Active Manager - Digital Platform
A Manager led business transformation technology that creates a sustainable step change in operational performance. It typically delivers performance improvements between 10-20%.
- Process and Operational Improvement
- People and Change
- Operational Strategy and Transformation
- Demand Management and Planning
- Sourcing and Procurement
- Smart and Sustainable Operations
- Supply Chain Analytics
- Achieves operational performance improvements
- Provides clients with a Year 1 ROI of 3:1
- Active Manager programmes are typically cash neutral within 9 months
- Establishes performance management culture within the Front Line Managers community
- Equips Managers to support, mentor and build high performance
- Enables Managers to manage change in constantly evolving operational environments
- Improves leadership capability, confidence and accountability for goal achievement
- Establishes rigor and discipline in delivering targeted performance goals/objectives
- Increases the confidence in line managers ability to challenge performance
£550 to £1700 per person per day
2 5 8 0 6 9 2 7 7 8 8 7 7 9 9
|Software add-on or extension||No|
|Cloud deployment model||
|Email or online ticketing support||Email or online ticketing|
|Support response times||E-mail support available during prime business hours (5 days a week, 9am - 6pm)|
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||Web chat|
|Web chat support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support accessibility standard||None or don’t know|
|How the web chat support is accessible||Skype web chat / IM support is available during prime working hours|
|Web chat accessibility testing||N/A|
|Onsite support||Onsite support|
|Support levels||Hands on training, management and implementation of the Active Manager programme is essential to the success of every Active Manager Project.|
|Support available to third parties||No|
Onboarding and offboarding
An initial discovery phase takes place in which key objectives and desired outputs are defined. From this point on, a structured approach is followed, which clearly sets out:
- BearingPoint's approach
- How key staff members will be trained to identify performance inefficiencies
- How improvements / results can best be captured
- Data Analysis to assist consistency of approach, use of KPI's and variation in performance to identify the lower quartile of performers for improvement
- Management Operation Framework (MOF) and Process Mapping
|Other documentation formats||
|End-of-contract data extraction||
The client is provided with all relevant data to the project during the offboarding process, which allows them to interpret a shared methodology.
Throughout the duration of the programme the data always resides with the client and ownership and/or IPR does not transfer to BearingPoint.
BearingPoint's IPR is the methodology and toolkits that are incorporated into the Active Manager offering.
|End-of-contract process||The Active Manager programme is entirely inclusive, with no additional services necessary.|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||The Active Manager platform has been developed by BearingPoint to support a hands-on mobile application developed specifically for training / implementation purposes|
|Description of service interface||Web / Offline interfaces are available for BearingPoint's Active Manager solution, as well as a mobile application.|
|Accessibility standards||None or don’t know|
|Description of accessibility||A private link with login / password capabilities is provided, unique to every project / project manager as required.|
|Description of customisation||The service can be customised to report differing KPI's, tailored to produce customised dashboards with varying outputs for analysis|
|Independence of resources||The Active Manager programme is provided as an independent toolkit to each client, with no centralised dependency of provision. Demand does not affect accessibility of our services and tools.|
|Service usage metrics||No|
|Supplier type||Not a reseller|
|Staff security clearance||Conforms to BS7858:2012|
|Government security clearance||Up to Security Clearance (SC)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||No|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least every 6 months|
|Penetration testing approach||In-house|
|Protecting data at rest||
|Other data at rest protection approach||
A Business Impact analysis and risk assessment is conducted for all of BearingPoint's core processes (16 areas in total, including HR, Finance, IT and Marketing) based on ISO:9001:2015 Processes.
The Business Continuity Plan (BCP) is tested continuously - once a year a full scale IT test is conducted. In addition, tests are conducted intermittently at various BearingPoint locations throughout the year.
BearingPoint is fully GDPR compliant.
|Data sanitisation process||Yes|
|Data sanitisation type||
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||Data resides within an online library which enables coaches and managers direct and impactful communications within their own corporate systems.|
|Data export formats||
|Other data export formats||XLS|
|Data import formats||
|Other data import formats||XLS|
|Data protection between buyer and supplier networks||Private network or public sector network|
|Data protection within supplier network||IPsec or TLS VPN gateway|
Availability and resilience
After the BearingPoint modules are implemented, the responsibility for hosting and performance of the associated infrastructure belongs to the client.
