Technology One UK Ltd

OneCouncil

TechnologyOne OneCouncil is a Council best practice business process, integrated ERP SaaS solution with accelerators, available on mobile devices/web browsers, including Financials, Accounting, General Ledger/Accounts Payable/Accounts Receivable (GL/AP/AR), Sundry Debtors, Budgeting, Forecasting, Supply Chain, Procurement, e-Procurement, Inventory Management, Spatial/Mapping, Performance Planning, Human Resources, Payroll, Asset Management, Content/Document Management, Business Analytics.

Features

  • Fully Integrated ERP solution for Local Government
  • Local Government focus/commitment - 330 local council clients
  • OneCouncil solution available on smart phones, tablets or laptop/desktop
  • 100% browser based. No apps to download/maintain, no local data
  • All functions available any device, running on any web browser
  • Single version of truth - One Solution/Data Schema/Interface
  • Pure Software as a Service, delivered in the AWS Cloud
  • One vendor for developing, delivering, supporting and running the solution
  • Business intelligence with transaction drill-down
  • Solution accelerator for Local Authorities – faster, reduced risk implementation

Benefits

  • One Vendor; designs, develops, implements, runs and supports the solution
  • Purpose built functionality designed to meet Local Government needs
  • Commercial off the shelf, driven 100% by configuration not customisations
  • UX is built according to consumer grade principles
  • Secure Scalable and fully managed; allows focus on service delivery
  • Single: workflow/forms engine, analytics/reporting tools, security & attachment/document management
  • Consistent user experience. Looks/behaves the same across entire system
  • End-to-end business processes in one system. Reduces/eliminates need for interfaces
  • Portals allow external parties to engage on their own smartphones/tablets
  • Easy/intuitive use, integrated to features like touch/pinch/zoom/location services and camera/video

Pricing

£42750 per unit per year

  • Education pricing available

Service documents

Framework

G-Cloud 11

Service ID

4 0 0 7 7 2 8 2 8 2 0 0 3 7 5

Contact

Technology One UK Ltd

Shelli Norris

01628591160

shelli_norris@technologyonecorp.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
Any planned maintenance will be as agreed between TechnologyOne and the Customer and performed in non-business hours.
System requirements
  • Supported web browsers: Internet Explorer 10+, Firefox, Chrome, Safari, Opera
  • Supported devices: PC, Mac, Smartphone, Tablet

