices. Details are available on request.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We utilise industry standard patterns and practices. Details are available on request.
Incident management type
Supplier-defined controls
Incident management approach
We utilise industry standard patterns and practices. Details are available on request.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

We encourage and support flexible working practices and ensure that both asynchronous and remote working practices are available to users and those within our organisation.

Where possible we operate a remote first policy to reduce the impact of commuting/travel.

Covid-19 recovery

We encourage and support flexible working practices and ensure that both asynchronous and remote working practices are available to users and those within our organisation.

Tackling economic inequality

We have provided employment opportunities for those who face barriers/challenges to employment and/or who are located in deprived areas.

Equal opportunity

We actively support and encourage those who are under represented within the technology/digital sector.

Wellbeing

We ensure that those within our network are able to openly discuss/share any challenges they are facing. We operate a "no questions asked" policy when it comes to people requiring time off in order to improve their wellbeing.

Pricing

Price
£300 to £1,500 a unit
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at jp@side8.io. Tell them what format you need. It will help if you say what assistive technology you use.