oneXRM
OneXRM is a SaaS platform that manages services, projects, and external workforce engagements through structured, outcome-based models. Designed for clients, consultancies, and intermediaries, it ensures work is accurately classified, compliantly contracted, and effectively delivered.
It replaces fragmented, high-risk processes with structured workflows that improve compliance, control, and delivery performance.
Features
- Build outcome-based contracts with structured SoW templates
- Automate IR35 triage and generate compliant SDS documents
- Track milestones and delivery status in real time
- Configure custom workflows for approvals and payments
- Enable secure e-signatures for contracts and deliverables
- Maintain audit-ready logs with immutable ledger tracking
- Control access with flexible, role-based user permissions
- Centralise all contract documentation in a secure repository
- Manage multiple suppliers in a unified service ecosystem
- Self-serve intake for compliant project classification and onboarding
Benefits
- Reduce SoW creation time by up to 80%
- Ensure IR35 and off-payroll compliance at every stage
- Increase delivery transparency and accountability organisation-wide
- Cut administrative burden with automation and reusable templates
- Prevent misclassification risks through structured triage workflows
- Align spend to outcomes, not hours or resources
- Standardise contracting across departments and service providers
- Improve audit performance with tamper-proof activity records
- Speed up onboarding with guided workflows and templates
- Access in-house experts for IR35 and compliance support
Pricing
£149 to £249 a user a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 2 2 4 7 4 7 1 3 3 2 4 0 4 1
Contact
oneXRM
Alex Farr
Telephone: +44 (0)7814781468
Email: office@onexrm.ai
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- None
- System requirements
- Cloud based licence
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Email support is provided by default. Response times vary depending on chosen SLA.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Available on platform as a pop-up chat window. Users can enter text and a bot will try to process request if possible, else request will be routed to support team.
- Web chat accessibility testing
- None yet.
- Onsite support
- No
- Support levels
-
Plastic: Email support 8/5. Response time 48 hours
Silver: Email Support 8/7. Response time 24 hours
Platinum: E-mail and phone support 24/7 with managed tickets. Response time 4 hours - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide full support, training and documentation as part of our enterprise licensed service.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- User are able to download and store the contracts and audit trails at any point and up to 12 months after contract ends.
- End-of-contract process
-
If the user chooses not to extend then they are able to download and retain the documents and audit trails created.
Access to system expires and the data is removed after 3 years.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- Yes
- What users can and can't do using the API
- Full support, documentation and training is provided as part of Contora licensing
- API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Contract templates are configurable as part of licence set up
Scaling
- Independence of resources
- We operate automated monitoring and load balancing to scale resource as needed.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We are able to provide service metrics at organisational, project and user levels
- Reporting types
-
- API access
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- All data and audit trails are stored in a locked PDF for download and future reference
- Data export formats
- Other
- Other data export formats
- Data import formats
- Other
- Other data import formats
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Contora provide the following average availability for all components of its platform. Maintenance windows, force majeure, internet outages and circumstances beyond contora's reasonable control are excluded.
- The Monthly Uptime Percentage is calculated using the following formula:
Monthly Uptime % = (Maximum Available Minutes-Downtime)/(Maximum Available Minutes) x 100
Contora Platform Guaranteed Uptimes (Level of Availability)
- Plastic = 99%
-- Gold = 99%
- Platinum = 99.9%
In the event that the platform is not available, users will be alerted via email. If the platform is unavailable for 24hrs or more, then a refund corresponding to the time unavailable prorated over the monthly subscription fees will be processed. - Approach to resilience
-
Contora is using a Cloud Application Resilience solution to protects its AWS application environment.
The solution uses native CloudFormation Infrastructure-as-Code (IaC) to automate recoveries of the entire application environment with application data.
The solution protects VMs, Containers, Load balancers, Security groups, Gateways, Routes, Network interfaces, RDS, Aurora Serverless. It also contains immutable copies of our cloud services, application data and cloud services configurations. - Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Controlled with user role profiles within the ASP.NET framework.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Third-party accredited certification body
- ISO/IEC 27001 accreditation date
- 31/12/2021
- What the ISO/IEC 27001 doesn’t cover
- None.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- Yes
- CSA STAR accreditation date
- 31/12/2021
- CSA STAR certification level
- Level 2: CSA STAR Attestation
- What the CSA STAR doesn’t cover
- None
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- ISO/IEC 27017:2015
- ISO/IEC 27018
- ISO 9001:2015
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- CSA CCM version 3.0
- Information security policies and processes
-
- Policy manuals: our organization's rules, policies and procedures are stored in electronic format. They contain Employment procedures, Work from home policies, Employee benefits, Communication policies, Payment procedures, Workplace guidelines and Employee code of conduct.
- Training courses: any new employee or direct partner must attend our electronic training courses on contora's policy and procedures.
- Tests: following the training courses, the trainees tested to make sure they fully understood contora's policies and procedures.
- Reviews of policies and procedures: our policy documents and training materials are reviewed at least every 6 months and, when required, new policies are implemented.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
In order to keep the Platform running smoothly, changes for updates and fixes are regularly released. Minor releases are following a monthly cycle whereas major releases are following a 3-months cycle. All changes (minor and major) are tested for Unit Testing, User Acceptance, Regression/Retrofit testing. Major release are additionally tested for Performance testing (Volume Stress Testing) and Security/Penetration testing.
Emergency Releases can be released at the discretion of contora in relation to urgent security updates or issues that are causing critical production issues or severe security threats. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
A vulnerability scanner is constantly running on contora's platform as part of the standard offering.
Once a vulnerability is found and deemed a risk, the vulnerability scanner will report it on the platform management console notifications board and an email is also sent to Contora's security team.
If the vulnerability pauses a critical risk to the solution, then it is escalated immediately and a fix is deployed ASAP (Emergency release).
Else, the vulnerability will be classed one of the 3 categories for action: Remediation, Mitigation, Acceptance. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
A vulnerability scanner is constantly running on contora's platform as part of the standard offering.
Once a vulnerability is found and deemed a risk, the vulnerability scanner will report it on the platform management console notifications board and an email is also sent to Contora's security team.
If the vulnerability pauses a critical risk to the solution, then it is escalated immediately and a fix is deployed ASAP (Emergency release).
Else, the vulnerability will be classed one of the 3 categories for action: Remediation, Mitigation, Acceptance. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Users report incidents via email using helpdesk@contora.com and specify issue and priority. This is logged into contora's incident management solution and the priority is reviewed.
The level of priority will define the response type. Once the incident is acknowledged, the user will receive a daily update.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
Fighting climate change
As an electronic SaaS platform, it eliminates the use of paper-based documentation reviews and approvals. It also allows for remote collaboration, reducing the need for travel and face-to-faceTackling economic inequality
Contora has been developed to meet the needs the needs to smaller organisations who do not have access to contract specialists and is able to support them on an equal par with large multi nationals.
By utilising AI, we are able to provide drafting support, risk mitigation and even the ability to identify dependencies and assumptions that are often overlooked.Equal opportunity
Contora evaluates all contracts without prejudice and is designed to enable co-creation rather than favour either party
Pricing
- Price
- £149 to £249 a user a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Limited time period of 28 days with full functionality.