Cloud HCM Consultancy & Support
Consultancy and support services to inform decision making, reinforce innovation, increase productivity, reduce cost and ensure maximum return from investments in Cloud computing. Our
HCM Consultancy and Support service covers: Workday, BAU/Production support, SAP SuccessFactors, HCM software implementation, Oracle Fusion, Vendor selection, HCM advisory,
Optimisation, Change Management, Solution Architecture.
Features
- Workforce planning - Ensures required resource is correct allocated
- Competency management - Measures and optimises behaviours/skills/values/performance
- Performance management - Activities to ensure goals are consistently met
- Compensation strategy - Foundation to attract, retain and motivate employees
- Time and Expense management - Keep track by projects/accounts/activities/task types
- On-boarding - Delivers knowledge, skills and behaviours to new employees
- Workforce analytics - Applies statistical models to worker-related data
- Vendor selection - Optimises selection of vendors against business requirements
- Change Management - Introduces and approves project and scope changes
Benefits
- Workforce planning - Resource in right place at right time
- Competency management - Strengthens organisational culture and competitive differentiators
- Performance management - Improved alignment/control, reduced costs, faster change
- Compensation strategy - Organisational alignment, higher retention and motivation
- Time and Expense management - Tighter management, reduced costs
- On-boarding - Speeds effective integration of new members and insiders
- Workforce analytics - Optimised HR management, increased employee output
- Vendor selection - Optimal supplier. Effective, harmonious supply contract
- Change Management - Reduces impact on current service, faster response
- SC / DV security cleared professionals
Pricing
£350 to £1,000 a person a day
Service documents
Request an accessible format
Framework
G-Cloud 11
Service ID
4 2 2 2 8 5 3 7 5 3 4 7 0 6 4
Contact
Henderson Scott
David Potter
Telephone: 07540974378
Email: David.potter@hendersonscott.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- No service constraints
- System requirements
- No specific system requirements
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Responses within 3 hours, including weekends.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
-
Response to requests within 3 hours, including weekends.
Standard support hours are 8.30am to 6.00pm Monday to Friday (24/7 and extended support also available on request)
We provide a dedicated account manager on all G-Cloud accounts to manage and support the recruitment process. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We provide a User Documentation pack for users of our Services.
All staff performing services have received extensive onsite training. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Users may take advantage of our online data tool or make a request and data will be provided to them.
- End-of-contract process
-
A full off-boarding process is implemented.
All services are included in the price of the contract, there is no additional cost.
Using the service
- Web browser interface
- No
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Services can be accessed either via our website or via email requests which is available on both mobile and desktop platforms.
- Service interface
- No
- API
- No
- Customisation available
- Yes
- Description of customisation
-
We are able to work to any SLA and have an extensive network of Cloud professionals who we can provide on a custom basis.
All users may request a customisation of the services, and this can be discussed with the User Account Manager prior to implementation.
Scaling
- Independence of resources
-
We have dedicated Account Teams, headed up by Senior Managers to ensure that the volume of requests from users is managed efficiently and the service provided is at the exceptional level that we have become known for in the industry.
The Account Leads have regular contact and communication with both Users and internal managers so demand can be communicated and managed efficiently.
Analytics
- Service usage metrics
- Yes
- Metrics types
- All services are recorded and metrics can be provided based on any area of Supplier delivery at the User's request.
- Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2012
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Users may take advantage of our online data tool or make a request and data will be provided to them.
- Data export formats
-
- CSV
- Other
- Other data export formats
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
We agree to work with any level of SLA that the user may require, and can arrange these on request.
If services are not performed to the satisfaction of the User, a full refund may be agreed on a case by case basis. - Approach to resilience
- Available on request
- Outage reporting
- Email Alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- IP restrictions, two factor authentication of approved users and protective monitoring/logging.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- Yes
- Any other security certifications
-
- Workday Certified
- Prince II
- CIPD
- Successfactors Certified
- Oracle Certified
- Fusion Certified
- Peoplesoft Certified
- SAP Certified
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Work to GDPR standards, and are in the process of implementing.
- Information security policies and processes
-
We work to GDPR levels of security, and all Information Security Policies and Processes are well documented.
Authorised users have thorough training on these policies, and we conduct regular security checks to ensure that these are being followed completely.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Work to recognised standards, details available on request.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Work to recognised standards.
Sensitive information, details available on request. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Work to recognised standards.
Sensitive information, details available on request. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Work to recognised standards.
Sensitive information, details available on request.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £350 to £1,000 a person a day
- Discount for educational organisations
- No
- Free trial available
- No