Skip to main content

Help us improve the Digital Marketplace - send your feedback

macseu

MACS Platform for CAFM & Digital Asset Management and IWMS Consultancy

MACS provide a cloud based fully integrated suite of Digital Asset Management solutions based around but not limited to IBM's market leading TRIRIGA Integrated Workplace Management System (IWMS) and Maximo Computer Aided Facilities Management (CAFM) software tools.

Features

  • Fully scalable service that can grow with your business.
  • Rapid on-boarding service available with MACS Quick Start.
  • Extensive knowledge and experience of the Property Sector.
  • IBM Certified TRIRIGA, Maximo Consultants & Reliable service delivery, support.
  • Industry Best Practice workflows yielding reduced costs and overheads.
  • End to End Process Integration (Requirement to Invoice Payment).
  • Workforce and Productivity Mobile Application Solutions.
  • Extensive experience within the Government Sector.
  • IBM Gold Business Partner. UK Based IBM Certified Technical Support.
  • Specialists in helping-asset-intensive industries & Resilience at all infrastructure levels.

Benefits

  • Fully Integrated Service & Access to highly skilled specialist consultants.
  • Compliant with Sector Specific Regulatory and Legislative Requirements.
  • Rapid deployment via our FM accelerator providing quick Return-on-investment.
  • Internet Based solutions providing access at point of use.
  • Spread costs through Monthly-OPEX payments avoiding large upfront CAPEX-payments.
  • A range of security options to protect your sensitive data.
  • Co-host your BI solution with your application for reduced latency.
  • Lower cost than retaining dedicated on-premise computing resources.
  • Reduce costs further with optional application support from MACS.
  • Flexibly add computing capacity, High availability to ensure high user-productivity.

Pricing

£6,000 a unit

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at g-cloud@macs.eu. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

1 0 0 1 5 5 8 3 0 4 4 3 3 0 2

Contact

macseu Alex Brain
Telephone: 02084327430
Email: g-cloud@macs.eu

Service scope

Service constraints
No
System requirements
  • Supported licenses for IBM Maximo/ Maximo Application Suite(MAS) / TRIRIGA
  • Supported licenses for IBM TRIRIGA/ TRIRIGA Application Suite (TAS) or
  • Supported licenses for IBM Control Desk.
  • DB2, ORACLE or MS SQL Server Database.
  • MS Windows or Linux OS.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Response is within two hours during normal office hours. Out of hours service is an optional extra.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Standard support is provided to ensure that the service is available for 98% of the agreed operating hours. Further support is provided to ensure that an RPO of 4 hours and an RTO of 12 hours is achievable. If optional application support is provided there are three levels of service. Level 1, for the resolution of easily rectified configuration issues; level 2 for those issues that are more involved, such as custom code or automation scripts; level 3 for passing on issues to IBM for a hotfix to base code.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Users have the option of installing their own applications and preparing the data or of commissioning MACS to assist. A VPN is provided for access to the virtual private cloud; the virtual servers are available within the cloud and ready for the client to begin installation. Assistance is available with gaining initial access. MACS will set up any URLs, NAT, firewalls, load balancing and security measures for the platform. This will be relayed to the purchaser following a brief consultation period to verify requirements.
Service documentation
Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction
Data is provided as an extract of the database.
End-of-contract process
Six months prior to the end of the contracted service period, the client and the provider shall assess whether or not an extension is desirable or allowable. Should the decision be to terminate the service the offboarding process shall be initiated. A date shall be agreed for the cessation of services upon which the database shall be disabled and the data exported. Following the successful export of the data, custom classes and report formats, the entire system will be securely wiped of data and software to ensure no leakage of artifacts to susequent clinets.

