Mercato Solutions

Transform 360 Delivery

CS Transform's SaaS business solution contains methodologies based on internationally-recognised standards for improving the delivery and benefit realisation of transformation project implementation. Transform 360 Delivery Manager builds roadmaps and detailed activity plans for collaborative working, creates dashboards for on-going business activities reporting, and provides audit trails for security and compliance.

Features

  • High level and detailed planning tool, with gantt chart view
  • Tailored summary of all actions for individual user
  • Permissions for controlled access to data relevant to role
  • Comes with dashboard and reporting modules

Benefits

  • Ensures clear ownership and line of sight to programme deliverables
  • Integrated PPM tools to manage delivery from one application
  • Built-in intelligence providing early warning for risks to delivery

Pricing

£1250 per instance per month

  • Education pricing available

Service documents

Framework

G-Cloud 11

Service ID

4 1 3 2 8 9 0 5 6 4 4 1 2 9 1

Contact

Mercato Solutions

Jack Robbins

0121 605 2050

jack.robbins@mercatosolutions.co.uk

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints None
System requirements Internet connectivity

User support

User support
Email or online ticketing support Email or online ticketing
Support response times We aim to respond to ALL initial questions within 2 hours during normal business hours 9am-5pm. We aim to response within 8 hours outside normal business hours.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.1 AA or EN 301 549
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels There are three types of support: help and training to use the Transform 360 application, help to use the supporting Operating Models, and help to cover any technical issues with Transform 360.
Support levels and service levels are included in total service costs and dependent on severity and assigned priority levels.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started All new customers are assigned an Account Manager that will provide proactive support and advise for the first 90 days. This also includes assistance to ensure the right configuration and setup is provisioned and maximised for any digital transformation management, along with a range of user guides.
Service documentation Yes
Documentation formats HTML
End-of-contract data extraction Data extracts can be provided in all main database formats as well as CSV and Excel. Where relevant, data will be integrated into user's existing systems, and therefore there will be no or limited data extraction requirements.
End-of-contract process When an organisation chooses to terminate the contract for Transform 360, any data extract requirements, CS Transform will endeavour to deliver these, where possible. Any costs for this service will be as agreed in the Exit Plan.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Elements of Transform 360 have been designed to be accessed more readily via mobile, and some via a laptop/PC. This is dependent upon the role and content accessed by the user. For example, the dashboard module is more likely to be viewed 'on the go' by a senior stakeholder but entering or updating more detailed data within the delivery module is easier if done via a laptop/PC.
Service interface No
API Yes
What users can and can't do using the API API's for Transform 360 are delivered via the extensibility capability of the KnowledgeKube platform that provides a fully configurable extensibility layer via it's Application Gateway technology. Transform 360 can configure new API's, connect to external API's, copy and edit existing API's from within the KnowledgeKube tool. This allows users to connect with legacy systems via RESTful API improving workflows and reducing duplication of effort.
API documentation Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Transform 360 can be customised (but may be chargable). CS Transform works directly with the client before deployment to agree any requirements and deliverables of their project/programme. Transform 360 is then set up to deliver the client's specific needs. Minor configuration can be undertaken by users, but major structural changes can be requested through the Transform 360 support team.

Scaling

Scaling
Independence of resources Transform 360 is built and hosted on the KnowledgeKube Platform. KnowledgeKube is hosted in a Hybrid environment taking advantage of the Microsoft Elastic Cloud technology. As such almost infinite scale is provided for and delivered automatically by the use of devOps monitoring and automatic scaling of customer resource in a predictive, demand-led hosting environment.

Analytics

Analytics
Service usage metrics Yes
Metrics types User numbers, amount of time logged in, error reporting
Reporting types Regular reports

Resellers

Resellers
Supplier type Reseller (no extras)
Organisation whose services are being resold CS Transform

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach ‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest Physical access control, complying with CSA CCM v3.0
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Data is exported via simple to configure datasource connectors to either SQL, CSV, XLS, Google Spreadsheet, Amazon DB or Google Big Query
Data export formats
  • CSV
  • Other
Other data export formats SQL, XLS, Google Spreadsheet, Amazon DB or Google Big Query
Data import formats
  • CSV
  • Other
Other data import formats SQL, XLS, Google Spreadsheet, Amazon DB or Google Big Query

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Legacy SSL and TLS (under version 1.2)
Data protection within supplier network Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability Monthly Uptime Percentage <99.95% Service Credit 10%

Monthly Uptime Percentage <99% Service Credit 20%
Approach to resilience The KnowledgeKube backup service is designed to be a resilient and a highly reliable mechanism. All Servers either Physical or Virtual are backed up daily using image technology. We use a fully automated backup process which intelligently creates incremental snapshot backups forever (after the initial full backup) and therefore uses less storage space, performs faster backups, and puts less load on the production servers. Once created on one of our dedicated backup severs, the image is replicated to our Nottingham Data Centre to another server with a large secure data repository. The image is then converted to a virtual machine automatically, ready to power on upon detection of an emergency. We keep data on disk for 14 days. The line is monitored 24/7. For data archiving we push all images to a high-density storage capacity tape autoloader using an Archive Manager. All tapes are secured with best practices, and stored at a record management company in a walk-in vault. To ensure we are successful if a disaster does occur we have a Business Continuity Plan and a Disaster Recovery Plan in place which are tested on a regular basis and are audited by BSI as part of our ISO27001 audit.
Outage reporting User defined error message displayed if service unavailable

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Customers have the option to raise a support request via telephone or email.
Access restriction testing frequency At least every 6 months
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users receive audit information on a regular basis
How long user audit data is stored for Between 6 months and 12 months
Access to supplier activity audit information Users receive audit information on a regular basis
How long supplier audit data is stored for Between 6 months and 12 months
How long system logs are stored for Between 6 months and 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 BSI
ISO/IEC 27001 accreditation date 12/02/2013 Last Revision Dated : 28/10/2016
What the ISO/IEC 27001 doesn’t cover All areas of the Business are In scope, no exclusions are present on the S.O.A
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes BSI PAS181
ISO 37106

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Change management is incorporated as part of our ISO/IEC 27001:2013 Accreditation. The platform does not have the concept of separate production and development processes as it’s not a development tool. We have change process/methodology based around the technology built into KnowledgeKube.
Vulnerability management type Supplier-defined controls
Vulnerability management approach There is a strict patch management process in place, critical Patches are deployed within 24 hours of availability, a number of sources are used to determine potential threats, Enterprise level Antivirus controls are in place and maintained
Protective monitoring type Supplier-defined controls
Protective monitoring approach We use a number of monitoring software applications to supply real-time information that is displayed to the operations and Infrastructure & Security Teams.
The response and timescale of the response is based on the severity of the information being provided
Incident management type Supplier-defined controls
Incident management approach There is a robust incident management policy in place and enforced as part of our ISO/IEC 27001:2013 accreditation
Incidents are reported on the corporate Intranet
The Information security Officer responds to any incidents reported in line with established control procedures

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks Yes
Connected networks Public Services Network (PSN)

Pricing

Pricing
Price £1250 per instance per month
Discount for educational organisations Yes
Free trial available No

Service documents

Return to top ↑