Technology One UK Ltd
OnePublicSector
The TechnologyOne OnePublicSector ERP solution generates efficiencies by automating and standardising key business processes.
OnePublicSector supports corporate, operational and strategic requirements of Public Sector Organisations, government departments and agencies. With powerful built-in performance management tools, departments and agencies use OnePublicSector to improve operations and enhance planning and decision making.
Features
- One Solution, One Database, One Interface.
- Public Sector focus and commitment.
- Pre-configured Solutions.
- Online Services supporting digital government objectives. Any device, anywhere, anytime.
- One vendor for developing, delivering, supporting and running the solution.
- Business intelligence with transaction drill-down.
- Simplified reporting functions - easy to use tools.
- Configurable workflow engine.
- Built-in business processes and advanced implementation methodologies.
Benefits
- One Vendor, One Solution, One Contact.
- Reduced cost of implementation, integration, training and upgrades.
- Flexible solutions. Change or extend functionality as required.
- Enables a mobile workforce and hot "desking".
- Integrated Solution and advanced Business Intelligence capability, increases transparency.
- Increase transparency and visibility between departments.
- Easily manage regulatory and compliance issues.
- Improve asset management and project delivery.
- Develop and drive long-term strategy and planning, Improve budgeting processes.
- Improve internal processes and stakeholder management.
Pricing
£24000 per unit per year
- Education pricing available
Service documents
Framework
G-Cloud 10
Service ID
446940049467330
Contact
Service scope
Software add-on or extension | No |
Cloud deployment model | Public cloud |
Service constraints | Any planned maintenance will be as agreed between TechnologyOne and the Customer and performed in non-business hours. |
System requirements |
|
User support
Email or online ticketing support | Email or online ticketing |
Support response times | TechnologyOne Support is available 24x7 online and by telephone from 07:00 to 19:00 (local time). Target response and resolution times are based on agreed priority classifications; for Priority 1 (Critical) issues the target response time is 30 minutes. |
User can manage status and priority of support tickets | Yes |
Online ticketing support accessibility | WCAG 2.0 AA or EN 301 549 |
Phone support | Yes |
Phone support availability | 9 to 5 (UK time), Monday to Friday |
Web chat support | No |
Onsite support | Yes, at extra cost |
Support levels |
TechnologyOne’s standard ASM, included in the SaaS fee, includes the following features: • Access to the TechnologyOne Customer Community which includes a range of helpful online support resources including: • Q&A – find answers to your questions • Chatter – collaborate with other customers and TechnologyOne (May 2015) • Knowledge Base – access our extensive knowledge base articles for helpful software information • Cases – create, track and manage your case requests • Ideas - suggest product enhancement ideas • Profile - manage your individual profile • New software releases, software revisions, Ci Packages and Ci Anywhere Apps • Privileged access to new software and modules • Fault reporting, tracking and escalation • Direct access to your Customer Account Manager and Product Customer Support Managers for each of your products, access to a Technical Account Manager, escalation to senior management and executives • Access to various support resources through our Customer Community or dedicated support number • Customer enhancement request or ideas via the Ideas Tab on the Customer Community TechnologyOne can provide other options for support and service availability, based on the payment of a premium above the standard TechnologyOne SaaS fee. |
Support available to third parties | Yes |
Onboarding and offboarding
Getting started | TechnologyOne provides onsite training, Key User workshops, and Train-the-Trainer cabability. The TechnologyOne training method involves participants engaging in a combination of formal instruction and demonstrations followed by Trainer directed “hands on” activities. |
Service documentation | Yes |
Documentation formats |
|
End-of-contract data extraction |
On exit, TechnologyOne will provide the Customer with a standard SQL backup of their database and a current file based snapshot of their files (attachments etc.). At such a time, all data belonging to the Customer will be deleted, the database instance destroyed and any dedicated virtual servers terminated. The steps taken to return data to the Customer upon termination or expiry of the contract/service are: 1. Restrict access to the Customer solution, to ensure that no further updates take place. 2. Take a final full backup of the production database, and place the backup in the Customer’s download area. 3. Take a final backup of all associated metadata files, and place the backup in the Customer’s download area. 4. Notify the Customer that the backups are on the download area, and that they have 30 days to download the backup files. 5. Verify with the Customer that they have completed the download. 6. After 30 days, remove the backup files from the Customer’s download area. 7. Then delete the Customer’s TechnologyOne Cloud environment, including all backups. Verification of the disposal is part of TechnologyOne’s ISO27001 Information Security Policy. |
