BearingPoint Ltd

Active Manager - Digital Platform

A Manager led business transformation technology that creates a sustainable step change in operational performance. It typically delivers performance improvements between 10-20%.


  • Process and Operational Improvement
  • People and Change
  • Operational Strategy and Transformation
  • Demand Management and Planning
  • Sourcing and Procurement
  • Smart and Sustainable Operations
  • Supply Chain Analytics


  • Achieves operational performance improvements
  • Provides clients with a Year 1 ROI of 3:1
  • Active Manager programmes are typically cash neutral within 9 months
  • Establishes performance management culture within the Front Line Managers community
  • Equips Managers to support, mentor and build high performance
  • Enables Managers to manage change in constantly evolving operational environments
  • Improves leadership capability, confidence and accountability for goal achievement
  • Establishes rigor and discipline in delivering targeted performance goals/objectives
  • Increases the confidence in line managers ability to challenge performance


£550 to £1700 per person per day

Service documents


G-Cloud 11

Service ID

2 5 8 0 6 9 2 7 7 8 8 7 7 9 9


BearingPoint Ltd

Stewart Johns

07976 812978

Service scope

Software add-on or extension
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
System requirements
  • Windows / iOS for Platform compatibility
  • Otherwise agnostic system requirements

User support

Email or online ticketing support
Email or online ticketing
Support response times
E-mail support available during prime business hours (5 days a week, 9am - 6pm)
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Skype web chat / IM support is available during prime working hours
Web chat accessibility testing
Onsite support
Onsite support
Support levels
Hands on training, management and implementation of the Active Manager programme is essential to the success of every Active Manager Project.
Support available to third parties

Onboarding and offboarding

Getting started
An initial discovery phase takes place in which key objectives and desired outputs are defined. From this point on, a structured approach is followed, which clearly sets out:

- BearingPoint's approach
- How key staff members will be trained to identify performance inefficiencies
- How improvements / results can best be captured
- Data Analysis to assist consistency of approach, use of KPI's and variation in performance to identify the lower quartile of performers for improvement
- Management Operation Framework (MOF) and Process Mapping
Service documentation
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
  • XLS
  • DOC
  • PPT
  • Mobile Application
End-of-contract data extraction
The client is provided with all relevant data to the project during the offboarding process, which allows them to interpret a shared methodology.

Throughout the duration of the programme the data always resides with the client and ownership and/or IPR does not transfer to BearingPoint.

BearingPoint's IPR is the methodology and toolkits that are incorporated into the Active Manager offering.
End-of-contract process
The Active Manager programme is entirely inclusive, with no additional services necessary.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
The Active Manager platform has been developed by BearingPoint to support a hands-on mobile application developed specifically for training / implementation purposes
Service interface
Description of service interface
Web / Offline interfaces are available for BearingPoint's Active Manager solution, as well as a mobile application.
Accessibility standards
None or don’t know
Description of accessibility
A private link with login / password capabilities is provided, unique to every project / project manager as required.
Accessibility testing
Customisation available
Description of customisation
The service can be customised to report differing KPI's, tailored to produce customised dashboards with varying outputs for analysis


Independence of resources
The Active Manager programme is provided as an independent toolkit to each client, with no centralised dependency of provision. Demand does not affect accessibility of our services and tools.


Service usage metrics


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Protecting data at rest
  • Physical access control, complying with another standard
  • Other
Other data at rest protection approach
A Business Impact analysis and risk assessment is conducted for all of BearingPoint's core processes (16 areas in total, including HR, Finance, IT and Marketing) based on ISO:9001:2015 Processes.

The Business Continuity Plan (BCP) is tested continuously - once a year a full scale IT test is conducted. In addition, tests are conducted intermittently at various BearingPoint locations throughout the year.

BearingPoint is fully GDPR compliant.
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Data resides within an online library which enables coaches and managers direct and impactful communications within their own corporate systems.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
Private network or public sector network
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
After the BearingPoint modules are implemented, the responsibility for hosting and performance of the associated infrastructure belongs to the client.

