Simply Zesty Limited

Umbraco Web Content Management System

Umbraco hosted on Tibus ISO27001 G-Cloud platform. The Umbraco Open Source solution is a fully extensible CMS and E-commerce platform providing: Web content Management; E-commerce; Online Communities; Intranet & Collaboration; Platform for web development and Integration 99.999% availability guarantee.

Features

  • Secure Fully Managed Umbraco CMS Platform
  • 24x7x365 monitoring, alerting and proactive support
  • ISO27001 (IL2/IL3 equivalent)
  • Data back ups
  • Disaster Recovery & Business Continuity options

Benefits

  • Easy to use out of box functionality
  • Fast website deployment
  • Update content quickly
  • Manage Your Website from Any Computer
  • Self-contained system no HTML editing software required
  • Secure Platform that can scale as required

Pricing

£5,950 to £100,000 a unit

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at rfp@simplyzesty.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

9 4 3 5 7 4 6 0 8 5 3 9 8 0 1

Contact

Simply Zesty Limited Louise Forbes
Telephone: 02890334044
Email: rfp@simplyzesty.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Website design, development and support services
Cloud deployment model
Private cloud
Service constraints
None
System requirements
Internet Access

User support

Email or online ticketing support
Email or online ticketing
Support response times
See Terms & Conditions
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Clients have access to the Service Desk and a dedicated cloud support engineer as standard from 0800 - 1800 normal working days.
Email access to support desk is available 24x7x365.
Service is proactively monitored 24x7x365.
Out of normal business hours emergency telephone support is an additional cost of £100/MONTH.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Onsite training and user documentation available.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
As part of our Exit Management process we will provide a snapshot of the latest data once contract ends
End-of-contract process
Umbraco Cloud Software Templates.

Additional services:
Technical Design
Project Management
Service Design
Configuration and Support
Application Support
Programmer
UX User Consultancy
Migration Services

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • MacOS
  • Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
None
Service interface
No
User support accessibility
WCAG 2.1 A
API
Yes
What users can and can't do using the API
Umbraco has a choice of modules that act as an API to integrate with different applications. Additionally we can provide custom code integration.
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Users can use Umbraco to customise web pages, functionality and content.

Scaling

Independence of resources
Each instance is dedicated specifically for the client. As part of our Capacity Management process we will upgrade infrastructure as we approach 70% of overall resource.

Analytics

Service usage metrics
Yes
Metrics types
We monitor the performance metrics of key hardware, operating systems, databases and application software. We will respond to any detected issues and report them immediately to the Client. Real time monitoring is available to the Client.
Reporting types
Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Data is exported as either an XML or CSV File
Data export formats
  • CSV
  • Other
Other data export formats
XML
Data import formats
  • CSV
  • Other
Other data import formats
XML

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
We provide a 99.999% availability supported by service credits. If unavailable for over 0.001% time within a month, upon the Customer's request, we will credit the Customer's account the pro-rated cost for one-day's charges for each hour of unavailability, up to a maximum of 1 week’s charges within any one month. For the purpose of this Service Availability Commitment Remedy, a Week shall mean the period from 12:00:01 AM Monday, until 12:00:00 AM the following Sunday.
Approach to resilience
Cloud and hosting services are delivered from our Tier 3 and 4 ISO 27001 accredited datacenters. All datacenters operate to ISO27001, ISO22301, ISO 50001, ISO9001, ISO 14001, OHAS 18001, PCI DSS standards and are audited and operated to the EU Code of Conduct’s best practice for datacenters. VESDA detection technology is installed and all infrastructure monitored 24x7x365 by the Network Operations Centre (NOC). There are dual 10G connections between each of our datacentres for resilience and we peer with 5 different Tier 1 telecoms to provide for the best connectivity and internet routes worldwide. In addition we are a member of INEX, LINX and LONAP for further capacity and resilience. There are no single points of failure, with redundancy built in at every layer of the load balanced platform, as well as within the core.

Tibus can facilitate any frequency of backups e.g. hourly, daily or anything in between. All data, including server configuration, application data and configuration, is backed up on minimum a daily basis, and retained for a minimum of 30 days.
Outage reporting
Email Alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Our Access Control Policy ensure that the principles of ‘least privilege’ and ‘need to know’ are applied consistently across the management of authorised access to information assets including management interfaces and support channels.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Certification Europe
ISO/IEC 27001 accreditation date
14/01/2015
What the ISO/IEC 27001 doesn’t cover
All hosting and cloud infrastructure business processes are covered by ISO27001.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Secure Engineering Principles
Supplier Assurance
Training and Awareness
Information Security Metrics & KPIs
Remote Working
Removeable Media
Security Education and Awareness
Access Control Policy
Accounting and Audit
Anti Malware
Operating System Hardening
Business Security Continuity Management
Business Security Continuation Plan
Change Management Policy
Cryptography Policy
Customer Access Management
Email Usage
Forensic Readiness
IA Policy
Incident Identification Reporting and Management
Information Classification
Information Security in Project Management
Information System Backup
Information Transfer
Internal Audit
IT Account Management - Users
IT Account Policy – Administrator
Mobile Device and Telephony
Network Security
Patch Management
Physical and Environmental Controls
Secure Information Asset Disposal
Virtual Private Network
Document Control
Employee Arrivals
Employee Exit
Employee Movers
Security Operating Procedures
Corrective Action

