Capita Business Services Limited

Affinity Geofield

A powerful map-based mobile work management solution that enables field workers to access and update enterprise data at the point of action.

Features

  • Single, interoperable Mobile GIS platform
  • Bi-directional seamless data transfer
  • Access GIS map and asset data disconnected/offline
  • Rules-based data collection and correction
  • Redline and Blackline data revision directly from the field
  • Network tracing engine – real-time analysis
  • Integrates with GIS, ERP, EAM and Content/Document management systems
  • Capture structured and unstructured data, photographs, videos and signatures
  • Fieldworkers sharing data in real-time
  • Interactive field activity status

Benefits

  • Improve workforce productivity
  • Improve operational and asset data quality
  • Demonstrate and improve compliance
  • Improve health and safety, MI and real-time decision making
  • Eliminating paper-based processes cuts costs and reduces environmental impact
  • Reduce clerical/administrative support
  • Reduce travel time to depots and offices
  • Future-proofing of any initial investment made
  • Flexible, scalable and designed to evolve with business needs
  • Reduce the risk of errors

Pricing

£20.00 per device per month

Service documents

G-Cloud 10

198149463601773

Capita Business Services Limited

Capita Business Services Ltd

08702407341

engagewithus@capita.co.uk

Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to Enterprise Resource Management, Enterprise Asset Management and Enterprise GIS including Ellipse, SAP, Maximo and ESRI.
Cloud deployment model Private cloud
Service constraints Not applicable.
System requirements No specific system requirements

User support

User support
Email or online ticketing support Email or online ticketing
Support response times For priority 1 incidents the target response time is one hour.

Standard Support not provided at weekends.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Our support levels are:
Target Response Time in Standard Hours:
Priority 1 = 1 Hour
Priority 2 = 1 Hours
Priority 3 = 2 Hours
Priority 4 = 2 Hours
Priority 5 = 4 Hours
Priority 6 = 1 Day (RFI)

Target Resolution Time in Standard Hours:
Priority 1 = 1 Working Day
Priority 2 = 5 Working Days
Priority 3 = 15 Working Days
Priority 4 = 60 Days or Next Release
Priority 5 = As Above
Priority 6 = 30 Days

To provide the above support levels, it costs 22% of the licence fee per annum.

We do not provide a technical account manager or cloud support engineer. Instead we have a dedicated help desk to provide telephone support.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We provide a comprehensive range of support for users to start using our service. This includes the provision of a 'test-drive' pilot activity to assist users to define suitable business workflows and test their operation prior to full deployment/rollout. We provide a range of training courses aimed at the various roles using and supporting the service, including technical/system training, business workflow configuration and end-user mobile training. Training materials are available for standard product features and custom options are available for users with complex workflows including the use of videos and other online materials.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction As defined in the contract and generally on Request and facilitated by ourselves on the customers behalf.
End-of-contract process Every contract has within it an Exit Plan which details the procedures to be undertaken at contract end. The exit process is dependant on the client use of the application. The provision of the Exit Plan is included in the contract, however the activities to be undertaken are revisited and priced at contract end as the circumstances and associated assumptions almost always change over the contract term.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • Windows
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Desktop services manages the system, data and configuration; mobile applications are used for primary business functions.
Accessibility standards None or don’t know
Description of accessibility UI can be tailored to meet the users needs with map-based workflows. Users can manage their own mobile business workflows, creating, modifying and refining forms as requirements change. Users can deploy forms to specific groups of users allowing central control of the data and process carried out by mobile users. Users can also dispatch digital work orders and make asset (equipment) records available to mobile users to access offline. Business and operational meta data can be reviewed using back office management tools, then approved and integrated into enterprise office systems.
Accessibility testing None.
API Yes
What users can and can't do using the API The API provides access to the interfaces and main business services. Users can use the API to authenticate users, distribute business data such as digital work orders, asset (equipment) records and workflow templates. The API is used primarily for transactional integration and services to support mobile user operations. Additional setup and configuration is offered in back office applications for user and workgroup management.
API documentation Yes
API documentation formats PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Main customisation areas include the User Interface, Dropdown lists, Reports, Integration to enterprise systems. Form customisation includes:

• Free Text
• Date/Time
• Single-selection pick lists
• Yes/No
• Signatures
• Photos

Network Asset symbols can be customised. Mobile App functionality can be customised to vary features available to the mobile user.

Customisation is performed by our technical teams and form configuration can be performed by end users.

Scaling

Scaling
Independence of resources Various agreed with customer (based on performance requirements).

Analytics

Analytics
Service usage metrics Yes
Metrics types Response & Resolution Metrics for:

• Incident Management
• Problem Management
• Service Requests
• Defect Analysis

Solution Availability

All referencing relevant SLA.
Reporting types Regular reports

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
  • Other locations
User control over data storage and processing locations Yes
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach SQL, online data exports or through the back-office applications.
Data export formats
  • CSV
  • Other
Other data export formats
  • XML
  • Various spatial data formats
Data import formats
  • CSV
  • Other
Other data import formats
  • XML
  • Various spatial data formats

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks IPsec or TLS VPN gateway
Data protection within supplier network IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Varies depending on customer NFRs and solution design. Additionally, our Cloud Hosting Partners have defined SLA's for elements of their service provision. These can range from 99.95% - 99.99% for which they provide service credit regimes should they fail to meet them. Where applicable all service credits awarded are passed through to our customers. Further information is available on request during customer engagement.
Approach to resilience Each deployment is backed off by a full BCP and DR plan. Solution design in this regard is dependent on customer NFRs and ranges from single site resilient virtual deployments to multi-site clustered environments with real-time / near-real-time replication or simple back-up / restore facilities. Enterprise services include a comprehensive Event Management portfolio providing solution monitoring services to proactively manage the solution environment. Specifics relating to security and resilience at our providers facilities are available on request and during customer engagement.
Outage reporting Periodic outages are arranged and managed via our Service Delivery Manager and named customer equivalents. Notice is provided via email alert and in the case of critical outages via telephone.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
  • Other
Other user authentication Users are presented with a log in and prompted to enter a username and password and then taken to the main application page.
Access restrictions in management interfaces and support channels Role-based and other controls agreed with customer.
Access restriction testing frequency At least once a year
Management access authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information No audit information available
Access to supplier activity audit information No audit information available
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach As laid down in the Capita Corporate policies and standards that are certified against ISO/IEC 27001:2013.
Information security policies and processes We follow the Capita Group Cyber and Information Security Policy and associated Standards. This policy and these standards are certificated to ISO27001:2013 elsewhere in the organisation. AMT-SYBEX are currently working towards obtaining certification based on adherence to these documents.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Configuration Management and Change Control is managed via defined processes within our corporate ISO9001 / TickIT accredited QEMS. Our Cloud Service providers have supplier-defined processes for their elements of the service provision in this regard. Further detail is available on request and during customer engagement.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Vulnerabilities are captured through penetration testing, internal review or defect reporting. Vulnerabilities are investigated, prioritised and managed through our normal support process which reflects business criticality and impact with required changes incorporated into our development and release cycle.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Supplier-defined process. Further detail is available on request and during customer engagement.
Incident management type Supplier-defined controls
Incident management approach Supplier-defined process. Further detail is available on request and during customer engagement.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £20.00 per device per month
Discount for educational organisations No
Free trial available No

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