Skip to main content

Help us improve the Digital Marketplace - send your feedback

HEALTHTRUST EUROPE LLP

EasiBuy

We provide cutting edge reverse auction software to governments and authorities which allows them to maximise savings on everything they purchase while accounting for non-price factors such as quality, environmental friendliness, preference for Small Medium Enterprise suppliers and local suppliers.

Features

  • Real time, cloud based pricing events
  • Transparent reverse auction process
  • Clear audit trails and archiving for sourcing events
  • RFX Event set up, review, and scoring.
  • Structured Multi-parameter, multi-format, multi-line, and non-price factor negotiations
  • Intuitive event creation and bid interfaces and real-time analytics
  • Side-by-side, line-by-line comparisons and multiparameter scoring
  • Award by line item or award by response
  • Comprehensive reporting and analysis on sourcing events
  • Secure architecture and structure designed to protect data

Benefits

  • Obtain best value for money in any bid
  • Immediately spot savings in realtime
  • Ability to take rapid corrective measures
  • Efficiently exchange information and define requirements
  • Reduce off-contract, off-catalog pricing and buying
  • Allow suppliers to access and maintain information
  • Efficiently assess and select suppliers
  • Execute informed sourcing and supplier decisions
  • Make rapid improvement adjustments

Pricing

£5,000 a unit

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at customercare@htepg.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

3 9 5 2 4 9 0 6 6 0 6 7 3 5 5

Contact

HEALTHTRUST EUROPE LLP Customer Care Team
Telephone: 08458875000
Email: customercare@htepg.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
We do not have real time electronic messaging
System requirements
  • All devices with internet access can access Easibuy
  • Platform supports current web technoligies

User support

Email or online ticketing support
Email or online ticketing
Support response times
We respond to calls and emails within a business day
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
We provide dedicated auction event support, sourcing support and a technical account manager for general account management and information. Further we allocate a dedicated bid manager for every electronic auction to oversee and project manage sourcing, setting up the bid, ensure the success of the event and general communication.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide one-to-one online and in person training on using the software platform for both vendors and buyers. The training pack is scripted and thoroughly documented, in order to maintain consistency and transparency. We always provide additional training if necessary.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
  • Microsoft PowerPoint
  • Microsoft Word
  • Microsoft Excel
  • Hard copy (on request)
End-of-contract data extraction
As part of our process we share all information particular to the buyer at every stage during any given procurement program in which we participate. Our clients can also access their data and extract it anytime from the portal upon completion of the contract.
End-of-contract process
Customers are not obliged to term commitments. They can stop using the platform at anytime. Once they give us notice that they are not going to use our platform, we start off boarding process. We charge a fee per a procurement event. It includes setting up and running each event. We offer additional services such as sourcing and market research for additional fees.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
We provide an easy to use, intuitive user interface that we train each user on how effectively use in order to get the most out our reverse auction platform.
Accessibility standards
None or don’t know
Description of accessibility
Users access the software using a web browser.
Accessibility testing
We have not currently performed testing of assistive technology, but our software platform uses standard web technologies and expressly avoids proprietary formats that would prevent assistive access.
API
No
Customisation available
Yes
Description of customisation
Our software offers a wide variety of configuration options to support common procurement formats including eRFx and eRA.

Scaling

Independence of resources
Service performance monitoring is used to establish provisioning criteria. Performance monitoring includes metrics at a systems level, as well as application performance such as request time and database query duration. Given the real-time nature of the software, adequate overhead is given a high priority.

Analytics

Service usage metrics
Yes
Metrics types
We provide information on number of events, amounts and quantities of goods and services auctioned, savings against agreed baselines and sourcing information.
Reporting types
Real-time dashboards

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
Other locations
User control over data storage and processing locations
No
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
Never
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Event reports are available in Microsoft Excel format. Additional data exports can be requested through support channels.
Data export formats
  • CSV
  • Other
Other data export formats
Microsoft Excel
Data import formats
  • CSV
  • Other
Other data import formats
  • Microsoft Execl
  • Open Office Calc
  • Other common spreadsheet applications

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Our aim is 99.9% availability
Approach to resilience
Our equipment that holds our software is housed in data centers with n+1 levels of resilience
Outage reporting
The preferred method of outage reporting is usage of email alerts.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Management interfaces are only accessible by authorised users, authenticated by username and password. Sensitive functions are restricted to authorised networks.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Our approach to security governance is to use industry best practices.
Information security policies and processes
The Company follows best practice information security policies and processes for the industry. It is the established policy of EasiBuy LLC to operate within the requirements of a documented Information Security Policy statement as a means to comply with all statutory, regulatory and contractual requirements, and, to protect the interests, property and information of the company, and of its clients and employees, against threats or loss.

In pursuance of this policy its stated requirements have been implemented together with the specified requirements of the company’s associated information security and computer system access management.

The purpose of this Information Security Policy statement is to describe how security is implemented, to give guidance to our employees whose actions can affect the confidentiality and integrity of the business, its product and services, and, to illustrate the overall commitment to security issues within our company.

The Information Security Policy is maintained by audit and review in order to provide effective assurance that all aspects of company, employee and customer specified security requirements are being implemented.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Servers are set to automatically install security patches nightly. Any changes to services are vetted for security impact at the planning and implementation stages.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Security managers monitor and evaluate security bulletins for application components. If possible the component is updated, and if an updated is not immediately available, a patch or mitigation is applied within 72-hours.
Protective monitoring type
Undisclosed
Protective monitoring approach
Logging is used to identify potential compromises. When discovered, compromises are responded to within 24-hours.
Incident management type
Supplier-defined controls
Incident management approach
We maintain a security point of contact. Any security related matters are forwarded to the security POC. Incident reports are emailed to affected customers.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

E-procurement not only means that the users are changing away from paper based procurement but we offer an integrated approach to procurement and technology. By building the requirement for enriched content and electronic trading directly in to the contractual relationship between customers and suppliers.

Covid-19 recovery

Users can get access to over 300,000 items that are vendor supplied, validated and cleansed. All of our Healthcare suppliers’ products are also clinically led and checked for quality, safety, service and price, so you can be confident that you are always getting the best value products. In the pursuit to Covid-19 recovery and the new ways of working a one stop portal for essential procurement means everyone can see exactly what has been ordered, when, where and how.

Tackling economic inequality

Incorporates features that were built specifically to enable public purchasing agents to provide opportunity to always buy products that are of quality, safe, excellent service and at the right price. In addition to straight forward economic contracting, the system also supports features that can prioritise any number of socio economic goals or programs.

Equal opportunity

An equal opportunity employer. We celebrate diversity and are committed to creating an inclusive environment for all employees.

Wellbeing

Mental health, good working conditions, flexible accommodation, and financial participation in company wide success are all central to our employer-employee relationship. Reacting to the changing workplace, we have been ahead of the curve with a flexible work-from-home enabled workplace for more than three years.

Pricing

Price
£5,000 a unit
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at customercare@htepg.com. Tell them what format you need. It will help if you say what assistive technology you use.