There is a IT Security Working group chaired by the SIRO and including ITSO, Change Managers, Systems Manager. Reporting structure is available as an Organisational Chart detailing ISMS.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We have a bespoke change management tool to enable all change requests to be logged, tracked, approved/rejected and reported on. The change management process includes:
• Documented Change Requests;
• Identification, prioritisation and initiation of change;
• Proper authorisation of change;
• Requirements analysis;
• Inter-dependency and compliance analysis;
• Business Impact Assessment;
• Change approach;
• Change testing;
• UAT and approval;
• Implementation, release planning and roll back procedures;
• Documentation;
• Change monitoring;
• Defined responsibilities of all users and IT personnel;
• Emergency change parameters.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Patch management is part of our ISO27001 ISMS.To assist the System Manager, there are a number of resources available for monitoring the status of vulnerabilities and patches including vendor/3rd party websites, mailing lists, vulnerability databases, Network management tools to scan for vulnerabilities on computers, provide information regarding needed patches and other software updates on those computers. Patch deployment should be conducted under direction of the Change Manager. They must be applied in a structured and methodical way, based on a determination of priority and within pragmatic timeframes: Emergency 24 hours, High priority 7 days, Medium within 30 days.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Systems are in place to alert NOC to potential issues as soon as they develop. The G Cloud platform sits behind perimeter enterprise-class, redundant core routers, firewalls and intrusion prevention systems. This includes Syslog, Netflow use of MD5 passwords. Perimeter firewalls are configured with ports locked down. Other ports are locked down to individual fixed IP addresses. Cisco IPS provides for real-time traffic analysis and packet logging on our IP networks to perform protocol analysis, content searching/matching to detect buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting. Regular vulnerability assessments of core network are undertaken.
Incident management type
Supplier-defined controls
Incident management approach
We provide a consolidated incident management process. The primary objective of the process is to restore normal operation as soon as possible, in accordance with service levels. The Incident Manager responsibilities include:

o Ensuring that issues are accurately recorded and that investigation is undertaken in a timely manner;
o Agreeing an appropriate priority with impacted users;
o Communicating relevant information about the incident and resolution progress to impacted users;
o Ensuring that business and technical escalations are managed in line with agreed best practice and service level targets;
o Communicating, resolution and closure of the incident to impacted users.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Fighting climate change

Fighting climate change

Our parent company's Global Environmental Initiative (GEI), the comprehensive sustainability program, has been in place since our inception as a public company in 2013, as we recognized early the importance of having a robust environmental strategy. Our program’s three pillars are: • REDUCE our operational carbon footprint 60% by fiscal 2030, achieve net zero carbon emissions by fiscal 2050 and reach zero waste (90% or greater waste diversion from landfills and incinerators) across our major sites by fiscal 2025. • ENGAGE our customers, employees and suppliers on sustainability outcomes, and continue our partnerships with the Science Based Target Initiative (SBTi) and Carbon Disclosure Project (CDP). • SOURCE responsibly 100% of our globally purchased paper from certified sustainable forest sources by 2025, reduce our supply chain carbon emissions by 20% by 203
Covid-19 recovery

Covid-19 recovery

Throughout the Covid-19 Pandemic, there were no furloughs across the business with a fairly high level of key workers continuing to work on digital projects. We ensured technology was deployed to all staff to work from home meaning as a recovery strategy we could facilitate a hybrid working model. We do regular Covid-19 recovery surveys on ideal ways of working and also obtain feedback on staff's mental health. As part of the findings from the survey we put in place a number of mental health support tools so staff were supported if they felt isolated.
Tackling economic inequality

Tackling economic inequality

At News UK, we believe in the importance of creating an environment in which all of our employees can feel valued, included and empowered. In 2020, we set out our ambitions to create a pathway to 50/50/20. Across our workforce, our aim is to have a 50/50 gender split and 20% representation of ethnic minorities. As a media and digital organisation, it is vital that our workforce reflects the diversity of society as a whole and that our content appeals to wide and diverse audiences across the UK and Ireland. Overall we have made good progress in increasing the number of women in the organisation. In April 2021, when data for this report was gathered, the proportion of women overall at News UK had increased to 39%, from 36% in 2017. Today, it is at 40%. As we accelerated our efforts to attract young, diverse talent from a much broader pool into junior roles, 60% of the 50 apprentices we have hired in the past year are women. Women now make up 48% of the lower half of our organisation, measured by salary bracket. Our ambition is to retain and develop that talent, ensuring that diversity stays with the company through to senior levels.
Equal opportunity

Equal opportunity

Fostering an environment where all employees can feel valued, included and empowered to bring great ideas to the table is paramount at News UK. We are committed to cultivating diversity and broadening the opportunity for inclusion across our businesses. The company maintains a Corporate Diversity Statement, which describes our longstanding Diversity, Equity & Inclusion (DEI) objectives and efforts. Specifically, our efforts focus on: • Leading and managing inclusively — embracing different cultures, ethnicities, genders and sexual orientations. • Creating a work environment that fosters growth and advancement. • Engaging with our audiences in ways that reflect and respect their unique perspectives and experiences. Diversity is a key focus for all of our business units’ workforce-related efforts, from building teams to cultivating leaders, as we strive to ensure that News UK is a great fit for every employee. Our Board of Directors oversees our commitment to DEI, including through the annual assessment of progress towards our DEI objectives by the Nominating and Corporate Governance Committee.
Wellbeing

Wellbeing

We have a peer network of mental health first aiders and practitioners accessible to all staff, we have an employee assistance programme, private healthcare with care in mental health available to staff and weekly wellbeing surveys sent to staff which are then followed up on in a sensitive and confidential manner.

Pricing

Price
£5,950 to £100,000 a unit
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at rfp@simplyzesty.com. Tell them what format you need. It will help if you say what assistive technology you use.