SEARCHABILITY (NS&D) LIMITED
Searchability NS&D Hosting
We provide technically qualified resource, resource augmentation and SoW across a range of Service offerings.
Features
- Technical Resource
- Technical Resource Augmentation
- SoW
- Outcomes and Deliverables
- Resource Management
Benefits
- Reduce time to mobilise
- Cost efficiency of resource
- Well run management of resource
- Guarantee of resource
- Continuity of service
Pricing
£450 to £1,200 a unit a day
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at will.roebuck@searchability.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
9 6 7 8 8 9 5 5 4 7 2 4 9 2 2
Contact
SEARCHABILITY (NS&D) LIMITED
William Roebuck
Telephone: 01172840050
Email: will.roebuck@searchability.co.uk
Service scope
- Service constraints
- None, we can provide resource around the clock and have fall back plans in place.
- System requirements
- None
User support
- Email or online ticketing support
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- We provide technically qualified resource, resource augmentation and SoW across a range of Service offerings. This can include all levels of support engineers and analysts as well as technical account mangers and support managers.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Onsite training, online training, launch calls, regular scheduled meetings, account manager who is available 24/7.
- Service documentation
- No
- End-of-contract data extraction
- All data belongs to the government body in question and we hand over all data.
- End-of-contract process
- We hand over all data and capabilities supplied.
Using the service
- Web browser interface
- No
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- No
- Independence of resources
- The service would prioritise G-cloud and all other work would contractually become secondary.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- Never
- Protecting data at rest
- Other
- Other data at rest protection approach
- Resource works to buying body's Protection of data at rest policy
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- No
Data-in-transit protection
- Data protection between buyer and supplier networks
- Other
- Other protection between networks
- Work on government bodies network
- Data protection within supplier network
- Other
- Other protection within supplier network
- Resource works to buying body's data protection protocols.
Availability and resilience
- Guaranteed availability
- Account mangers are available 24/7 and individual resources availability is on a case by case basis.
- Approach to resilience
- Our resources typically work on buying body's datacentre.
- Outage reporting
- Email alerts
Identity and authentication
- User authentication
- 2-factor authentication
- Access restrictions in management interfaces and support channels
- Our resources work to the buying body's Access restrictions in management interfaces and support channels
- Access restriction testing frequency
- Never
- Management access authentication
- 2-factor authentication
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Dedicated device on a government network (for example PSN)
- Dedicated device over multiple services or networks
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- No
- Security governance certified
- No
- Security governance approach
- Our resources work to buying body's security governance procedures
- Information security policies and processes
- Our resources follow the buying body's security policies and processes.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Our resources work in agreement with the buying body's configuration and change management processes.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Our resources work to the buying body's vulnerability management process.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Our resources work to the buying body's protective monitoring processes
- Incident management type
- Supplier-defined controls
- Incident management approach
- Our resources work to the buying body's incident management processes.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Social Value
-
Social Value
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Tackling economic inequality
We have a Diversity & Inclusion and Equality policy as well as D&I officers who ensure economic equality and equal opportunities.Equal opportunity
We have a Diversity & Inclusion and Equality policy as well as D&I officers who ensure economic equality and equal opportunities.Wellbeing
We have monthly 'Third Thursdays' for all of our employees where on the third Thursday of every month, we host a range of well being workshops. These are delivered by third party professionals and range from mental health workshops to money, wealth management and debt advise and full body scans for physical healthchecks.
Pricing
- Price
- £450 to £1,200 a unit a day
- Discount for educational organisations
- No
- Free trial available
- No
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at will.roebuck@searchability.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.