NTT Data - SAP Ariba Guided Buying
With SAP Ariba Guided Buying, buyers can experience smart shopping while being led to the right items and preferred suppliers, and ensuring adherence to procurement policies and procedures. The SAP Ariba Guided Buying solution makes the procurement process intuitive and more compliant and automates/controls the sourcing of goods/services within one-space.
Features
- Streamlined buying for end-users
- Streamlined Catalogue management
- Improved contract spend compliance through catalogue-based buying
- Reduced errors
- Improved compliance and adherence to buying policies
- Integrated to the Ariba Sourcing processes for new goods/services
Benefits
- Intuitive buying experience for end-users
- Supports catalogue and ad-hoc form based requisitions
Pricing
£69,440 a unit a year
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
2 1 2 7 3 1 8 1 4 5 2 1 7 2 8
Contact
NTT DATA Business Solutions (UK) Limited
Philip Newman
Telephone: 07554555951
Email: philip.newman@nttdata.com
Service scope
- Software add-on or extension
- Yes
- What software services is the service an extension to
- SAP Ariba Buying
- Cloud deployment model
- Public cloud
- Service constraints
- No
- System requirements
- None
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- SLAs are agreed with Customers. Weekend SLAs may be different but again will be agreed with Customers
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Standard and Expert care options
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide on site blueprinting as part of our deployment services (covered in Deployment costs) and train the trainer method
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Straight from the Ariba Application with 3 months after the contract ends
- End-of-contract process
- 3 months for clients to extract all their data
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- SAP Ariba is built with a responsive design to support both Mobile and Desktop.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- Yes
- What users can and can't do using the API
- SAP Ariba is built with a responsive design to support both Mobile and Desktop.
- API documentation
- No
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
- Massive scale and data centre build
Analytics
- Service usage metrics
- Yes
- Metrics types
- Full in depth pre set or customised reporting
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller (no extras)
- Organisation whose services are being resold
- SAP
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with SSAE-16 / ISAE 3402
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Number of options
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- IPsec or TLS VPN gateway
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- 99.5, assured by contractual commitment
- Approach to resilience
- Available on request
- Outage reporting
- Outages are reported using e-mail alerts as well as public dashboard available in user community
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Public key authentication (including by TLS client certificate)
- Access restrictions in management interfaces and support channels
- SAP Ariba can share this information on request
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- PWC
- ISO/IEC 27001 accreditation date
- 2nd March 2015
- What the ISO/IEC 27001 doesn’t cover
- https://assets.cdn.sap.com/sapcom/docs/2016/01/08b81ca2-597c-0010-82c7-eda71af511fa.pdf
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- ISO 9001
- ISO 27001
- ISO 22301
- ISO 10012
- https://www.sap.com/corporate/en/company/quality.html
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- CSA CCM version 3.0
- Information security policies and processes
- This information upon request or can be accessed at www.sap.com/corporate/en/company/security.html
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- All processes and policies are defined following industry standards. Most of these are internal and audited in our SOC2 audit which is made twice a year and available to the customer
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- All processes and policies are defined following industry standards. Most of these are internal and audited in our SOC2 audit which is made twice a year and available to the customer
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- All processes and policies are defined following industry standards. Most of these are internal and audited in our SOC2 audit which is made twice a year and available to the customer
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- All processes and policies are defined following industry standards. Most of these are internal and audited in our SOC2 audit which is made twice a year and available to the customer
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
Our company has analysed its carbon footprint and found that it emits 440 tons of carbon into the atmosphere annually. More than 70% of the emissions are due to travel in fossil-fuelled cars. Our company launched two significant initiatives to reduce its carbon footprint:
a subsidised electric car scheme where we pay employees an allowance to exchange their fossil-fuelled car for an all-electric vehicle. The approach is highly tax-efficient for the individual. In its first year, we have replaced 5% of our fleet, a trend we expect to accelerate significantly from now on; and
our “Work Where it Works” initiative allows employees to choose where they work each day, subject to customer needs. In practice, most employees want to spend most of their time working from home. This further reduces travel within our company, improves employee well-being and makes it easier for people, such as mothers with young children, to continue working for our company.
The other area we address is the use of fuel and water in our offices. Although the impact is less significant than with cars, it is still positive. We continue to pressure our landlords to use renewable energy suppliers, and two of three have committed to change to such a supplier in the coming 12 months. We discourage the use of air conditioning, except where needed in server rooms. Instead, we ask employees to open the windows if it is a warm day.
We analyse our carbon footprint annually and report our results publicly via the SECR (Streamlined Energy ad Carbon Reporting) and ESOS (Energy Savings Opportunity Scheme). WE action any recommendations from the consultancies involved in the audits.
Pricing
- Price
- £69,440 a unit a year
- Discount for educational organisations
- No
- Free trial available
- No