Technology One UK Ltd

OneUniversity

Underpin academic, operational and strategic requirements of universities and dual-sector institutions with a single, integrated enterprise solution (ERP). Streamline processes to increase efficiency and provide an exceptional student experience. OneUniversity enables effective engagement with students and stakeholders. Adapt to changing environments and operate efficiently through end-to-end management of university operations.

Features

  • One Solution, One Database, One Interface.
  • Online Services supporting digital government objectives. Any device, anywhere, anytime.
  • Configurable workflow engine.
  • Automate procurement and operational reporting.
  • One vendor for developing, delivering, supporting and running the solution.
  • Business intelligence with transaction drill-down.
  • Simplified reporting functions - easy to use tools.
  • Employee Self Service enables self-management of personal details.
  • Drive efficiencies by streamlining your entire business operations.
  • Streamline management of facilities.

Benefits

  • One Vendor, One Solution, One Contact.
  • Reduced cost of implementation, integration, training and upgrades.
  • Flexible solutions. Change or extend functionality as required.
  • Enables a mobile workforce and hot "desking".
  • Integrated Solution and advanced Business Intelligence capability, increases transparency.
  • Manage the entire student recruitment and admission process effectively.
  • Increase transparency and visibility between departments.
  • Monitor student performance, improve student retention, outcomes and enhance satisfaction
  • Rapidly develop and circulate academic programs and curriculum proposals.
  • Manage the student lifecycle from enquiry to graduation and beyond.

Pricing

£24000 per unit per year

  • Education pricing available

Service documents

G-Cloud 10

539432968771632

Technology One UK Ltd

Shelli Norris

01628591160

shelli_norris@technologyonecorp.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints Any planned maintenance will be as agreed between TechnologyOne and the Customer and performed in non-business hours.
System requirements
  • Supported web browsers: Internet Explorer 10+, Firefox, Chrome, Safari, Opera
  • Supported devices: PC, Mac, Smartphone, Tablet

User support

User support
Email or online ticketing support Email or online ticketing
Support response times TechnologyOne Support is available 24x7 online and by telephone from 07:00 to 19:00 (local time). Target response and resolution times are based on agreed priority classifications; for Priority 1 (Critical) issues the target response time is 30 minutes.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.0 AA or EN 301 549
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels TechnologyOne’s standard ASM, included in the SaaS fee, includes the following features:
• Access to the TechnologyOne Customer Community which includes a range of helpful online support resources including:
• Q&A – find answers to your questions
• Chatter – collaborate with other customers and TechnologyOne (May 2015)
• Knowledge Base – access our extensive knowledge base articles for helpful software information
• Cases – create, track and manage your case requests
• Ideas - suggest product enhancement ideas
• Profile - manage your individual profile
• New software releases, software revisions, Ci Packages and Ci Anywhere Apps
• Privileged access to new software and modules
• Fault reporting, tracking and escalation
• Direct access to your Customer Account Manager and Product Customer Support Managers for each of your products, access to a Technical Account Manager, escalation to senior management and executives
• Access to various support resources through our Customer Community or dedicated support number
• Customer enhancement request or ideas via the Ideas Tab on the Customer Community

TechnologyOne can provide other options for support and service availability, based on the payment of a premium above the standard TechnologyOne SaaS fee.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started TechnologyOne provides onsite training, Key User workshops, and Train-the-Trainer cabability. The TechnologyOne training method involves participants engaging in a combination of formal instruction and demonstrations followed by Trainer directed “hands on” activities.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction On exit, TechnologyOne will provide the Customer with a standard SQL backup of their database and a current file based snapshot of their files (attachments etc.). At such a time, all data belonging to the Customer will be deleted, the database instance destroyed and any dedicated virtual servers terminated.
The steps taken to return data to the Customer upon termination or expiry of the contract/service are:
1. Restrict access to the Customer solution, to ensure that no further updates take place.
2. Take a final full backup of the production database, and place the backup in the Customer’s download area.
3. Take a final backup of all associated metadata files, and place the backup in the Customer’s download area.
4. Notify the Customer that the backups are on the download area, and that they have 30 days to download the backup files.
5. Verify with the Customer that they have completed the download.
6. After 30 days, remove the backup files from the Customer’s download area.
7. Then delete the Customer’s TechnologyOne Cloud environment, including all backups.
Verification of the disposal is part of TechnologyOne’s ISO27001 Information Security Policy.
End-of-contract process An exit management plan will be prepared and maintained and the services to implement the exit management plan will be charged to the Customer on a time and materials basis at the then current daily consulting rates unless otherwise agreed between the parties.
As TechnologyOne is proposing Software as a Service, termination of the contract terminates the right to use the Software. Where the Customer wishes to continue to use the software after termination, the Customer will need to purchase a further license for the software. As TechnologyOne provides commercial off the shelf software, if the Customer requires support and maintenance services after termination, TechnologyOne will continue to provide these to the Customer on TechnologyOne standard terms and fees.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Ci Anywhere is a Software as a Service (SaaS) solution delivered from the TechnologyOne Cloud, a platform designed for a “cloud first, mobile first” world. Ci Anywhere has a pure HTML5 user interface that only requires a web browser to run, is designed for touch operation, and adapts to the device it is being viewed on – e.g., tablet, smart phone, Apple or Windows laptop or PC.
Accessibility standards WCAG 2.0 AA or EN 301 549
Accessibility testing Our software engineers are trained by Vision Australia in Web Accessibility Guidelines, to the software is designed to meet the general requirements of accessibility as follows:
1. Sequence in source code order is meaningful
2. Text resizes when size (e.g. using zoom) is changed in the browser
3. Text is implemented as HTML text
4. Colour alone is not used to convey information or indicate an action
5. A visual focus indicator is provided
6. The tab order for controls, input fields and other objects is logical
A user is able to select "Accessibility" mode, which will enhance the current presentation functionality, as well as providing text tool tips that allow screen readers to read the page aloud and interpret the interface for the user. Our development team has focused on the screen reader technology built in to Mac OSX, and JAWS readers for Windows.
API Yes
What users can and can't do using the API The TechnologyOne solution has two Web Services Application Programming Interfaces (APIs) that provide a real-time interface to various functions that can read and update information.