User support

Email or online ticketing support
Email or online ticketing
Support response times
TechnologyOne Support is available 24x7 online and by telephone from 07:00 to 19:00 (local time). Target response and resolution times are based on agreed priority classifications; for Priority 1 (Critical) issues the target response time is 30 minutes.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
TechnologyOne’s standard ASM, included in the SaaS fee, includes the following features.
Access to the TechnologyOne Customer Community which includes a range of helpful online support resource tabs, including: Cases - create and manage your cases online: Groups - ask questions, share news and collaborate with other customers and TechnologyOne: Knowledge -access to extensive knowledge articles for helpful software information:
Ideas - suggest product enhancement requests or ideas: Profile - manage your individual profile.
Access to our dedicated Customer Support team.
New SaaS software releases, software updates, Ci Packages and Ci Anywhere Apps.
Fault / Issue reporting on shipped products.
Direct access to Customer Account Managers.
TechnologyOne University, which connects users with powerful and timely training resources that can be accessed when they are needed – on any device, anywhere, any time.
TechnologyOne can provide other options for support and service availability, based on the payment of a premium above the standard TechnologyOne SaaS fee.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
TechnologyOne provides onsite training, Key User workshops, and Train-the-Trainer cabability. The TechnologyOne training method involves participants engaging in a combination of formal instruction and demonstrations followed by Trainer directed “hands on” activities.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
On exit, TechnologyOne will provide the Council with a standard SQL backup of their database and a current file-based snapshot of their files (attachments etc.). At such a time, all data belonging to the Council will be deleted, the database instance destroyed, and any dedicated virtual servers terminated.
The steps taken to return data to the Council upon termination or expiry of the contract/service are:
1. Restrict access to the Council solution, to ensure that no further updates take place.
2. Take a final full backup of the production database and place the backup in the Council’s download area.
3. Take a final backup of all associated metadata files and place the backup in the Council’s download area.
4. Notify the Council that the backups are on the download area, and that they have 30 days to download the backup files.
5. Verify with the Council that they have completed the download.
6. After 30 days, remove the backup files from the Council’s download area.
7. Then delete the Council’s TechnologyOne Cloud environment, including all backups.
Verification of the disposal is part of TechnologyOne’s ISO27001 Information Security Policy.
Verification of the disposal is part of TechnologyOne’s ISO27001 Information Security Policy.
End-of-contract process
An exit strategy plan will be prepared and maintained and the services to implement the exit strategy plan will be charged to the Council on a time and materials basis at the then current daily consulting rates unless otherwise agreed between the parties.
As TechnologyOne is proposing Software as a Service, termination of the contract terminates the right to use the Software. Where the Customer wishes to continue to use the software after termination, the Customer will need to purchase a further license for the software. As TechnologyOne provides commercial off the shelf software, if the Customer requires support and maintenance services after termination, TechnologyOne will continue to provide these to the Customer on TechnologyOne standard terms and fees.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Ci Anywhere is a Software as a Service (SaaS) solution delivered from the TechnologyOne Cloud, a platform designed for a “cloud first, mobile first” world. Ci Anywhere has a pure HTML5 user interface that only requires a web browser to run, is designed for touch operation, and adapts to the device it is being viewed on – e.g., tablet, smart phone, Apple or Windows laptop or PC.
Service interface
Yes
Description of service interface
TechnologyOne's Ci Anywhere software is designed to be used anywhere, anytime from any device. It is a pure browser-based solution and has been optimised for performance across low-bandwidth connections and on mobile devices. Ci Anywhere communicates using the HTTP protocol, and all communications are encrypted using TLS. Access requirements are simply an HTML5 enabled Device and Internet connection.
TechnologyOne offers a good user experience via a standard web browser, with no requirement for RDS or Citrix client software.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
Our software engineers are trained by Vision Australia in Web Accessibility Guidelines, to the software is designed to meet the general requirements of accessibility as follows:
1. Sequence in source code order is meaningful
2. Text resizes when size (e.g. using zoom) is changed in the browser
3. Text is implemented as HTML text 4. Colour alone is not used to convey information or indicate an action
5. A visual focus indicator is provided
6. The tab order for controls, input fields and other objects is logical
A user is able to select "Accessibility" mode, which will enhance the current presentation functionality, as well as providing text tool tips that allow screen readers to read the page aloud and interpret the interface for the user. Our development team has focused on the screen reader technology built in to Mac OSX, and JAWS readers for Windows.
API
Yes
What users can and can't do using the API
The TechnologyOne solution has two Web Services Application Programming Interfaces (APIs) that provide a real-time interface to various functions that can read and update information.
A library of legacy, SOAP (Simple Object Access Protocol) web services that implement specific business processes as part of the TechnologyOne product suite. The available web services are pre-defined and a user can configure and update a call as required from any tool that can make SOAP calls. Each web service has a specific defined input and output syntax defined in the application.
A library of REST (REpresentational State Transfer) web services that form an integral part of our Service-Oriented Architecture. TechnologyOne’s strategy is to expose a generic web service endpoint to external systems and to allow the customer to configure the data requirements within the application itself. Customers can access the entire data set using this method, which effectively future-proofs the interface. REST services are self documenting and fully testable in the application as they are created.
Web Services offer a standardised way of validating and updating external data into the TechnologyOne solution. All Web Service activities are subject to the same authentication, authorisation and audit controls as an interactive user.
API documentation
Yes
API documentation formats
Open API (also known as Swagger)
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
TechnologyOne’s enterprise software operates from a standard code base and is specifically designed to enable organisations to configure their customer experience and business process requirements without the need for costly customised software development that requires highly technical resources. TechnologyOne has invested heavily in providing a very mature best practice configuration based approach not only for customer configurations, but also as the core architectural approach for the entire range of TechnologyOne market solutions.
The following areas can be customised:
Business Intelligence – to provide customised reporting and dashboards.
Workflow - ablity to define and customise workflow for approvals as per business needs.
BPM Forms provides a modern, intuitive web form interface for the end user, with a configurable forms designer. BPM Forms is connected to BPM Workflow, which provides the flexibility to implement a myriad of business processes. A process can be initiated with a form, then automated and managed with workflow.
Users can customise the above following training, dependent on role based access levels; users are assigned a role or profile which determines what modules and functions a user can access.