Using the service

Web browser interface
No
API
No
Command line interface
No

Scaling

Scaling available
Yes
Scaling type
Automatic
Independence of resources
Clients do not share computing resources. Sufficient resources are allocated to cope with the expected demand of the client within their VPC. Clients may share system resources between their own non-production and production systems, however demand is monitored and resources flexed automatically.
Usage notifications
Yes
Usage reporting
  • API
  • Email

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
  • Other
Other metrics
  • Network connections
  • Network traffic
  • Integration flows
  • Integration messages
  • Thread pools
  • Security event and incident monitoring
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
IBM

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • Daily database backups
  • Hourly transaction file backups
  • Virtual Machine snapshots
  • High Availability and Disaster Recovery
  • Hot and Warm standby
  • Dynamic container storage backups
Backup controls
Databases are backed up according to a schedule dictated by the RPO and RTO requirements.
Virtual machine snapshots are taken periodically as agreed.
Dynamic container storage backups as agreed.
Datacentre setup
  • Multiple datacentres with disaster recovery
  • Multiple datacentres
  • Single datacentre with multiple copies
  • Single datacentre
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
The network and infrastructure is guaranteed for 99.9% uptime. The database availability is guaranteed for 95% uptime. No refund is offered.
Approach to resilience
Datacentre is Tier-4 fault tolerant,

Multiple datacentre Regions,

Multiple datacentre Zones,

Split system deployment.
Outage reporting
Standard service outages would be reported through email alerts and API. Other types of service reporting can be configured based on the requirements and can encompass cloud provision reporting or specific tools like Dynatrace.

Identity and authentication

User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google apps)
  • Dedicated link (for example VPN)
Access restrictions in management interfaces and support channels
Under our ISO 27001 Standard Operating Procedure (SOP) Access control is based on the role of the employee and is documented under an Access levels process. This is controlled by the security officer and access is granted to the central management team and reviewed under our internal and external audits for ISO 27001.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device on a government network (for example PSN)
  • Dedicated device over multiple services or networks
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
TCL - The Certification Leaders B.V.
ISO/IEC 27001 accreditation date
25/11/2021
What the ISO/IEC 27001 doesn’t cover
Planning, design, implementation and operation of Security Operation Centre (SOC) Security Incident and Event Monitoring (SIEM) protective monitoring and vulnerability services to detect and respond to actual and potential threats of customer systems and networks. The service is tailored to customer requirements and may include the following: detection, alerting, response management (triage/analysis/reporting), root cause analysis; vulnerability scanning, and patching remediation identification.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • CSA CCM version 3.0
  • ISO/IEC 27001
  • Other
Other security governance standards
Cyber Essentials Plus Accredited
Information security policies and processes
Available on request.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Primary contact person will maintain and add information to these requests including an impact analysis for realizing the changes and improvements.
On a quarterly basis all request and changes will be reviewed by the Customer key user team and the MACS primary contact.
All approved changes will be packaged in point releases after which detailed planning will be made for security analysis, development, testing, acceptance and promotion to the SIT, UAT and production systems.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Information about technical vulnerabilities of information systems/application being used are monitored via the MACS technical team, the product owners and the software providers. The organisation's exposure to vulnerabilities is evaluated regularly and appropriate measures taken to address the associated risk. MACS follow the patch policy of all deployed products. All systems shall be kept up to date based on software updates provided by the supplier.

A full IT Security Health Check is carried out at least once a year.
All patching is carried out to Cyber Essentials Plus standards.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
ISMS SR (information incidents) are notified by all employees in the servicedesk or otherwise emailed to the security officer. The security officer has a console designed to monitor all incidents from first notification to completion. Protective monitoring is carried out by a SOC/SIEM service. This service is integrates with our cyber security incident response plan.

Protective monitoring is carried out by a SOC/SIEM service. This service is integrates with our cyber security incident response plan.
Incident management type
Supplier-defined controls
Incident management approach
Incident management is covered under our ISO 27001 Standard Operating Procedures. All incidents are reported in our Servicedesk as an internal service request with the marking Information Security (SR type = ISMS) and dealt with separately. The Security Officer will be notified always of every new incident and he/she shall check at that time whether the reported incident is an information security incident. If it is an information security incident, it will be dealt with in accordance to the cyber incident response policy.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Supplier
Virtualisation technologies used
Red Hat Virtualisation
How shared infrastructure is kept separate
It is not typical for different organisations to share the same infrastructure but where this is required it can be achieved using RedHat OpenShift clusters and data security controls.

