Nuclear Enterprise Innovation Management Software
Accolade SaaS manages the entire Enterprise Innovation process to ensure execution is aligned with strategic goals and supported by nuclear-level Governance.
Programme and project portfolios are continually optimised to create maximum value, based on available financial and other resources. This results in better decision-making at all levels.
Features
- Provides Governance, Assurance and Sanction Control for the Nuclear Industry
- Enables faster and better informed Decisions at all levels
- Ensures continual alignment of Strategy with execution
- Continually optimises Portfolios across the organisation
- Manages the Innovation process across the Enterprise
- Creates up to date dashboards to improve decision integrity
- Manages Gated Processes and Workflow to accelerate delivery
- Creates intuitive roadmaps for medium and long term planning
- Best practices for Nuclear and Energy sectors
- Classification up to Official Sensitive (OS) Sensitive Nuclear Information (SNI)
Benefits
- Decisions to promote or kill projects are made more effectively
- Improves efficiency and tracks benefit realisation
- Ensures that activities always support Enterprise objectives
- Creates maximum value within restraints of financial and other resources
- Improves validity of decisions being single source of the truth
- Manages process decisions at every stage to enhance governance
- Continually aligns R&D with development and Strategic Objectives
- Easily adapts to changes in roles and organisational structure
- Multiple Roadmapping Views for improved communication
- Integration with Microsoft 365 and Teams simplifies collaboration
Pricing
£1,296 a licence a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 2 3 9 7 0 9 1 1 1 0 4 3 7 7
Contact
Roadmapping Technology Ltd
Chris Creighton Thomas
Telephone: 01494 616006
Email: chrisct@roadmappingtechnology.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- Please see our Service Definition document for details of technical requirements
- System requirements
-
- Modern networked device / PC
- Browser as defined in specifications section
- Sufficient network bandwidth to access services
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Operational questions are answered within 2 to 24 hours dependent on agreed criticality.
Standard support is provided form 9:00 to 17:00 on Monday to Friday excluding public holidays. Other options can be arranged as required. - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Standard technical support is included in the SaaS license fees. Support can be arranged outside normal support hours at an additional cost. Additional support may be required to enable new features to be configured to clients needs. Support charges are based on our standard daily rates in the pricing document
A technical account manager is assigned to each client and is responsible for the level of client satisfaction. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
On-site training workshops are carried out with classes of up to 12 attendees run by one of our training consultants. Typically 1 day
"Train the trainer" sessions are encouraged so that ongoing training can be done in-house for new users.
On-line training is also available and may be more suitable if attendees are geographically dispersed.
User documentation is accessible from within the system - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Roadmapping Technology can provide extracts of the data in a variety of formats from an entire backup of the SQL database to an export format to be agreed with the customer, including but not limited to XML, CSV and ODF formats. Self-service reports can be used directly by the customer to extract data at any time limited only by the security profile of the user.
- End-of-contract process
-
Roadmapping Technology will provide a copy of the clients's data in a suitable format free of charge, or the client can extract this at any time.
If the client wishes we can also provide additional help and guidance to assist in moving this data to a new environment. This will be charged on our normal time and materials basis.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Interface layout optimised for mobile platforms with option to run desktop version as required
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 A
- Description of service interface
-
The Accolade Web API is a private RESTful web service, intended for use by company assets and by our customers. A RESTful API is based on representational state transfer (REST), an architectural style and approach to communications often used in web services development.
A RESTful web application exposes information about itself in the form of information about its resources. It also enables the client to take actions on those resources, such as create new resources (i.e. create a new user) or change existing resources (i.e. edit a post). - Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- Accolade’s Web API conforms to the Richardson Maturity Model Level 2. It is implemented with ASP.Net Web API 2.2 with attribute routing, and follows OData v3 conventions. JSON is the media type that is supported for request and response payloads.
- API
- Yes
- What users can and can't do using the API
- Accolade provides a fully functional web API covering a comprehensive set of functionality allowing efficient management of data and enabling interfacing to external data souces. There is also an Integration Engine which enables easy integration with most common applications.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Accolade provides a comprehensive configuration layer allowing it to be tailored to the individual business use cases of each customer. This configuration approach is far better than customisation as it does not involve modifying any of the core product components.
Trained users can customise the configuration, but only when they are given appropriate access rights. Alternatively, many customers consider it more efficient to use our resources to make changes.
