REPL Group Worldwide Ltd


ADAPT is a highly-adaptable suite of tools for granular insights and exceptional forecasting accuracy. ADAPT combines workforce management best practice with state-of-the-art technology, transforming how you schedule, forecast and budget.
Go beyond old-school labour modelling with leading-edge software that calculates, manages and analyses data on an unparalleled scale.


  • Calculate workforce demand using cutting-edge technology
  • Assign duties for optimal productivity with a revitalised labour model
  • Assemble bottom-up demand for labour budget planning in minutes
  • Aggregate forecasts for faster and more accurate analysis
  • Create advanced scheduling using artificial intelligence
  • Manage task execution and distribution quickly and easily
  • Monitor and track progress with task reporting
  • Identify areas for improvement to task completion rates


  • Facilitate rapid what if analysis and planning
  • Eliminate mismatches between budgets and schedules
  • Reduce labour costs through breakthrough budgeting tools
  • Increase workforce capacity, satisfaction, productivity and performance
  • Identify growth opportunities and elevate customer satisfaction
  • Make and review changes in isolation before committing


£4000 to £35000 per licence per month

  • Free trial available

Service documents


G-Cloud 11

Service ID

7 6 0 9 5 7 2 3 3 0 2 5 1 7 7


REPL Group Worldwide Ltd

Valentin Kalis

01564 793731

Service scope

Service scope
Software add-on or extension No
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints ADAPT is cloud hosted in Microsoft Azure (private or public) so customers must ensure any firewalls are configured to allow access to ADAPT.

A 2 hour bi-weekly maintenance window is reserved for updates, patching and configuration changes outside of working hours, however often this will not result in any down time as much of our service utilises rolling updates. The ADAPT team would advise in advance of any planned down time during a window.
System requirements
  • Modern Web Browsers, Chrome (recommended)
  • Internet Access
  • Access to Azure private cloud if required

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Dependent on agreed SLA's and priority
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.1 A
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels 4 tiers of support
All times in the timezone of the customer's primary location.
Standard - 9am to 5pm - Monday to Friday
Extended - 8 am to 10pm - Monday-Friday
Premium - 8 am to 10pm - 7 days
Seamless - 24/7.
The majority of our customers take standard support as this is typically all customer require. This is included in the SaaS costs provided. The following premiums are for the enhanced support services.
Extended - SaaS cost +7%
Premium - SaaS cost + 15%
Seamless - SaaS cost +25%
Only Critical and High priority cases are managed outside of UK business hours.
Hosted environments are monitored 24/7.
Technical account management is provided in seamless support.
Cloud hosting specialists maintain the environments.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started The application is intuitive allowing users to self learn. We also provide the following services to support the implementation of the platform

An implementation support team is available at additional cost. They will provide the following services
- Implementation Project Plan
- On site Training
- Supported by Weekly Conference call meetings
- Project best practice and change management expertise
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction User and configuration data may be exported. More complete data extracts can be supplied as database backup files on request via our support team.
End-of-contract process If the customer chooses not to continue the service all data can be extracted for the customer in a format of their choosing at additional cost.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Chrome
Application to install No
Designed for use on mobile devices No
Service interface No
What users can and can't do using the API We have API's for importing and exporting selected data.
API documentation Yes
API documentation formats
  • Open API (also known as Swagger)
  • PDF
API sandbox or test environment Yes
Customisation available No


Independence of resources Adapt is a cloud hosted solution in Microsoft Azure that incorporates the following features to ensure scalability.

- All organisations are provided with their own environment, independent of any other environment.
- Automated scale-up rules during high load / CPU periods.
- 24x7 Monitoring of scaling events or service slow down.
- Micro-service architecture allows individual parts of the system to scale independently and should a slow down occur it will be limited to one area.


Service usage metrics Yes
Metrics types Metrics via Google analytics for web covering user activity by team or the organisation as a whole. Includes...

Active users
Page views
Session Duration
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Encryption of all physical media
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Adapt supports import and export of user data via the labour model.
Data export formats
  • CSV
  • Other
Other data export formats
  • Xml
  • JSON
Data import formats
  • CSV
  • Other
Other data import formats
  • Xml
  • JSON
  • API Intergration

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability We guarantee at least a 99.9% availability to back this up we offer service credits as per the contract on the hosting elements of the service.
Approach to resilience Due to the commercial nature of this, it is available on request.
Outage reporting Internally we have private dashboards and email alerts on service interruptions. Notifications to customers can either be automated or through contact via REPL Support desk, depending on which approach is most relevant to the customer. The REPL Customer Service Manager will provide regular service reviews where any outages are reported on and the cause(s) discussed.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
  • Other
Other user authentication We can use any authentication method commonly available or required by a customer. The above responses reflect what has been in use by existing customers to date. For example two factor authentication or limited access over a government network can be achieved with relative ease.
Access restrictions in management interfaces and support channels Access to Adapt site administration interfaces is limited by access permission. The organisation owner and any user with permissions to modify users may assign/remove these permissions to any user as required, however, no user may modify permissions of the organisation owner.

2nd level support staff have no access to the customer data, or the ability to access as the customer. They have access to the underlying infrastructure, azure platform to triage or prevent any issues.

3rd level support staff do have access to all data if required to fix any issues.
Access restriction testing frequency At least every 6 months
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach The Security & Governance approach of Adapt follows the ISO 27001 framework. As a relatively new small company, we have not had time to attain full accreditation. The accreditation of the ISO 27001:2013 standard is currently in process, with a target date set for Q3 2018.
Information security policies and processes Adapt have adopted policies and process set by the ISO 27001 standard and by Information Security best practices. Polices are defined as statements from the board and are peer reviewed and require annual review.

The board also provide the strategic direction to the Head of Group Information Security & Compliance who ensures policies and process are in place and followed. The Head of Group Information Security and Compliance reports directly to a board member and audits security and compliance across the company.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach We have internal processes for change control and management. These are periodically reviewed to ensure we incorporate any emerging best practice. Our audit capabilities ensure we have a comprehensive list of all changes to the environment and configuration. Our process is built with security and control in mind and we utilise leading source control management tools. Significant changes to our product set result in independent security assessments. Our deployments are automated and our monitoring tools are provided by a leading vendor.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Threat assessment is collected from a combination of sources which include; regular 3rd party penetration testing, monitoring access logs and using the tools that Microsoft make available which are evolving all the time e.g. Azure Security Center & Azure SQL Database Threat Detection.
Protective monitoring type Supplier-defined controls
Protective monitoring approach In conjunction with Vulnerability management, we review a combination of sources to detect potential threats.

On discovering a potential threat an assessment is made to understand the implications and scope. If deemed to be significant appropriate actions are taken and customer notified if threat is deemed to be insignificant the incident is logged and dealt with, customer is not notified.
Incident management type Supplier-defined controls
Incident management approach The incident management process is defined and configured by the requirements set in ISO 27001:2013. Users report Incidents via a dedicated Incident reporting area within the group portal. The information reported feeds directly to Information Security, who are then able to produce analytic and statistical information based on the incidents reported.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No


Price £4000 to £35000 per licence per month
Discount for educational organisations No
Free trial available Yes
Description of free trial Free pilot licence can be provided, but any requested developments or implementation services/set up services will be charged. The free pilot licence is limited to 3 months maximum

Service documents

Return to top ↑