Transport Management System (TMS)
LiteTMS is a cloud-based TMS solution developed exclusively for small to mid-size 3PL businesses that ship Truckload (LTL, FTL, co-loading) freight and work with multiple carriers. LiteTMS automates the complete day-to-day process right from creating new orders, negotiating and comparing TL rates, scheduling pick-ups to tracking shipments till delivery.
Features
- Fleet Lifecycle Management: record buses, trucks, drivers and associated assets
- Vehicle Tracking - GPRS/Geofencing methods, real time location of carrier
- Diagnostics provided: Usage of vehicle telematics; information about status
- Real-time data from sensors and IOT mechanism to detect threat
- Remote Asset Management: Based on RFIDs, Barcodes and IOT sensors
- Driver Behaviour Measurement: safety compliance, punctuality and driving style
- periodic sms/emails about the scheduled maintenance of vehicles
- Analytics with Dashboards and Reports
Benefits
- Manage day-to-day tasks
- Manage Partners and Customers
- Track the vehicels with real-time location
- Manage statuatory documents: store work-orders, tax-receipts, licensing-permit etc.
- Easy to understand reports and cognitive dashboards
- Reduce Human Errors: accessible and real-time updated system
- Create Quick Orders: Instantly create editable work-orders
Pricing
£25 to £40 a user a month
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
1 6 3 4 7 0 6 4 9 3 4 2 4 6 7
Contact
Acuma Solutions Limited
Jonathan Eeley
Telephone: 0161 241 4111
Email: bid_team@acuma.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- LiteTMS is a freight management solution only for Truckload. It does not support LTL, Ocean or Air Cargo shipping. It is only meant for domestic shipping and does not support international shipping, customs clearance and insurance claims. For the fleet management, the hardware device to be installed in the trucks would have to be purchased by the customer, and are not a part of the software solution. The driver app which is a part of this solution is developed only for Android phones.
- System requirements
-
- A web browser to access the application
- Mobile phones for location data, if required
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 4 hrs
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- Jaws
- Onsite support
- Yes, at extra cost
- Support levels
-
Level 1 support –provide basic support and troubleshooting, such as password resets, break/fix instructions, ticket routing and escalation to Level 2 and Level 3 support. A Level 1 tech gathers and analyzes information about the user’s issue and determines the best way to resolve their problem.
Level 2 support – manage break/fix, configuration issues, troubleshooting. Manage escalated issues that Level 1 support is not equipped to handle.
Level 3 support – Troubleshooting, configuration and database administration. Level 3 tech has the ability to deploy solutions to new problems, and is the go-to person for solving difficult issues.
All levels of support are included in the product cost, no extra cost for support.
Usually, the user raises a ticket which is assigned to one of the available Level 1 support engineer who carries it to completion.
While Technical account manager or cloud support engineer are not needed, they are provided at extra cost. See our SFIA rates for details. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide video based trainings on how to use the software, and user manuals. We also provide a two hour training by one of the sales executives.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
- The entire user data is exported in CSV and PDF’s and given to the users at no extra charge. The service can be customised to deliver data with encryption in multiple ways at an extra charge.
- End-of-contract process
- The entire user data is exported in CSV and PDF’s and give to users. A feedback form is given. Typical end-of-sales activities are done at the end of contract, and there is no extra cost for this.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
There are multiple ways to access
1) Native mobile app for information entry
2) Web app for management and administration
3) Native mobile app for information consumption
The differences
● User interface
● Access permissions
● Third party integrations
Typically, the mobile-app user (which can be driver) will be able to access the service to upload the key statistics about the trip. He may not have access to the key reports and statistics available to the system administrator through dashboard. Admins, however, for the ease of access can access the reports and real time status updates via mobile app too. - Service interface
- No
- User support accessibility
- WCAG 2.1 AAA
- API
- No
- Customisation available
- Yes
- Description of customisation
-
This is a SaaS solution deployed on cloud.
The users can customize the look and feel of the user interface by choosing one of the available themes of the solution.
Customers can also white-label the solution to add their branding, colours etc.
Scaling
- Independence of resources
- LiteTMS is deployed on an Azure cloud. In Azure cloud, the users get compute resources on demand. Azure pool its massive hardware resources and provide virtual machines on top of it to the users. Azure used resource over-commitment to best utilize the resources of a virtualised cloud infrastructure, so that user’s aren't affected by a spike in CPU usage.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
The service is priced as per user per month, so the metrics for other usage as device, instance, server load, transactions, data-size is not provided.
This is not to be confused with metrics useful for the service like orders, drivers on duty etc. which are provided and described in the features and benefits. - Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- The user can export the data through downloadable CSV format files. These files will be available for direct downloads to the permitted users only. Every section which has data in the form of reports or statistics is supplemented by clickable buttons which allows the user to download the data instantaneously.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- We don’t offer any guaranteed availability. However since the application is deployed on Microsoft Azure and has redundancy, the application is a highly available application. In the past the application has been available for more than 99.5% time
- Approach to resilience
-
LiteTMS is deployed on Microsoft Azure, which has built in high availability, disaster recovery, and backup. It’s a proven technology that -
• Keeps the applications up and running
• Creates a resilient environment easier in the cloud
• Minimizes the impact of incidents
• Stays compliant with the first ISO 22301, Business Continuity Management, certified global cloud - Outage reporting
- We use Azure’s outage reporting as LiteTMS is deployed on Azure.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- There is no separate management access interface setting in LiteTMS.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- Less than 1 month
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- No
- Security governance certified
- No
- Security governance approach
- We do a security risk analysis and feature planning. All services are secured with OAuth and JWT implementation. Microservices are secured through common service gateway with single endpoint. We perform platform security testing and application penetration testing periodically. We audit the software using security threat monitoring tools. SSL is used to encrypt data in transit, and all stored data is encrypted and stored using SQL Azure Services.