BearingPoint are not responsible, therefore instances of refunds are not appropriate to this offering.

BearingPoint's pricing structure ensures delivery of services prior to the rendering of payment.
Approach to resilience
The BearingPoint service is sponsored by our Chief Operating Officer Hughes Verdier, Steering Committee meetings are held several times a year to manage and control resilience.

If required, BearingPoint can arrange a meeting / call to present our plans, documentation and provide any additional information that may be necessary.
Outage reporting

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels

The BearingPoint solution resides within our clients infrastructure and therefore our clients are responsible for any access restrictions in management interfaces and support channels
Access restriction testing frequency
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
DMSZ GmbHDeutsche Managementsystem Zertifizierungsgesellschaft mbH
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
No Exclusions
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
BearingPoint's Information Management Policy adheres to ISO15489 International Standard, to define the companies rules for capturing, protecting, sharing, storing, organising, accessing, using, inventorying, archiving and deleting information produced within the company.

The IT Governance Council (IT GC) is a management committee composed of Partners & the FW IT department leader, whose mission is to evaluate and approve IT activities and responsibilities within the firm. Amongst the IT GC, a dedicated Partner is chosen to be the sponsor for IT Security in order to co-ordinate activities. The IT GC decides the budget and resources to be assigned to the different IT projects, including security.

The IT security incident review committee is composed of 4 persons: the COO, Legal Director, IT Director and CISO. Its mission is to review incidents that occured within the firm, as well as the ISMS efficiency. Reviews are managed on a regular basis (every 3 months).

BearingPoint has created different positions to support its security infrastructure:

- 1 CISO (Responsible for IT Security firmwide, oversees the functional manager in charge of ISMS)
- 2 Data Privacy Officers
- DPO Deputies
- Regionally appointed Data Privacy contacts

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
BearingPoint uses a configuration of network device solutions that provide efficient change notifications and updates that are made within the network.

Our network configuration management tools detect configuration changes in real time and sends notifications to the administrator. Our solution allows for the configuration of change notifications whenever there is a change in:

1. Startup or running configuration
2. Startup configuration alone
3. Running configuration alone

Other aspects of the configuration include E-mail notification, sending SNMP traps for configuration changes, collects Syslog messages and generates Tickets for configuration changes that need to be routed to specific change e-mail addresses
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
BearingPoint solutions allow for a live view across our entire enterprise - end-points, servers, applications, cloud work-loads, IoT devices and operational technology industrial control systems.

The BearingPoint solution predicts attacks and prioritises all vulnerabilities to drive a measured increase in efficiency.

This enables organisational alignment in collaboration within security protocols in order to re-mediate all threats.

Our solution aligns security with IT business objectives.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
BearingPoint uses protective monitoring technology and processes as part of our risk management strategy through the on-going collection and automated analysis of all log and event data, looking at all records of activity and performing real-time advanced correlation and pattern recognition.

Our technologies alert on both individual and broader malicious event sequences simplifying re-mediation and mitigating risk.

BearingPoint complies with the UK Government CESG good practise guide 13 (GPG13) and is a major component providing oversight of our corporate systems. It also maintains organisational risk management strategies related to commercial regulations such as PCI DSS.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
BearingPoint follows the ITIL incident management best practise which is closely aligned with the service desk which is the single point of contact for all users communicating with IT.

In the event of an unplanned interruption to, or quality reduction of an IT service our process follows a structured workflow, that encourages efficiency and best results on behalf of our customers.

The incident process provides efficient incident handling which in turn ensures continual service up-time.

Categorisation of incidents dependent on their business impact can be low, medium or high and procedurally follow initial diagnosis, through to resolution and recovery.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks


£550 to £1700 per person per day
Discount for educational organisations
Free trial available

Service documents

Return to top ↑