Be Informed

Be Informed- Intelligent Process Automation Platform

The Be Informed platform lays the foundation for automated processes and decision making. Legacy integration or new build, our engine accelerates agile digital development. We handle complex rules. Our advanced inferencing technology supports the most complex of business processes, radically improves customer experience, and ensures compliance with regulations and policies.

Features

  • Dynamic / Adaptive Case Management
  • Decision Support & Knowledge Work Automation
  • Single Integrated Platform to manage processes, data, decisions, and portals
  • Model (vs code) driven development
  • Semantic Ontology used to define, document, and execute business rules
  • Execution of constraint based, goal oriented, event driven processes
  • Full audit, traceability, self test and self documenting
  • Built around open standards and open source stack
  • Modular Service Oriented Architecture
  • Rapid development of mobile, web, cloud services, applications and solutions

Benefits

  • Rapid implementation and ease of ongoing maintenance
  • Reduced TCO
  • High levels of Straight Through Processing
  • Single point of definition allowing re-use of rules and models
  • Compliancy with all relevant regulations, security and policies
  • Context specific support for case workers
  • Role, rule and involvement based collaboration on electronic dossiers
  • Operational reporting , workload management, and auditing
  • Context driven digital customer journeys
  • One process supporting multiple products and services

Pricing

£75 to £150 per user per month

  • Education pricing available
  • Free trial available

Service documents

Framework

G-Cloud 11

Service ID

1 7 0 6 3 5 2 3 8 6 8 5 7 0 3

Contact

Be Informed

Mark Dawber

+44 (0)7887 491106

m.dawber@beinformed.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints None
System requirements N.a.

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Service response times are Mon-Fri CET 9am - 5pm at no extra cost.
Response and service times 24 x 7 are available by negotiation.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Correction Time: the maximum period between the moment that Be Informed has confirmed the classification of the Defect to Licensee (see Reaction Time) and the moment that the solution or a Workaround for the Defect is delivered to Licensee by Be Informed.
Defect: defect in the Software as a result of which the Software does not operate in accordance with the Functional Specifications.
Hotfix: delivery of part of the Software in which a specific Blocking Defect or various related Blocking Defects have been solved. A Hotfix is released specifically for a customer or partner.
Major Release: Upgrade of the Software in which mainly Platform support has been adjusted. Major Releases are backwards-compatible, Major Releases are numbered by adding a subnumber to the version number of the Version on which the Major Release.
Minor Release: Upgrade of the Software in which mainly altered and/or new functionality is included. Minor
Partner & Customer Support Desk: the primary contact for Licensee within the organization of Be Informed with respect to Support.
Reaction Time: the maximum period between the moment that the Defect is reported by Licensee and the moment that Be Informed confirms the classification of the Defect to Licensee.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Onsite training, user documentation, examples/templates
Service documentation Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats On lin through our Plaza Knowledge Service
End-of-contract data extraction The models describing the business rules can be exported in various formats, e.g. XMI/XML, HTML, PDF or RDF.
The data of the application is stored in a relational database system with a customizable schema. This data can exported using regular database tooling.
End-of-contract process Inclusive: setup exit strategy
optional: support in transfering to other supplier; export of data

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install Yes
Compatible operating systems
  • Linux or Unix
  • Windows
Designed for use on mobile devices Yes
Differences between the mobile and desktop service With our modular UI our interface is fully responsive
Service interface Yes
Description of service interface The service interface of the Be Informed applications is, by default, a web interface for user interaction (HTTPS, HTML, JS, REST/JSON) and HTTPS-based interfaces for system-to-system interaction (REST/JSON, SOAP/XML). Other means for interaction, e.g. file, email, messaging, can be enabled upon request. The available services are automatically documented and can be browsed via the OpenAPI (formally SwaggerAPI) interface. If necessary the service descriptions can also be imported as OpenAPI (v3) and Swagger API (v2) service descriptions.
Accessibility standards WCAG 2.1 AA or EN 301 549
Accessibility testing The overall accessibility of a project built with Be Informed depends in large part on the Be Informed configuration and additional customization of a layout. However, provided that these have been implemented correctly with the accessibility guidelines in mind, Be Informed application meet the WCAG 2.1 AA accessibility standard. With additional customizations to the layout, conformance to WCAG 2.1 AAA can be achieved, if that is required. However, conformance to level AAA has such high impact on design, that even the W3C claims that most organizations should not strive to achieve that level for the entire application (as the compromises on design will be too important) (http://www.w3.org/TR/WCAG20/#conformance-reqs: It is not recommended that Level AAA conformance be required as a general policy for entire sites because it is not possible to satisfy all Level AAA Success Criteria for some content.)
API Yes
What users can and can't do using the API All functionality is available through the API's based on REST (http/json, http/xml), SOAP and JMS. For specific functionality (email, database, documents, etc.) API's are available based on: CMIS, JDBC, SMTP, IMAP, POP3, FTP and File (fixed length, XML, CSV). The integration capabilities are extendable via Apache Camel plugins.
API documentation Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
API sandbox or test environment Yes
Customisation available Yes
Description of customisation The service is a model driven platform, the functionality of the service is derived from models. Users simply create models that contain their business logic. The models captured in the Be Informed platform are immediately executable, without additional programming or conversion into code. To define and model the business rules a modeling environment is provided. Besided the customization of the functionality also the user and system interfaces can be customized via the same modeling environment.

Scaling

Scaling
Independence of resources Multi tenancy architecture; private cloud

Analytics

Analytics
Service usage metrics Yes
Metrics types The service keeps an audit trail of every modification is made to the information stored. This information (data and metadata) is available to define all kinds of usage metrics such as: #cases, #open cases, aggregations based on various criteria (upcomming expiration of time limits, process state and custom defined case properties).
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least every 6 months
Penetration testing approach In-house
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Various approaches are available. The data of the application is stored in a relational database system with a customizable schema. This data can exported using regular database tooling (ETL). But it is also possible to use the platform's integration capabilities to for example push information in a event driven approach or a more batch-oriented approach using files.
Data export formats
  • CSV
  • Other
Other data export formats
  • PDF
  • SQL
  • JSON
  • XML
  • Other custom defined text formats
Data import formats
  • CSV
  • Other
Other data import formats
  • XML
  • JSON
  • SQL
  • Other user defined text formats

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Please refer to Terms and Conditions, Annex 2: service level support
Approach to resilience Available on request
Outage reporting Email and phone alerts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels In general based on user authentication and user roles. When required additional measures can be implemented such as a requirement to use a dedicated link and/or the use of a stronger authentication scheme.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Our information security policy is available on request
Information security policies and processes Our information security policy is available on request

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Regular software releases; please refer to Terms and Conditions document for releaseschedule (see Annex 2 Service Support Level).
We aply continuous testing tools and test for potential security leaks.
Vulnerability management type Supplier-defined controls
Vulnerability management approach As part of our Service Level Support (see Annex 2 of the Terms and Conditions document) we implement patches acording to our Corrective Maintenance table. Information about potential threats can originate from various sources: clients, monitoring and own research.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Please refer to our Service Level Support (Annex 2 of the Terms and Conditions document) adaptive and preventive maintenance clauses.
Incident management type Supplier-defined controls
Incident management approach Please refer to our Service Level Support (as Annex 2 of the attached Terms and Conditions document).

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £75 to £150 per user per month
Discount for educational organisations Yes
Free trial available Yes
Description of free trial We offer a Software Evaluation version under the conditions described in a Software Evaluation Agreement; we can provide this on request

Service documents

Return to top ↑