Axiell ALM Ltd

Trend Artemis Management Information

Axiell’s Management Information Solution provides advanced library reporting services and presents analytical content to ensure a Customer's service has all of the information needed via an intuitive, secure web based suite of tools.


  • Reporting on circulation
  • Reporting on cataloguing
  • Reporting on acquisitions
  • Reporting on cash management
  • Reporting on Integrations Framework
  • Reporting on marketing and events
  • Reporting on Digital Media Management
  • Customisable report formats
  • Reporting on Cloud Based Interface
  • Reporting on Application Support and Managed Services


  • Up to date analytical data when needed
  • Reporting against configurable APIs
  • Easy to understand dashboard interface
  • Intuitive report writing
  • Third party integration framework
  • Bank of standard reports
  • Industry standard periodic reports e.g. CIPFA
  • Trend analysis
  • Fully web based


£1250 per unit per year

Service documents

G-Cloud 10


Axiell ALM Ltd

Malcolm Howitt

0115 900 8000

Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to SelfLib - Low cost, cloud based self service solution;
Axiell's Library Management Service platform;
Arena Discovery Platform
Cloud deployment model Private cloud
Service constraints Any service constraints are defined and agreed within the service level agreement for the solution.
System requirements
  • An internet connection
  • Browser must support HTML5 and javascript

User support

User support
Email or online ticketing support Yes, at extra cost
Support response times As agreed in contracted Service Level Agreements. Axiell can provide a draft SLA for standard response times.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.0 AA or EN 301 549
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels The support contract is tailored to suit the requirements of the customer. All levels of support are agreed and defined in the Service Level Agreement.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started All implementations include a detailed Implementation Service with an agreed training programme. This may include hands on training sessions as well as consultation.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Axiell provide all data in a defined template as part of an exit plan/strategy. Full details of the extract data sets can be supplied upon request.
End-of-contract process Axiell supply all data in a pre-defined format in line with the agreed exit plan. Additional costs may be applicable for the data extracts and any additional consultation not defined within the exit plan.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Our service, and the functionality offered within it, are standardised across all platforms.
Accessibility standards WCAG 2.0 AA or EN 301 549
Accessibility testing Through UX testing, accessibility has been integrated into the design of the Axiell LMS with a touch-screen button layout being adopted and a tabbed interface, in place of a menu driven system. As a standard delivery, themes follow the following best practice principles:
• Font: Muli, sans-serif. This is a font commonly used for optimum speed in addition to make text more legible and less confusing than standard screen fonts.
• Text Colour: The default font colour was chosen to benefit that largest statistical colour blind group, although it is noted that there are no ideal colour combinations to satisfy all visually impaired individuals.
• Text Size: Large clear text displayed for each feature with full support for standard browser controls and accessibility tools.
• Buttons: Size and spacing have been designed to facilitate ease of use with a responsive design for optimum scaling to suit the platform of choice.
• Button Text: Remains consistent between screens to facilitate recognition and ease of use.
• Background: Other areas are grey to assist differentiation between the backgrounds and buttons.
What users can and can't do using the API All Axiell Library Management System APIs include detailed documentation that clearly define the scope of the specific integration.
API documentation Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Trend Artemis is modular in design. Users can decide on the features to be included as well as the specific configuration relating to each feature. Axiell's implementation and consultancy services guide our customers throughout this process in order to ensure the system is optimised for our customers requirements throughout the lifetime of the contract.


Independence of resources The Axiell LMS is designed so that it is load balanced and scalable to suit the customer requirements. If additional resource is required, the system can be scaled appropriately without loss of service to the end user.


