Mazepoint Limited


Mazepoint's timesheet and project portfolio management application enabling timesheet completion by remote staff, managing them to a common timetable. Multiple projects are managed across different portfolios to ensure financial objectives are met. It provides vital management information for the monitoring of timesheets, expenses, time off in lieu, budgets and forecasts.


  • Project performance reporting
  • Timesheet exception reporting
  • Resource management
  • Project financial performance monitoring
  • Staff project performance management
  • Customised reporting
  • Time and expense reporting and approval
  • Facility allowing advance release of March timesheets in February
  • Data export facilities
  • Custom data query tool


  • On-line measurement of project and staff performance
  • Incorporates automated reporting
  • Centralised management of users, projects, holidays, overtime and expenses
  • Management information tailored to user profiles
  • Streamlined project and implementation team administration
  • Automation of year-end accrual processes
  • Important management information presented in a straightforward way
  • Ease of access to system data


£1.63 to £20.83 a user a month

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

1 4 1 5 0 9 9 9 0 5 8 0 5 5 2


Mazepoint Limited James Noble
Telephone: 020 7348 7600

Service scope

Software add-on or extension
Cloud deployment model
Private cloud
Service constraints
On-site support at extra cost. Remote support available in the UK during normal office hours 8:30 to 17:30 (except public holidays, weekends or between Christmas and New Year).
System requirements
  • Mazetime User Licences
  • Windows 10 or newer
  • Windows: Intel Pentium 4 or AMD Opteron processor or newer
  • 2Gb to 8Gb RAM
  • Windows and Mac: min 1366x768 screen resolution
  • Minimum 20Mbps Internet connection recommended

User support

Email or online ticketing support
Email or online ticketing
Support response times
Response times depend on the level of support required, ranging from 1 hour response for Critical issues for the Premium Service, resolution target within 4 hours, to 2 days response and 5 days resolution target for Standard Service. Support hours do not include week-ends.
User can manage status and priority of support tickets
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Web chat support
Onsite support
Yes, at extra cost
Support levels
Our approach to service levels is based on ITIL standards and is detailed in our Cloud Support Service Description document. In principle it supports the identification, management, resolution, and considered future mitigation of issues through a multi-level support structure, contactable through various channels and operating during normal UK office hours of 8:30 - 17:30, Monday to Friday (except UK public holidays and the period between Christmas and New Year). Other support arrangements are available on request.
Support available to third parties

Onboarding and offboarding

Getting started
Tailored to each customer's requirements, can include onsite, online training and user documentation
Service documentation
Documentation formats
End-of-contract data extraction
Users can extract defined data using the interface available within the software. Upon request, Mazepoint will provide a complete data set, at an additional cost.
End-of-contract process
The service will be turned off at the end of the contract and no further charges will be incurred. However there would be an additional cost for further data extraction depending on the amount of data requested, for which Mazepoint will provide a quotation.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
There is no difference in functionality between the mobile and desktop service, but some reports may not display in an optimised way for mobile. However, most other pages are designed with mobile responsiveness in mind.
Service interface
Customisation available
Description of customisation
This is not always self-service and may involve extra cost. For more information please refer to our Service Definition Document.


Independence of resources
Systems usage and capacity are monitored through the router logs which provide alerts to potential performance and capacity limits. Performance of specific customer applications is monitored regularly to ensure continuity of service. Server capacity is managed within the virtualisation environment which is controlled by the infrastructure team and monitoring tools. Customer websites and applications are continuously monitored with Site24x7. Project managers, delivery and support staff will be immediately updated on any resource capacity issues that arise on a customer's environment.


Service usage metrics
Metrics types
Please refer to our Service Definition document for more information.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
User interface included within the software that enables users to query the data held and export if required
Data export formats
Data import formats
Other data import formats
None, upload not available

