Mercato Solutions

Transform 360 Enterprise

CS Transform's SaaS business solution contains methodologies based on internationally-recognised standards for improving the delivery and benefit realisation of even the most complex transformation projects. Transform 360 supports capability-building, provides intelligent real-time information, and manages every aspect of regulatory and non-regulatory compliance to enable effectively governance, implementation, delivery and reporting.

Features

  • Browser accessible on any device
  • Built-in business processes aligned to Prince2/agile methodologies
  • Calculates forward impact of critical actions, alerting managers to problems
  • Hardwires activities to business outcomes to manage performance and compliance
  • Highly configurable, with permissions-based access for all stakeholders
  • Tailored views of project data appropriate to role
  • Real-time dashboards and reporting features tailored to each user
  • Drilldown functionality to interrogate detailed data
  • Data import and export features for easy data management
  • Standalone system, with ability to integrate with other business systems

Benefits

  • Unique product that supports implementation of business transformation global standards
  • Supports public sector organisations' transition to Cloud-based services
  • Designed to reduce risk and speed up delivery
  • Acts as intelligent agent, alerting managers early to potential issues
  • Secure, tailored views to use one system across all stakeholders
  • Easier for managers to consume, react to events in project
  • Reduces the administrative load on business leaders
  • Supports communications using social media, alerts and SMS
  • Scalable to large numbers of users in any locations
  • Fully supported, with easy and intuitive administration set up

Pricing

£10000 per instance per month

  • Education pricing available

Service documents

Framework

G-Cloud 11

Service ID

8 4 4 2 3 8 1 4 6 9 1 2 2 1 0

Contact

Mercato Solutions

Jack Robbins

0121 605 2050

jack.robbins@mercatosolutions.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
None
System requirements
Internet connectivity

User support

Email or online ticketing support
Email or online ticketing
Support response times
We aim to respond to ALL initial questions within 2 hours during normal business hours 9am-5pm. We aim to response within 8 hours outside normal business hours.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
There are three types of support: help and training to use the Transform 360 application, help to use the supporting Operating Models, and help to cover any technical issues with Transform 360.
Support levels and service levels are included in total service costs and dependent on severity and assigned priority levels.
Support available to third parties
No

Onboarding and offboarding

Getting started
All new customers are assigned an Account Manager that will provide proactive support and advise for the first 90 days. This also includes assistance to ensure the right configuration and setup is provisioned and maximised for any digital transformation management, along with a range of user guides.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
Data extracts can be provided in all main database formats as well as CSV and Excel. Where relevant, data will be integrated into user's existing systems, and therefore there will be no or limited data extraction requirements.
End-of-contract process
When an organisation chooses to terminate the contract for Transform 360, any data extract requirements, CS Transform will endeavour to deliver these, where possible. Any costs for this service will be as agreed in the Exit Plan.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Elements of Transform 360 have been designed to be accessed more readily via mobile, and some via a laptop/PC. This is dependent upon the role and content accessed by the user. For example, the dashboard module is more likely to be viewed 'on the go' by a senior stakeholder but entering or updating more detailed data within the delivery module is easier if done via a laptop/PC.
Service interface
No
API
Yes
What users can and can't do using the API
API's for Transform 360 are delivered via the extensibility capability of the KnowledgeKube platform that provides a fully configurable extensibility layer via it's Application Gateway technology. Transform 360 can configure new API's, connect to external API's, copy and edit existing API's from within the KnowledgeKube tool. This allows users to connect with legacy systems via RESTful API improving workflows and reducing duplication of effort.
API documentation
Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Transform 360 can be customised (but may be chargable). CS Transform works directly with the client before deployment to agree any requirements and deliverables of their project/programme. Transform 360 is then set up to deliver the client's specific needs. Minor configuration can be undertaken by users, but major structural changes can be requested through the Transform 360 support team.

Scaling

Independence of resources
Transform 360 is built and hosted on the KnowledgeKube Platform. KnowledgeKube is hosted in a Hybrid environment taking advantage of the Microsoft Elastic Cloud technology. As such almost infinite scale is provided for and delivered automatically by the use of devOps monitoring and automatic scaling of customer resource in a predictive, demand-led hosting environment.

Analytics

Service usage metrics
Yes
Metrics types
User numbers, amount of time logged in, error reporting
Reporting types
Regular reports

Resellers

Supplier type
Reseller (no extras)
Organisation whose services are being resold
CS Transform

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Physical access control, complying with CSA CCM v3.0
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Data is exported via simple to configure datasource connectors to either SQL, CSV, XLS, Google Spreadsheet, Amazon DB or Google Big Query
Data export formats
  • CSV
  • Other
Other data export formats
SQL, XLS, Google Spreadsheet, Amazon DB or Google Big Query
Data import formats
  • CSV
  • Other
Other data import formats
SQL, XLS, Google Spreadsheet, Amazon DB or Google Big Query

Data-in-transit protection

Data protection between buyer and supplier networks
Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
Monthly Uptime Percentage <99.95% Service Credit 10%

Monthly Uptime Percentage <99% Service Credit 20%
Approach to resilience
The KnowledgeKube backup service is designed to be a resilient and a highly reliable mechanism. All Servers either Physical or Virtual are backed up daily using image technology. We use a fully automated backup process which intelligently creates incremental snapshot backups forever (after the initial full backup) and therefore uses less storage space, performs faster backups, and puts less load on the production servers. Once created on one of our dedicated backup severs, the image is replicated to our Nottingham Data Centre to another server with a large secure data repository. The image is then converted to a virtual machine automatically, ready to power on upon detection of an emergency. We keep data on disk for 14 days. The line is monitored 24/7. For data archiving we push all images to a high-density storage capacity tape autoloader using an Archive Manager. All tapes are secured with best practices, and stored at a record management company in a walk-in vault. To ensure we are successful if a disaster does occur we have a Business Continuity Plan and a Disaster Recovery Plan in place which are tested on a regular basis and are audited by BSI as part of our ISO27001 audit.
Outage reporting
User defined error message displayed if service unavailable

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Customers have the option to raise a support request via telephone or email.
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users receive audit information on a regular basis
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
Users receive audit information on a regular basis
How long supplier audit data is stored for
Between 6 months and 12 months
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
12/02/2013 Last Revision Dated : 28/10/2016
What the ISO/IEC 27001 doesn’t cover
All areas of the Business are In scope, no exclusions are present on the S.O.A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
BSI PAS181
ISO 37106

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Change management is incorporated as part of our ISO/IEC 27001:2013 Accreditation. The platform does not have the concept of separate production and development processes as it’s not a development tool. We have change process/methodology based around the technology built into KnowledgeKube.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
There is a strict patch management process in place, critical Patches are deployed within 24 hours of availability, a number of sources are used to determine potential threats, Enterprise level Antivirus controls are in place and maintained
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We use a number of monitoring software applications to supply real-time information that is displayed to the operations and Infrastructure & Security Teams.
The response and timescale of the response is based on the severity of the information being provided
Incident management type
Supplier-defined controls
Incident management approach
There is a robust incident management policy in place and enforced as part of our ISO/IEC 27001:2013 accreditation
Incidents are reported on the corporate Intranet
The Information security Officer responds to any incidents reported in line with established control procedures

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
Yes
Connected networks
Public Services Network (PSN)

Pricing

Price
£10000 per instance per month
Discount for educational organisations
Yes
Free trial available
No

Service documents

Return to top ↑