Axians Modular Architecture
Axians Modular Architecture has been designed to be able to configure applications to the specific needs by selecting and using the required business modules, enabling fast delivery of a software service.
Features
- Workspace
- Objects 360 Record
- Dynamic Forms
- Organisation and Master Data Management
- Users and Roles Management
- Process and Approvals Management
- Intelligent Assistance
- Reporting and Analytics
- Document Management module
- Messaging module
Benefits
- Fast assembly and configuration
- Leveraging on modules continued improvement
- Continuously improved Design System
- Built-in proved experience
- Ability to adjust to specific needs
- Pay what you use
- Build an ecosystem cost efficiently
Pricing
£25,000 a unit a year
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
4 7 7 0 5 3 8 2 4 6 3 4 6 3 2
Contact
Axianseu II Digital Consulting
Ricardo Goncalves
Telephone: 07776697179
Email: ricardo.goncalves@axians.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- N/A
- System requirements
- Web browser
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- Service requests are classified according to severity and impact and can be of 3 types: user support, incidents or improvement requirements. Each of these has different response times. Primary support is Monday to Friday, 9 AM to 5 PM, except January 1st and December 25th. Bespoke arrangements can be set at extra cost. Please refer to the Service Support document for additional information.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 A
- Web chat accessibility testing
- N/A
- Onsite support
- Yes, at extra cost
- Support levels
- Please refer to the Service Support documentation.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- The onboarding process considers an initial side-by-side walk through and discussion to fine-tune the solution to the Customer's needs and demonstrate the self-service capabilities to enable the master data configurations.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- The solution provides functionality that allows the Customer to export all data from the solution. Additionally, we can offer database diagrams that help understand how data is related.
- End-of-contract process
- At the end of the contract, the Customer can simply stop using the system, exporting data deemed relevant. Additional specific services required can be agreed upon and provided at extra cost.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The solution is web responsive. Some functionality (e.g. reporting) may not render or work as effectively.
- Service interface
- No
- User support accessibility
- WCAG 2.1 A
- API
- Yes
- What users can and can't do using the API
- APIs (SOAP or REST) can be used to enable integrations with other systems (e.g. ERP, Document Management, etc.)
- API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Users with the required roles can customise relevant master and business data
Scaling
- Independence of resources
- The service is scalable to address demand increase and decrease
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Data can be manipulated in the solution (drag & drop functionality that allows the user to define what data to export) and exported into spreadsheet format. Other types of export are available at extra cost
- Data export formats
- CSV
- Data import formats
-
- CSV
- Other
- Other data import formats
- Spreadsheet
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
Service Uptime for Production Environment: 99.50%
Recovery Point Objective (RPO) : 12 Hours (PROD), 24 Hours (DEV and QA)
Recovery Time Objective (RTO): 2 Hours (PROD), 24 Hours (DEV and QA) - Approach to resilience
- AWS Cloud Services underpin the solution. Additional information is available on request.
- Outage reporting
- Email alerts are sent in case of service disruptions
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Access to functionality and data is controlled via User and Roles management, complemented when relevant by other variables (e.g. Service, Team, etc.).
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Axians has implemented ISO 27001 standard compliant Information Systems Security Policy (ISSP), operational policies, computer charters defining security rules, and security procedures, regularly revised by the Security Steering Committee (SSC).
Roles and responsibilities have been designed to include both internal and external parties. Governance is supported by a Strategic Steering Committee, a Security Steering Committee, a CIO Steering Committee, and a RIP/ITM Security Committee, focusing on different responsibilities.
Risk management follows an Expression of Requirements and Identification of Security Objectives (EBIOS) methodology, and Continuous improvement follows a Plan-Do-Check-Act approach.
E-learning courses on Security and internal processes are mandatory for all Employees and Contractors, and awareness sessions are promoted regularly. Accountability is included in employees' contracts and Business Unit Managers in charge of the consulting teams, are responsible (and liable) for promoting the knowledge and compliance with the Governance process.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Configuration and change are managed through the technology platform's native functionality. The Service Center console gives every module an incremental version number as it is published. These versions can be accessed to confirm the upload date, time, and publisher identity, or to roll the code back in Service Studio for further development from the previous state of the app.
When a development milestone is achieved, a snapshot of the application can be created and tagged as a major/minor version with a description of the new features. It can then be deployed in LifeTime, the console that manages all the environments. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- The technology (cloud services and platform) underpinning the solution is regularly updated and patched by the technology vendors to address new threats. Notifications and updates/patches are regularly sent/deployed by the vendors to keep the underpinning service up-to-date.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- As part of the service support package, the solutions are regularly monitored for compromises, which are addressed according to the service's SLAs
- Incident management type
- Supplier-defined controls
- Incident management approach
- Customers can report user support requests, incidents or improvement requirements within the solution. Each type of request is classified according to severity and impact (P1 to P5) and, depending on the type of request, may include a brief explanation, contact details of the user, date and time of occurrence, and information that might help troubleshoot the issue (e.g., screenshots, details and context in which it happened, etc.). Requests are addressed according to the SLAs and monthly/quarterly reports are produced and shared with the Customer.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
Commitment to deliver additional environmental benefits in the performance of the contract including working towards net zero greenhouse gas emissions. - Covid-19 recovery
-
Covid-19 recovery
Commitment to improve workplace conditions that support the COVID-19 recovery effort including effective social distancing, remote working, and sustainable travel solutions. - Tackling economic inequality
-
Tackling economic inequality
Commitment to support educational attainment relevant to the contract, including training schemes that address skills gaps and result in recognised qualifications - Equal opportunity
-
Equal opportunity
Commitment to demonstrate action to identify and tackle inequality in employment, skills and pay in the contract workforce. - Wellbeing
-
Wellbeing
Commitment to demonstrate action to support the health and wellbeing, including physical and mental health, in the contract workforce.
Pricing
- Price
- £25,000 a unit a year
- Discount for educational organisations
- No
- Free trial available
- No