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Availability is defined as the time the service is available during the agreed service window i.e. outside of agreed downtime for maintenance and upgrades. Any further agreed downtime does not count towards the service availability statistic. Generally, Mazepoint offers a 99.7% service availability measured on a monthly basis which will be confirmed in the SLA. Any case of a breach of an SLA will be reported as an incident in Mazepoint's support ticketing system and assigned an impact and urgency level, which is accessible to the client.
Approach to resilience
The software solution provides a degree of resilience through componentisation. A failure in one component will not necessarily effect others. Further resilience at the application level (e.g. clustering) is not supported by the analytical components.
The underlying virtualised infrastructure runs on resilient host hardware. Virtual machines can be migrated between hosts with no loss in service and minimal disruption.
Firewalls are clustered and configured to failover in the event of an individual one failing.
Mazepoint’s data centre provider has highly resilient infrastructure including dual power feeds & backup generator capacity, and redundant cooling, offering power uptime SLA’s of 99.999%.
Internet connectivity is multi-homed via several suppliers to ensure continuous connectivity in the event of an ISP failure.
Outage reporting
Service availability at a client level is continuously monitored by Mazepoint. Any service failures will alert the Mazepoint Infrastructure team who will deal with the issue accordingly. An incident support ticket will be created, alerting the customer, and will be resolved in accordance to the agreed SLA. Live public service dashboards and direct email alerts are available on request at an additional cost.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Mazepoint’s User Access Management Policy establishes the procedures for restricting access to prevent unauthorised access to information systems. The procedures are documented for new users, managing change, password and privilege management as well as regular reviews of user access rights. Group-based permissions are supplied within each service application, generally administered by the customer, with the capability to control each user’s data and information access rights down to an individual data cell. Mazepoint’s Password Security Policy establishes the standards required for password complexity and compliance measurement. Access to Mazepro, Mazepoint’s support ticketing system is governed by similar user-access rights and passwords.
Access restriction testing frequency
At least once a year
Management access authentication
Description of management access authentication
Management access is operated through the Mazesupport ticketing system and implemented by Mazepoint staff subject to the contract and Service Level Agreement. There is no direct access management portal.

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
British Assessment Bureau Limited
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
There are no exclusions to Mazepoint's ISO27001 certification.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
Cyber Essentials Plus

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Without exception, all Mazepoint staff are contractually obliged to adhere to the principles of ISO27001:2013 and the GDPR in respect of information security. The company’s ISO27001 accreditation is based on a variety of policies, procedures, risk assessments and responsibilities, all of which are subject to regular external and internal audits, and staff are regularly reminded of their obligations and notified when policies and procedures are updated. The company’s ISO accreditation is led by the Managing Director, the management representative, who retains responsibility for overall observance of policies, processes and updates while delegating responsibility for monitoring and compliance, primarily to the infrastructure and administration teams but also to the software development and new business teams. Each policy and process includes compliance measurement which is carried out by the policy owner and verified by the management representative. The company’s online Information Security Management System maintains all policy and process information, including ISO9001:2008 documentation and the Feedback Reporting System for use by all staff. The Managing Director and all team leaders attend the audits to ensure that any observation or potential non-conformance is addressed with the appropriate level of urgency, and management reviews are carried out and documented by the management representative.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Mazepoint follows the ITIL methodology for configuration and change, defined mainly as Standard or Normal. Requests are logged via Mazepoint's support ticketing system (Mazesupport) and assessed in terms of impact and urgency. A priority matrix is referred to determining the response and resolution time for each request. For system critical items, users are also required to inform Mazepoint by telephone. Users will be notified of an approximate time for resolution at the outset and regularly updated until completion.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Mazepoint’s Vulnerability Management Policy documents this process which is enforced by the infrastructure team. Common vulnerabilities and exposures are routinely checked in accordance with the CVE database and other third party sources. Systems are monitored to detect and assess vulnerabilities which are then classified and prioritised by risk and urgency. Vulnerability removal is then planned and executed. Software updates are applied on a regular basis or immediately in the case of high risk, urgent vulnerabilities. User identity and access rights, hardware and software configuration standards, and network vulnerabilities are all regularly reviewed, assessed and tested, and remediation plans implemented.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
The firewall logs are regularly reviewed using the Intrusion Protection System monitoring tool dashboard to understand potential compromises. Firewall logs can be filtered based on IP address and server, and the SmartMonitor application monitors VPN connections and firewall activity. Management of incidents is documented in the Information Security Incident Management policy.
Incident management type
Supplier-defined controls
Incident management approach
Mazepoint’s Information Security Incident Management Policy documents this process. Security incidents that have a direct impact on a customer’s application or data will result in the customer being contacted immediately following incident identification, as well as the Information Commissioner's Office if applicable. Security incidents are logged in Mazepoint’s support ticketing system, Mazepro, and the progress of open tickets tracked. Upon closure of a security incident ticket, the customer will receive a full report covering the time the incident was identified to its resolution. Monthly security and service reports are available to the customer at an additional cost.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
Connected networks
Other public sector networks


£1.63 to £20.83 a user a month
Discount for educational organisations
Free trial available
Description of free trial
Please refer to our service definition document for more information.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.