Cadence Innova

Procurement as a Service

Cloud portal, enabling the commissioning of a flexible procurement resourcing model for ‘end to end’ procurement services. Services include: Discovery, RFI’s, RFQ, Pre-Qualification, ITT, evaluation, OJEU / other government frameworks, contracting and award. Capacity to meet unplanned demand for procurement capability (surge/burst capacity) and online access to support and advice.


  • Ability to commission procurement work packages via cloud portal
  • Access to expert, experienced procurement and commercial capability
  • Tried and tested flexible, responsive procurement resourcing model
  • Best practice procurement capability, deployed rapidly within your organisation
  • Expert knowledge of OJEU, DOS, G-Cloud and other Framework procurements
  • Strong stakeholder engagement/management, building internal relationships
  • Online access to procurement support and advice
  • Full lifecycle: pre-procurement, procurement delivery, contract award and implementation
  • Structured, tested methodology and process that drives cost reductions
  • Evaluation model design, criteria; weightings, scoring and reports


  • Cloud procurement and solutions specialists
  • Delivers value for money
  • Customised approach, suited to clients needs, scope and capability
  • Experienced at working alongside internal procurement and legal teams
  • Needs translated into requirements then creative cloud procurement solutions
  • Advice and support to deliver SME/ Social Value Act obligations
  • Advice informed through deep industry and public sector experience
  • Quality documentation, aligned to government policy/public sector best practice
  • Full audit trail of documentation
  • Supplement to, or transformation of in-house capacity and capability


£300 to £1500 per person per day

  • Education pricing available

Service documents


G-Cloud 11

Service ID

8 0 4 5 4 6 0 3 9 2 3 8 4 4 1


Cadence Innova

Gary Ashby

07974 086615

Service scope

Software add-on or extension
Cloud deployment model
Public cloud
Service constraints
System requirements
  • No specific system requirements.
  • Browser access to cloud front end.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 48 hours of the questions being posted (excluding weekend periods).
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Support levels
Phone and email support weekdays between 9am and 5pm UK time as standard.
Support available to third parties

Onboarding and offboarding

Getting started
The web front end is incredibly user friendly so user documentation that is provided is usually sufficient. However we will follow up with online / onsite training if required.
Service documentation
Documentation formats
End-of-contract data extraction
All procurement data is provided with each procurement avoiding the need for data extraction at the end of the contract.
End-of-contract process
All procurement data and assets are provided with each procurement avoiding the need for data extraction at the end of the contract. No further activity is required upon end of contract.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Designed for use on mobile devices
Service interface
Customisation available


Independence of resources
Our service is run on a global platform with proven scalability and reliability. Our service grows to meet your needs.


Service usage metrics


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
Protecting data at rest
Other data at rest protection approach
We use a managed service and data is protected at rest by platform supplier using PCI DSS 3.2 certified at Level 1 Servers.
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
No data is needed to be exported as all data is supplied as part of procurement audit trail.
Data export formats
Other data export formats
  • Word
  • Excel
Data import formats
Other data import formats
  • Word
  • Excel
  • Pdf

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
99.9% availability of cloud front end
Approach to resilience
Our service runs on a global platform supplied by a 3rd party with 99.9% uptime SLA
Outage reporting
Email alerts

Identity and authentication

User authentication needed
User authentication
2-factor authentication
Access restrictions in management interfaces and support channels
Management interfaces secured using 2 factor authentication to underlying back-office solution where data is held.
Access restriction testing frequency
At least once a year
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Less than 1 month
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Less than 1 month
How long system logs are stored for
Less than 1 month

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
Other security governance standards
We are Cyber Essentials accredited
Information security policies and processes
We are Cyber Essentials accredited

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Our web front end is delivered using a 3rd party platform and we undertake no changes to our web front end.
Vulnerability management type
Vulnerability management approach
Our service is provided by a 3rd party platform who provide all vulnerability monitoring and management.
Protective monitoring type
Protective monitoring approach
Our service is provided by a 3rd party platform who provide all protective monitoring including cutting edge DDOS protection
Incident management type
Incident management approach
Our web front end service is provided by a 3rd party platform. All incidents can be reported via phone or email. These will be managed in accordance with the 3rd party's incident management processes.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£300 to £1500 per person per day
Discount for educational organisations
Free trial available

Service documents

Return to top ↑