Oracle Corporation UK Limited

Oracle Transportation Cooperative Routing Cloud Service

This service (Oracle APN B78952) enables organisations to strategically examine the use of carrier and fleet resources, identifying historical shipping patterns and determining optimal asset versus carrier allocation. This plan is then considered within Oracle Transportation Management's operational plan to ensure that benefits of the strategic plan are realised.

Features

  • Strategically design transportation network; economically, environmentally, and carrier friendly
  • Analyse shipping patterns; assign resources to the most effective routes
  • Determine the optimal mix of private, dedicated, and contract capacity
  • Identify strategic continuous move opportunities
  • Determine optimal fleet sizing
  • Allocate fleet resources; right locations at the right times
  • Identify routes that can be packaged together for bidding

Benefits

  • Lower transportation costs
  • Reduce carbon footprint
  • Reduce empty miles and fuel usage
  • Improve asset utilisation and network efficiency
  • Increase predictability for third party carriers
  • Increase carrier tender acceptance percentage
  • Increase customer service levels
  • Enable new avenues for collaboration

Pricing

£4787.64 per unit per year

Service documents

G-Cloud 9

236950490067228

Oracle Corporation UK Limited

Adrienne Belton

+44 118 92 43257

Gcloud-enquiries_gb@oracle.com

Service scope

Service scope
Software add-on or extension Yes
What software services is the service an extension to Oracle Transportation Management Cloud Service and Oracle Transportation Operational Planning Cloud Service
Cloud deployment model Public cloud
Service constraints N/A
System requirements N/A

User support

User support
Email or online ticketing support Email or online ticketing
Support response times 1 hour
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support Web chat
Web chat support availability 24 hours, 7 days a week
Web chat support accessibility standard WCAG 2.0 AA or EN 301 549 9: Web
Web chat accessibility testing Oracle products are tested for accessibility using a variety of techniques including automated tools, expert heuristic review, visual inspection, manual operation, and testing with various AT by both disabled and non-disabled users. We report the outcome of that testing using the Voluntary Product Accessibility Template (VPAT). The VPAT was developed by ITI and GSA to assist Federal contracting officials and other buyers in making preliminary assessments regarding the availability of commercial ICT products and services with features that support accessibility. See Voluntary Product Accessibility Templates for an in-depth discussion of how we use the VPAT, and to locate the VPATs for Oracle products.
Onsite support Onsite support
Support levels Oracle provides enhanced electronic-based and telephone technical support to customers with a current technical support services agreement. Customers have access to the largest and most advanced support organization in the world, with more than 50,000 development engineers and customer support specialists, working in 29 languages from 28 global support centers across 145 countries.
Technical support services are available to resolve product issues quickly and accurately by providing answers to product questions that are general or routine in nature. This includes questions about product functionality, syntax, setup, and use. Technical support engineers will also work with customers to diagnose and troubleshoot errors, determine workarounds, and process enhancement requests.
Technical support is provided for issues (including problems created by the user) that are demonstrable, running unaltered, and on an appropriate hardware, database and operating system configuration, as specified in the customer order or program documentation.
In addition, working with the global support hubs, Oracle provides onsite hardware support for Oracle and Sun branded systems either directly, or in some countries through an extensive partner network. For further information please refer to Oracle Technical Support Policy documents provided at: http://www.oracle.com/us/support/policies/index.html
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started As part of the implementation user training requirements will be identified and the required training will be tailored to meet these requirements for each user/role
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Production data will be made available for up to 60 days after termination for the purpose of retrieval by Customer via SFTP. The extracted data will be available in Data pump format.
End-of-contract process Extracted files are made available to the customer on an sftp server within 5 business days of the termination. Customers have up to 60 days to retrieve this data. This is all included in the price of the contract.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10+
  • Firefox
  • Chrome
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The mobile app is dedicated to a specific user/role and enables relevant transactions
Accessibility standards WCAG 2.0 AA or EN 301 549
Accessibility testing Oracle products are tested for accessibility using a variety of techniques including automated tools, expert heuristic review, visual inspection, manual operation, and testing with various AT by both disabled and non-disabled users. We report the outcome of that testing using the Voluntary Product Accessibility Template (VPAT). The VPAT was developed by ITI and GSA to assist Federal contracting officials and other buyers in making preliminary assessments regarding the availability of commercial ICT products and services with features that support accessibility. See Voluntary Product Accessibility Templates for an in-depth discussion of how we use the VPAT, and to locate the VPATs for Oracle products.
API Yes
What users can and can't do using the API Integration to/from Logistics Cloud is accomplished via XML documents. Sending data to Logistics Cloud is supported using HTTPPOST and Web Services. Outbound Integration from Logistics Cloud is supported using HTTPPOST and Web Services.
API documentation Yes
API documentation formats PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation The systems is highly configurable and can be configured to support the required business processes

Scaling

Scaling
Independence of resources Customers are hosted in a completely isolated single tenant environment which means they do not share their database or environments with any other customers. There is no impact by other users on the service.

