This G-Cloud 10 service is no longer available to buy.

The G-Cloud 10 framework expired on Tuesday 2 July 2019. Any existing contracts with Capita Business Services Limited are still valid.
Capita Business Services Limited

Affinity Geofield

A powerful map-based mobile work management solution that enables field workers to access and update enterprise data at the point of action.

Features

  • Single, interoperable Mobile GIS platform
  • Bi-directional seamless data transfer
  • Access GIS map and asset data disconnected/offline
  • Rules-based data collection and correction
  • Redline and Blackline data revision directly from the field
  • Network tracing engine – real-time analysis
  • Integrates with GIS, ERP, EAM and Content/Document management systems
  • Capture structured and unstructured data, photographs, videos and signatures
  • Fieldworkers sharing data in real-time
  • Interactive field activity status

Benefits

  • Improve workforce productivity
  • Improve operational and asset data quality
  • Demonstrate and improve compliance
  • Improve health and safety, MI and real-time decision making
  • Eliminating paper-based processes cuts costs and reduces environmental impact
  • Reduce clerical/administrative support
  • Reduce travel time to depots and offices
  • Future-proofing of any initial investment made
  • Flexible, scalable and designed to evolve with business needs
  • Reduce the risk of errors

Pricing

£20.00 a device a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at engagewithus@capita.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 10

Service ID

1 9 8 1 4 9 4 6 3 6 0 1 7 7 3

Contact

Capita Business Services Limited Capita Business Services Ltd
Telephone: 08702407341
Email: engagewithus@capita.co.uk

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Enterprise Resource Management, Enterprise Asset Management and Enterprise GIS including Ellipse, SAP, Maximo and ESRI.
Cloud deployment model
Private cloud
Service constraints
Not applicable.
System requirements
No specific system requirements

User support

Email or online ticketing support
Email or online ticketing
Support response times
For priority 1 incidents the target response time is one hour.

Standard Support not provided at weekends.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Our support levels are:
Target Response Time in Standard Hours:
Priority 1 = 1 Hour
Priority 2 = 1 Hours
Priority 3 = 2 Hours
Priority 4 = 2 Hours
Priority 5 = 4 Hours
Priority 6 = 1 Day (RFI)

Target Resolution Time in Standard Hours:
Priority 1 = 1 Working Day
Priority 2 = 5 Working Days
Priority 3 = 15 Working Days
Priority 4 = 60 Days or Next Release
Priority 5 = As Above
Priority 6 = 30 Days

To provide the above support levels, it costs 22% of the licence fee per annum.

We do not provide a technical account manager or cloud support engineer. Instead we have a dedicated help desk to provide telephone support.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide a comprehensive range of support for users to start using our service. This includes the provision of a 'test-drive' pilot activity to assist users to define suitable business workflows and test their operation prior to full deployment/rollout. We provide a range of training courses aimed at the various roles using and supporting the service, including technical/system training, business workflow configuration and end-user mobile training. Training materials are available for standard product features and custom options are available for users with complex workflows including the use of videos and other online materials.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
As defined in the contract and generally on Request and facilitated by ourselves on the customers behalf.
End-of-contract process
Every contract has within it an Exit Plan which details the procedures to be undertaken at contract end. The exit process is dependant on the client use of the application. The provision of the Exit Plan is included in the contract, however the activities to be undertaken are revisited and priced at contract end as the circumstances and associated assumptions almost always change over the contract term.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Desktop services manages the system, data and configuration; mobile applications are used for primary business functions.
Accessibility standards
None or don’t know
Description of accessibility
UI can be tailored to meet the users needs with map-based workflows. Users can manage their own mobile business workflows, creating, modifying and refining forms as requirements change. Users can deploy forms to specific groups of users allowing central control of the data and process carried out by mobile users. Users can also dispatch digital work orders and make asset (equipment) records available to mobile users to access offline. Business and operational meta data can be reviewed using back office management tools, then approved and integrated into enterprise office systems.
Accessibility testing
None.
API
Yes
What users can and can't do using the API
The API provides access to the interfaces and main business services. Users can use the API to authenticate users, distribute business data such as digital work orders, asset (equipment) records and workflow templates. The API is used primarily for transactional integration and services to support mobile user operations. Additional setup and configuration is offered in back office applications for user and workgroup management.
API documentation
Yes
API documentation formats
PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Main customisation areas include the User Interface, Dropdown lists, Reports, Integration to enterprise systems. Form customisation includes:

• Free Text
• Date/Time
• Single-selection pick lists
• Yes/No
• Signatures
• Photos

Network Asset symbols can be customised. Mobile App functionality can be customised to vary features available to the mobile user.

Customisation is performed by our technical teams and form configuration can be performed by end users.

Scaling

Independence of resources
Various agreed with customer (based on performance requirements).

Analytics

Service usage metrics
Yes
Metrics types
Response & Resolution Metrics for:

• Incident Management
• Problem Management
• Service Requests
• Defect Analysis

Solution Availability

All referencing relevant SLA.
Reporting types
Regular reports

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
SQL, online data exports or through the back-office applications.
Data export formats
  • CSV
  • Other
Other data export formats
  • XML
  • Various spatial data formats
Data import formats
  • CSV
  • Other
Other data import formats
  • XML
  • Various spatial data formats

Data-in-transit protection

Data protection between buyer and supplier networks
IPsec or TLS VPN gateway
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Varies depending on customer NFRs and solution design. Additionally, our Cloud Hosting Partners have defined SLA's for elements of their service provision. These can range from 99.95% - 99.99% for which they provide service credit regimes should they fail to meet them. Where applicable all service credits awarded are passed through to our customers. Further information is available on request during customer engagement.
Approach to resilience
Each deployment is backed off by a full BCP and DR plan. Solution design in this regard is dependent on customer NFRs and ranges from single site resilient virtual deployments to multi-site clustered environments with real-time / near-real-time replication or simple back-up / restore facilities. Enterprise services include a comprehensive Event Management portfolio providing solution monitoring services to proactively manage the solution environment. Specifics relating to security and resilience at our providers facilities are available on request and during customer engagement.
Outage reporting
Periodic outages are arranged and managed via our Service Delivery Manager and named customer equivalents. Notice is provided via email alert and in the case of critical outages via telephone.

Identity and authentication

User authentication needed
Yes
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
  • Other
Other user authentication
Users are presented with a log in and prompted to enter a username and password and then taken to the main application page.
Access restrictions in management interfaces and support channels
Role-based and other controls agreed with customer.
Access restriction testing frequency
At least once a year
Management access authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
As laid down in the Capita Corporate policies and standards that are certified against ISO/IEC 27001:2013.
Information security policies and processes
We follow the Capita Group Cyber and Information Security Policy and associated Standards. This policy and these standards are certificated to ISO27001:2013 elsewhere in the organisation. AMT-SYBEX are currently working towards obtaining certification based on adherence to these documents.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Configuration Management and Change Control is managed via defined processes within our corporate ISO9001 / TickIT accredited QEMS. Our Cloud Service providers have supplier-defined processes for their elements of the service provision in this regard. Further detail is available on request and during customer engagement.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Vulnerabilities are captured through penetration testing, internal review or defect reporting. Vulnerabilities are investigated, prioritised and managed through our normal support process which reflects business criticality and impact with required changes incorporated into our development and release cycle.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Supplier-defined process. Further detail is available on request and during customer engagement.
Incident management type
Supplier-defined controls
Incident management approach
Supplier-defined process. Further detail is available on request and during customer engagement.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Pricing

Price
£20.00 a device a month
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at engagewithus@capita.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.