Workforce Management (WFM) & Optimisation (WFO)Employee Engagement, Value Realisation Services (VRS)
NICE WFM/EEM addresses all WFM needs: accuracy, simplicity, reliability, visibility, engagement. NICE WFM includes forecasting, planning, scheduling, daily management and communication, transforming operational efficiency while engaging employees across the entire operation. Value Realization Services leverages the full depth of NICE functionality, helping organisations drive business impact, the faster, the better.
Features
- Forecasting; Long Term, Short Term, Across all Digital Channels
- Scheduling, Schedule Management, Holiday Management, Optimisation
- Real-time Reporting & Adherence
- Communication
- Multi-skill & multi-channel, voice, email, chat, sms
- Intraday/Change Management & Automated Intraday Optimisation
- Agent Mobile Application
- High Availability, DR & Real-time diagnostics
- Self-Service
- Value Realisation Services
Benefits
- Accurately calculate resource requirements across the entire enterprise
- Optimal schedules, Supporting Hybrid Working. Reduce costs, meeting SLA
- Up-to-the-moment graphical activity view, comprehensive reporting and analysis tools
- Real-time change notifications and reminders
- Multi-skill simulation addressing complexities of multi-skilled, multi-channel environments
- Track staff/performance data throughout the day making proactive SLA adjustments
- Enable agents to view adjust/trade schedules and respond to opportunities
- Maximum up-time by monitoring system issues, high availability & resiliency
- Desktop/Mobile portal enabling engagement by offering time off/bidding/performance/chat/preferences
- Compliance to latest GDPR enforcement, labour/union rules by configuration
Pricing
£2 to £50 a licence a month
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
2 8 8 6 8 4 5 1 9 0 0 4 3 9 0
Contact
NICE SYSTEMS UK LIMITED
Richard Perkins
Telephone: 07785503405
Email: richard.perkins@nice.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- None
- System requirements
-
- We support technologies such as Linux, Microsoft, Oracle, customer provides
- AV technologies are supported which the customer supplies
- Detailed service requirements are confirmed per system design
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- The response time is dependent upon the contract requirements. NICE can respond to tickets with 2 hours if that is the requirement, for example
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Standard- Monday to Friday, 0830-1730
Enhanced- 24 x 7 - Support available to third parties
- No
Onboarding and offboarding
- Getting started
- A full range of installation, training, consulting and support services are coordinated and focused on establishing an environment that creates results for our customers. Training can be provided as remote or onsite. Full user documentation is available as soft or hard copy and also embedded into the system software for ease of access.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- EEM and WFM, does not contain typical data to be extracted from the system as it only contains scheduling information based on ACD information. For GDPR functionality, data portability is available.
- End-of-contract process
-
In the event that a customer chooses to terminate their contract, NICE will work with your organization to efficiently transfer or terminate any data held within NICE Data Centres.
Options would include transferring data to a supplied FTP site.
NICE would not retain any customer data without a valid contract in place.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
The mobile application is used with EEM for agents self service when out of the office.
When in Office, agents will use the desktop service. - Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
-
The SmartSync API feature allows the user to dynamically request NICE IEX Workforce Management data or insert updates into the workforce management database. This feature provides a secure and easy way to integrate the workforce management system with other applications.
The user is responsible for creating XML files according to the specification. The WSDL (web services description language) files are available on the workforce management application server.
All web services are stateless. The web services will throw an exception, with details, if the parameters are invalid. Users need to be authenticated for access to all the web services, with the exception of the web services noted “Authenticate not required”. For authentication, define a user (supervisor) with a login and password in the Users and Permissions view of the WFM application. You will use this login and password to access the web services - API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- NICE WFM is highly configurable, the system allows users dependent on their permissions, to adapt it to their particular needs through a wide range of operating parameters, rules, and feature enablement. This allows the system to meet a wide variety of operational needs, labor rules, and site-specific parameters, while maintaining stability and scalability.
Scaling
- Independence of resources
- The WFM and EEM solutions are design to ensure the optimal performance based on the maximum users using / managed by each solution design.
