Maximo Mobile - ESA
Maximo Mobile is fully configurable using transferable skills that will become increasingly commonplace throughout MAS, aligned with the IBM technology stack. The solution uses MAS app points and therefore has no requirements for a 3rd party license, additional server software/hardware or integration. Maximo Mobile also has a strong development roadmap.
Features
- Ability to work in disconnected mode and seamless data synchronisation
- Ability to navigate to work location efficiently using Maps/GPS
- Ability to convert voice to text helping technicians reduce typing
- Scan Barcode/QR code/RFID to pull asset information
- Visualise and identify specific asset/location details with GIS integration
- Technicians can update work order statuses to track progress
- Technicians can complete complex inspection forms accurately and efficiently
- Technicians can record failure problem, cause and remedy codes
- Technicians can create follow-up work where required
- Technicians can record time, material, and tools used during work
Benefits
- Platform support: Apps are available on Apple, Android and Windows
- Authentication: Options including Maximo/MAS Security, LDAP and SSO
- Data accuracy: Capture accurate data for critical back office reporting
- Robust functions including updating assets, work orders and inventory
- Speed: Mobile apps provide more efficient field service management
- Volume: Large numbers of work orders can be accessed
- Productivity: Boost technician productivity by providing access to mobile-native features
- Compliance: Integrated HSE data and processes to improve safety
- Navigation: Simplified navigation to perform on-field operations
- Role-based features to enable management of assets and work
Pricing
£51.32 a unit
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 4 7 2 5 2 4 1 0 0 7 9 1 9 3
Contact
COHESIVE UK GROUP LIMITED
Matt Blackwell
Telephone: +447717838847
Email: matt.blackwell@cohesivegroup.com
Service scope
- Software add-on or extension
- Yes
- What software services is the service an extension to
- IBM Maximo Application Suite (MAS)
- Cloud deployment model
- Private cloud
- Service constraints
- Platform-specific support is dependent on ultimate choice of Mobile solution for Maximo. All require Maximo Application Suite as the mobile solutions interact with Maximo Manage.
- System requirements
-
- Requires Maximo Application Suite; interacts with Maximo Manage.
- If running Android - version 11 or above
- If running iOS - version 14.3 or above
- If running Windows - version 10 (v10.0.17763.) or 11
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
When a client raises a support issue, response times are measured from the moment the client submits a support request via the supplier’s online support system. Response times vary according to the priority and nature of the query, if the support relates to a Maximo system we are supporting:
- P1 (Critical business impact): Within 2 hours (coverage 24x7x365)
- P2 (Significant business impact): Within 4 hours (normal business working hours)
- P3 (Some business impact): End of next working day (normal business working hours)
- P4 (Minimal business impact): End of next working day (normal business working hours) - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- -
- Web chat accessibility testing
- -
- Onsite support
- Yes, at extra cost
- Support levels
-
Cohesive have the following priority levels for support: -
Priority 1 Critical business impact
Priority 2 Significant business impact
Priority 3 Some business impact
Priority 4 Minimal business impact
P1 are 24x7x365
P2 - P4 are handled (09.00 — 17.00) Monday to Friday UK Time (Excluding UK Bank Holidays)
There are various levels of support that are priced on an individual basis, please contact us for a separate quotation.
Resolution Targets: These are handled on a Severity basis. For incidents classed as severity 1 (highest) our incident handling window covers all days, 24 hours a day, 7 days a week. For incidents of severity 2 to 4, our incident handling is covered during normal business hours. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- After the cloud service is enabled we will engage with the users (stakeholders, representatives from various departments) to define configuration details to meet the clients requirements. We can also provide on and off site standard or custom training. We can also provide early life support once the system goes live. We can provide a tailored deployment based upon clients specific requirements all based upon the SFIA rate card.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Cohesive will work with the client to export their data in an agreed format. This is typically in the form of a database export of transactional data, but other methods are available. If a client is migrating to another Maximo environment, Cohesive can assist with the transition.