End-of-contract process |
An exit management plan will be prepared and maintained and the services to implement the exit management plan will be charged to the Customer on a time and materials basis at the then current daily consulting rates unless otherwise agreed between the parties. As TechnologyOne is proposing Software as a Service, termination of the contract terminates the right to use the Software. Where the Customer wishes to continue to use the software after termination, the Customer will need to purchase a further license for the software. As TechnologyOne provides commercial off the shelf software, if the Customer requires support and maintenance services after termination, TechnologyOne will continue to provide these to the Customer on TechnologyOne standard terms and fees. |
Using the service
Web browser interface | Yes |
Supported browsers |
|
Application to install | No |
Designed for use on mobile devices | Yes |
Differences between the mobile and desktop service | Ci Anywhere is a Software as a Service (SaaS) solution delivered from the TechnologyOne Cloud, a platform designed for a “cloud first, mobile first” world. Ci Anywhere has a pure HTML5 user interface that only requires a web browser to run, is designed for touch operation, and adapts to the device it is being viewed on – e.g., tablet, smart phone, Apple or Windows laptop or PC. |
Accessibility standards | WCAG 2.0 AA or EN 301 549 |
Accessibility testing |
Our software engineers are trained by Vision Australia in Web Accessibility Guidelines, to the software is designed to meet the general requirements of accessibility as follows: 1. Sequence in source code order is meaningful 2. Text resizes when size (e.g. using zoom) is changed in the browser 3. Text is implemented as HTML text 4. Colour alone is not used to convey information or indicate an action 5. A visual focus indicator is provided 6. The tab order for controls, input fields and other objects is logical A user is able to select "Accessibility" mode, which will enhance the current presentation functionality, as well as providing text tool tips that allow screen readers to read the page aloud and interpret the interface for the user. Our development team has focused on the screen reader technology built in to Mac OSX, and JAWS readers for Windows. |
API | Yes |
What users can and can't do using the API |
The TechnologyOne solution has two Web Services Application Programming Interfaces (APIs) that provide a real-time interface to various functions that can read and update information. A library of legacy, SOAP (Simple Object Access Protocol) web services that implement specific business processes as part of the TechnologyOne product suite. The available web services are pre-defined and a user can configure and update a call as required from any tool that can make SOAP calls. Each web service has a specific defined input and output syntax defined in the application. A library of REST (REpresentational State Transfer) web services that form an integral part of our Service-Oriented Architecture. TechnologyOne’s strategy is to expose a generic web service endpoint to external systems and to allow the customer to configure the data requirements within the application itself. Customers can access the entire data set using this method, which effectively future-proofs the interface. REST services are self documenting and fully testable in the application as they are created. Web Services offer a standardised way of validating and updating external data into the TechnologyOne solution. All Web Service activities are subject to the same authentication, authorisation and audit controls as an interactive user. |
API documentation | Yes |
API documentation formats | Open API (also known as Swagger) |
API sandbox or test environment | Yes |
Customisation available | Yes |
Description of customisation |
TechnologyOne’s enterprise software operates from a standard code base and is specifically designed to enable organisations to configure their customer experience and business process requirements without the need for costly customised software development that requires highly technical resources. TechnologyOne has invested heavily in providing a very mature best practice configuration based approach not only for customer configurations, but also as the core architectural approach for the entire range of TechnologyOne market solutions. The following areas can be customised: Business Intelligence – to provide customised reporting and dashboards Workflow - ablity to define and customise workflow for approvals as per business needs BPM Forms provides a modern, intuitive web form interface for the end user, with a configurable forms designer. BPM Forms is connected to BPM Workflow, which provides the flexibility to implement a myriad of business processes. A process can be initiated with a form, then automated and managed with workflow Users can customise the above following training, dependent on role based access levels; users are assigned a role or profile which determines what modules and functions a user can access. |
Scaling
Independence of resources | At the processing layer, TechnologyOne Cloud is a production line of servers with the same operating system, the same OS configuration and the same TechnologyOne code. All Cloud customers share this common "codeset" - there is no custom code in this layer. The business layer is truly elastic and scales dynamically to meet demands. This is only possible because all the servers are identical and do not host customer specific code or configuration. The TechnologyOne Cloud platform is based on an Active-Active architecture which is underpinned by elastic provisioning of stateless, dynamic load balanced server processes. |
