CS Transform

Transform 360

CS Transform's SaaS business solution contains methodologies based on internationally-recognised standards for improving the delivery and benefit realisation of even the most complex transformation projects. Transform 360 supports capability-building, provides intelligent real-time information, and manages every aspect of regulatory and non-regulatory compliance to enable effectively governance, implementation, delivery and reporting.

Features

  • Browser accessible on any device
  • Built-in business processes aligned to Prince2/agile methodologies
  • Calculates forward impact of critical actions, alerting managers to problems
  • Hardwires activities to business outcomes to manage performance and compliance
  • Highly configurable, with permissions-based access for all stakeholders
  • Tailored views of project data appropriate to role
  • Real-time dashboards and reporting features tailored to each user
  • Drilldown functionality to interrogate detailed data
  • Data import and export features for easy data management
  • Standalone system, with ability to integrate with other business systems

Benefits

  • Unique product that supports implementation of business transformation global standards
  • Supports public sector organisations' transition to Cloud-based services
  • Designed to reduce risk and speed up delivery
  • Acts as intelligent agent, alerting managers early to potential issues
  • Secure, tailored views to use one system across all stakeholders
  • Easier for managers to consume, react to events in project
  • Reduces the administrative load on business leaders
  • Supports communications using social media, alerts and SMS
  • Scalable to large numbers of users in any locations
  • Fully supported, with easy and intuitive administration set up

Pricing

£2500 per instance per month

  • Education pricing available

Service documents

Framework

G-Cloud 11

Service ID

9 3 3 8 0 8 4 3 4 4 1 2 4 4 7

Contact

CS Transform

Chris Parker

08454654683

impact@cstransform.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Hybrid cloud
Service constraints None
System requirements Internet connectivity

User support

User support
Email or online ticketing support Email or online ticketing
Support response times We aim to respond to ALL initial questions within 2 hours during normal business hours 9am-5pm. We aim to response within 8 hours outside normal business hours.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.1 AA or EN 301 549
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels There are three types of support: help and training to use the Transform 360 application, help to use the supporting Operating Models, and help to cover any technical issues with Tranform 360.
Support levels and service levels are included in total service costs and dependent on severity and assigned priority levels.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started All new customers are assigned an Account Manager that will provide proactive support and advise for the first 90 days. This also includes assistance to ensure the right configuration and setup is provisioned and maximised for any digital transformation management, along with a range of user guides.
Service documentation Yes
Documentation formats HTML
End-of-contract data extraction Data extracts can be provided in all main database formats as well as CSV and Excel. Where relevant, data will be integrated into user's existing systems, and therefore there will be no or limited data extraction requirements.
End-of-contract process When an organisation chooses to terminate the contract for Transform 360, any data extract requirements, CS Transform will endeavour to deliver these, where possible. Any costs for this service will be as agreed in the Exit Plan.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Elements of Transform 360 have been designed to be accessed more readily via mobile, and some via a laptop/PC. This is dependent upon the role and content accessed by the user. For example, the dashboard module is more likely to be viewed 'on the go' by a senior stakeholder but entering or updating more detailed data within the delivery module is easier if done via a laptop/PC.
Service interface Yes
Description of service interface The service is accessible using the most common web browsers and is delivered over various public and private networks including the internet, PSN, and governmental private networks. The web interface is protected by standards-based encryption, two-factor authentication and optionally IP address restrictions. The web interface is entirely HTML5 and does not require any auxiliary plug-ins, therefore the web interface is accessible by any modern day desktop or mobile internet browser able to support secure HTTPS connections.
Accessibility standards WCAG 2.1 AA or EN 301 549
Accessibility testing N/A
API Yes
What users can and can't do using the API API's for Transform 360 are delivered via the extensibility capability of the KnowledgeKube platform that provides a fully configurable extensibility layer via it's Application Gateway technology. Transform 360 can configure new API's, connect to external API's, copy and edit existing API's from within the KnowledgeKube tool. This allows users to connect with legacy systems via RESTful API improving workflows and reducing duplication of effort.
API documentation Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Transform 360 can be customised (but may be chargable). CS Transform works directly with the client before deployment to agree any requirements and deliverables of their project/programme. Transform 360 is then set up to deliver the client's specific needs. Minor configuration can be undertaken by users, but major structural changes can be requested through the Transform 360 support team.

Scaling

Scaling
Independence of resources Transform 360 is built and hosted on the KnowledgeKube Platform. KnowledgeKube is hosted in a Hybrid environment taking advantage of the Microsoft Elastic Cloud technology. As such almost infinite scale is provided for and delivered automatically by the use of devOps monitoring and automatic scaling of customer resource in a predictive, demand-led hosting environment.

