Information. Assured.

Contact Us

Concept definition and strategy development

When a client doesn't know where to start, we know what to ask.

We work with our clients to help them manage their information risks effectively. We collaborate to understand their data landscape, identifying where vulnerabilities exist and may exist in the future, the types of data assurance that are feasible and desirable according to the needs of their business, and the processes and protocols they need to put into place to ensure that any software solutions implemented don't operate in isolation.

Our project approach follows four key phases, that align with the Government Digital Service Manual

Discovery

A short phase to understand the needs of the service users, find out what should be measured and explore technological or policy-related constraints.

Cross domain solution implementation

Cross domain solutions are used by organisations that require the best possible protection against data loss, data theft, malware or ransomware attacks, and other security threats.

They represent a more resilient approach than traditional technologies such as firewalls, which present a large attack surface to cyber aggressors - leaving systems, data, and businesses at risk.

Using techniques such as uni-directional flows, protocol breaks, simple transfer protocols, and transformation & verification, cross domain solutions represent the safest way possible to receive data into your organisation and share information with other organisations.

The implementations we provide to our clients are best-in-class examples of this. All of our work follows National Cyber Security Centre guidance.

Alpha

A short phase in which solutions are prototyped to meet identified needs. Prototypes are tested with small user groups to gather early feedback on the solution design.

Beta

A longer phase where development is done in a live environment and understanding is gained of how to build and scale through the release of sample test versions.

Service management and innovation

When a technical solution has been engineered and implemented, we maintain it to the highest standards.

We work to understand our clients’ future business plans and to proactively develop mitigation strategies that align with them, finding new use cases for the cross domain solutions that we deploy to ensure the best defence possible against future cyber attacks.

Live

The service goes live but the work doesn't stop. The team will iteratively improve the service, reacting to new needs and demands, whilst meeting and exceeding targets set during the development.

Why are cross domain solutions an exemplary form of cyber security?

Cyber Essentials Plus

Cyber Essentials is a government-backed scheme that helps protect organisations from cyber attacks. TwinStream has a Cyber Essentials Plus accreditation. This means we have passed an independent technical audit, undertaken by a certified assessor. The audit provides evidence of the strength of our own technical controls and protocols which protect our business and our data from sophisticated cyber adversaries.

Find out more
Image of the Cyber Essentials Plus logo

Agile methodologies.

At TwinStream we closely follow the principles of the Agile Manifesto for software development in all our work.

Working in this way is a critical driver of our success, allowing us to collaborate effectively with our clients and to deliver their requirements quickly and efficiently.

Our working practices are built around the four key Agile values, which guide how we focus our time and energy on any project. Working to these values doesn't negate the need for any established project management tools or practices, but prioritises the most important levers for delivering success.

1.

Individuals and interactions

OVER

Processes and tools.

The best tools and most refined processes will still fail if the teams driving them function poorly. We prioritise building capable and communicative teams who are motivated to solve problems together.

2.

Working software

OVER

Comprehensive documentation.

Detailed documentation produced ahead of development becomes quickly outdated. Getting software to our client, getting their feedback and refining the product further is always our priority, and documentation is kept to a minimum.

3.

Customer collaboration

OVER

Contract negotiation.

Instead of agreeing detailed requirements and schedules ahead of any development and then waiting until the project end date to review progress, we engage our clients continuously, through each iteration, to ensure we're delivering in line with their expectations and involve them in improving the end result.

4.

Responding to change

OVER

Following a plan.

Rather than trying to mitigate change, we expect and embrace shifting priorities throughout the development process and adapt accordingly.

These values are supported by the 12 principles of the Agile manifesto which are evidenced in our everyday practice:
Decorative image to describe TwinStream principle Prioritise customer satisfaction
+ Prioritise customer satisfaction
Our highest priority is to deliver software early and continuously to the customer.
Decorative image to describe TwinStream principle Embrace change
+ Embrace change
Changes are not seen as something to be avoided or mitigated, but are welcomed at any stage in the development process.
Decorative image to describe TwinStream principle Deliver working software frequently
+ Deliver working software frequently
Software is delivered every couple of weeks to every couple of months, keeping the timeframe as short as possible.
Decorative image to describe TwinStream principle Bring technical and non-technical people together
+ Bring technical and non-technical people together
Software developers and business stakeholders work together daily.
Decorative image to describe TwinStream principle Trust and empower teams
+ Trust and empower teams
The best results are delivered by motivated individuals. Our culture provides the environment and support our teams need to get the job done.
Decorative image to describe TwinStream principle Favour face-to-face conversations
+ Favour face-to-face conversations
We prioritise face-to-face conversation with our customers and within our teams to ensure we communicate efficiently and effectively.
Decorative image to describe TwinStream principle Measure progress by working software
+ Measure progress by working software
Working software is our primary measure of project success.
Decorative image to describe TwinStream principle Maintain a consistent pace
+ Maintain a consistent pace
All project stakeholders, developers and users of the software strive to maintain a consistent pace indefinitely through the application of agile principles.
Decorative image to describe TwinStream principle Attend to technical excellence and good design
+ Attend to technical excellence and good design
Agility is improved through continuous attention to technical and design excellence.
Decorative image to describe TwinStream principle Simplify
+ Simplify
We don't waste time gilding the lily. Work is interrogated in terms of business value, prioritising small and focussed units of development for delivery.
Decorative image to describe TwinStream principle Allow teams to self-organise
+ Allow teams to self-organise
Our self-organising teams are autonomous, empowered and adaptive, to ensure we produce the best architectures, requirements and designs.
Decorative image to describe TwinStream principle Regularly discuss how to improve
+ Regularly discuss how to improve
At routine intervals, our teams reflect on how to become more effective and adjust their behaviours in the pursuit of continuous improvement

Get in touch.

If you're a business and would like to know more about our services please get in touch.

info@twinstream.com

If you're a prospective candidate and interested in joining our team, please contact Anthony Gallagher, our Recruitment Manager.

ant.g@twinstream.com