Mobile Agility
Cranmore drives digital transformation across the Public, Private, and Health sectors with Mobile Agility, using agile delivery and seamless integration. We specialise in software development, managed application support, identity assurance, digital architecture, project governance, and target operating model transformation, ensuring a smooth transition for your organisation’s digital journey.
Features
- CRM
- Scalable Platform
- Enterprise Architecture
- Power Platform - Dynamics, Power Apps
- Low Code/No Code Development Environment
- Discovery
- Managed Application Support
- Agile Delivery
- Identity Assurance
- Digital Identity
Benefits
- On-time Delivery
- SecDevOps
- Collaborative
- Full Governance
- Extended Business Processes
- Real Time Data
- Real Time Reporting
- Build and Release
- MDM
- Drag and Drop Form Creation
Pricing
£650 to £950 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 7 9 9 6 4 9 6 8 6 9 1 2 1 7
Contact
Cranmore Consulting Limited
Heather McCook
Telephone: 02890421238
Email: heather@cranmoreconsulting.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- There are no constraints that buyers should be aware of.
- System requirements
-
- Mobile Agility Licence
- Support for Docker Containers
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 24 hours
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- See attached pricing document
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Agile delivery approach
- Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
- Agile Toolsets
- End-of-contract data extraction
-
Migration to new DB
PDF export - End-of-contract process
- Varied based on customer/contract
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- None
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- Yes
- Description of customisation
-
App Editing
Creating New Apps
User friendly UI - drag and drop
Scaling
- Independence of resources
-
Architecture setup
scaleability of infrastructure and application
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
SQL
PDF - Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
- JSON
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- JSON
- API
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- SLA based on individual users/contracts
- Approach to resilience
- Available on request
- Outage reporting
- Email alerts and dashboards
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Limited access network (for example PSN)
- Username or password
- Other
- Other user authentication
- AD
- Access restrictions in management interfaces and support channels
- Active Directory
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Limited access network (for example PSN)
- Username or password
- Other
- Description of management access authentication
- AD
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Cyber Essentials Plus
- Information security policies and processes
- Available on Request
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Configuration and change management is inline with iOS and Android release pipeline.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Available on Request
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We use a 3rd party to monitor our services
- Incident management type
- Supplier-defined controls
- Incident management approach
- Available on Request
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Tackling economic inequality
- Equal opportunity
Tackling economic inequality
Our business is set in the heart of the Holywood community, we work with local groups to encourage health and wellbeing through sponsorship of local sports clubs.
We have set a Net Zero target for our business for 2030.
We have repurposed an existing derelict building into a state of art low carbon offices. We heat our building through server and computing heat and promote the use of public transport, cycling and electric vehicles to all staff.Equal opportunity
At Cranmore we believe in enabling people to succeed. This is an ethos for both our deliveries for clients but also internally for our staff. This creates a culture of collaboration, inclusivity and knowledge.
We encourage and promote training within the business with all staff having obtained a mixture of Microsoft accreditations, Prince 2, ITIL and Scrum agile accreditations.
We foster networks within the industry and forums where SME business can collaborate to promote the sector and encourage the development of skills..
We work with the two local universities to provide work paid work placements and provide annual hackathon sessions to help encourage and promote the sector to all individuals.
Pricing
- Price
- £650 to £950 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Pilot projects are available
- Link to free trial
- https://www.mobileagility.app/contact-us