BearingPoint Ltd

Active Manager - Digital Platform

A Manager led business transformation technology that creates a sustainable step change in operational performance. It typically delivers performance improvements between 10-20%.

Features

  • Process and Operational Improvement
  • People and Change
  • Operational Strategy and Transformation
  • Demand Management and Planning
  • Sourcing and Procurement
  • Smart and Sustainable Operations
  • Supply Chain Analytics

Benefits

  • Achieves operational performance improvements
  • Provides clients with a Year 1 ROI of 3:1
  • Active Manager programmes are typically cash neutral within 9 months
  • Establishes performance management culture within the Front Line Managers community
  • Equips Managers to support, mentor and build high performance
  • Enables Managers to manage change in constantly evolving operational environments
  • Improves leadership capability, confidence and accountability for goal achievement
  • Establishes rigor and discipline in delivering targeted performance goals/objectives
  • Increases the confidence in line managers ability to challenge performance

Pricing

£550 to £1700 per person per day

Service documents

G-Cloud 11

258069277887799

BearingPoint Ltd

Stewart Johns

07976 812978

UKPublicSectorBD@bearingpoint.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints N/A
System requirements
  • Windows / iOS for Platform compatibility
  • Otherwise agnostic system requirements

User support

User support
Email or online ticketing support Email or online ticketing
Support response times E-mail support available during prime business hours (5 days a week, 9am - 6pm)
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard None or don’t know
How the web chat support is accessible Skype web chat / IM support is available during prime working hours
Web chat accessibility testing N/A
Onsite support Onsite support
Support levels Hands on training, management and implementation of the Active Manager programme is essential to the success of every Active Manager Project.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started An initial discovery phase takes place in which key objectives and desired outputs are defined. From this point on, a structured approach is followed, which clearly sets out:

- BearingPoint's approach
- How key staff members will be trained to identify performance inefficiencies
- How improvements / results can best be captured
- Data Analysis to assist consistency of approach, use of KPI's and variation in performance to identify the lower quartile of performers for improvement
- Management Operation Framework (MOF) and Process Mapping
Service documentation Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
  • XLS
  • DOC
  • PPT
  • Mobile Application
End-of-contract data extraction The client is provided with all relevant data to the project during the offboarding process, which allows them to interpret a shared methodology.

Throughout the duration of the programme the data always resides with the client and ownership and/or IPR does not transfer to BearingPoint.

BearingPoint's IPR is the methodology and toolkits that are incorporated into the Active Manager offering.
End-of-contract process The Active Manager programme is entirely inclusive, with no additional services necessary.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The Active Manager platform has been developed by BearingPoint to support a hands-on mobile application developed specifically for training / implementation purposes
Accessibility standards None or don’t know
Description of accessibility A private link with login / password capabilities is provided, unique to every project / project manager as required.
Accessibility testing N/A
API No
Customisation available Yes
Description of customisation The service can be customised to report differing KPI's, tailored to produce customised dashboards with varying outputs for analysis

Scaling

Scaling
Independence of resources The Active Manager programme is provided as an independent toolkit to each client, with no centralised dependency of provision. Demand does not affect accessibility of our services and tools.

Analytics

Analytics
Service usage metrics No

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach In-house
Protecting data at rest
  • Physical access control, complying with another standard
  • Other
Other data at rest protection approach A Business Impact analysis and risk assessment is conducted for all of BearingPoint's core processes (16 areas in total, including HR, Finance, IT and Marketing) based on ISO:9001:2015 Processes.

The Business Continuity Plan (BCP) is tested continuously - once a year a full scale IT test is conducted. In addition, tests are conducted intermittently at various BearingPoint locations throughout the year.

BearingPoint is fully GDPR compliant.
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Data resides within an online library which enables coaches and managers direct and impactful communications within their own corporate systems.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats XLS
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats XLS

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Private network or public sector network
Data protection within supplier network IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability After the BearingPoint modules are implemented, the responsibility for hosting and performance of the associated infrastructure belongs to the client.