Analytics

Analytics
Service usage metrics Yes
Metrics types Availability, usage, storage.
Reporting types Real-time dashboards

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Other
Other data at rest protection approach Customers have the option to purchase an additional offering called Oracle Advanced Security Transparent Data Encryption (TDE). This stops would-be attackers from bypassing the database and reading sensitive information from storage by enforcing data-at-rest encryption in the database layer. Applications and users authenticated to the database continue to have access to application data transparently, while attacks from OS users attempting to read sensitive data from tablespace files and attacks from thieves attempting to read information from acquired disks or backups are denied access to the clear text data. Available for an additional cost.
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Customers can extract their data export via reports or data extracts available in the OTM/GTM product, or via XML using web services. In the event of a contract termination customers can access their extracted files up to 60 days after termination. Files will then be available in Datapump format.
Data export formats Other
Other data export formats
  • XML
  • CSV
  • Datapump format (at end of contract)
Data import formats
  • CSV
  • Other
Other data import formats XML

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Private network or public sector network
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Oracle works to meet the Target Service Availability Level, or Target Uptime, of 99.5%.
Approach to resilience Oracle deploys the Oracle Cloud Services on resilient computing infrastructure designed to maintain service availability and continuity in the case of an incident affecting the services. Data centers retained by Oracle to host Oracle Cloud Services have component and power redundancy with backup generators in place, and Oracle may incorporate redundancy in one or more layers including network infrastructure, program servers, database servers, and/or storage.
Outage reporting All customers have access to a portal where availability and any events impacting the service would be posted. Customers can also elect to receive these alerts via email if they wish.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Other
Other user authentication Via a IDM system  using a federated SSO account with user name and password
Access restrictions in management interfaces and support channels Access to Oracle Cloud systems is controlled by restricting access to authorized personnel on a deny by default basis. Oracle enforces strong password policies on infrastructure components and cloud management systems used to operate the Oracle Cloud environment.This includes requiring a minimum password length, password complexity, and regular password changes.Strong passwords or multi-factor authentication are used throughout the infrastructure to reduce the risk of intruders gaining access through exploitation of user accounts. System access controls include system authentication, authorization, access approval, provisioning, and revocation.
Access restriction testing frequency At least once a year
Management access authentication 2-factor authentication

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information You control when users can access audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations Yes
Any other security accreditations SSAE 16 SOC 1 and 2 for the application.

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation Yes
Security governance standards Other
Other security governance standards SSAE-16 SOC 1 and SOC 2 for the application and all data centers comply with the security standards outlined in SSAE-16. Everything Oracle does from a security perspective is aligned with ISO/IEC 27002 Code of Practice for information security controls.
Information security policies and processes Oracle Cloud has an extensive set of information security policies that establish and govern areas of security applicable to Oracle Cloud Services and to its customers’ use of Oracle Cloud Services. Oracle personnel (including full time employees, temporary employees and contractors) are subject to the policies that govern their employment or the services they provide to Oracle. Oracle Cloud takes a holistic approach to information security, implementing a layered defense security strategy where network, operating system, database, and Oracle Programs security practices are intended to complement one another with resilient internal controls, governance, and oversight.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach Oracle tracks the release levels of various components within the customer’s Services environment. Oracle will periodically deploy patches, maintenance releases, and updates to the customer’s Services environment to keep the Cloud Services at a current release version or to enhance service performance. Software upgrade to the customer’s Services environment is governed by Oracle’s change control procedures. For security patch bundles that Oracle deploys Oracle will apply the security patch bundle to the production environment after successfully completes testing on the non-production environment. Changes to Cloud environments are performed following documented change control procedures.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Vulnerability assessment tools are used to identify security threats and vulnerabilities in the Cloud Services environments. Formal procedures are in place to assess, validate, prioritize, and remediate identified
issues. Oracle subscribes to vulnerability notification systems to stay apprised of security incidents, advisories, and other related information. Oracle acts on the notification of a threat or risk once it has confirmed that, both, a valid risk exists and that the recommended changes are applicable to services environments.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach Oracle conducts extensive monitoring and reporting
tracking over 200 service metrics, including Availability and SLA, External URL monitoring to mimic customer interface,
Server level monitoring (CPU, mem, disk usage and I/O),
Component level monitoring (application queues),
Network and Storage monitoring. Staff monitor alert tickets 24x7; worked on according to priority and severity
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach Oracle evaluates and responds to incidents that create suspicions of unauthorized access to, or handling of a customer’s Content. When Oracle's Global Information Security (GIS) organization is informed of such incidents it defines escalation paths and response teams to address those incidents. GIS will work with the customer, the appropriate technical teams, and law enforcement where necessary to respond to the incident. The goal of the incident response will be to restore the confidentiality, integrity and availability of the Customer's environment, and to establish root causes and remediation steps. All Oracle employees are required to report suspected incidents.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £4787.64 per unit per year
Discount for educational organisations No
Free trial available No

Documents

Documents
Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