- End-of-contract process
- Cohesive require 6 months’ notice of termination of a Cloud-Hosted Solution agreement. Upon termination of the Service, Cohesive will deactivate any accounts and upon request provide an export of the Maximo Manage data in a standard, generally accepted electronic form (database export) within ten (10) business days. If a client is migrating to another Maximo environment, Cohesive can assist with the transition. If the client wishes to renew the service for a further term we can review and provide a commercial proposal .
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Windows
- Windows Phone
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Maximo Mobile provides a native mobile device User Interface. It works in both online and offline mode, synchronising when reconnected.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 A
- Description of service interface
- Maximo Mobile provides a native mobile device User Interface. It works in both online and offline mode, synchronising when reconnected.
- Accessibility standards
- WCAG 2.1 A
- Accessibility testing
- Maximo uses the latest W3C Standard, WAI-ARIA 1.0 to ensure compliance to US Section 508, and Web Content Accessibility Guidelines (WCAG).
- API
- Yes
- What users can and can't do using the API
-
The Maximo Integration Framework (MIF), included with the core Maximo product, enables customers to continuously improve their processes by providing interoperability characteristics, features and support. It is a set of applications and predefined integration points that allows customers to integrate Maximo with its enterprise applications and create business flows between Maximo and other enterprise applications.
Cohesive's use of the integration framework allows Maximo to be used as best-in-class asset and service management solution in tight combination with key enterprise systems. The integration framework allows the synchronization and integration of data between an external system and applications that use base services.
The integration framework follows the Service Oriented Architecture (SOA) directive and implements REST API, SOAP based web services, XML, and other formats. It is completely configurable, and the behaviour can be changed with rules instead of programming. There are also facilities to transform XML with XSL and Java customization. - API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Maximo Mobile can be fully configured or customised to meet business needs, through an extensive series of User Interface applications, or standard software development tools. All configurations are transparent through the upgrade process. Customisations are supported and undertaken in collaboration with Cohesive delivery teams. Cohesive host a secure FTPS service as part of deployed infrastructure for MAS, to serve customisation archives.
Scaling
- Independence of resources
- This will be dependent on each client's infrastructure setup. Cohesive-provisioned infrastructure is within an isolated, single-tenant account; never co-located with other users’ data - our typical approach provides a logically-isolated area dedicated to enabling secure operation of mission-critical Maximo Enterprise Asset and Work Management applications. Each VPC hosts production and non-production networks, divided into dedicated subnets & subnet types, to ensure isolation of environments.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We can provide usage statistics and SLA uptime reporting upon request.
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- IBM
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Data can be imported and exported via the client's Maximo Application Suite.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- XML
- JSON
- Microsoft Excel
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- XML
- JSON
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection between networks
-
•ECDSA P-256 (elliptic-curve) SSL.
•Strict security groups in-place for all servers and load balancers.
•NAT gateways for traffic to sources outside the VPC.
•IPSEC VPN with AES-256 encryption algorithms for Phases 1/2, with IKEv2, and SHA2-512 integrity algorithms.
•DDoS protection on public DNS server (AWS Shield).
•WAF situated between public DNS server and load balancer to the OpenShift cluster applications with mitigations against known malicious IPs, crawler bots, known bad inputs and vulnerabilities described in OWASP publications.
•CloudFront provides in-built security functionality, e.g. geo-blocking, acting as a second layer of proxy to application servers (the first layer being elastic load-balancers). - Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection within supplier network
-
•All utilized services within the solution can encrypt data at-rest.
•All data at rest encrypted with industry-standard AES-256 encryption.
•Data at rest encryption applies to OpenShift block storage, OpenShift shared storage, database storage, object storage, and backup storage.
•Document, backup and Maximo archive storage resides in AWS S3 - which maintains compliance programs such as PCI-DSS, HIPAA/HITECH, FedRAMP, EU Data Protection Directive, and FISMA.
•Encryption and decryption is transparent, using highly secure AWS KMS keys.
Availability and resilience
- Guaranteed availability
- Our Service and Support is provided all days, 24 hours a day, seven days a week. With a multi-zone database option our system availability is 99.99%; without multi-zone our system availability is 99.9%.
- Approach to resilience
- All components within the solution stack are provisioned redundant and are configured to provide high availability. We deploy production and non-production instances in separate physical locations. More information is available upon request.
