Affinity Geofield
A powerful map-based mobile work management solution that enables field workers to access and update enterprise data at the point of action.
Features
- Single, interoperable Mobile GIS platform
- Bi-directional seamless data transfer
- Access GIS map and asset data disconnected/offline
- Rules-based data collection and correction
- Redline and Blackline data revision directly from the field
- Network tracing engine – real-time analysis
- Integrates with GIS, ERP, EAM and Content/Document management systems
- Capture structured and unstructured data, photographs, videos and signatures
- Fieldworkers sharing data in real-time
- Interactive field activity status
Benefits
- Improve workforce productivity
- Improve operational and asset data quality
- Demonstrate and improve compliance
- Improve health and safety, MI and real-time decision making
- Eliminating paper-based processes cuts costs and reduces environmental impact
- Reduce clerical/administrative support
- Reduce travel time to depots and offices
- Future-proofing of any initial investment made
- Flexible, scalable and designed to evolve with business needs
- Reduce the risk of errors
Pricing
£20.00 a device a month
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at engagewithus@capita.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 10
Service ID
1 9 8 1 4 9 4 6 3 6 0 1 7 7 3
Contact
Capita Business Services Limited
Capita Business Services Ltd
Telephone: 08702407341
Email: engagewithus@capita.co.uk
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Enterprise Resource Management, Enterprise Asset Management and Enterprise GIS including Ellipse, SAP, Maximo and ESRI.
- Cloud deployment model
- Private cloud
- Service constraints
- Not applicable.
- System requirements
- No specific system requirements
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
For priority 1 incidents the target response time is one hour.
Standard Support not provided at weekends. - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Our support levels are:
Target Response Time in Standard Hours:
Priority 1 = 1 Hour
Priority 2 = 1 Hours
Priority 3 = 2 Hours
Priority 4 = 2 Hours
Priority 5 = 4 Hours
Priority 6 = 1 Day (RFI)
Target Resolution Time in Standard Hours:
Priority 1 = 1 Working Day
Priority 2 = 5 Working Days
Priority 3 = 15 Working Days
Priority 4 = 60 Days or Next Release
Priority 5 = As Above
Priority 6 = 30 Days
To provide the above support levels, it costs 22% of the licence fee per annum.
We do not provide a technical account manager or cloud support engineer. Instead we have a dedicated help desk to provide telephone support. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide a comprehensive range of support for users to start using our service. This includes the provision of a 'test-drive' pilot activity to assist users to define suitable business workflows and test their operation prior to full deployment/rollout. We provide a range of training courses aimed at the various roles using and supporting the service, including technical/system training, business workflow configuration and end-user mobile training. Training materials are available for standard product features and custom options are available for users with complex workflows including the use of videos and other online materials.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- As defined in the contract and generally on Request and facilitated by ourselves on the customers behalf.
- End-of-contract process
- Every contract has within it an Exit Plan which details the procedures to be undertaken at contract end. The exit process is dependant on the client use of the application. The provision of the Exit Plan is included in the contract, however the activities to be undertaken are revisited and priced at contract end as the circumstances and associated assumptions almost always change over the contract term.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Desktop services manages the system, data and configuration; mobile applications are used for primary business functions.
- Accessibility standards
- None or don’t know
- Description of accessibility
- UI can be tailored to meet the users needs with map-based workflows. Users can manage their own mobile business workflows, creating, modifying and refining forms as requirements change. Users can deploy forms to specific groups of users allowing central control of the data and process carried out by mobile users. Users can also dispatch digital work orders and make asset (equipment) records available to mobile users to access offline. Business and operational meta data can be reviewed using back office management tools, then approved and integrated into enterprise office systems.
- Accessibility testing
- None.
- API
- Yes
- What users can and can't do using the API
- The API provides access to the interfaces and main business services. Users can use the API to authenticate users, distribute business data such as digital work orders, asset (equipment) records and workflow templates. The API is used primarily for transactional integration and services to support mobile user operations. Additional setup and configuration is offered in back office applications for user and workgroup management.
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Main customisation areas include the User Interface, Dropdown lists, Reports, Integration to enterprise systems. Form customisation includes:
• Free Text
• Date/Time
• Single-selection pick lists
• Yes/No
• Signatures
• Photos
Network Asset symbols can be customised. Mobile App functionality can be customised to vary features available to the mobile user.
Customisation is performed by our technical teams and form configuration can be performed by end users.
Scaling
- Independence of resources
- Various agreed with customer (based on performance requirements).
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Response & Resolution Metrics for:
• Incident Management
• Problem Management
• Service Requests
• Defect Analysis
Solution Availability
All referencing relevant SLA. - Reporting types
- Regular reports
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- EU-US Privacy Shield agreement locations
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- SQL, online data exports or through the back-office applications.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- XML
- Various spatial data formats
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- XML
- Various spatial data formats
Data-in-transit protection
- Data protection between buyer and supplier networks
- IPsec or TLS VPN gateway
- Data protection within supplier network
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- Varies depending on customer NFRs and solution design. Additionally, our Cloud Hosting Partners have defined SLA's for elements of their service provision. These can range from 99.95% - 99.99% for which they provide service credit regimes should they fail to meet them. Where applicable all service credits awarded are passed through to our customers. Further information is available on request during customer engagement.
- Approach to resilience
- Each deployment is backed off by a full BCP and DR plan. Solution design in this regard is dependent on customer NFRs and ranges from single site resilient virtual deployments to multi-site clustered environments with real-time / near-real-time replication or simple back-up / restore facilities. Enterprise services include a comprehensive Event Management portfolio providing solution monitoring services to proactively manage the solution environment. Specifics relating to security and resilience at our providers facilities are available on request and during customer engagement.
- Outage reporting
- Periodic outages are arranged and managed via our Service Delivery Manager and named customer equivalents. Notice is provided via email alert and in the case of critical outages via telephone.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Other
- Other user authentication
- Users are presented with a log in and prompted to enter a username and password and then taken to the main application page.
- Access restrictions in management interfaces and support channels
- Role-based and other controls agreed with customer.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- As laid down in the Capita Corporate policies and standards that are certified against ISO/IEC 27001:2013.
- Information security policies and processes
- We follow the Capita Group Cyber and Information Security Policy and associated Standards. This policy and these standards are certificated to ISO27001:2013 elsewhere in the organisation. AMT-SYBEX are currently working towards obtaining certification based on adherence to these documents.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Configuration Management and Change Control is managed via defined processes within our corporate ISO9001 / TickIT accredited QEMS. Our Cloud Service providers have supplier-defined processes for their elements of the service provision in this regard. Further detail is available on request and during customer engagement.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Vulnerabilities are captured through penetration testing, internal review or defect reporting. Vulnerabilities are investigated, prioritised and managed through our normal support process which reflects business criticality and impact with required changes incorporated into our development and release cycle.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Supplier-defined process. Further detail is available on request and during customer engagement.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Supplier-defined process. Further detail is available on request and during customer engagement.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £20.00 a device a month
- Discount for educational organisations
- No
- Free trial available
- No
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at engagewithus@capita.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.