Scaling

Independence of resources
At the processing layer, TechnologyOne Cloud is a production line of servers with the same operating system, the same OS configuration and the same TechnologyOne code. All Cloud customers share this common "codeset" - there is no custom code in this layer. The business layer is truly elastic and scales dynamically to meet demands. This is only possible because all the servers are identical and do not host customer specific code or configuration. The TechnologyOne Cloud platform is based on an Active-Active-Active architecture which is underpinned by elastic provisioning of stateless, dynamic load balanced server processes.

Analytics

Service usage metrics
Yes
Metrics types
The TechnologyOne SaaS Platform gathers a wide range of metrics including things like response time, error messages and SQL performance measurements. These metrics are being expanded upon regularly to help build a wider picture of a customers experience within the SaaS Platform. As part of this process . we are able to present to our customers a snapshot view of their users experience on demand as required.
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
  • Other
Other data at rest protection approach
All data volumes within the TechnologyOne SaaS Platform are encrypted at rest to ensure that in the event of any physical intrusion to the service, data would be unreadable.
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
TechnologyOne’s Business ETL (Extract-Transform-Load) Capability for extracting and transforming data, or ‘ETL’ for short. Business ETL provides the mechanism for bringing data together from disparate sources, transforming that data to ensure it can be easily imported into the TechnologyOne products, organising and calculating it to create flattened, easy to access information for reporting, importing or exporting. The integration capability of ETL enables it to easily query information and extract it for the use of external applications as well as providing capability for importing information back into the TechnologyOne solution, either in a real-time or scheduled mode.
Data export formats
  • CSV
  • Other
Other data export formats
  • XML
  • Pdf
Data import formats
  • CSV
  • Other
Other data import formats
  • XML
  • Pdf

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Other
Other protection between networks
All services delivered by the TechnologyOne SaaS Platform are delivered via HTTP/S with the latest modern secure cyphers.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network
All services delivered by the TechnologyOne SaaS Platform are delivered via HTTP/S with the latest modern secure cyphers.

Availability and resilience

Guaranteed availability
TechnologyOne aims to provide the Customer with 99.5% availability of the software each month of the cloud services term during business hours. Business hours are deemed 7am-7pm Monday to Friday unless otherwise agreed.
Any Service Credits are an "at risk" amount based on a percentage of the total Annual Hosting Services Fee (VAT exclusive) available to the Customer from Supplier that will be allocated and applied annually by the Customer in accordance with the contracted Hosting Service Level Commitment for failure to meet the Availability Service Level.
Approach to resilience
The TechnologyOne Cloud provides a highly resilient environment and architecture to promote the highest possible levels of availability and is summarised as follows:
• Highly resilient site design including dual power and communications services, power systems and strict security;
• Dual site redundancy between no less than two data centres located within the EEA;
• Highly available architecture that replicates all transactions in real time providing immediate continuity of the solution in the event of a catastrophic site failure.
• A robust backup regime that incremental backups of all solution data.
• Internet availability: users can log into the solution from any Internet-connected device.
Further information is available on request.
Outage reporting
TechnologyOne uses a governance model defined under the ITIL Service Management Framework that pre­defines the steps that are taken to handle an incident impacting a customer’s environment. TechnologyOne uses an incident management tool to manage the incident process ensuring incidents are handled via a pre­defined path and within pre­defined timescales. The Incident model includes the steps that TechnologyOne takes to handle the Incident including the chronological order of the incident including any dependences. Responsibilities are outlined and detail the tasks that are required to resolve the incident including the associated escalation procedures and who should be contacted and at what stage.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
Access restrictions in management interfaces and support channels
Only the nominated key contact(s) can register incidents or cases in our TechnologyOne Customer Community, cases would need to be logged in order to provision new service elements or manage user accounts.
User security is divided into Authentication (the login process) and Authorisation (access to functions and data within the solution once a user has logged on). Once a user is authenticated, access control is implemented using a security matrix made up of a number of different configurable objects; only those with the appropriate access can perform management activities.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
DAS Certification
ISO/IEC 27001 accreditation date
02/09/2018
What the ISO/IEC 27001 doesn’t cover
The certification is limited to the provision of software solutions within a cloud architecture.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
Yes
Any other security certifications
  • ISO/IEC 27017
  • ISO/IEC 27018
  • ISAE 3402 SOC 1 Type 1
  • SSAE 18 SOC 1
  • AT-C 205 SOC 2
  • SOC 3
  • Cyber Essentials

