Tricostar Consortia Buyers Website
Our consortium software allows solicitor and barristers to publish their rates facilitating local authorities putting out bids for required work to identify best value before awarding work. It manages training courses inc. advertising, course booking and participant communication. Forums and ‘Special Interest Groups’ create knowledge centres to share ideas.
Features
- Training Course and Event Management
- Easier to instruct law firms and barristers for work
- The ability to accept and execute estimates provided
- Management of internal and public faxing documents
- Maintenance of an interactive 3rd party rate finder
- Knowledge centres for forums an special interest groups
- Job Vacanices
- Multilingual
- Links to CommsHub - see separate listing for Tricostar products
Benefits
- Easier management of of event, training courses and participants
- Speedy identification of best value for 3rd party contracted work
- More competitive pricing achieved as rates publicised to all consortia
- More efficient management of estimates
- Improve knowledge management sharing amongst consortia members
- Build centres of knowledge excellence
- Greater flexibility through access from multiple devices
- Manage content on the move
Pricing
£5,000 to £15,000 a licence
- Minimum contract period: Year
- Excluding VAT
Service documents
Request an accessible format
Framework
G-Cloud 7
Service ID
7 7 7 4 7 2 0 1 5 2 8 6 0 5 7 7
Contact
Tricostar Software Ltd
James Lawler
Telephone: 0333 220 5081
Email: james.lawler@tricostar.com
Support
- Support service type
-
- Service desk
- Phone
- Support accessible to any third-party suppliers
- Yes
- Support availability
- Monday to Friday exc. Bank Holidays: 9.00am to 5.30pm
- Standard support response times
- Between 1 to 4 hours subject to severity
- Incident escalation process available
- Yes
Open standards
- Open standards supported and documented
- Yes
Onboarding and offboarding
- Service onboarding process included
- Yes
- Service offboarding process included
- Yes
Analytics
- Real-time management information available
- Yes
Cloud features
- Elastic cloud approach supported
- Yes
- Guaranteed resources defined
- Yes
- Persistent storage supported
- Yes
Provisioning
- Self-service provisioning supported
- No
- Service provisioning time
- 1 day
- Service deprovisioning time
- 1 day
Open source
- Open-source software used and supported
- Yes
Code libraries
- Languages your code libraries are written in
-
- Python
- Java Script
API access
- API access available and supported
- Yes
- API type
- REStful
Networks and connectivity
- Networks the service is directly connected to
- Internet
Access
- Supported web browsers
-
- Internet Explorer 9
- Internet Explorer 10+
- Firefox
- Chrome
- Safari
- Offline working and syncing supported
- No
- Supported devices
-
- PC
- Mac
- Smartphone
- Tablet
Certifications
- Vendor certification(s)
- Microsoft Partner
Identity standards
- Identity standards your service uses
- XML
Data storage
- Datacentres adhere to the EU code of conduct for energy-efficient datacentres
- Yes
- User-defined data location
- Yes
- Datacentre tier
- TIA-942 Tier 2
- Backup, disaster recovery and resilience plan in place
- Yes
- Data extraction/removal plan in place
- Yes
Data-in-transit protection
- Data protection between user device and service
Asset protection and resilience
- Datacentre location
- Data management location
- Legal jurisdiction of service provider
- EU
- Datacentre protection
- Yes
- Data-at-rest protection
- Secure data deletion
- Other secure erasure process
- Service availability
- 99.9%
Separation between consumers
- Cloud deployment model
- Public cloud
- Type of consumer
- Anyone - public
- Services separation
- Yes
- Services management separation
- Yes
Governance
- Governance framework
- Yes
Configuration and change management
- Change impact assessment
- Yes
Vulnerability management
- Vulnerability assessment
- Yes
- Vulnerability monitoring
- Yes
- Vulnerability mitigation prioritisation
- Yes
- Vulnerability tracking
- Yes
- Vulnerability mitigation timescales
- Yes
Event monitoring
- Event monitoring
- Yes
Incident management
- Incident management processes
- Yes
- Consumer reporting of security incidents
- Yes
- Security incident definition published
- No
Personnel security
- Personnel security checks
Secure development
- Secure development
- Yes
- Secure design, coding, testing and deployment
- Yes
- Software configuration management
- Yes
Supply-chain security
- Visibility of data shared with third-party suppliers
- Yes
- Third-party supplier security requirements
- Yes
- Third-party supplier risk assessment
- Yes
- Third-party supplier compliance monitoring
- Yes
Authentication of consumers
- User authentication and access management
- Yes
- User access control through support channels
- Yes
Separation and access control within management interfaces
- User access control within management interfaces
- Yes
- Administrator permissions
- Yes
Identity and authentication
- Identity and authentication controls
Secure service administration
- Service management model
Audit information provision to consumers
- Audit information provided
- Data made available by negotiation
Secure use of the service by the customer
- Device access method
- Training
- Yes