- Outage reporting
-
Planned and unplanned outage notification emails are sent to registered users for affected systems. We offer comprehensive system monitoring and alerts, with capacity and service reviews performed at regular intervals. Monitoring and alerts include - 1) Infrastructure monitoring;
2) Network monitoring; 3) Event and Log monitoring; 4) Application monitoring (including availability) and 5) Database monitoring.
For planned maintenance we confirm the monthly patching window with each customer in advance and only proceed once this is agreed.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Other
- Other user authentication
- SAML, LDAP.
- Access restrictions in management interfaces and support channels
- Maximo follows a role-based, modular approach to managing access to applications and data. Roles are managed in security groups which control user access and privileges associated with applications, screens, fields, table rows, etc. User privileges can be controlled at any level (module, application, screen, field, table row, etc.) and different access can be granted when certain conditions apply. The system is access-controlled through named users. The role-based security model allows for very granular access control of data which enables support for having both internal and external users with different access to data and functionality.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Username or password
- Other
- Description of management access authentication
- Maximo Security features ensure that user access is controlled to only allow users to access data to which they have been assigned. This level of control can be at the application level or to row and column granularity. The data and application entitlements are powerful and set up by role-based access profiles. Users are granted access to a number of roles to build up their total access profile; Administrator is a profile type. This approach allows system administrators to rapidly set up new users and give them appropriate access to the areas of the system to which they require access.
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users receive audit information on a regular basis
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 10/02/2023
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
We are certified to ISO27001 (the ISO/IEC standard for information security management systems (ISMS), defining the requirements an ISMS must meet).
Our internal Information Security Policies (approved by the board of directors and administered by our Information Security and Compliance teams) are communicated to colleagues through a compliance awareness and education programme. All colleagues must review and acknowledge the policies on an annual basis. Policies, including our Information Security manual and processes, Disaster Recovery Plan, and Business Recovery Plan are updated at least annually or when revisions or updates necessitate. Through existing processes and third-party security tools, we continually monitor our overall security programme.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Configuration and Change Management follow the ITIL framework and policies and procedures are documented with various security standards. All SaaS offerings go through a cloud approval process and are scanned for vulnerabilities prior to production.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
-
Vulnerability management is conducted through various technologies internal and external to our network. Real-time vulnerability scanning is performed within the application cluster and is up to date with audit requirements as per CIS Benchmarks, NIST, PCI and HIPAA.
Threats are identified using industry standard listings and patches/updates are applied at least monthly, or as needed, based on criticality. We confirm the monthly patching window with each customer in advance and only proceed once this is agreed. We also confirm with each customer that the patch has been successful or that the patch has been rolled-back. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Our monitoring services monitor health and service performance metrics. This includes:
1) Infrastructure monitoring:
• Centralised Infrastructure health
• Monitors cloud environments through a single pane of glass
• Capacity management and server performance monitoring
2) Network monitoring:
• Monitors process-specific network performance metrics to proactively identify connection issues
3) Event and Log monitoring:
• Automated collection of log and event data
4) Application monitoring:
• Centralized Infrastructure health
• Performance, availability and user experience
• Monitoring and optimisation of application transactions
5) Database monitoring:
• Track database performance and resources to maintain a high performing and available application infrastructure - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
As a minimum, Cohesive implements a best-practice based backup/disaster recovery policy:
• Daily backups of all databases and configuration
• 30-day retention for Production.
• 7-day retention for Non-Production
• On-demand backups for patching and changes.
Common events are handled dependent on severity, and users have multiple methods of reporting; reports are provided as part of our Incident Management procedure.
Processes for common events include:
Disaster Recovery/Failure Modes;
System Compromise;
Systemic Failure;
Catastrophic Failure (including terrorist attacks, warfare, national disasters, etc.).
Cohesive also have a validated cross-region DR approach, which is tested annually.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Cohesive are putting sustainability goals into action, both internally but also externally helping support our clients’ journeys helping establish sustainability and ESG data foundations which can enable a business to be more responsible and profitable.
From optimizing energy consumption and reducing operational costs to enhancing sustainability and improving carbon goals, there is a constant need for innovative solutions that we provide which drive efficiency and productivity along with our partnership with IBM Envizi and its ESG suite.
