Skip to main content

Help us improve the Digital Marketplace - send your feedback

Cranmore Consulting Limited

Mobile Agility

Cranmore drives digital transformation across the Public, Private, and Health sectors with Mobile Agility, using agile delivery and seamless integration. We specialise in software development, managed application support, identity assurance, digital architecture, project governance, and target operating model transformation, ensuring a smooth transition for your organisation’s digital journey.

Features

  • CRM
  • Scalable Platform
  • Enterprise Architecture
  • Power Platform - Dynamics, Power Apps
  • Low Code/No Code Development Environment
  • Discovery
  • Managed Application Support
  • Agile Delivery
  • Identity Assurance
  • Digital Identity

Benefits

  • On-time Delivery
  • SecDevOps
  • Collaborative
  • Full Governance
  • Extended Business Processes
  • Real Time Data
  • Real Time Reporting
  • Build and Release
  • MDM
  • Drag and Drop Form Creation

Pricing

£650 to £950 a licence a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at heather@cranmoreconsulting.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 7 9 9 6 4 9 6 8 6 9 1 2 1 7

Contact

Cranmore Consulting Limited Heather McCook
Telephone: 02890421238
Email: heather@cranmoreconsulting.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
There are no constraints that buyers should be aware of.
System requirements
  • Mobile Agility Licence
  • Support for Docker Containers

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 24 hours
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
See attached pricing document
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Agile delivery approach
Service documentation
Yes
Documentation formats
  • PDF
  • Other
Other documentation formats
Agile Toolsets
End-of-contract data extraction
Migration to new DB
PDF export
End-of-contract process
Varied based on customer/contract

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
None
Service interface
No
User support accessibility
None or don’t know
API
No
Customisation available
Yes
Description of customisation
App Editing
Creating New Apps
User friendly UI - drag and drop

Scaling

Independence of resources
Architecture setup
scaleability of infrastructure and application

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
SQL
PDF
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
JSON
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • JSON
  • API

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
SLA based on individual users/contracts
Approach to resilience
Available on request
Outage reporting
Email alerts and dashboards

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Username or password
  • Other
Other user authentication
AD
Access restrictions in management interfaces and support channels
Active Directory
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Username or password
  • Other
Description of management access authentication
AD

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
Cyber Essentials Plus
Information security policies and processes
Available on Request

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Configuration and change management is inline with iOS and Android release pipeline.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Available on Request
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We use a 3rd party to monitor our services
Incident management type
Supplier-defined controls
Incident management approach
Available on Request

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Tackling economic inequality
  • Equal opportunity

Tackling economic inequality

Our business is set in the heart of the Holywood community, we work with local groups to encourage health and wellbeing through sponsorship of local sports clubs.
We have set a Net Zero target for our business for 2030.
We have repurposed an existing derelict building into a state of art low carbon offices. We heat our building through server and computing heat and promote the use of public transport, cycling and electric vehicles to all staff.

Equal opportunity

At Cranmore we believe in enabling people to succeed. This is an ethos for both our deliveries for clients but also internally for our staff. This creates a culture of collaboration, inclusivity and knowledge.
We encourage and promote training within the business with all staff having obtained a mixture of Microsoft accreditations, Prince 2, ITIL and Scrum agile accreditations.
We foster networks within the industry and forums where SME business can collaborate to promote the sector and encourage the development of skills..
We work with the two local universities to provide work paid work placements and provide annual hackathon sessions to help encourage and promote the sector to all individuals.

Pricing

Price
£650 to £950 a licence a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Pilot projects are available
Link to free trial
https://www.mobileagility.app/contact-us

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at heather@cranmoreconsulting.com. Tell them what format you need. It will help if you say what assistive technology you use.