Analytics
Service usage metrics | Yes |
Metrics types | TechnologyOne Cloud Business Unit performance monitoring systems measure performance and up-time of the TechnologyOne Cloud. Notifications for the TechnologyOne Cloud service are available to customers, and are transmitted via the TechnologyOne Customer Community login/email. |
Reporting types |
|
Resellers
Supplier type | Not a reseller |
Staff security
Staff security clearance | Other security clearance |
Government security clearance | Up to Baseline Personnel Security Standard (BPSS) |
Asset protection
Knowledge of data storage and processing locations | Yes |
Data storage and processing locations | European Economic Area (EEA) |
User control over data storage and processing locations | No |
Datacentre security standards | Complies with a recognised standard (for example CSA CCM version 3.0) |
Penetration testing frequency | At least once a year |
Penetration testing approach | Another external penetration testing organisation |
Protecting data at rest |
|
Data sanitisation process | Yes |
Data sanitisation type | Explicit overwriting of storage before reallocation |
Equipment disposal approach | Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001 |
Data importing and exporting
Data export approach | TechnologyOne’s Business ETL (Extract-Transform-Load) Capability for extracting and transforming data, or ‘ETL’ for short. Business ETL provides the mechanism for bringing data together from disparate sources, transforming that data to ensure it can be easily imported into the TechnologyOne products, organising and calculating it to create flattened, easy to access information for reporting, importing or exporting. The integration capability of ETL enables it to easily query information and extract it for the use of external applications as well as providing capability for importing information back into the TechnologyOne solution, either in a real-time or scheduled mode. |
Data export formats |
|
Other data export formats | XML |
Data import formats |
|
Other data import formats | XML |
Data-in-transit protection
Data protection between buyer and supplier networks | TLS (version 1.2 or above) |
Data protection within supplier network | TLS (version 1.2 or above) |
Availability and resilience
Guaranteed availability |
TechnologyOne aims to provide the Customer with 99.5% availability of the software each month of the cloud services term during business hours. Business hours are deemed 7am-7pm Monday to Friday unless otherwise agreed. Any Service Credits are an "at risk" amount based on a percentage of the total Annual Hosting Services Fee (VAT exclusive) available to the Customer from Supplier that will be allocated and applied annually by the Customer in accordance with the contracted Hosting Service Level Commitment for failure to meet the Availability Service Level. |
Approach to resilience |
The TechnologyOne Cloud provides a highly resilient environment and architecture to promote the highest possible levels of availability and is summarised as follows: • Highly resilient site design including dual power and communications services, power systems and strict security; • Dual site redundancy between no less than two data centres located within the EEA; • Highly available architecture that replicates all transactions in real time providing immediate continuity of the solution in the event of a catastrophic site failure. • A robust backup regime that incremental backups of all solution data. • Internet availability: users can log into the solution from any Internet-connected device. Further information is available on request. |
Outage reporting | TechnologyOne uses a governance model defined under the ITIL Service Management Framework that predefines the steps that are taken to handle an incident impacting a customer’s environment. TechnologyOne uses an incident management tool to manage the incident process ensuring incidents are handled via a predefined path and within predefined timescales. The Incident model includes the steps that TechnologyOne takes to handle the Incident including the chronological order of the incident including any dependences. Responsibilities are outlined and detail the tasks that are required to resolve the incident including the associated escalation procedures and who should be contacted and at what stage. |
Identity and authentication
User authentication needed | Yes |
User authentication |
|
Access restrictions in management interfaces and support channels |
Only the nominated key contact(s) can register incidents or cases in our TechnologyOne Customer Community, cases would need to be logged in order to provision new service elements or manage user accounts. User security is divided into Authentication (the login process) and Authorisation (access to functions and data within the solution once a user has logged on). Once a user is authenticated, access control is implemented using a security matrix made up of a number of different configurable objects; only those with the appropriate access can perform management activities. |
Access restriction testing frequency | At least once a year |
Management access authentication |
|
Audit information for users
Access to user activity audit information | Users have access to real-time audit information |
