E Squared UK Ltd

Isoma Analytics

Isoma Analytics is an optional module for Isoma BM. It consists of a comprehensive set of quantitative tools for analysing and improving process efficiency.

Applications include: business transformation, operational excellence, change management, mergers and acquisitions.

Features

  • Process analytics
  • Effeciency modelling
  • Version control
  • Change control
  • Data export
  • Real-time reporting

Benefits

  • Reveal process bottlenecks and inefficiencies
  • Transform enterprise efficiency and agility
  • Foster, accelerate and support a global culture of excellence
  • Drive continuous and continual improvement (Kaizen)
  • Align people with processes at times of major change
  • Use across your entire value chain

Pricing

£25000 per instance per year

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 9

799543597248911

E Squared UK Ltd

David Key

0113 366 2091

sales@esquared.systems

Service scope

Service scope
Software add-on or extension Yes
What software services is the service an extension to Isoma BM
Cloud deployment model Hybrid cloud
Service constraints None
System requirements
  • Microsoft server 2008 R2 and above
  • Microsoft sql server 2008 and above
  • Internet explorer 8 and above
  • Microsoft.net 4.51
  • Microsoft iis7

User support

User support
Email or online ticketing support Yes, at extra cost
Support response times Support availability Monday to Thursday GMT 0830 to 1700; Friday 0830 to 1600. Standard support response times are immediate to 5 working days dependent on issue prioritisation. Incident escalation process is available.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard WCAG 2.0 AA or EN 301 549 9: Web
Web chat accessibility testing None done to date
Onsite support Yes, at extra cost
Support levels Support availability Monday to Thursday GMT 0830 to 1700; Friday 0830 to 1600.

Standard support is remote via a cloud support engineer and response times are immediate to 5 working days dependent on issue prioritisation.

Incident escalation process is available.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Onsite training, online training, training documentation, training videos and phone and email support are all provided.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction We have an XML export function that users can use to export data
End-of-contract process The software is available for the duration of the contract. Upon termination or expiration of the contract the software will cease to be available to the user without renewal.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10+
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install Yes
Compatible operating systems Windows
Designed for use on mobile devices No
Accessibility standards None or don’t know
Description of accessibility Where possible we endeavour to include descriptive terms against non-text based items i.e. controls and inputs. As our software is graphical in nature we provide the ability to link to external documents which can provide a textual description.
Accessibility testing We have tested our different zoom and DPI levels to allow for ease of use for the visually impaired.
API No
Customisation available Yes
Description of customisation Administrators can customise the branding and design of the front landing page, the process boxes and the portal banner.

Scaling

Scaling
Independence of resources We provide a hybrid service. We can host both privately or publicly.

Analytics

Analytics
Service usage metrics Yes
Metrics types There is an activity report along with system status updates
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency Never
Protecting data at rest Other
Other data at rest protection approach Other encryption, assured by Independent validation of assertion
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Administrators can export their organisation's data to an XML format.
Data export formats
  • CSV
  • Other
Other data export formats
  • XML
  • PNG
Data import formats Other
Other data import formats N/A

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection between networks Assured by Independent validation of assertion
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection within supplier network Assured by Independent validation of assertion

Availability and resilience

Availability and resilience
Guaranteed availability 99.95%, assured by Independent validation of assertion
Approach to resilience There are two elements: The web service - this runs multiple instances to be resilient. The SQL database - has inbuilt replication and automatically switches when required.
Outage reporting Public dashboard

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Restricted by the roles of the user
Access restriction testing frequency At least once a year
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information No audit information available
Access to supplier activity audit information No audit information available
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations Yes
Any other security accreditations
  • ISO 9001:2008
  • ISO 9001:2015
  • UKAS Management Systems 8872

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation No
Security governance approach We are currently working towards cyber essentials
Information security policies and processes We have an internal security policy which is distributed to all staff. Where applicable we limit IT equipment using microsoft intune.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach We have a change impact assessment. Assured by Independent validation of assertion
Vulnerability management type Supplier-defined controls
Vulnerability management approach Yes. Assured by Independent validation of assertion
Protective monitoring type Supplier-defined controls
Protective monitoring approach Yes. Assured by Independent validation of assertion
Incident management type Supplier-defined controls
Incident management approach Yes. Assured by Independent validation of assertion

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks Yes
Connected networks Other

Pricing

Pricing
Price £25000 per instance per year
Discount for educational organisations Yes
Free trial available Yes
Description of free trial Two types of free service.

1. Trial: a purely technical test of the Software to satisfy a New Client of its compatibility, safety and security.

2. Proof on concept project: a jointly managed project, to prove the business viability of the Software in a live environment. Typically 1 to 3-months.

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