LOGEX Capacity Management / Budgeting
Get an objective view of your budget by linking volumes, resources, and finances – effortlessly and in real-time. We help you to improve the accuracy and applicability of budgeting and drive performance improvement programs.
Features
- one-source-of truth
- direct insights in impact portfolio decisions on resources and finances
- scenario management
- NHS CLA salary cost calculation
Benefits
- Seamlessly link volumes, resources and finances in one budget.
- Match the deployment of resources & manpower to future demand.
- Determine how portfolio choices impact operations, and spot improvement areas
- Bottom-up budgeting functionality facilitates collaboration with non-financial stakeholders.
Pricing
£34,922 a licence a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 0 4 0 3 0 6 6 9 4 8 2 2 8 5
Contact
LOGEX HEALTHCARE ANALYTICS LTD
Jasper Hugen
Telephone: +31 (0)6 48 05 96 37
Email: jasper.hugen@logex.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- LOGEX Costing
- Cloud deployment model
- Public cloud
- Service constraints
- No service constraints.
- System requirements
-
- Minimum recommended technical requirements provided based on discussions.
- An internet browser
- An internet connection
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- The target response time is 2 hours, Monday - Friday. The detailed information around agreed support will be set out within the agreed SLA with the client.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
- The service desk is initial point of contact in providing customer support and while they may be some variation in customer SLA's our standard support levels are as follows: Severity level 1 - Software failure - user unable to work - 1 working hour to initiate diagnosis & 4 working hours (from Response Time) to resolve or provide a workaround solution. Severity level 2 - Software failure – user unable to perform some key tasks - 1 working hour to initiate diagnosis & 4 working hours (from Response Time) to resolve or provide a workaround solution. Severity level 3 - Intermittent software problem – user still able to perform key tasks - 4 working hours to initiate diagnosis and 16 working hours (from Response Time) to resolve or provide a workaround solution. Severity level 4 - Information request – no impact on the user - 8 working hours to provide initial update and up to 32 working hours to provide information/advice The cost is included in the monthly fee. Technical support is provided via our technical support team on the service desk and a lead consultant is allocated to every customer.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Training will be provided as part of the implementation process. This training can take place onsite or online depending on customer preference. All training documentation and webinars are available via the knowledge base on our customer portal.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- In case of termination of the agreement all data stored at LOGEX Group will be disposed, including back-ups. All existing reports will be shared with Trust before deletion. Upon termination of the contact, request of the client or after maximum of five years after year-closing data will be deleted. Based on a simple algorithm every month data older than 5 years will be automatically deleted. Aggregated output (non-personal data) can be kept available for reporting purposes. On request LOGEX can provide a destruction certificate.
- End-of-contract process
- At the end of the contract, reports and exports will be made available. Afterwards, everything will be at an additional cost.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- -The system allows open access to underlying data outputs and reports. Via API the PowerBI environment can access the underlying output database of the Costing Solution. Please note that extensive analytics functionality is already part of the solution. - With the API, the data can be extracted (if required daily) back to the Trust Data Warehouse.
- API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
The hierarchy of the volum page is flexible, so both can be customised.
User access can be customised (read vs write / edit combined with organisation structure).
Users can customise the cost calculation and analytics. User access is arranged by the supplier
Scaling
- Independence of resources
- We ensure that specifications are accurate based on clients requirements and undertake a formal capacity management programme to ensure that these are consistently met.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We can discuss the provision of any required metrics and build those which are available into your SLA.
- Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with SSAE-16 / ISAE 3402
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Users will have full access to their data and will be able to extract it via the extract functionality provided. Training on how to export data will be given to users.
- Data export formats
-
- CSV
- Other
- Other data export formats
- Excel
- Data import formats
-
- CSV
- Other
- Other data import formats
- Excel
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- 99.95% availability is standard (excluding planned maintenance), SLAs are tailored to each customer and if appropriate, service credits are issued based on the SLA targets meeting availability.