Analytics
- Service usage metrics
- Yes
- Metrics types
- NICE WFM / EEM has a full comprehensive suite of reporting including Scheduling, Intraday, Analysis, Time off & Administration.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
WFM offers 2 way for exporting data using API or using the reporting tool embedded in the product. The report type can be either: PDF, DOCX, SLSX or CSV.
EEM provides reports capability. Reports can be sent by email, printed or exported in Excel file format. - Data export formats
-
- CSV
- Other
- Other data export formats
-
- EXCEL
- DOCX
- Data import formats
-
- CSV
- Other
- Other data import formats
- XML
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
- Solution will be segregated by firewalls, predefined user groups, administrative access privileges and production environments are logically segmented from staging and test environment. Different network, passwords and encryption keys are used for every environment. Data which is analyised is encrypted using AES 256 algorithm throughout the lifecycle. The decryption keys are within the server environment and data can only read in clear text within the server environment. The copy paste functions have been removed to ensure that no data will leave the hosted environment. Also the system does not have any inbound or outbound Internet connectivity.
Availability and resilience
- Guaranteed availability
- The is specified in the Cloud contract between customer and NICE. WFM and EEM are 99.9% availability. Our 12 month trend on availability is currently over 99.9% so we do not include refunds as a part of the contract.
- Approach to resilience
- Infrastructure is designed from ground up to make sure that we have resiliency for everything in the Data centre, starting from the customer instances that are being spread across different physical servers, switches and racks, making sure we have redundant power supplies, multiple network paths and much more. In addition using the latest virtualisation technologies for HA to make sure it covers physical failures as well. All of this comes in addition to the solution resiliency and HA options.
- Outage reporting
- In the event of an outage or service issue, a notification is sent to the clients by the NICE Proactive Monitoring Team.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
-
Firewall detailed configuration and the infrastructure management is performed by the NICE Cloud Services team. Global management of the firewall infrastructure is performed by NICE Cloud Services using a dedicated interface. Firewalls separate the internal network from the internet. Firewall settings are configured for authorised traffic only, defined in NICE Cloud’ Security Policy.
NICE manages and delivers services using a variety of systems and environments. Information security controls and procedures are implemented, to prevent unauthorised access. Resources are protected through a combination of firewalls, VPNs, native operating system access controls, database management security, application controls, intrusion detection monitoring software. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users receive audit information on a regular basis
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- SII-QCD
- ISO/IEC 27001 accreditation date
- 20/02/2016
- What the ISO/IEC 27001 doesn’t cover
- Additional Cloud Services not covered under the ISO 27001 are covered by SSAE16 SOC certification.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- N\A
- PCI DSS accreditation date
- N\A
- What the PCI DSS doesn’t cover
- We answered yes to allow this note to be displayed: The answers above are regarding WFM which does not need to be PCI compliant.
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- ISO 27001 which is relevant for the services management organisation
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
NICE recognises the significance of physical security controls as a key component in its overall security program. Physical access methods, procedures and controls have been implemented to help prevent unauthorised access to data, assets and restricted areas. Physical access to NICE office is restricted to authorised personnel using personal electronic identification cards. These access cards are issued to NICE's employees by the administrative manager. Permissions to issue cards and grant access are restricted to the administrative manager and the authorised designees. In addition, visitors to the NICE office are accompanied while on premises.