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
Regularly report on energy efficiency of datacentres. Energy management systems in place. Use of energy efficient equipment and technology. Optimised cooling systems and use of renewable energy.

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Reducing our environmental impact is a core priority at MACS, and we are committed to implementing comprehensive strategies across our operations.

To reduce our carbon emissions, we've transitioned our on-premises infrastructure hosting, along with that of many customers and suppliers, to secure cloud infrastructure. This move significantly decreases the environmental footprint of our IT operations. Furthermore, we've retrofitted our buildings with energy-efficient lighting, heating, ventilation, and cooling systems, and upgraded laptops and mobile phones to newer, more energy-efficient models, donating or recycling the old ones wherever possible. Smart energy management systems within our built estate optimise energy usage.

In the UK, our new Head Office building boasts an impressive EPC rating of A and operates gas-free, sourcing 100% of its electricity from renewable energy. Similarly, at our Netherlands Head Office, we've installed solar PV panels to generate clean, renewable energy. To monitor and optimise our efforts, we've implemented smart sensors, meters, and IoT devices to collect real-time data on energy usage, emissions, and other environmental parameters in our offices.

To address waste, we've implemented a robust recycling program covering paper, plastic, and electronic waste. Additionally, by providing fully functioning kitchen spaces, we're reducing single-use plastics and promoting the use of stainless steel and biodegradable materials.

In collaboration with suppliers, we're working to reduce emissions throughout the supply chain, setting sustainability requirements and conducting audits while emphasizing local sourcing to minimize transportation-related emissions.

Our travel policy prioritises modes of transport investing in carbon offset projects, such as reforestation or renewable energy initiatives. For instance, we endorse airlines that participate in carbon sequestration programs, like tree planting for every flight taken. We're also championing the use of electric vehicles (EVs) within our employee car scheme and encouraging alternative commuting methods like public transportation, carpooling, or biking.

Covid-19 recovery

To aid recovery from the impacts of the COVID-19 pandemic, MACS has spearheaded various employment and re-training initiatives. In response to the unprecedented challenges posed by the pandemic, we have implemented a range of measures to support our staff. This includes providing essential digital tools, facilitating remote access and cloud sharing to enable seamless remote working, and ensuring that mental health support is readily available to all employees. We are training a cohort of volunteering staff as mental health first aiders, reinforcing our commitment to prioritising well-being during these challenging times.

Recognising the diverse needs of our workforce, we have established tailored programs to facilitate a gradual return to health and work following illness, ensuring the well-being and productivity of our employees. We have redesigned our workplaces and policies to align with evolving safety protocols and guidelines and committed to ongoing safe working practices.

Central to our recovery efforts is the implementation of our hybrid working policy, which sets clear boundaries and provides support for staff navigating the complexities of remote work and living arrangements. Additionally, we are managing the safe transition back to both MACS and client workplaces, ensuring a smooth and secure reintegration process.

Looking ahead, MACS is steadfast in promoting an ongoing hybrid working approach, offering flexibility and adaptability to meet the evolving needs of our workforce while fostering a culture of innovation, resilience, and collaboration in the post-pandemic landscape.

To support our Social Value reporting and monitoring we have implemented a dedicated Social Value software platform called Thrive for the collation and reporting of our Social Value performance through a single portal. The Thrive software tracks activities through a series of metrics and calculates the social value outcome, integrating data from our HR and delivery Systems to inform insights on the level of social value delivered.

Tackling economic inequality

At MACS, we're committed to addressing economic inequality, recognising its profound impact on social cohesion and economic progress. Our comprehensive approach tackles economic disparity head-on, promoting fairness across our communities.

Central to our strategy is our unwavering commitment to fair and equitable employment practices. We strive to offer competitive wages and benefits to all employees, ensuring they can adequately support themselves and their families. Over the past eight years, we've witnessed a remarkable 15% year-on-year growth in our UK workforce, with 30% of all job opportunities being filled locally.
We're dedicated to providing equal opportunities for career advancement and professional development, regardless of background or socioeconomic status. By fostering diversity and inclusion within our workforce, we aim to create pathways for individuals facing barriers to employment and break the cycle of economic disadvantage. As a testament to this commitment, 6% of our employees were previously unemployed or in full-time education, 6% are UK Armed Forces veterans, and 5% have disclosed disabilities.