- Information security policies and processes
- We do a security risk analysis and feature planning. All services are secured with OAuth and JWT implementation. Microservices are secured through common service gateway with single endpoint. We perform platform security testing and application penetration testing periodically. We audit the software using security threat monitoring tools. SSL is used to encrypt data in transit, and all stored data is encrypted and stored using SQL Azure Services.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- First we identify the need for the change requested, and what needs to be changed or configured. There are several layers of stakeholders that include management which both directs and finances the endeavor, champions of the process, and those who are directly charged with instituting the new normal. A road-map is then defined that includes the beginning, the route to be taken, and the goals. We also integrate resources to be leveraged, the scope or objective, and costs into the plan.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Our vulnerability management process consists of five phases: • Preparation • Vulnerability scan • Define remediating actions • Implement remediating actions • Rescan.
The security officer is the owner of the vulnerability management process. The vulnerability engineer role is responsible for configuring the vulnerability scanner and scheduling the various vulnerability scans. The asset owner is responsible for the IT asset that is scanned by the vulnerability management process. This owner decides whether identified vulnerabilities are mitigated or their associated risks are accepted. An IT system engineer role is typically responsible for implementing remediation actions for detected vulnerabilities. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We work with Microsoft Azure’s protective monitoring approach for LiteTMS. We also run security tests to identify potential compromises, and if we find any, we completely move LiteTMS to a separate instance of Azure. We can move to a separate instances within 24 hours of identifying a compromise.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Our Incident management is closely aligned with the service desk. When a service is disrupted or fails to deliver the promised performance during normal service hours, we put an effort to restore the service to normal operation as quickly as possible. Also any condition that has the potential to result in a breach or degradation of service triggers a response that prevents the actual disruption from occurring. Our incident management process includes Incident identification, logging, categorization, prioritization, diagnosis, Escalation, resolution and closure. Also Communication with the user community throughout the life of the incident.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
Acuma fully supports fighting climate change and as a responsible supplier has implemented a carbon reduction policy and Statement demonstrating our commitment to fighting climate change. This is available on request. - Covid-19 recovery
-
Covid-19 recovery
Acuma has remained busy during the C-19 Pandemic providing consistent services to our customers and has fully supported suppliers and staff in line with all government policy and following all government recommendations and guidelines. We have a C-19 recovery plan in place which can be shared on request and are slowly returning to the office with very limited on-site customer meetings. We work with all our customers following their guidelines, the governments’, and also our own business protocol. - Tackling economic inequality
-
Tackling economic inequality
We take economic inequality very seriously and have implemented a number of policies to address inequality. We are an accredited Living Wage Employer and have a number of policies in place to support equality. These include, Modern Slavery Policy, Equality and Diversity, Labour Standards Policy and Ethical Trading Policy. Our board is represented fairly by all genders and we operate with a diverse workforce with employees speaking over 60 languages located globally across India, USA , UK , Malaysia, and Singapore. - Equal opportunity
-
Equal opportunity
The Company applies a policy of non-discrimination on grounds of religion, ethnic origin, sex, age, marital status or disability. The only criteria for selection and for any particular position within the Company is a candidate's ability to do the job required. The Company recognises that disabled individuals can and do make a valuable and significant contribution to the business activities of the Company. Where disabled people have the attitude and abilities necessary for the job, sympathetic and positive consideration is given to their applications. Encouragement will be given in the education, training, career development and promotion of all employees, according to the opportunities available, organisational requirements and individual attitudes and abilities. - Wellbeing
-
Wellbeing
Acuma is committed to providing a healthy working environment and improving the quality of working lives for all our employees. Our wellbeing strategy aims to support Acuma's mission and core values of freedom of thought and expression, freedom from discrimination and the recognition that Acuma's staff are its greatest asset. Through the integration of wellbeing in all work activities and practices, a positive environment can be created that is compatible with promoting staff engagement, performance and achievement. Working in partnership with all areas of Acuma and the wider company with a common interest in promoting a culture of wellbeing is key to the success of this strategy. The wellbeing strategy’s ultimate goal is to improve the health, safety and wellbeing of Acuma's staff and to prevent work associated ill health, for the overall benefit of staff and the organisation. This encompasses the physical, mental and social health of employees and recognises that employees’ values, personal development and work within Acuma contribute to their overall wellbeing at work. Acuma has a large workforce and is geographically, culturally and linguistically diverse. The wellbeing strategy aims to reflect this diversity and to provide direction on related issues and challenges in order to support the development of effective solutions and outcomes. This strategy aims to bring together all initiatives already in place within Acuma for supporting and maximising the health and wellbeing of staff. Through the coordination of current wellbeing activities and the identification of further opportunities, an action plan has been established that consolidates existing work and achieves additional progress. This action plan has been developed using CIPD’s five recognised domains of wellbeing, namely: health, work, values/principles, collective/social and personal growth.
Pricing
- Price
- £25 to £40 a user a month
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Most of the features of the service for a week.
- Link to free trial
- http://litedemo.cloudapp.net:1092/#/login