Bramble Hub Limited

Bramble Hub MACS - Maximo SAAS

(SaaS) is a software delivery model in which software function is delivered over the internet, managed by a vendor and paid for on a subscription basis. This would allow you to securely access its secure data from anywhere, at any time, via the internet from our Partner’s Tier 3+ datacentres


  • Server Operating System.
  • Anti-Virus Provision for Microsoft Windows workloads.
  • Fully managed infrastructure platform
  • Monitoring of platform availability and performance.
  • Capacity and availability reporting.
  • 24/7/365 service desk and technical support


  • Paid as an OPEX expense instead of a CAPEX investment.
  • Lower cost of service delivery
  • Reduced IT system administration cost
  • Reduced IT implementation Cost
  • Reallocation of IT resources
  • Faster roll-out / deployment
  • Scalability
  • IL0 to IL3 options


£277.43 per user per month

Service documents

G-Cloud 10


Bramble Hub Limited

Roland Cunningham

+44 (0) 2077350030

Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to Options
-Additional non-production instance(s)
-Expansion of non-production instance(s)
-Additional release upgrade frequency
-Optional First Line Helpdesk
Cloud deployment model Private cloud
Service constraints Not included
Implementation Services
-Application / Workflow Configuration
-VPN Configuration
-LDAP Configuration
-Data Transformation & Migration

Requires Further Discussion

Deployments over XXX Concurrent Users
-Availability SLA > 99.8
-Other non-standard hosting or support requirements
System requirements
  • Server Monitoring, Management & Backup
  • Operating System Management
  • Management and support of deployed Cloud+ workloads
  • Secure Data Protection –Data backup for deployed Cloud+ workloads
  • Dual Site Option

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Within 2 hours of service notification
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels MACS will support the management of IT as required by offering advice and practical solutions to a range of Max imo related activities. This may include, but is not limited to:
Advice on usage and set-up of hardware environments.
Evaluate and advise on acceptance of Operating System software upgrades and configuration changes,
including program patches.
Project support to any changes proposed to either the installed database software version or database
structure. Monthly rate for hosting tended support can extend from £1000 - £10,000 (dependent on the Business requirements. An account manager is provided.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started Data Loading Tools: Provide an excel template and instructions on how to populate. Introduce a new application for importing data.
-Person User
-Person Group

Preconfigured: Provide default data out of the box so organizations can be up and running within hours or days not weeks or months
-Security Groups
-Person Groups
-Start Centers
-Site/Org/Set Currencies
-GL Components
-Financial Periods
-Units of Measure

Straightforward to use – Little or no training required: applications will provide enough (but not too much) capability for Customers
-New Simplified apps – less fields/tabs/actions – for better consume-ability
-Focus on Service Request, Work Order, Asset, Jobplan, PM, Item

Quick onboarding:
-Pre-installed content to minimize data entry (Extend Content Pack)
-Focus on Initiator, Job Control, Planner, Technician roles
-Start Centers, Queries, Security Groups, Orgs/Sites/Sets, Currencies, Financial Periods, GL Accounts, System Properties, Units of Measure, Worktypes, Crafts
-Data Loading capabilities – support multiple iterations
-Person/User, Person Groups,
-Asset and Location Hierarchies
Service documentation Yes
Documentation formats
  • PDF
  • Other
Other documentation formats MS Word format
End-of-contract data extraction A process of database export has been established this can be exported tables, excel files, CSV. Further details can be provided from the MACS and terms and conditions.
End-of-contract process There will be a formal end of contract agreement following commercial and technical discussion which will be covered off in the MACS EU Limited terms and conditions

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Firefox
  • Chrome
  • Safari 9+
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Mobile deployed via the off-line and inline features and via roles and apps.
Accessibility standards None or don’t know
Description of accessibility Maximo is accessible in line with Federal government security and accessibility standards: USGCB, FDCC, FIPS support, NIST SP800-131a, and Section 508 accessibility.
Accessibility testing IBM Maximo has been vigorously tested before release.
Customisation available No


Independence of resources MACS provide separate physical platforms.


Service usage metrics Yes
Metrics types Need to agree in conjunction with the client service metric requirements
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Reseller providing extra support
Organisation whose services are being resold MACS - MAXIMO SAAS

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least every 6 months
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process No
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach There are 3 ways to import and export data from Maximo
• The import or Export function can be added to the application where the data resides,
• Manually import or export from an integration external system,
• Automatically import or export data, this can be done using OSLC, an interaction, an invocation channel, polling a database table, consuming an xml file or consuming a flat file from a file directory. The type of data import controls the elements that have to be set-up
Data export formats CSV
Data import formats
  • CSV
  • Other
Other data import formats
  • Data Table Import
  • ETL Process
  • Data Integration

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Our Cloud Service provider provides 100% uptime Guarantee for Network and Platform. Loss of use of core functionality Maximo is 5 % i.e. 95 % availability . No refund is offered.
Approach to resilience VM Replication -Database Replication -Transactional replication -Log shipping -Mirroring -Array-based Replication -DNS Failover
Outage reporting Email Alerts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels User name and Password
Access restriction testing frequency At least every 6 months
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach There is a set of in house security policy and procedure. It's available on request.
Information security policies and processes There is a set of in house security policy and procedure. It's available on request.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Primary contact person will maintain and add information to these requests including an impact analysis for realizing the changes and improvements.
On a quarterly basis all request and changes will be reviewed by the Customer key user team and the MACS primary contact.
All approved changes will be bundled in releases after which detailed planning will be made for development, testing, acceptance and promotion to production.
Carrying out modifications, extensions, installation of patches, etc. on the Maximo product itself via releases is not covered by this contract.
Vulnerability management type Undisclosed
Vulnerability management approach Maximo services are hosted with a leading Cloud Services Provider hat has well-defined Vulnerability management processes and regularly assesses Potential Threats via Penetration testing. Security as a service is from Alert Logic is deployed and we benefit from 24x7x365 security management support. Alert Logic provides Security-as-a-Service for on-premises, identifying potential threats and delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Fully managed by a team of experts, the Alert Logic Security-as-a-Service solution provides network, system and web application protection immediately, wherever your IT infrastructure resides.
Protective monitoring type Undisclosed
Protective monitoring approach It's available on request.
Incident management type Undisclosed
Incident management approach It's available on request.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks Yes
Connected networks
  • Public Services Network (PSN)
  • Scottish Wide Area Network (SWAN)


Price £277.43 per user per month
Discount for educational organisations No
Free trial available No

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