ADAPT is a highly-adaptable suite of tools for granular insights and exceptional forecasting accuracy. ADAPT combines workforce management best practice with state-of-the-art technology, transforming how you schedule, forecast and budget.
Go beyond old-school labour modelling with leading-edge software that calculates, manages and analyses data on an unparalleled scale.
- Calculate workforce demand using cutting-edge technology
- Assign duties for optimal productivity with a revitalised labour model
- Assemble bottom-up demand for labour budget planning in minutes
- Aggregate forecasts for faster and more accurate analysis
- Create advanced scheduling using artificial intelligence
- Manage task execution and distribution quickly and easily
- Monitor and track progress with task reporting
- Identify areas for improvement to task completion rates
- Facilitate rapid what if analysis and planning
- Eliminate mismatches between budgets and schedules
- Reduce labour costs through breakthrough budgeting tools
- Increase workforce capacity, satisfaction, productivity and performance
- Identify growth opportunities and elevate customer satisfaction
- Make and review changes in isolation before committing
£4000 to £35000 per licence per month
- Free trial available
7 6 0 9 5 7 2 3 3 0 2 5 1 7 7
REPL Group Worldwide Ltd
|Software add-on or extension||No|
|Cloud deployment model||
ADAPT is cloud hosted in Microsoft Azure (private or public) so customers must ensure any firewalls are configured to allow access to ADAPT.
A 2 hour bi-weekly maintenance window is reserved for updates, patching and configuration changes outside of working hours, however often this will not result in any down time as much of our service utilises rolling updates. The ADAPT team would advise in advance of any planned down time during a window.
|Email or online ticketing support||Email or online ticketing|
|Support response times||Dependent on agreed SLA's and priority|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||WCAG 2.1 A|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
4 tiers of support
All times in the timezone of the customer's primary location.
Standard - 9am to 5pm - Monday to Friday
Extended - 8 am to 10pm - Monday-Friday
Premium - 8 am to 10pm - 7 days
Seamless - 24/7.
The majority of our customers take standard support as this is typically all customer require. This is included in the SaaS costs provided. The following premiums are for the enhanced support services.
Extended - SaaS cost +7%
Premium - SaaS cost + 15%
Seamless - SaaS cost +25%
Only Critical and High priority cases are managed outside of UK business hours.
Hosted environments are monitored 24/7.
Technical account management is provided in seamless support.
Cloud hosting specialists maintain the environments.
|Support available to third parties||Yes|
Onboarding and offboarding
The application is intuitive allowing users to self learn. We also provide the following services to support the implementation of the platform
An implementation support team is available at additional cost. They will provide the following services
- Implementation Project Plan
- On site Training
- Supported by Weekly Conference call meetings
- Project best practice and change management expertise
|End-of-contract data extraction||User and configuration data may be exported. More complete data extracts can be supplied as database backup files on request via our support team.|
|End-of-contract process||If the customer chooses not to continue the service all data can be extracted for the customer in a format of their choosing at additional cost.|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||No|
|What users can and can't do using the API||We have API's for importing and exporting selected data.|
|API documentation formats||
|API sandbox or test environment||Yes|
|Independence of resources||
Adapt is a cloud hosted solution in Microsoft Azure that incorporates the following features to ensure scalability.
- All organisations are provided with their own environment, independent of any other environment.
- Automated scale-up rules during high load / CPU periods.
- 24x7 Monitoring of scaling events or service slow down.
- Micro-service architecture allows individual parts of the system to scale independently and should a slow down occur it will be limited to one area.
|Service usage metrics||Yes|
Metrics via Google analytics for web covering user activity by team or the organisation as a whole. Includes...
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||
|User control over data storage and processing locations||No|
|Datacentre security standards||Managed by a third party|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||Another external penetration testing organisation|
|Protecting data at rest||Encryption of all physical media|
|Data sanitisation process||No|
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||Adapt supports import and export of user data via the labour model.|
|Data export formats||
|Other data export formats||
|Data import formats||
|Other data import formats||
|Data protection between buyer and supplier networks||
|Data protection within supplier network||
Availability and resilience
|Guaranteed availability||We guarantee at least a 99.9% availability to back this up we offer service credits as per the contract on the hosting elements of the service.|
|Approach to resilience||Due to the commercial nature of this, it is available on request.|
|Outage reporting||Internally we have private dashboards and email alerts on service interruptions. Notifications to customers can either be automated or through contact via REPL Support desk, depending on which approach is most relevant to the customer. The REPL Customer Service Manager will provide regular service reviews where any outages are reported on and the cause(s) discussed.|
Identity and authentication
|User authentication needed||Yes|
|Other user authentication||We can use any authentication method commonly available or required by a customer. The above responses reflect what has been in use by existing customers to date. For example two factor authentication or limited access over a government network can be achieved with relative ease.|
|Access restrictions in management interfaces and support channels||
Access to Adapt site administration interfaces is limited by access permission. The organisation owner and any user with permissions to modify users may assign/remove these permissions to any user as required, however, no user may modify permissions of the organisation owner.
2nd level support staff have no access to the customer data, or the ability to access as the customer. They have access to the underlying infrastructure, azure platform to triage or prevent any issues.
3rd level support staff do have access to all data if required to fix any issues.
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||The Security & Governance approach of Adapt follows the ISO 27001 framework. As a relatively new small company, we have not had time to attain full accreditation. The accreditation of the ISO 27001:2013 standard is currently in process, with a target date set for Q3 2018.|
|Information security policies and processes||
Adapt have adopted policies and process set by the ISO 27001 standard and by Information Security best practices. Polices are defined as statements from the board and are peer reviewed and require annual review.
The board also provide the strategic direction to the Head of Group Information Security & Compliance who ensures policies and process are in place and followed. The Head of Group Information Security and Compliance reports directly to a board member and audits security and compliance across the company.
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||We have internal processes for change control and management. These are periodically reviewed to ensure we incorporate any emerging best practice. Our audit capabilities ensure we have a comprehensive list of all changes to the environment and configuration. Our process is built with security and control in mind and we utilise leading source control management tools. Significant changes to our product set result in independent security assessments. Our deployments are automated and our monitoring tools are provided by a leading vendor.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||Threat assessment is collected from a combination of sources which include; regular 3rd party penetration testing, monitoring access logs and using the tools that Microsoft make available which are evolving all the time e.g. Azure Security Center & Azure SQL Database Threat Detection.|
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||
In conjunction with Vulnerability management, we review a combination of sources to detect potential threats.
On discovering a potential threat an assessment is made to understand the implications and scope. If deemed to be significant appropriate actions are taken and customer notified if threat is deemed to be insignificant the incident is logged and dealt with, customer is not notified.
|Incident management type||Supplier-defined controls|
|Incident management approach||The incident management process is defined and configured by the requirements set in ISO 27001:2013. Users report Incidents via a dedicated Incident reporting area within the group portal. The information reported feeds directly to Information Security, who are then able to produce analytic and statistical information based on the incidents reported.|
|Approach to secure software development best practice||Conforms to a recognised standard, but self-assessed|
Public sector networks
|Connection to public sector networks||No|
|Price||£4000 to £35000 per licence per month|
|Discount for educational organisations||No|
|Free trial available||Yes|
|Description of free trial||Free pilot licence can be provided, but any requested developments or implementation services/set up services will be charged. The free pilot licence is limited to 3 months maximum|