BearingPoint are not responsible, therefore instances of refunds are not appropriate to this offering.
BearingPoint's pricing structure ensures delivery of services prior to the rendering of payment.
|Approach to resilience||
The BearingPoint service is sponsored by our Chief Operating Officer Hughes Verdier, Steering Committee meetings are held several times a year to manage and control resilience.
If required, BearingPoint can arrange a meeting / call to present our plans, documentation and provide any additional information that may be necessary.
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||
The BearingPoint solution resides within our clients infrastructure and therefore our clients are responsible for any access restrictions in management interfaces and support channels
|Access restriction testing frequency||Never|
|Management access authentication||
Audit information for users
|Access to user activity audit information||No audit information available|
|Access to supplier activity audit information||No audit information available|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||DMSZ GmbHDeutsche Managementsystem Zertifizierungsgesellschaft mbH|
|ISO/IEC 27001 accreditation date||19/04/2019|
|What the ISO/IEC 27001 doesn’t cover||No Exclusions|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||
BearingPoint's Information Management Policy adheres to ISO15489 International Standard, to define the companies rules for capturing, protecting, sharing, storing, organising, accessing, using, inventorying, archiving and deleting information produced within the company.
The IT Governance Council (IT GC) is a management committee composed of Partners & the FW IT department leader, whose mission is to evaluate and approve IT activities and responsibilities within the firm. Amongst the IT GC, a dedicated Partner is chosen to be the sponsor for IT Security in order to co-ordinate activities. The IT GC decides the budget and resources to be assigned to the different IT projects, including security.
The IT security incident review committee is composed of 4 persons: the COO, Legal Director, IT Director and CISO. Its mission is to review incidents that occured within the firm, as well as the ISMS efficiency. Reviews are managed on a regular basis (every 3 months).
BearingPoint has created different positions to support its security infrastructure:
- 1 CISO (Responsible for IT Security firmwide, oversees the functional manager in charge of ISMS)
- 2 Data Privacy Officers
- DPO Deputies
- Regionally appointed Data Privacy contacts
|Configuration and change management standard||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Configuration and change management approach||
BearingPoint uses a configuration of network device solutions that provide efficient change notifications and updates that are made within the network.
Our network configuration management tools detect configuration changes in real time and sends notifications to the administrator. Our solution allows for the configuration of change notifications whenever there is a change in:
1. Startup or running configuration
2. Startup configuration alone
3. Running configuration alone
Other aspects of the configuration include E-mail notification, sending SNMP traps for configuration changes, collects Syslog messages and generates Tickets for configuration changes that need to be routed to specific change e-mail addresses
|Vulnerability management type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Vulnerability management approach||
BearingPoint solutions allow for a live view across our entire enterprise - end-points, servers, applications, cloud work-loads, IoT devices and operational technology industrial control systems.
The BearingPoint solution predicts attacks and prioritises all vulnerabilities to drive a measured increase in efficiency.
This enables organisational alignment in collaboration within security protocols in order to re-mediate all threats.
Our solution aligns security with IT business objectives.
|Protective monitoring type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Protective monitoring approach||
BearingPoint uses protective monitoring technology and processes as part of our risk management strategy through the on-going collection and automated analysis of all log and event data, looking at all records of activity and performing real-time advanced correlation and pattern recognition.
Our technologies alert on both individual and broader malicious event sequences simplifying re-mediation and mitigating risk.
BearingPoint complies with the UK Government CESG good practise guide 13 (GPG13) and is a major component providing oversight of our corporate systems. It also maintains organisational risk management strategies related to commercial regulations such as PCI DSS.
|Incident management type||Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402|
|Incident management approach||
BearingPoint follows the ITIL incident management best practise which is closely aligned with the service desk which is the single point of contact for all users communicating with IT.
In the event of an unplanned interruption to, or quality reduction of an IT service our process follows a structured workflow, that encourages efficiency and best results on behalf of our customers.
The incident process provides efficient incident handling which in turn ensures continual service up-time.
Categorisation of incidents dependent on their business impact can be low, medium or high and procedurally follow initial diagnosis, through to resolution and recovery.
|Approach to secure software development best practice||Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)|
Public sector networks
|Connection to public sector networks||No|
|Price||£550 to £1700 per person per day|
|Discount for educational organisations||No|
|Free trial available||No|