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
ISAE 3402 SOC 1
SSAE 18 SOC 1
AT-C 205 SOC 2, SOC 3
ISO/IEC 27017
ISO/IEC 27018
Information security policies and processes
TechnologyOne has a policy in place with regards to Information Security Management. TechnologyOne currently holds certification for the following standards with regards to Information Security Management:
• ISO/IEC 27001:2013
• ISO/IEC 27017
• ISO/IEC 27018
• ISAE 3402 SOC 1
• SSAE 18 SOC 1
• AT-C 205 SOC 2
• SOC 3
The assurance services examine internal controls related to Information Security (e.g. Network Security, Operating System and Database Configuration), Change and System Maintenance, Data Centre and Network Operations and Disaster Recovery for activities undertaken by the TechnologyOne Cloud Business Unit.
TechnologyOne undertakes annual awareness and training programs covering technology, security, policies, processes, incident management and DR, alongside regular audits of policies and processes. Information Security Training is incorporated as part of an induction process, is integrated as a module into our organisations overarching training programme and bespoke training is delivered to those performing specific roles.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
All changes are initiated, authorised, developed, tested and approved with appropriate segregation of duties between development, test (ITQA) and production environments.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
TechnologyOne is subject to independent penetration testing as part of maintaining ISO 27001 certification. All infrastructure and platforms have been configured to ensure our software is protected against vulnerabilities such as SQL injection, cross site scripting, buffer overruns and man-in-the-middle attacks. It also extends to the Cloud platform, with a defence-in-depth architecture: each layer of infrastructure is segregated at multiple levels, including network, firewall and application. Industry standard perimeter security is supplied by Amazon Web Services (AWS), to protect against unauthorised access and Denial-of-Service (DOS) attacks.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
TechnologyOne is subject to independent penetration testing as part of maintaining ISO 27001 certification. All infrastructure and platforms have been configured to ensure our software is protected against vulnerabilities such as SQL injection, cross site scripting, buffer overruns and man-in-the-middleattacks. It also extends to the Cloud platform, with a defence-in-deptharchitecture: each layer of infrastructure is segregated at multiple levels, including network, firewall and application. Industry standard perimeter security is supplied by Amazon Web Services (AWS), to protect against unauthorised access and Denial-of-Service (DOS) attacks.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
TechnologyOne uses a governance model defined under the ITIL Service Management Framework that pre­defines the steps that are taken to handle an incident impacting a customer’s environment. TechnologyOne uses an incident management tool to manage the incident process ensuring incidents are handled via a pre­defined path and within pre­defined timescales. The Incident model includes the steps that TechnologyOne takes to handle the Incident including the chronological order of the incident including any dependences. Responsibilities are outlined and detail the tasks required to resolve the incident including the associated escalation procedures and who should be contacted and at what stage.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Pricing

Price
£42750 per unit per year
Discount for educational organisations
Yes
Free trial available
No

Service documents

Return to top ↑