A library of legacy, SOAP (Simple Object Access Protocol) web services that implement specific business processes as part of the TechnologyOne product suite. The available web services are pre-defined and a user can configure and update a call as required from any tool that can make SOAP calls. Each web service has a specific defined input and output syntax defined in the application.
A library of REST (REpresentational State Transfer) web services that form an integral part of our Service-Oriented Architecture. TechnologyOne’s strategy is to expose a generic web service endpoint to external systems and to allow the customer to configure the data requirements within the application itself. Customers can access the entire data set using this method, which effectively future-proofs the interface. REST services are self documenting and fully testable in the application as they are created.

Web Services offer a standardised way of validating and updating external data into the TechnologyOne solution. All Web Service activities are subject to the same authentication, authorisation and audit controls as an interactive user.
API documentation Yes
API documentation formats Open API (also known as Swagger)
API sandbox or test environment Yes
Customisation available Yes
Description of customisation TechnologyOne’s enterprise software operates from a standard code base and is specifically designed to enable organisations to configure their customer experience and business process requirements without the need for costly customised software development that requires highly technical resources. TechnologyOne has invested heavily in providing a very mature best practice configuration based approach not only for customer configurations, but also as the core architectural approach for the entire range of TechnologyOne market solutions.
The following areas can be customised:
Business Intelligence – to provide customised reporting and dashboards
Workflow - ablity to define and customise workflow for approvals as per business needs
BPM Forms provides a modern, intuitive web form interface for the end user, with a configurable forms designer. BPM Forms is connected to BPM Workflow, which provides the flexibility to implement a myriad of business processes. A process can be initiated with a form, then automated and managed with workflow
Users can customise the above following training, dependent on role based access levels; users are assigned a role or profile which determines what modules and functions a user can access.

Scaling

Scaling
Independence of resources At the processing layer, TechnologyOne Cloud is a production line of servers with the same operating system, the same OS configuration and the same TechnologyOne code. All Cloud customers share this common "codeset" - there is no custom code in this layer. The business layer is truly elastic and scales dynamically to meet demands. This is only possible because all the servers are identical and do not host customer specific code or configuration. The TechnologyOne Cloud platform is based on an Active-Active architecture which is underpinned by elastic provisioning of stateless, dynamic load balanced server processes.

Analytics

Analytics
Service usage metrics Yes
Metrics types TechnologyOne Cloud Business Unit performance monitoring systems measure performance and up-time of the TechnologyOne Cloud. Notifications for the TechnologyOne Cloud service are available to customers, and are transmitted via the TechnologyOne Customer Community login/email.
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations European Economic Area (EEA)
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach TechnologyOne’s Business ETL (Extract-Transform-Load) Capability for extracting and transforming data, or ‘ETL’ for short. Business ETL provides the mechanism for bringing data together from disparate sources, transforming that data to ensure it can be easily imported into the TechnologyOne products, organising and calculating it to create flattened, easy to access information for reporting, importing or exporting. The integration capability of ETL enables it to easily query information and extract it for the use of external applications as well as providing capability for importing information back into the TechnologyOne solution, either in a real-time or scheduled mode.
Data export formats
  • CSV
  • Other
Other data export formats XML
Data import formats
  • CSV
  • Other
Other data import formats XML