Through partnerships with local universities and colleges, we've established Graduate and Apprenticeship Schemes, providing skills and resources for economic self-sufficiency. Additionally, we offer level 2, 3, and 4 training opportunities annually, enhancing our workforce's capabilities.

Externally, we support local businesses and communities, collaborating with SMEs and startups on major projects. By engaging local businesses, we stimulate economic activity and contribute to the local economies. We prioritise sourcing goods and services from local suppliers wherever possible, reducing our carbon footprint while bolstering local businesses financially.

Internally, we maintain a culture of transparency and accountability regarding pay and compensation practices. Regular audits and reviews ensure that our policies are fair and equitable, with a commitment to closing any gender or racial pay gaps within our organisation.

Equal opportunity

At MACS, diversity isn't just a buzzword; it's the cornerstone of our success and the driving force behind our collective achievements. We passionately believe that fostering a diverse and inclusive work environment is not only ethically imperative but also essential for driving innovation, creativity, and delivering high-quality outcomes. With this conviction at our core, we have taken proactive steps to create a multitude of employment and training opportunities specifically tailored to individuals with protected characteristics.

Our commitment to diversity and inclusion is ingrained in our culture of promotion and recruitment. We are steadfast in our dedication to addressing workforce inequality, ensuring that every individual, regardless of background, has the opportunity to thrive and fulfill their potential within our organisation.

Central to our approach are HR policies and procedures that actively champion the interests of ethnic minorities, individuals with neurodiversity, members of the LGBTQ+ community, women, and veterans. Through targeted initiatives and ongoing support, we strive to create an environment where everyone feels valued, respected, and empowered to contribute their unique perspectives and talents.

As a testament to our commitment, 25% of MACS employees come from ethnic minority backgrounds, reflecting the rich tapestry of diversity within our workforce. Additionally, 5% of our employees have declared disabilities, and 6% are veterans of the UK armed forces. These figures not only highlight the tangible progress we've made but also underscore our unwavering dedication to fostering an inclusive workplace where all individuals are afforded equal opportunities for success and advancement.

Wellbeing

At MACS, we believe that investing in the well-being of our employees not only enhances individual lives but also drives collective success and fulfillment. Our commitment to employee well-being extends beyond mere functionality; it encompasses a holistic approach that prioritises physical, mental, and emotional wellness. Our workspaces are thoughtfully designed to foster a sense of harmony and vitality, featuring ergonomic workstations and abundant natural light that not only enhance productivity but also nurture the wellness of our employees.

By centering our focus on wellness, we acknowledge and address the interconnectedness of health and performance. Through the incorporation of biophilic elements throughout our offices, we aim to create environments that transcend the conventional workspace, offering softer, more tranquil settings that rejuvenate both mind and body. These elements not only contribute to the overall ambiance but also serve as catalysts for creativity, innovation, and well-being.

Embracing an innovative Home & Away approach, we empower collaboration across various locations, facilitating a seamless blend of work life balance. Our commitment to inclusivity ensures that remote team members feel valued and connected through advanced technologies like life-size screens and centered audio, fostering a sense of belonging regardless of physical location.
Recognising the importance of focused work and confidential conversations, we've created designated Concentration Zones and privacy booths, providing spaces conducive to productivity and discretion. Additionally, we've curated areas within our workspaces for eating, relaxing, and socialising, offering respites from the daily hustle and fostering a strong sense of community among our team members.

Moreover, our employee healthcare scheme prioritises mental health support, offering a comprehensive range of resources and a network of mental health first aiders for localised assistance.

Pricing

Price
£6,000 a unit
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
MACS offers free SaaS trial of IBM Maximo SaaS with combination of the world’s leading enterprise asset management system with all the benefits of a CMMS. Deployed on the IBM Cloud by subscription, it is low-cost, secure and available in multiple offerings depending on size and scope of your organisation.
Link to free trial
https://macs.eu/ibm-maximo-saas-free-trial/

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at g-cloud@macs.eu. Tell them what format you need. It will help if you say what assistive technology you use.