How long user audit data is stored for | Between 1 month and 6 months |
Access to supplier activity audit information | Users contact the support team to get audit information |
How long supplier audit data is stored for | Between 1 month and 6 months |
How long system logs are stored for | At least 12 months |
Standards and certifications
ISO/IEC 27001 certification | Yes |
Who accredited the ISO/IEC 27001 | DAS Certification |
ISO/IEC 27001 accreditation date | 02/09/2015 |
What the ISO/IEC 27001 doesn’t cover | The certification is limited to the provision of software solutions within a cloud architecture. |
ISO 28000:2007 certification | No |
CSA STAR certification | No |
PCI certification | No |
Other security certifications | Yes |
Any other security certifications |
|
Security governance
Named board-level person responsible for service security | Yes |
Security governance certified | Yes |
Security governance standards | ISO/IEC 27001 |
Information security policies and processes |
TechnologyOne has a policy in place with regards to Information Security Management. TechnologyOne currently holds certification for the following standards with regards to Information Security Management: • ISO/IEC 27001:2013 • ISO/IEC 27017 • ISO/IEC 27018 • ISAE 3402 SOC 1 Type 1 • ISAE 3402 SOC 1 Type 2 • ISAE 3000 SOC 2 Type 1 • ISAE 3000 SOC 2 Type 2 (five trust principles) The ISAE 3402 assurance scope is represented below: The assurance services examine internal controls related to Information Security (e.g. Network Security, Operating System and Database Configuration), Change and System Maintenance, Data Centre and Network Operations and Disaster Recovery for activities undertaken by the TechnologyOne Cloud Business Unit. TechnologyOne undertakes annual awareness and training programs covering technology, security, policies, processes, incident management and DR, alongside regular audits of policies and processes. Information Security Training is incorporated as part of induction process, is integrated as a module into our organisations overarching training programme and bespoke training delivered to those performing specific roles. All policies are available to staff on the TechnologyOne intranet. |
Operational security
Configuration and change management standard | Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402 |
Configuration and change management approach | All changes are initiated, authorised, developed, tested and approved with appropriate segregation of duties between development, test (ITQA) and production environments. |
Vulnerability management type | Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402 |
Vulnerability management approach | TechnologyOne is subject to independent penetration testing as part of maintaining ISO 27001 certification. All infrastructure and platforms have been configured to ensure our software is protected against vulnerabilities such as SQL injection, cross site scripting, buffer overruns and man-in-the-middle attacks. It also extends to the Cloud platform, with a defence-in-depth architecture: each layer of infrastructure is segregated at multiple levels, including network, firewall and application. Industry standard perimeter security is supplied by Amazon Web Services (AWS), to protect against unauthorised access and Denial-of-Service (DOS) attacks. |
Protective monitoring type | Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402 |
Protective monitoring approach | TechnologyOne is subject to independent penetration testing as part of maintaining ISO 27001 certification. All infrastructure and platforms have been configured to ensure our software is protected against vulnerabilities such as SQL injection, cross site scripting, buffer overruns and man-in-the-middleattacks. It also extends to the Cloud platform, with a defence-in-deptharchitecture: each layer of infrastructure is segregated at multiple levels, including network, firewall and application. Industry standard perimeter security is supplied by Amazon Web Services (AWS), to protect against unauthorised access and Denial-of-Service (DOS) attacks. |
Incident management type | Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402 |
Incident management approach | TechnologyOne uses a governance model defined under the ITIL Service Management Framework that predefines the steps that are taken to handle an incident impacting a customer’s environment. TechnologyOne uses an incident management tool to manage the incident process ensuring incidents are handled via a predefined path and within predefined timescales. The Incident model includes the steps that TechnologyOne takes to handle the Incident including the chronological order of the incident including any dependences. Responsibilities are outlined and detail the tasks required to resolve the incident including the associated escalation procedures and who should be contacted and at what stage. |
Secure development
Approach to secure software development best practice | Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0) |
Public sector networks
Connection to public sector networks | No |
Pricing
Price | £24000 per unit per year |
Discount for educational organisations | Yes |
Free trial available | No |
Documents
Pricing document | View uploaded document |
Skills Framework for the Information Age rate card | View uploaded document |
Service definition document | View uploaded document |
Terms and conditions document | View uploaded document |