Roke Manor Research

Business Analysis

Business Analysis across Solution Development lifecycles. Stakeholder Management and engagement, Requirements Engineering, Business Process modelling from the Business Architecture layer down to Task level, using industry standard modelling (BPMN, CMMN, UML and BPMN Choreography). Business Acceptance testing and Benefits realisation coupled with Business Change are part of our core capabilities.

Features

  • Development and realisation of User driven requirements.
  • Flexible Stakeholder Management and engagement capability
  • Business process, service and architecture mapping using BPMN, UML, CMMN
  • Development of Business, Solution and Process design and architecture options.
  • Gap and Impact analysis (Financial, Technical and Business Operations)
  • Business Acceptance Testing
  • Problem Definition and Data Analysis.
  • Clear and concise reporting of outcomes against delivery.
  • Provision of SC and DV cleared professionals with BCS Qualifications

Benefits

  • Maximisation of user benefit and value
  • Key stakeholders engaged and on-board
  • Understanding as-is and to-be business and service architectures
  • Reduced risk of development delays from unnecessary or unclear requirements
  • Efficient handover of outputs to authority and other third parties
  • SC and DV cleared professionals with secure offices
  • Offices in Romsey, London and Gloucester
  • Ability to work efficiently on the authority's premises and IT
  • Ability to work fully remote up to and including Official-Sensitive

Pricing

£540 to £1,770 a person a day

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sue.gannon@roke.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

3 8 8 4 4 9 2 6 5 6 1 9 0 8 0

Contact

Roke Manor Research Sue Gannon
Telephone: (0)1794 833158
Email: sue.gannon@roke.co.uk

Planning

Planning service
Yes
How the planning service works
As part of planning and designing a new service which uses Information Technology, Cyber Security must be considered. Roke’s Secure Architecture and Risk Assessment service provides support to service planning teams through the application of a well-defined Cyber Risk Assessment process:

(1). Understand User Needs – what does the system need to do?

(2). Asset Identification – what information or service needs to be protected?

(3). Threat Identification – what is the system likely to be exposed to?

(4). Vulnerabilities – in the current design, where is the solution vulnerable?

(5). Risk Identification – based on 1 to 5, what are the current risks when operating the system?

(6). Risk Control – the development of mitigations for the top risks.

(7). Risk Management – the ongoing management of Cyber risk.

Roke are able to use this Risk Assessment process, either to assist with the definition of a secure architecture or to review the architectures produced by client design teams. Performing this activity early and before the service is implemented enables savings in cost, time to market and reputation through the reduction in re-work in latter phases of the service development.
Planning service works with specific services
No

Training

Training service provided
No

Setup and migration

Setup or migration service available
Yes
How the setup or migration service works
When planning to migrate to the Cloud, or between Cloud services, it's vital that Cyber Security is considered, including changes to the threat landscape since the service was originally implemented. Roke’s Secure Architecture and Risk Assessment service provides support to teams who are planning the migration of services through the application of Cyber Risk Assessment of the new service:
(1). Understand User Needs – what does the system need to do?
(2). Asset Identification – what information or service needs to be protected?
(3). Threat Identification – what is the system likely to be exposed to?
(4). Vulnerabilities – in the current design, where is the solution vulnerable?
(5). Risk Identification – based on 1 to 5, what are the current risks when operating the system?
(6). Risk Control – the development of mitigations for the top risks.
(7). Risk Management – the ongoing management of Cyber risk.

Roke are able to use this Risk Assessment process to review the architectures and service migration plans produced by design teams. Performing this activity early and before the service is migrated enables savings in cost, time to market and reputation through the reduction in re-work in latter phases of the service development.
Setup or migration service is for specific cloud services
No

Quality assurance and performance testing

Quality assurance and performance testing service
Yes
How the quality assurance and performance testing works
Roke has a mature, comprehensive Quality Management System and holds 3rd party certification to ISO 9001:2015 (BSI registration certificate number Q05609).

The scope of this certification is for technical consultancy; research and development; design, development and supply of hardware and software products, and technical service and support in the fields of sensors, electronics and communications.

Security testing

Security services
Yes
Security services type
  • Security strategy
  • Security risk management
  • Security design
  • Cyber security consultancy
  • Other
Other security services
To be discussed individually with each Customer.

Ongoing support

Ongoing support service
No

Service scope

Service constraints
No

User support

Email or online ticketing support
Email or online ticketing
Support response times
1 business working day, during offices hours.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Support levels
To be discussed as part of statement of work.

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Pricing

Price
£540 to £1,770 a person a day
Discount for educational organisations
Yes

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sue.gannon@roke.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.