Internally, we are committed to reporting on relevant ESG topics aligned with leading frameworks and methodologies.
We have been measuring our carbon footprint since 2006 using the internationally recognized Greenhouse Gas Protocol standard, including emissions from office utility consumption, global business travel, and colleague commuting. We strive for efficiency in our business practices including corporate travel, colleague commuting and energy use for our offices.
We are engaged with the Science Based Targets initiative (SBTi), the world’s leading coalition for setting corporate emission reduction targets in line with climate science. Their Net-Zero Standard is the benchmark against which organizations demonstrate strong management of their climate strategy, and why we chose to work within their framework. By submitting our near-term corporate targets to SBTi we are formally committing to be a part of the movement, in line with the Paris Agreement, to limit global warming to 1.5 degrees Celsius and reach a common goal of net zero no later than 2050.
We encourage and support recycling and energy conservation programmes and each office participates in recycling programmes as offered by the local authorities and landlords.
We have a published Carbon Reduction Plan in line with the requirements of PPN 06/21, published here: https://cohesivegroup.com/wp-content/uploads/2024/03/CARBON-REDUCTION-PLAN-Cohesive-UK-Group-Ltd.pdfTackling economic inequality
We are passionate about helping the communities where we live and work, in every country where we operate. We support both global and local initiatives, both corporately and through the initiative of our colleagues. Through corporate giving, we provide financial support for global and local organisations, such as The Hunger Project, Habitat for Humanity, Red Cross, and many others. These organisations help provide necessities—such as food, water, and shelter—to people in need all around the world.Equal opportunity
We are an equal opportunity employer and consider all qualified applicants for employment without regard to race, colour, sex, sexual orientation, gender identity, disability, protected veteran status, religion, national origin, age, or any other protected characteristic. This commitment extends to all aspects of employment, including, but not limited to, hiring, placement, promotion, compensation, and training. We support workplace fair practices that promote diversity and inclusion. All suppliers are expected to promote a workforce and workplace free of harassment, unlawful discrimination, and retaliation. Suppliers are expected to provide equal opportunity employment and must not discriminate on the basis of age, race, colour, sex, religion, national origin, sexual orientation, disability, covered veteran status, or any other status protected by law.
We are committed to conducting business with integrity and upholding high standards for business ethics and responsibility. This commitment extends to our suppliers, vendors, and business partners; our Supplier Code of Conduct details our commitments to responsible business throughout our supply chain.
All suppliers and their employees or consultants (sub-suppliers) must adhere to this Supplier Code of Conduct while conducting business with us and must comply with all applicable laws and regulations while conducting business with us. We provide a Whistle-blower hotline to enable reporting of any violations of the code.Wellbeing
The health, safety, and well-being of our colleagues, contractors and the public is of primary importance to us. All our colleagues understand that they are responsible for their own safety and wellbeing, and that they must be alert to safety and wellbeing concerns for those around them.
Our health, safety and wellbeing policy provides colleagues and contractors with information about managing health and safety hazards and risks associated with our business, premises and activities. It is structured to set out legal duties and how to comply with the health & safety policy, safe work practices and procedures.
Our Mental Health First Aiders have been formally accredited to administer mental health first aid in the workplace, by attending and passing a Mental Health First Aid Course that has been delivered by an Accredited Mental Health First Aid Instructor. They must be easily contactable during core working hours, be able to be called away from their normal duties at short notice if required and be able to maintain confidentiality as appropriate whilst demonstrating an ability to relate well to colleagues. Cohesive recognises that respecting the privacy of information relating to individuals who have received mental health first aid or may be experiencing a mental health problem or a mental health crisis at work is of high importance. All mental health first aiders and HR representatives are obligated to treat all matters sensitively and privately in accordance with Cohesive’s confidentiality protocols. If at any time the Mental Health First Aider assesses there is a risk of harm to another individual, they must escalate the matter to HR and they will advise on next steps. Cohesive's Operations Board are responsible for supporting Regional Managing Directors in implementing the Cohesive HSW policy manual and applying the controls in leading their global teams.
Pricing
- Price
- £51.32 a unit
- Discount for educational organisations
- No
- Free trial available
- No