BearingPoint are not responsible, therefore instances of refunds are not appropriate to this offering.

BearingPoint's pricing structure ensures delivery of services prior to the rendering of payment.
Approach to resilience The BearingPoint service is sponsored by our Chief Operating Officer Hughes Verdier, Steering Committee meetings are held several times a year to manage and control resilience.

If required, BearingPoint can arrange a meeting / call to present our plans, documentation and provide any additional information that may be necessary.
Outage reporting N/A

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels N/A

The BearingPoint solution resides within our clients infrastructure and therefore our clients are responsible for any access restrictions in management interfaces and support channels
Access restriction testing frequency Never
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information No audit information available
Access to supplier activity audit information No audit information available
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 DMSZ GmbHDeutsche Managementsystem Zertifizierungsgesellschaft mbH
ISO/IEC 27001 accreditation date 19/04/2019
What the ISO/IEC 27001 doesn’t cover No Exclusions
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes BearingPoint's Information Management Policy adheres to ISO15489 International Standard, to define the companies rules for capturing, protecting, sharing, storing, organising, accessing, using, inventorying, archiving and deleting information produced within the company.

The IT Governance Council (IT GC) is a management committee composed of Partners & the FW IT department leader, whose mission is to evaluate and approve IT activities and responsibilities within the firm. Amongst the IT GC, a dedicated Partner is chosen to be the sponsor for IT Security in order to co-ordinate activities. The IT GC decides the budget and resources to be assigned to the different IT projects, including security.

The IT security incident review committee is composed of 4 persons: the COO, Legal Director, IT Director and CISO. Its mission is to review incidents that occured within the firm, as well as the ISMS efficiency. Reviews are managed on a regular basis (every 3 months).

BearingPoint has created different positions to support its security infrastructure:

- 1 CISO (Responsible for IT Security firmwide, oversees the functional manager in charge of ISMS)
- 2 Data Privacy Officers
- DPO Deputies
- Regionally appointed Data Privacy contacts

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach BearingPoint uses a configuration of network device solutions that provide efficient change notifications and updates that are made within the network.

Our network configuration management tools detect configuration changes in real time and sends notifications to the administrator. Our solution allows for the configuration of change notifications whenever there is a change in:

1. Startup or running configuration
2. Startup configuration alone
3. Running configuration alone

Other aspects of the configuration include E-mail notification, sending SNMP traps for configuration changes, collects Syslog messages and generates Tickets for configuration changes that need to be routed to specific change e-mail addresses
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach BearingPoint solutions allow for a live view across our entire enterprise - end-points, servers, applications, cloud work-loads, IoT devices and operational technology industrial control systems.

The BearingPoint solution predicts attacks and prioritises all vulnerabilities to drive a measured increase in efficiency.

This enables organisational alignment in collaboration within security protocols in order to re-mediate all threats.

Our solution aligns security with IT business objectives.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach BearingPoint uses protective monitoring technology and processes as part of our risk management strategy through the on-going collection and automated analysis of all log and event data, looking at all records of activity and performing real-time advanced correlation and pattern recognition.

Our technologies alert on both individual and broader malicious event sequences simplifying re-mediation and mitigating risk.

BearingPoint complies with the UK Government CESG good practise guide 13 (GPG13) and is a major component providing oversight of our corporate systems. It also maintains organisational risk management strategies related to commercial regulations such as PCI DSS.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach BearingPoint follows the ITIL incident management best practise which is closely aligned with the service desk which is the single point of contact for all users communicating with IT.

In the event of an unplanned interruption to, or quality reduction of an IT service our process follows a structured workflow, that encourages efficiency and best results on behalf of our customers.

The incident process provides efficient incident handling which in turn ensures continual service up-time.

Categorisation of incidents dependent on their business impact can be low, medium or high and procedurally follow initial diagnosis, through to resolution and recovery.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £550 to £1700 per person per day
Discount for educational organisations No
Free trial available No

Service documents

pdf document: Pricing document pdf document: Terms and conditions pdf document: Modern Slavery statement
Service documents
Return to top ↑