Service usage metrics Yes
Metrics types Axiell provide a range of reports that can be used by our customers to determine service usage. Included in the range of reports are extracts to specifically meet the CIPFA requirements of the service. This is in addition to any routine reports such as borrower transactional data, item circulation data/trends and financial information.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations No
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Axiell agree an approach for the export of data from our platform. As a standard deliverable Axiell will provide access to any/all reports through our management information solution where the level of access is defined by the customer and based on role configuration. For routine data extracts, the process will depend on the available and agreed options but as an example, many of our customer choose to export their financial data for import into third party financial systems. Axiell work with the customer and the third party system supplier to agree requirements and implement accordingly.
Data export formats
  • CSV
  • Other
Other data export formats
  • XLS
  • TSV
  • XML
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Calculation of Service Availability is based upon events of an unplanned, reported failure on an End User's Live Service and are measured from the time the problem is reported to Axiell's UK Service Desk (also includes reporting by automatic monitoring systems). All services are measured separately. Typically we are achieving less than 7 hours downtime in a 12 month period for either system, this equates to 99.5% uptime, which is our target level for the year.
Approach to resilience Axiell utilise a Tier 3 Datacentre to host the provided services in dedicated, leased rack space from Interxion, London. Interxion are ISO27001 and ISO22301 accredited. The Datacentre campus is monitored 24x7 by CCTV and security patrols. All access is via multiple barriers, mantraps, contactless key cards and biometrics. The final barrier is the actual racks holding the servers supporting the environment and these are protected by keypad locks. Only the Axiell Group CIO or the Axiell UK Technical Operations Manager are authorised to give access to any staff requiring access to the Datacentre or the individual racks.
Axiell are not ISO27001 accredited but do have policies in line with ISO27001 under an overarching ISMS Policy. Axiell have received the Cyber Essentials Certification (Self-Assessment) and have obtained Cyber Essentials Plus Certification .
Our policy "Axiell and the Cloud Security Principles" outlines how Axiell meet the requirement of CESG’s 14 Principles of Cloud Computing and is available on request.
Outage reporting Axiell’s Firewalls support IDS which send events to our SIEM monitoring server. The SIEM monitoring server also monitors endpoints, routers, switches for unusual activity and potential risks. As well as a visible wallboard for alerts the solution autologs events into Axiell’s Case Management Tool which are then investigated and mitigated by Axiell’s Technical Services Team.
A service dashboard is a available through the case management tool and Customer notifications are typically provided by email or telephone although APIs are available for third party monitoring of the service if required.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels Only authorised users are assigned permissions to access management functions associated with their role. Support services all require the individual user to have their own account and as required, these accounts can be approved by a customer manager.
Access restriction testing frequency At least every 6 months
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Cyber Essentials Plus

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Axiell follow the CESG Cloud Computing Principles and have policies in line with ISO27001 with an overarching ISMS Policy.
Information security policies and processes Axiell have implemented a detailed ISMS policy. This Information Security Management System and associated operational procedures will, as far as practicable, address the Information Security Management principles defined within ISO27002:2013 ‘Code of Practice for Information Security Controls’. As such, this Policy will enable Axiell’s Staff, Suppliers and Contractors to accurately address the Information Security requirements of Axiell, thus avoiding ambiguity in the specification, delivery and implementation of Information Systems.
Operational procedures will be established to implement the corporate information security requirements outlined in this Security Management System, and appropriate mechanisms will be put in place to monitor and manage these procedures.
This Information Security Management System is supplemented by an “Information Security - User Guidelines” document.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Axiell operate a CMDB integrated into its Case Management System. As such all components of the solution have a Configuration Item. Where a system failure (Incident) or Change is made on a given CI then the CI is associated to the record, creating a full history of all changes and faults on a given component. The CMDB includes all services offered with relationships to the underpinning architecture such that analysis can be done prior to a change to see all the affected components.
All changes need approval by Axiell’s CTO who is responsible for ensuring that all services are secure.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Axiell’s estate is monitored using AlienVault OSSIM which assesses the configuration items against a database of known threats imported into OSSIM. Any detected risk of vulnerability is assessed against test systems to ensure that risks can be mitigated or eliminated with recommended actions. Axiell automatically apply all security fixes to all the underpinning OS and applications deployed unless there is proven detrimental impact to end users and risks are low to medium. Axiell subscribe to a number of sources for threat and vulnerability information.
Axiell follow the guidelines laid out in the CESG guidance on Implementing the Cloud Security Principles.
Protective monitoring type Supplier-defined controls
Protective monitoring approach AlienVault OSSIM consolidates the total view of Axiell’s infrastructure and receives alerts and logs from a variety of sources. Alerts are presented on a Nagios Wallboard with visual alerts and SMS and email alerts are sent to relevant analysts. As soon as any suspicious activity is detected, Incident Management processes are followed to investigate and manage the threat.
Active monitoring of infrastructure components generates alerts into OSSIM, OSSIM also sends alerts into the Incident Management Tool.
Incident management type Supplier-defined controls
Incident management approach Axiell’s Customer Service Tool receives alerts from OSSIM that trigger ITIL Incident Management Processes to track and progress all security incidents. Active threats are treated as Major Incidents. A knowledge base is maintained with processes to follow for events that have been seen and actioned. As the security incidents follow the Major Incident Process, this includes notification for key customer contacts. All Major Incidents are reported as part of the reporting pack from the Service Desk. As Security Incidents are classed as Major Incidents they will be reported as such. Any threat that risks the system directly is reported immediately.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks Yes
Connected networks
  • Public Services Network (PSN)
  • Joint Academic Network (JANET)
  • Scottish Wide Area Network (SWAN)


Price £1250 per unit per year
Discount for educational organisations No
Free trial available No


Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Terms and conditions document View uploaded document
Return to top ↑