Bramble Hub Limited

Bramble Hub MACS - Maximo Hosting

MACS also provides hosting of your production, development, acceptance and or test system. MACS provide you with the availability of a hosted and managed system and take care of the associated IT Management Support.


  • Access to specialist expertise without a significant internal team
  • Better IT system Adminstration cost
  • IT implementation
  • 24/7/365 on site server monitoring with 24/7/365 server restart service
  • High speed network systems and connections to the Internet.
  • Remote back up operations centre
  • UPS multiple generator power back up at the hosting centre.
  • System administration and infrastructure management
  • Provision of Closed-Circuit TV security at the hosting centre
  • Remote administrative support via a VPN connection


  • Immediate access to specialist expertise without a significant internal team
  • Reduce IT system Administration cost
  • Reduce IT implementation
  • Reliable High speed network systems
  • Immediate Remote back up operations
  • Multiple generator power back up at the hosting centre
  • Better System administration and infrastructure management
  • Ability to deliver 24/7/365 server restart service
  • Mitigate risk and liability
  • Billed as an opex expense instead of a capex investment


£277.43 to £400 per user per month

Service documents

G-Cloud 10


Bramble Hub Limited

Roland Cunningham

+44 (0) 2077350030

Service scope

Service scope
Service constraints None
System requirements
  • Server management
  • Firewall Management
  • Advanced monitoring and 24 X 7 server restarts
  • Windows Server 2012 R2 administration, patches and updates;
  • Daily backup of system and associated files (and stored remote)
  • Anti-virus protection

User support

User support
Email or online ticketing support Yes, at extra cost
Support response times MACS will provide system support between the hours of 08:30 and 18:00 Monday to Friday excluding public holidays
(United Kingdom).
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels MACS will support the management of IT as required by offering advice and practical solutions to a range of Max imo related activities. This may include, but is not limited to:
Advice on usage and set-up of hardware environments.
Evaluate and advise on acceptance of Operating System software upgrades and configuration changes,
including program patches.
Project support to any changes proposed to either the installed database software version or database
structure. Monthly rate for hosting tended support can extend from £1000 - £10,000 (dependent on the Business requirements. An account manager is provided.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started Data Loading Tools: Provide an excel template and instructions on how to populate. Introduce a new application for importing data.
- Person User
- Person Group
- Asset

Preconfigured: Provide default data out of the box so organizations can be up and running within hours or days not weeks or months
- Security Groups
- Person Groups
- Start Centers
- Site/Org/Set Currencies
- GL Components
- Financial Periods
- Units of Measure
- Maxvars
- Worktypes
- Crafts

Straightforward to use – Little or no training required: applications will provide enough (but not too much) capability for Customers
- New Simplified apps – less fields/tabs/actions – for better consume-ability
- Focus on Service Request, Work Order, Asset, Jobplan, PM, Item

Quick onboarding:
- Pre-installed content to minimize data entry (Extend Content Pack)
- Focus on Initiator, Job Control, Planner, Technician roles
- Start Centers, Queries, Security Groups, Orgs/Sites/Sets, Currencies, Financial Periods, GL Accounts, System Properties, Units of Measure, Worktypes, Crafts
- Data Loading capabilities – support multiple iterations
- Person/User, Person Groups,
- Asset and Location Hierarchies
- Items
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction A process of database export has been established this can be exported tables, excel files, CSV. Further details can be provided from the MACS and terms and conditions.
End-of-contract process There will be a formal end of contract agreement following commercial and technical discussion which will be covered off in the MACS EU Limited terms and conditions

Using the service

Using the service
Web browser interface No
Command line interface No


Scaling available No
Independence of resources MACS provide separate physical platforms.
Usage notifications Yes
Usage reporting Email


Infrastructure or application metrics Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Reseller providing extra support
Organisation whose services are being resold SCC and Rackspace

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least every 6 months
Penetration testing approach In-house
Protecting data at rest
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process No
Equipment disposal approach In-house destruction process

Backup and recovery

Backup and recovery
Backup and recovery Yes
What’s backed up
  • Files
  • Virtual Machines
  • Databases
  • Application
Backup controls Depending on Security access and the contract agreement , this can be done on a daily , monthly and yearly basis.
Datacentre setup Multiple datacentres with disaster recovery
Scheduling backups Users contact the support team to schedule backups
Backup recovery Users contact the support team

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Loss of use of core functionality is 5 % i.e. 95 % availability . No refund is offered.
Approach to resilience It's available on request.
Outage reporting Email Alerts

Identity and authentication

Identity and authentication
User authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels None
Access restriction testing frequency At least every 6 months
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device over multiple services or networks

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach There is a set of in house security policy and procedure. It's available on request.
Information security policies and processes There is a set of in house security policy and procedure. It's available on request.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Primary contact person will maintain and add information to these requests including an impact analysis for realizing the changes and improvements.
On a quarterly basis all request and changes will be reviewed by the Customer key user team and the MACS primary contact.
All approved changes will be bundled in releases after which detailed planning will be made for development, testing, acceptance and promotion to production.
Carrying out modifications, extensions, installation of patches, etc. on the Maximo product itself via releases is not covered by this contract.
Vulnerability management type Undisclosed
Vulnerability management approach Maximo services are hosted with a leading Cloud Services Provider hat has well-defined Vulnerability management processes and regularly assesses Potential Threats via Penetration testing. Security as a service is from Alert Logic is deployed and we benefit from 24x7x365 security management support.
Alert Logic provides Security-as-a-Service for on-premises, identifying potential threats and delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Fully managed by a team of experts, the Alert Logic Security-as-a-Service solution provides network, system and web application protection immediately, wherever your IT infrastructure resides.
Protective monitoring type Undisclosed
Protective monitoring approach It's available on request.
Incident management type Undisclosed
Incident management approach It's available on request.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart No

Energy efficiency

Energy efficiency
Energy-efficient datacentres Yes


Price £277.43 to £400 per user per month
Discount for educational organisations No
Free trial available No


Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