Skip to main content

Help us improve the Digital Marketplace - send your feedback

Grove Information Systems

Grove Data Analytics - Predictive Optimization, Forecasting and Scheduling Tool

Grove’s Analytics platform empowers organisations to transform your data into meaningful insights. Have lots of data? We apply historical and real-time business data to our prescriptive algorithms to ensure your people make effective decisions, take efficient actions and avoid costly mistakes. Get your Data to Tell You What to Do.

Features

  • Predictive analytics
  • Resource optimisation
  • Remote monitoring
  • Prescriptive Analytics

Benefits

  • Increased Workforce Efficiency
  • Reduced Cost Per Unit
  • Better Customer Service

Pricing

£5 a unit

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at pwitheridge@groveis.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 5 0 9 0 5 8 4 5 0 0 5 3 0 8

Contact

Grove Information Systems Philip Witheridge
Telephone: +44 207 493 6741
Email: pwitheridge@groveis.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Any ERP, CRM, Business Function that has multiple moving parts and constraints
Cloud deployment model
Private cloud
Service constraints
TBD
System requirements
Solution is hosted in the cloud. Web browser is required

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 24 Hours
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
P1
- Critical business impact or critical loss of service
- The issue must be logged via telephone
A resolution of a next-steps action plan will be relayed within four hours for all support cases received from customers during each annual support period.

P2
- Major or partial loss of service, where a work-around does not exist
- Issue must be logged via telephone or the support portal
A resolution or an initial next-steps action plan will be relayed within five hours, provided the customer provides all requested information in a timely manner.

P3
- Questions, how-to queries or minor service impact
- The issue must be logged via telephone or the support portal
- A resolution plan will be relayed within eight hours, provided the customer provides all requested information in a timely manner.

P4
- Documentation and enhancement requests
- Issue must be logged via telephone or the support portal
A resolution plan will be relayed within 24 hours, provided the customer provides all requested information in a timely* manner.
Support available to third parties
No

Onboarding and offboarding

Getting started
We have at least 2 or 3 months of onboarding where we work closely with the customer to make sure they know exactly how our product works, and how to get the most out of it
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
We give users temporary access to the relevant store where they can extract and delete the data.
End-of-contract process
Our contracts include full use of our service and/or API's. We also provide support for any service related bugs or outages. Further enhancements or feature requests are handled on a case by case basis.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
In some cases we will allow access to a service interface that allows the user to have more control over certain constraints and settings.
Accessibility standards
None or don’t know
Description of accessibility
Our platform is customisable, so we usually scope out user requirement in the discovery phase.

In most cases the users are not able to modify our algorithms unless accessed through a constraints settings portal
Accessibility testing
None
API
Yes
What users can and can't do using the API
Our API is customised for each customer. Users can send relevant data to our optimisation service via a REST API. We then return the optimised data back to the users systems to be used in downstream applications
API documentation
No
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
We allow users to customise inputs, outputs and algorithm biases. We work with users to find the right balance then deploy into production once we've reach that point

Scaling

Independence of resources
Each customer is provisioned on their own separate cloud container/instance which is configured to automatically scale when needed.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
This can be achieved either by exporting from a cloud data store.
Data export formats
CSV
Data import formats
  • CSV
  • Other
Other data import formats
API

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network
All services run on the Microsoft Azure platform and secured according to Microsoft best practices

Availability and resilience

Guaranteed availability
99.9%

We operate a 24/7 GNOC support centre and offer SLA service credits where out SLA has been breached for more than a specific period of time. More details available on request
Approach to resilience
Our service uses auto scaling architecture, and makes use of various clustering methods for failover.
Outage reporting
Email alerts to customers or API if required

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Role based authentication is used in all management service interaces
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password
  • Other
Description of management access authentication
IP restriction

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
No
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Not know at this time

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All of our code is peer-reviewed and version controlled. Each customer deployment makes use of a customised version of our stock algorithms which we adjust for each customer use case.

Each deployment is treated as a separate bit of code and stored, updated and managed separately
Vulnerability management type
Undisclosed
Vulnerability management approach
We make use of a vulnerability scanning service which is then fed into a remediation service that allows us to prioritise potential threats across our services and applications
Protective monitoring type
Undisclosed
Protective monitoring approach
Undisclosed
Incident management type
Undisclosed
Incident management approach
We utilise Salesforce for all our support communications

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
Yes
Connected networks
Other
Other public sector networks
Liverpool council LoRa network

Social Value

Social Value

Social Value

Tackling economic inequality

Tackling economic inequality

The solutions and services we offer to G Cloud procurement organisations typically require new skill sets for which we provide employment and follow on mentorship training and growth opportunities.

Pricing

Price
£5 a unit
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Discovery workshop
Trial instance setup and configuration
Support during trial
Maximum 3 month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at pwitheridge@groveis.com. Tell them what format you need. It will help if you say what assistive technology you use.