CASED DIMENSIONS LIMITED

Fluids365

Fluids365 allows clients to modernise applications. Move applications to a (PaaS) Platform as a Service architecture and make use of Azure Service Fabric with Microservices.

Fluids365 provides exceptional business agility by connecting applications, data, and devices with a data, Process and API approach.

Features

  • Application Modernisation: multiple Business Processes services/applications via workflow designer
  • Self Service: has a self service portal
  • Application Integration: Integrates with other 3rd party services/applications.
  • Legacy Modernisation: enables replacement of historic systems
  • Microservice Platform as a Service
  • Application Migration: allows for customisable workflows
  • Business Process Management Tool
  • Community Eco-System; workflows can be shared among users
  • Continuous Upgrades to the latest features

Benefits

  • Move from old applications to SaaS model in rapid timeframes
  • Quick create data capture forms.
  • Helps make call centre staff more efficient
  • Business process automation
  • Use Microservices to integrate applications on-premise or in cloud
  • Version Controlled workflows
  • Rapid creation of workflows.
  • Promotes higher productivity among users

Pricing

£1000 per virtual machine per month

  • Free trial available

Service documents

G-Cloud 11

560456857704494

CASED DIMENSIONS LIMITED

Gary Moore

07881293702

Gary.Moore@caseddimensions.com

Service scope

Service scope
Software add-on or extension Yes
What software services is the service an extension to Fluids365 is deployed infront of existing applictaions to enable employee self service. IE: Salesforce, Dynamics, ServiceNow, Remedy, Workday or Oracle.

Fluids365 is also employed to replace custom applications where new application is deployed as a Software as a Service.
Cloud deployment model Private cloud
Service constraints Support only available during 7-7 Monday to Friday, with phone support available for P1's during out of hours.
System requirements
  • Microsoft Azure PaaS is where application is deployed.
  • Azure Private Subscription.

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Response Times:
Priority 1 (Critical): 1 hour,
Priority 2 (Urgent): 1 day,
Priority 3 (Routine): 3 days.

Target Resolution:
Priority 1: 1 day,
Priority 2: 5 days,
Priority 3: 10 days.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support No
Support levels Cloud Support Engineers provide support on a Monday - Friday 7am to 7pm basis. Out of hours support is provided 7 days per week for P1 issues.

Out of hours support for P1 issues is included within standard pricing.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Documentation is provided. Clients should buy a mininum of 3 days training for key staff members at start of project.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Documentation is advised during the life-cycle of the application.

Manual capture would be required at end of contract should Client be migrating.

Processes configured are presented in a visual manner - similar to Visio. SnagIt / Capture copying of process configured is supported.
End-of-contract process Platform is turned off in Azure by clients within their Subscription. This is a decision by each Client and fully within Client control.

Clients would be responsible for capturing configuration / data should client be leaving service.

Should client wish to extend service, Cased Dimensions will be happy to extend service at market rates at point of renewal.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The service has been optimised for all mobile displays as well as desktop web browsers.
Accessibility standards WCAG 2.1 AAA
Accessibility testing Testing with assistive technology is part of our overall accessibility testing for Fluids365.

We ensure Fluids365 works with assistive technologies. This is so everyone can use our service with the technology they rely on, such as a screen reader or speech recognition software.
API Yes
What users can and can't do using the API Our framework is built to enable API connectivity. A library exists to allow repeat use of existing API connectors. If a client has an old application where an API doesn’t exist, clients can write their own API connectors and enable them within the library. This allows open connectivity to all applications - old and modern alike.
API documentation Yes
API documentation formats Open API (also known as Swagger)
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Customers can create their own customised workflows using a drag and drop solution. Admin Workflow designers are selected by the end user and they have privileges to create, edit, update and publish workflows.

Scaling

Scaling
Independence of resources Power BI via Microsoft Azure.

Analytics

Analytics
Service usage metrics Yes
Metrics types Platform works with Azure Power BI
Reporting types
  • API access
  • Real-time dashboards

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach ‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest Physical access control, complying with CSA CCM v3.0
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Manual capture.
Data export formats
  • CSV
  • Other
Other data export formats Manual Capture
Data import formats Other
Other data import formats Manual Capture

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection between networks Application is deployed in a Secure Client owned Azure subscription.

Data is also additionally encrypted using Azure API management and HTTPs Certificates.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Aligned to Microsoft Azure SLA for subscription Client deploys service within.
Approach to resilience Aligned to Microsoft Azure SLA for data centre Client deploys service within.
Outage reporting Public dashboard and email alerts as alerted by Microsoft Services

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
Access restrictions in management interfaces and support channels Fluids365 is deployed in Client network. Cased Dimensions do not have access until Client provides access. Authentication is "Roles based authentication".
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Other
Description of management access authentication Role based authentication. As application is deployed to Client private network / subscription, Client must enable access before support is provided.

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 QMS
ISO/IEC 27001 accreditation date 8/8/2018
What the ISO/IEC 27001 doesn’t cover The provision of all IT Services are all covered by ISO 27001. This includes application development team.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications
  • Certifying Body: QMSISO 9001:2015 Certificate number 300122018
  • Certify Body: DionachCyber Essentials Certificate number 8620957004179553
  • Certify Body; Microsoft Gold Cloud Platform
  • Certify Body; Microsoft Gold Application Development
  • Certify Body; Microsoft Silver Dynamics365
  • Certify Body; Microsoft Cloud Service Provider
  • Certify Body; Microsoft Smart Teaming Partner
  • GovernmentMajority of staff already SC or DV Cleared

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes We are aligned to RMADS standards as an organisation.

Physical office locations are compliant to NCSC standards.

We are Cyber Essentials certified as an organisation.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach Cased Dimensions follows ITIL Change and Configuration management process for management of our company assets. When Fluids365 is deployed to a Client environment, Client then manages the change and configuration updates to Fluids365. IE: releases / Changes occur when Client process allows updates. Application is deployed within Client private network.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Cased Dimensions follows RMADS as a standard for operations management. We are ISO27001 certified each year.

All systems are automatically patched using the latest Windows updates.

We receive regular updates through the Microsoft Security Update Bulletin.

We use Microsoft Azure Security Center to constantly monitor vulnerabilities and threats, as it produces security alerts and recommendations.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach Cased Dimensions follows RMADS as a standard for operations management. We are ISO27001 certified each year.

All systems are automatically patched using the latest Windows updates.

We receive regular updates through the Microsoft Security Update Bulletin.

We use Microsoft Azure Security Center to constantly monitor vulnerabilities and threats, as it produces security alerts and recommendations.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach Cased Dimensions follows RMADS as a standard for operations management. We are ISO27001 certified each year.

Incident Management is ITIL aligned and certified to ISO27001 and ISO9001 each year. Users can report incidents through phone and email, if applicable we provide tailored monthly incident reports using SLA Monitoring.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £1000 per virtual machine per month
Discount for educational organisations No
Free trial available Yes
Description of free trial We allow a two month trial. The software is free, however the client must pay for 3 days professional service (£900 per day) for setup and training. This is to ensure client is productive in trialing.

License for Fluids365 is free during trial.

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