- Approach to resilience
- Datacentre resilience information is available on request.
- Outage reporting
- Service outages are communicated to internal stakeholders and external key contacts by the Service Desk team. Scheduled maintenance will occur outside the hours of 07:00 and 19:00 Monday to Friday excluding English Bank Holidays. Both planned and unplanned outages will be included in standard service reports.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- LOGEX requires an IP-restriction for users of the platform. Users have a personal username and password, supported by MFA. A permission scheme is applied to users to segregate e.g. admin, super user and regular user permissions.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 07/01/2022
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- ISO27001
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Changes are discussed/reviewed in a change control board, and approved changes are recorded in ticketing system. A security representative is part of the change control board.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We periodically run vulnerability scanners and software composition analysis tools to identify pressing vulnerabilities in our software. Patches can be deployed instantly if needed, or within the standard 2-week release schedule.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Provided through our web application firewall. Incidents, depending on their nature, can be responded to within minutes.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- LOGEX will immediately inform clients both by phone and by email within 24 hours after any data leak has been identified. A policy on reporting information security incidents describes the nature of the security incidents, how to report them and highlights the importance of evidence collection for further investigation. Reporting a security incident is a topic during information security training of the employee onboarding process. An incident response protocol is followed for every potential information security incident. This protocol includes assessment of the incident, whether personal data breach is applicable &actions to inform the data controller and relevant privacy authorities.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Tackling economic inequality
At LOGEX, we believe in creating opportunities for all members of our community, especially those from disadvantaged backgrounds. We are committed to providing local employment opportunities and supporting individuals who face barriers to entering the workforce.Equal opportunity
At LOGEX, we understand the importance of fostering a diverse and inclusive workplace that reflects the communities we serve. We have implemented several initiatives to increase diversity.
One example of our commitment to diversity is our targeted recruitment efforts. We actively seek out talent from diverse backgrounds by partnering with organisations that are frontrunners in diverse recruitment and using diverse recruitment networks. Additionally, we have created and implemented an in-house unconscious bias training for all our hiring managers to ensure that candidates are evaluated based on their skills and qualifications, rather than unconscious biases. Our own recruiters are passionate about diversity and due to their passion are key in guiding our hiring managers in the right direction. One of their goals is to challenge hiring managers to recruit boldly, and to make decisions based on potential and character, rather than on boxes ticked. In the past 2 years, we've achieved a significant milestone: we're proud to announce that we've hired as many women as men. Additionally, almost 40% of our employees are women. Both of these numbers are particularly noteworthy in the tech industry, where gender balance remains a challenge.Wellbeing
At LOGEX, our mission is to turn data into better healthcare. Hence, it's needless to say we recognise that the health and wellbeing of our employees are paramount to our success. We have implemented comprehensive programmes and initiatives to support the physical, mental, and emotional well-being of our workforce;
One example of our commitment to employee health is our wellness programme, which offers a range of resources and activities designed to promote healthy lifestyles. This includes access to fitness classes and mental health support services. For example, we work together with mental health and wellbeing support service OpenUp which provides unlimited consultations with online psychologists and masterclasses.
We offer comprehensive healthcare benefits, including access to medical professionals:
24/7 virtual GP, Expert case management, Mental health support, Health check, Nutrition consultation, Online Fitness programme via our Life Insurance Partner. and preventive absence consultations.
We provide flexible working arrangements and promote work-life balance to reduce stress and prevent burnout. For example, we encourage our employees to work in a hybrid way, as we believe this will contribute significantly to our great place to work ambition. To help our employees in creating the best home office, we provide the necessary company equipment.
In case of inappropriate behaviour, confidential counselors have been appointed. Our confidential counselling team is professionally trained to support employees facing these kinds of issues.
Also, we provide training on health and safety protocols. For example, we’ve a group of Emergency Response Officers who maintain the local regulations and ensure the health and safety of our workforce.
Pricing
- Price
- £34,922 a licence a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- 3 months trial system