Analytics

Analytics
Service usage metrics Yes
Metrics types User numbers, amount of time logged in, error reporting
Reporting types Regular reports

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach ‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Other
Other data at rest protection approach Customers are encouraged to protect their own data using encryption technologies where only they have the decryption key. In this way, our customers are assured that their data can never be accessed by a third party. Where possible we pass data to customers, so that they can manage their data under their internal security policy.
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Data is exported via simple to configure datasource connectors to either SQL, CSV, XLS, Google Spreadsheet, Amazon DB or Google Big Query
Data export formats
  • CSV
  • Other
Other data export formats
  • SQL
  • XLS
  • Google Spreadsheet
  • Amazon DB
  • Google Big Query
Data import formats
  • CSV
  • Other
Other data import formats
  • SQL
  • XLS
  • Google Spreadsheet
  • Amazon DB
  • Google Big Query

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection between networks The Transform 360 platform is a closed portal where users are required to have a valid username and password to gain access to the portal. The platform does not store passwords. Passwords are encrypted and all users have the ability to reset and change their password where required. On set up all users are assigned to one or more roles that provide system permissions to the portal. The users role dictates what the user can do and access on the portal.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection within supplier network The Transform 360 platform is a closed portal where users are required to have a valid username and password to gain access to the portal. The platform does not store passwords. Passwords are encrypted and all users have the ability to reset and change their password where required. On set up all users are assigned to one or more roles that provide system permissions to the portal. The users role dictates what the user can do and access on the portal.

Availability and resilience

Availability and resilience
Guaranteed availability Monthly Uptime Percentage <99.95% Service Credit 10%

Monthly Uptime Percentage <99% Service Credit 20%
Approach to resilience The KnowledgeKube backup service is designed to be a resilient and a highly reliable mechanism. All Servers either Physical or Virtual are backed up daily using image technology. We use a fully automated backup process which intelligently creates incremental snapshot backups forever (after the initial full backup) and therefore uses less storage space, performs faster backups, and puts less load on the production servers. Once created on one of our dedicated backup severs, the image is replicated to our Nottingham Data Centre to another server with a large secure data repository. The image is then converted to a virtual machine automatically, ready to power on upon detection of an emergency. We keep data on disk for 14 days. The line is monitored 24/7. For data archiving we push all images to a high-density storage capacity tape autoloader using an Archive Manager. All tapes are secured with best practices, and stored at a record management company in a walk-in vault. To ensure we are successful if a disaster does occur we have a Business Continuity Plan and a Disaster Recovery Plan in place which are tested on a regular basis and are audited by BSI as part of our ISO27001 audit.
Outage reporting User defined error message displayed if service unavailable

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Customers have the option to raise a support request via telephone or email.
Access restriction testing frequency At least every 6 months
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users receive audit information on a regular basis
How long user audit data is stored for User-defined
Access to supplier activity audit information Users receive audit information on a regular basis
How long supplier audit data is stored for User-defined
How long system logs are stored for Between 6 months and 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 BSI
ISO/IEC 27001 accreditation date 12/02/2013 Last Revision Dated : 28/10/2016
What the ISO/IEC 27001 doesn’t cover All areas of the Business are In scope, no exclusions are present on the S.O.A
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards BSI PAS181
ISO 37106
Information security policies and processes We have in operation an ISMS which is maintained by the Information Security Officer. We are accredited to ISO/IEC 27001:2013 and are audited by a UKAS accredited body on an annual basis.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Change management is incorporated as part of our ISO/IEC 27001:2013 Accreditation. The platform does not have the concept of separate production and development processes as it’s not a development tool. We have change process/methodology based around the technology built into KnowledgeKube.
Vulnerability management type Supplier-defined controls
Vulnerability management approach There is a strict patch management process in place, critical Patches are deployed within 24 hours of availability, a number of sources are used to determine potential threats, Enterprise level Antivirus controls are in place and maintained.
Protective monitoring type Supplier-defined controls
Protective monitoring approach We use a number of monitoring software applications to supply real-time information that is displayed to the operations and Infrastructure & Security Teams.
The response and timescale of the response is based on the severity of the information being provided.
Incident management type Supplier-defined controls
Incident management approach There is a robust incident management policy in place and enforced as part of our ISO/IEC 27001:2013 accreditation
Incidents are reported on the corporate Intranet
The Information security Officer responds to any incidents reported in line with established control procedures.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks Yes
Connected networks Public Services Network (PSN)

Pricing

Pricing
Price £2500 per instance per month
Discount for educational organisations Yes
Free trial available No

Service documents

Return to top ↑