Scaling
- Independence of resources
- Environments are scoped with the customer during initial planning phases and are tested against specification during the implementation phases. Any subsequent changes to the customers usage requirements are scoped as required and changes in the provision of service are scheduled with the customer. Environments are additionally monitored allowing for any anomalies to be identified and investigated. Environments are highly scalable allowing for the largest of implementations.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Usage metrics are captured at application, hosting environment and support system levels and can be reported on by defining a set of required metrics with the customer
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Sopheon for application software and Claritas Solutions for cloud hosting
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Comprehensive self-service reporting, including online report and chart creation, custom report creation, style templates and intelligent extract fields, and integration with Microsoft Office documents to create 'smart' documents driven from Accolade data. Extensive API allows expert users to create their own bespoke exports as required.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- XML
- JPG
- PNG
- TXT
- DOC
- DOCX
- XLS
- XLSX
- Any additional formats required via the API
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- XML
- JPG
- PNG
- TXT
- DOC
- DOCX
- XLS
- XLSX
- Any additional data formats via the API
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Bonded fibre optic connections
- Legacy SSL and TLS (under version 1.2)
- Other
- Other protection between networks
- We understand that some clients’ data requires specific protection and as such where required "alternative security products" can be installed within the environment.
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- 99.95%. Excludes planned and emergency maintenance.
- Approach to resilience
-
We only use “Tier 3” data centres, which are considered the gold standard for cloud storage. A Tier 3 (or Level 3) data centre is a location with redundant and dual-powered servers, storage, network links, and other IT components. It is one of the most commonly used data centre tiers, where IT components are powered with multiple, active and independent sources of power and cooling resources.
For Private Cloud a number of options enable you to build resilience into your applications. We offer Private Cloud Compute from two geographically distinct sites, both located in the UK and separated by over 100km for excellent geo-diversity. - Outage reporting
-
A public dashboard - both bespoke and standard is available
An API - porting data into the clients' SIEM product
Email alerts - alerting specific individuals or groups
SMS - message to defined individuals within the organisation
Outages are identified as Planned maintenance, Emergency maintenance, and platform issues. In addition, the designated Technical Account Manager will proactively contact customers as appropriate.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Other
- Other user authentication
- For online systems (e.g. Customer Portal & API interfaces), all users are required to have a unique username, password and memorable word combination. Customers may also use 2FA authentication tokens.
- Access restrictions in management interfaces and support channels
- For the management of the environment will always authenticate the identity of the user by validating known phone numbers and asking them for specific characters within their pre-agreed memorable word.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- LRQA Limited
- ISO/IEC 27001 accreditation date
- 07/05/2022
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- Yes
- CSA STAR accreditation date
- 2018
- CSA STAR certification level
- Level 1: CSA STAR Self-Assessment
- What the CSA STAR doesn’t cover
- N/A
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- ISO/IEC 27001
- Information security policies and processes
- Development, implementation, support and hosting services are implemented according to the information security controls defined in the ISO/IEC 27001 standard
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- We operate our change and config management service in line with the ITIL 4.0 Approach. All CIs, are recorded and monitored through their lifecycle via our ITSM tooling so that all changes made to a particular CI can be tracked, seen and understood within the context of the full environment.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
We have a documented vulnerability management policy and process, which have been implemented, maintained and assessed in accordance with the guidance from ITIL v.3 and the current ISO20000 and ISO27001 standards.
We run continual vulnerability scanning across the environment, ensuring that if any vulnerabilities are identified that they cannot be leveraged from the outside world,
Patching takes place on a weekly basis, however, if urgent or critical patches are released they will be issued outside of the weekly cycle.
We monitor and are subscribed to a variety of channels in order to monitor current and emerging threats. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
We work with a partner to deliver an independent monitoring solution, ensuring that they give an independent view of what is going on within the environment.
Monitoring tools are deployed across the environment and monitored on a 24/7/365 basis.
Response times can be built to the client's specific SLAs but we would usually expect to be responding to a security incident within the first few minutes of a compromise being identified. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
We have a documented incident management policy and process, which have been implemented, maintained and assessed in accordance with the guidance from ITIL v.3 and the current ISO20000 and ISO27001 standards.
Users may report incidents in a variety of ways (phone/email or integration into your organisation's ITSM tool).
Depending on the severity of the incident, reports will be provided in a variety of ways. General user interaction will be provided directly. High priority incidents (P1) will have a report produced and issued to client management.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Wellbeing
Fighting climate change
The system can be used to support sustainability as part of the process to help with the environmental impact.Covid-19 recovery
The system encourages better collaboration between colleagues working remotely or in the office or in hybrid mode. The system integrates with MS Teams, MS Office 365 and Google G Suite making it easier to work from home when recovering from illness.Wellbeing
The system automates many of the tiresome chores of managing data and reduces the risk of errors. It also provides users with up to date accurate information to enable them to feel confident in the decisions they need to make to be good at their job.
Pricing
- Price
- £1,296 a licence a year
- Discount for educational organisations
- No
- Free trial available
- No