SCUBE LIMITED

HR Software

Scube's HR Management System offers a wealth of modules to suit the needs of your business. This highly used system is feature-rich, direct and gives a key HR management platform along with free documentation and entry to large community of users.

Features

  • Customisable Dashboard
  • System Administration
  • Personal Information Management
  • Leave Management
  • Time & Attendance Management
  • Recruitment Management
  • Performance Management

Benefits

  • Available on multiple devices
  • Secured Environment with 2 step authetication
  • Both Android and iOS App
  • Feature Rich
  • Highly configurable

Pricing

£10 to £20 per licence per month

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 11

902333514938116

SCUBE LIMITED

R P Pappu

07800570574

raja.pappu@scubedimensions.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints Nothing as of now.
System requirements
  • A system with Windows or Mac OS and browser
  • Suitable antivirus to protect web services

User support

User support
Email or online ticketing support Email or online ticketing
Support response times 24 Hours SLA
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels Level 1 - Email support, FREE of cost
Level 2 - Telephone support, GBP 8 per hour
Level 3 - Onsite support, from GBP 50 per visit
Dedicated Account Manager for Corporates and Enterprises.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We use online training and if the strength is more than 5 then we can provide onsite training.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Multiple ways:
1. CSV formats
2. We can help migrating in to new system
3. If the format request is placed then data can be delivered in the same.
End-of-contract process Licenses, Training and Email support are included and any further request is chargeable.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service This is still under development.
API No
Customisation available Yes
Description of customisation This software is fully customisable from fields to services. Users can opt for the services they would like to use and can freeze those which are not needed.

Scaling

Scaling
Independence of resources Our application is hosted on high end servers and has capacity to handle multiple sessions and thousands of users. We monitor the capacity and application efficiency as well.

Analytics

Analytics
Service usage metrics Yes
Metrics types Performance and potential metrics
Cost and time to hire
Absenteeism
Health metrics
Reporting types
  • Real-time dashboards
  • Regular reports

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least every 6 months
Penetration testing approach In-house
Protecting data at rest Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach There are multiple ways of doing it. It depends on what system, what version is in place and accordingly we can help the users to migrate to our system.
Data export formats
  • CSV
  • ODF
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability We guarantee our Cloud Service connectivity at least 99.95% of the time.
Approach to resilience It’s available on request
Outage reporting Email Alerts, SMS alerts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels Need to draft
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Information Security Incident Management
Application Service Provider Security Requirements
Computer Crime and Privacy Laws

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach • We are using cloud based DevOps tool which undertakes configuration changes and tracks management approval process.
• We follow pre-approved change tasks for Cloud computing scenarios (eg. Auto scaling, DNS update) which reduce the delay in approval processes.
• We have aligned standard change request (pre-approved) processes which are within pre-defined rules, parameters and cost limits.
• We have also set a tracking system which can track and record all changes made in system including ability to generate reports for tracking and reviewing trends for further action.
Vulnerability management type Undisclosed
Vulnerability management approach We follow below steps under this -
• Outline vulnerability management policy.
• Discover existing vulnerabilities.
• Analyse current level of security and rank vulnerabilities by threat level/remediation actions required.
• Mitigate the causes of vulnerabilities.
• Maintain security through ongoing testing and discovery.
We constantly scans for new vulnerabilities and patches and automatically remediates during your already scheduled maintenance on Linux and windows servers.
Protective monitoring type Undisclosed
Protective monitoring approach Proactive monitoring policies are as follows
• Provide visibility and an understanding of how the IT systems and services are used.
• Provide details of who is accessing data, particularly sensitive data.
• Provide the ability to detect and investigate unlawful activity or security events.
• Assist in making users accountable for their use of the IT systems or services.
• Provide evidence of compliance with policy, standards, legislation and regulations.
Incident management type Undisclosed
Incident management approach We have support module directly integrated with our cloud based HRMS system to manage incidents. As soon as its raised, it will be assigned to an agent and depending on the severity, it will be assigned to Support or Product team.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £10 to £20 per licence per month
Discount for educational organisations Yes
Free trial available Yes
Description of free trial Full Entreprise version

Service documents

pdf document: Pricing document pdf document: Terms and conditions
Service documents
Return to top ↑