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability TechnologyOne aims to provide the Customer with 99.5% availability of the software each month of the cloud services term during business hours. Business hours are deemed 7am-7pm Monday to Friday unless otherwise agreed.
Any Service Credits are an "at risk" amount based on a percentage of the total Annual Hosting Services Fee (VAT exclusive) available to the Customer from Supplier that will be allocated and applied annually by the Customer in accordance with the contracted Hosting Service Level Commitment for failure to meet the Availability Service Level.
Approach to resilience The TechnologyOne Cloud provides a highly resilient environment and architecture to promote the highest possible levels of availability and is summarised as follows:
• Highly resilient site design including dual power and communications services, power systems and strict security;
• Dual site redundancy between no less than two data centres located within the EEA;
• Highly available architecture that replicates all transactions in real time providing immediate continuity of the solution in the event of a catastrophic site failure.
• A robust backup regime that incremental backups of all solution data.
• Internet availability: users can log into the solution from any Internet-connected device.
Further information is available on request.
Outage reporting TechnologyOne uses a governance model defined under the ITIL Service Management Framework that pre­defines the steps that are taken to handle an incident impacting a customer’s environment. TechnologyOne uses an incident management tool to manage the incident process ensuring incidents are handled via a pre­defined path and within pre­defined timescales. The Incident model includes the steps that TechnologyOne takes to handle the Incident including the chronological order of the incident including any dependences. Responsibilities are outlined and detail the tasks that are required to resolve the incident including the associated escalation procedures and who should be contacted and at what stage.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
Access restrictions in management interfaces and support channels Only the nominated key contact(s) can register incidents or cases in our TechnologyOne Customer Community, cases would need to be logged in order to provision new service elements or manage user accounts.
User security is divided into Authentication (the login process) and Authorisation (access to functions and data within the solution once a user has logged on). Once a user is authenticated, access control is implemented using a security matrix made up of a number of different configurable objects; only those with the appropriate access can perform management activities.
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for Between 1 month and 6 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for Between 1 month and 6 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 DAS Certification
ISO/IEC 27001 accreditation date 02/09/2015
What the ISO/IEC 27001 doesn’t cover The certification is limited to the provision of software solutions within a cloud architecture.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications
  • ISO/IEC 27017
  • ISO/IEC 27018
  • ISAE 3402 SOC 1 Type 1
  • ISAE 3402 SOC 1 Type 2
  • ISAE 3000 SOC 2 Type 1
  • ISAE 3000 SOC 2 Type 2 (five trust principles)

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes TechnologyOne has a policy in place with regards to Information Security Management. TechnologyOne currently holds certification for the following standards with regards to Information Security Management:
• ISO/IEC 27001:2013
• ISO/IEC 27017
• ISO/IEC 27018
• ISAE 3402 SOC 1 Type 1
• ISAE 3402 SOC 1 Type 2
• ISAE 3000 SOC 2 Type 1
• ISAE 3000 SOC 2 Type 2 (five trust principles)
The ISAE 3402 assurance scope is represented below:
The assurance services examine internal controls related to Information Security (e.g. Network Security, Operating System and Database Configuration), Change and System Maintenance, Data Centre and Network Operations and Disaster Recovery for activities undertaken by the TechnologyOne Cloud Business Unit.
TechnologyOne undertakes annual awareness and training programs covering technology, security, policies, processes, incident management and DR, alongside regular audits of policies and processes. Information Security Training is incorporated as part of induction process, is integrated as a module into our organisations overarching training programme and bespoke training delivered to those performing specific roles. All policies are available to staff on the TechnologyOne intranet.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach All changes are initiated, authorised, developed, tested and approved with appropriate segregation of duties between development, test (ITQA) and production environments.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach TechnologyOne is subject to independent penetration testing as part of maintaining ISO 27001 certification. All infrastructure and platforms have been configured to ensure our software is protected against vulnerabilities such as SQL injection, cross site scripting, buffer overruns and man-in-the-middle attacks. It also extends to the Cloud platform, with a defence-in-depth architecture: each layer of infrastructure is segregated at multiple levels, including network, firewall and application. Industry standard perimeter security is supplied by Amazon Web Services (AWS), to protect against unauthorised access and Denial-of-Service (DOS) attacks.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach TechnologyOne is subject to independent penetration testing as part of maintaining ISO 27001 certification. All infrastructure and platforms have been configured to ensure our software is protected against vulnerabilities such as SQL injection, cross site scripting, buffer overruns and man-in-the-middleattacks. It also extends to the Cloud platform, with a defence-in-deptharchitecture: each layer of infrastructure is segregated at multiple levels, including network, firewall and application. Industry standard perimeter security is supplied by Amazon Web Services (AWS), to protect against unauthorised access and Denial-of-Service (DOS) attacks.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach TechnologyOne uses a governance model defined under the ITIL Service Management Framework that pre­defines the steps that are taken to handle an incident impacting a customer’s environment. TechnologyOne uses an incident management tool to manage the incident process ensuring incidents are handled via a pre­defined path and within pre­defined timescales. The Incident model includes the steps that TechnologyOne takes to handle the Incident including the chronological order of the incident including any dependences. Responsibilities are outlined and detail the tasks required to resolve the incident including the associated escalation procedures and who should be contacted and at what stage.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £24000 per unit per year
Discount for educational organisations Yes
Free trial available No

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