Savant Limited

Mataco Business Continuity Software

Mataco is a secure, cloud based software service offering standards based compliant business continuity plan implementation, management, exercise, review and audit. Mataco also supports incident management activation and activity tracking. Mobile Mataco ensure that Plans can be accessed from anywhere at any time from a mobile device.

Features

  • Secure hosted storage for business critical data
  • Access from anywhere, anytime via internet or mobile devices
  • Business Data edited in one place, updated in all Plans
  • Plans can be created for a range of scenarios
  • Plans automatically updated to reflect data changes
  • Plan templates ensure a consistent look and feel to Plans
  • Email alerts to remind that reviews due or approvals required
  • Reports to enable access to business critical data quickly
  • User dashboard providing quick access to users plans and tasks
  • Support for reviews and exercising of Business Continuity Plans

Benefits

  • Reduced risk with "anytime,anywhere access" to data
  • Guaranteed security of data
  • Cloud based with you in control
  • Access from mobile devices
  • Management control: tracking of tasks and access to audit log
  • Reduced cost of plan production and maintenance
  • Key business data always available when you need it
  • Peace of mind
  • User permissions to control access to data

Pricing

£125 to £1250 per user per month

  • Education pricing available

Service documents

G-Cloud 9

309390435111868

Savant Limited

Rachel Wood

01524784400

rachel.wood@savant.co.uk

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints There are no service constraints.
System requirements
  • Web Browser - IE, Firefox, Chrome, Safari or Opera
  • Web or mobile internet access
  • PC, laptop, tablet or mobile device

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Initial response within 4 hours on working days between 8.30am and 5pm. 247 support can be provided at additional cost.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels There are 2 support levels:
Basic support providing telephone and email support on all working days between the hours of 8.30am and 5pm. This is included in the licence price.
Enhanced support to cover other hours as required. Costs can be provided on application.
All clients have a technical account manager who they can contact during working hours.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started User documentation is provided for the service.
A training course is provided for the service. The training can be carried out onsite or online.
Assistance is provided with data load and initial implementation.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Data can be extracted into Excel spreadsheets. All PDF documents can be extracted as PDFs.
End-of-contract process There will be no additional costs at the end of the contract unless the client specifically asked for data to be extracted for them in a specific format.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10+
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The full service can be accessed on a mobile device

On a mobile device, contacts can be sent text messages.
Accessibility standards None or don’t know
Description of accessibility Uncluttered layout. Good contrast and use of colours. Font size set to ensure easy to read. Intuitive menus appropriate to process.
Service is browser based so accessibility extensions within browsers can be used.
Accessibility testing No testing has been carried out with users of assistive technology.
API No
Customisation available No

Scaling

Scaling
Independence of resources We continually monitor the database sizes and the overall processing load on our servers and expand requirements to ensure no degradation in service. Our servers are specified to ensure they will maintain service with the maximum number of users permitted by the client licences.

Analytics

Analytics
Service usage metrics No

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Users can export their data into Excel spreadsheets.
Data export formats
  • CSV
  • Other
Other data export formats
  • PDF
  • Word
  • RTF
  • MHT
  • HTML
  • Text
  • Image
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Mataco is currently hosted on a virtual server by Melbourne Server Support, part of the Iomart Group. They give a 99.95% Service Level Agreement (SLA) for network connectivity. This means that the client's server will be accessible via the internet for 99.95% of the time, which equates to a maximum of 4.38 hours downtime per year.
Approach to resilience Savant uses a number of datacentres to support its services. We ensure a high level of resilience as a priority. We will discuss and agree with a client the most appropriate datacentre to meet their needs.
Outage reporting Savant would contact our customers directly by phone or email in the event of any outage.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels ISO 27001 and 9001. Staff training
Access restriction testing frequency At least every 6 months
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 Lloyds Register
ISO/IEC 27001 accreditation date 29/01/2012
What the ISO/IEC 27001 doesn’t cover No aspect of the service is not covered by our ISO/IEC 27001 certification or the ISO/IEC 27001 certification of our hosting provider.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation Yes
Security governance standards ISO/IEC 27001
Information security policies and processes The Improvements Manager reports to the Managing Director and is responsible for ensuring our Information Security policies are adhered to. Savant has an Information Security Procedure, which must be followed by all staff. The Procedure covers identifying interested parties and defining their interest, identifying information assets and categorising them, grouping information assets into information classes, identifying asset owners and assessing the class value. Risks are identified against each information asset, risks are linked to the ISMS controls; the likelihood of the risk occurring and the asset class risk of compromise are identified and the risk acceptance criteria are assessed. Treatment Plans are defined by asset class, the procedure for the execution of the treatment plan is defined and the procedures for re-assessing the risk score are documented. Regular internal audits ensure that the procedures are followed. Staff are encouraged to promptly report any suspected security breaches.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach All services are subject to Savants configuration and change management procedures. Each service has a specific procedure defining the steps to be taken to release a new version. These procedures cover requirements specifications for all proposed changes, test scripts for all proposed changes, testing procedure to include regression testing, a release schedule, customer liaison and the production and issue of release notes. All bugs are recorded in our Testtrack system from initially being reported through to update of the software and release to the customer.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Savant continually assess vulnerabilities. We ensure that our hosting services provide the highest levels of vulnerability management. We maintain awareness of vulnerabilities that might effect our software services and regularly test/audit our software services to ensure any potential vulnerabilities are identified and corrected promptly.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Savant carries out daily checks on its server to identify any potential compromises. We also have email alerts set up to notify staff of any compromises. In the event of a potential compromise being identified we will immediately lock-down the server affected and inform any affected customers. We aim to respond to any such incidents as quickly as possible and in any event within one hour during normal working hours. Outside of normal working hours, our hosting provider would take action on our behalf.
Incident management type Supplier-defined controls
Incident management approach Savant has a Business Continuity Plan that identifies our critical services and the actions to be taken in the event of an incident. Savant uses a hosted Business Continuity software service to store and maintain its Business Continuity data and Plans. Processes are defined to be followed in the event of specific incidents. There is a defined process for users to report incidents using the business continuity software enabling text messages to be sent to the Incident Management team. All details of an incident are recorded and an Incident Management report is produced by the software recording all actions taken.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £125 to £1250 per user per month
Discount for educational organisations Yes
Free trial available No

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