Formal written policies for the principles and processes within the organisation are developed and communicated so that personnel understand NICE's objectives. The assigned policy owner updates the policy annually and the policy is reviewed and approved by designated members of management. In addition, Responsibility and accountability for developing and maintaining the policies are assigned to the NICE relevant teams and are reviewed and approved on an annual basis by the management team.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- NICE DevOps regularly makes changes within its production environment in response to the evolving client and market needs. These changes include adding/removing/changing the configuration policies of the existing servers or performing routine maintenance activities, software updates. Design, development, deployment, and management of infrastructure is documented and approved by the management team within the NICE change management application. Access to the change management documentation application system is restricted to authorized personnel. A risk assessment process is performed by the Security team before implementing a new infrastructure or software as defined within the system Security related policy.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Vulnerability Management proactively prevents the exploitation of known vulnerabilities that exist within the NICE Systems – Cloud Services network and infrastructure. The expected result of the vulnerability and threat management program is to reduce time, resources, and money spent addressing vulnerabilities and any exploitation of those vulnerabilities. As soon as any vulnerability is validated and approved by the Application Development R&D team, patches are deployed. Information for potential threats are gathered from cloud security subscriptions.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Global Hosting Operations and the Manager Security and Compliance Cloud Services must be alerted to suspected information and system component compromises through cloud security subscription. The aim is to handle the situation in a way that limits damage and reduces recovery time and costs. Once notified and validated by the Application Development, patches are deployed.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- NICE has a predefined Incident Management Process. Responsibilities and procedures are established to ensure a quick, effective and orderly response to information security incidents. Incident reporting includes alerts from intrusion detection, intrusion prevention and file integrity monitoring systems. Reporting procedures follow a legal and regulatory compliance requirements. Users are made aware of malicious code issues and also receive guidance on what they should do if an infection occurs.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
We believe that maintaining market leadership cannot preclude our commitment to a cleaner and safer world. A major part of this commitment is compliance with the standards, regulations and requirements concerning the environmental aspects of our operations and products. - Covid-19 recovery
-
Covid-19 recovery
We at NICE Technologies take very seriously the challenges imposed by the Covid-19 coronavirus. To minimize the impact of Covid-19 coronavirus, we are closely monitoring and following the recommendations from the World Health Organization (WHO) as well as the local Public Health Authorities, ensuring that our business operations consider all known risks. NICE has a solid Business Continuity Plan supported by operational procedures and means. In addition to the activation of the Business Continuity Plan, and in order to meet the specific risks of the Covid-19 coronavirus, we have imposed ongoing measures across the organization. Steps taken by NICE to mitigate the risk of spreading ▪ Implement social distancing. ▪ Non-essential business travel has been restrictions across various regions. ▪ Digital/phone meetings conducted in place of physical meetings using WebEx, Skpe, Microsoft Teams, etc. ▪ As a part of NICE’s active Business Continuity Plan, employees are remote. Exceptions are in place for approved critical functions. Operational mitigation activities carried out by NICE ▪ Critical employees and functions have been mapped, and backup options have been defined. ▪ Employees have laptops and secure network connections enabling them to work from home. ▪ IT infrastructure has been fully tested and supports remote secure access. ▪ Customer Support teams are remotely separated and provide support cross region. ▪ Logistics is in continuous contact with suppliers and partners to ensure a steady supply chain. ▪ Data Centers are globally dispersed with redundancies applied. ▪ Taskforce conducing daily check-ins and continuous monitoring of the situation. ▪ Updates to all employees published regularly. - Tackling economic inequality
-
Tackling economic inequality
We are committed to conducting business in an ethical and transparent manner by the promotion and education of honest conduct of our employees, consultants and contractors representing the company. We ensure that our infrastructure, operating cadences, facilities and supply chain are upheld by ethical business practice and strictly managed company-wide policy. - Equal opportunity
-
Equal opportunity
At NICE we are dedicated to respecting human rights, ensuring equality and preventing discrimination in the workplace. We devote our time to creating a rich and innovative work environment that encourages diverse perspectives and healthy dialogue around what makes each of us unique. It is our commitment to a safe and healthy work environment for our employees while providing them with efficient resources enabling them to grow professionally and personally. - Wellbeing
-
Wellbeing
We believe that the strength and leadership of our business and core values should be leveraged for the benefit of our local communities, whether through charitable activities that give back to the communities we live in or by shaping the next generation of young women to lead the way on closing the gender gap in technology and be the future of our industry.
Pricing
- Price
- £2 to £50 a licence a month
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- NICE will work with the Department to provide a limited number of free trial licenses for the purpose of a time bound Proof Of Concept (maximum loan period 12 weeks per project)