Governance as a Service
Governance as a Service is an integrated governance platform. An easy and flexible solution for Compliance, Portfolio, Risk, Demand, Resource, Contract, Supplier Workflow and Document Management. NHS Change and Regulatory Governance.
Features
- Portfolio Management
- Compliance Management
- Demand Management
- Contract Management
- Supplier Management
- Resource Management
- Governance Workflow Management
- Asset Management
- Business Process Management
- Document Management
Benefits
- Regulation Monitoring and Reporting
- Change Governance and Reporting
- Resource Balancing
- Demand Management
- Change Control
- Risk Analysis
- Remediation Tracking
- Automated, repeatable and audited runbooks. Learn and continuously improve.
- Track benefits to strategies and track across projects, resources, costs
- Reduce cost of change, increase transparency regulation and policy control.
Pricing
£115 to £210 a user a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 8 3 0 5 5 3 6 1 4 2 7 7 2 6
Contact
AHLC Solutions Ltd.
Andrew Williams
Telephone: 07957967270
Email: Andy.williams@ahlcsolutions.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- The AHLC Solutions Helpdesk is available between 08:30 and 17:30 Monday to Friday, excluding weekends and Bank Holidays and only available remotely.
- System requirements
- No specific requirements
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Support services are available on the cloud platform (no application feature support) from 7am to 7pm or 24 x 7. Initial response within 1 hour.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Support services are available on the cloud platform (no application feature support) from 7am to 7pm or 24 x 7.
A Technical Account manager will be provided for larger accounts. A cloud support engineer will be allocated to each individual ticket raised. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We provide the following:
Onsite Training
Web Training
User Documentation
Pre-defined templates - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
-
User are able to extract their data using:
1. Excel exports
2. Web Service extracts - End-of-contract process
- At the end of the contract the instance is taken offline. There is no additional cost.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The mobile service is a responsive designed web page that re-renders the application screens onto target devices. This is suitable for tablets but not recommended for smaller mobile devices such as smart phones.
- Service interface
- No
- User support accessibility
- WCAG 2.1 A
- API
- Yes
- What users can and can't do using the API
-
A comprehensive SDK and Web service API set is available allowing for a majority of CRUD operations on the PRIMED platform. All services support authentication to ensure security.
Primed aims to be an open platform that allows 3rd PArty developers. - API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
The service can be customised through the utilisation of templates that can configure the system including elements such as reference data, object types, status', roles, accessibility etc.
Administrators (those users with the administrator role) can easily configure the platform.
Scaling
- Independence of resources
- Each instance is dedicated to the purchaser and is scaled accordingly.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We offer user based analytics to show utilisation of the service
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
-
User are able to extract their data using:
1. Excel exports
2. Web Service extracts - Data export formats
-
- CSV
- Other
- Other data export formats
-
- XML (Web Service)
- MPP (Where appropriate)
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- MPP
- Web Service
- Jira
- MS Project Server
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- We provide the level of SLA's that our hosting providers (Azure, AWS, Oracle) provide. Refunds from the hosting provider will be passed to the client in full.
- Approach to resilience
- Available on request
- Outage reporting
-
Email Alerts
Public Dashboard
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
-
All access to system functionality is controlled in two ways:
1. Access to the environment is controlled through user setup and authentication
2. Individual system functions are role based
3. Certain data element access is permission based.
These are all controlled through the same administration interface. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- No
- Security governance certified
- No
- Security governance approach
- We have our own in house framework in which the decisions made about security issues are aligned with the overall business strategy and the culture of our organisation and our clients needs. This varies depending on the domain and security requirements of our clients.
- Information security policies and processes
-
We have adopted an Information Security Policy that complies with stringent legal requirements and provides the necessary assurance that data held and processed by our systems is treated with the highest appropriate standards to keep it safe. .
The detailed information security policies can be provided on request but in essence they are:
Making sure that only those who need access to data have that access.
Not storing information where it can be accidentally exposed or lost,Making sure that if data has to be transported it is done so securely using encrypted devices or channels.
Any breaches of these areas are reported directly to the CIO who will instigate a review of each case.
All staff are required to go through annual training and spot checks and audits are carried out to ensure policies are adhered to.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Provided on request
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Provided on request
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Provided on request
- Incident management type
- Supplier-defined controls
- Incident management approach
-
We offer a fully web based incident management system where users can create their own incidents that our service agents will respond to.
There is an associated Knowledge Base and FAQ for common issues which both support agents and user have access to.
Incident reports can be provided to customers on request or on a requested cadence that can be agreed.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Our software incorporates sustainable practices, such as energy efficiency, carbon footprint reduction and eco-friendly design principles, which contribute to environmental wellbeing by minimising resource consumption and environmental degradation.Covid-19 recovery
Our software supports Covid-19 recovery efforts by facilitating remote work, communication, and collaboration, enabling businesses and organisations to adapt to new ways of operating during the pandemic. Through features such as virtual meetings, document sharing, and project management tools, our software helps teams stay connected and productive while working from home.Tackling economic inequality
Our software tackles economic inequality by providing affordable access to essential tools and resources, empowering individuals and communities to overcome financial barriers and achieve their goals.
Firstly, our software offers flexible pricing options and affordable subscription plans to ensure that cost is not a prohibitive factor for users. By providing discounts for students, nonprofit organisations, or individuals from low-income backgrounds, our software extends its reach to those who might otherwise be excluded due to financial constraints.
Additionally, our software emphasises value for money by offering free versions with basic features or limited access, allowing users to experience its benefits without incurring significant costs. This freemium model enables individuals with limited resources to still access essential functionalities, fostering a more equitable distribution of opportunities.
Furthermore, our software facilitates economic empowerment by supporting entrepreneurship and skill development. Through features such as educational resources, training materials, and access to online courses or certification programs, our software equips users with the knowledge and tools they need to start their own businesses or pursue career advancement opportunities, regardless of their socioeconomic background.
Moreover, our software fosters financial literacy and inclusion by providing tools for budgeting, financial planning, and resource management. By empowering users to make informed financial decisions and manage their resources effectively, our software helps them build financial resilience and navigate economic challenges more successfully.
Beyond individual empowerment, our software contributes to economic equality by promoting fair and transparent market practices. By adhering to ethical standards, transparency in pricing, and accountability in business practices, our software helps level the playing field for small businesses and startups, reducing barriers to entry and fostering competition in the marketplace.Equal opportunity
Our software supports equal opportunity by embracing principles of inclusivity, accessibility, and fairness. Through careful design and thoughtful features, it strives to ensure that all users, regardless of their background, abilities, or circumstances, have an equal chance to benefit from its offerings.
Accessibility is a cornerstone of our software's commitment to equal opportunity. By adhering to accessibility standards and guidelines such as WCAG, our software ensures that individuals with disabilities can navigate and interact with it effectively. Features like screen reader compatibility, keyboard navigation, and adjustable settings for font size and contrast empower users with diverse needs to access our software on equal footing.
Inclusivity is another key aspect of our software's approach to equal opportunity. It is designed to be welcoming and affirming for users from all walks of life, with diverse representation in its content, imagery, and user interface. By avoiding stereotypes and biases, our software fosters an environment where everyone feels valued and respected.
Our software also promotes equal opportunity through affordability. By offering flexible pricing options, discounts for certain demographics, or even free versions with limited features, our software ensures that economic barriers do not prevent anyone from accessing its benefits.
Moreover, our software prioritises data privacy and security to protect the confidentiality and integrity of user information, ensuring equal protection for all users regardless of their identity or background.
Through community engagement initiatives such as forums, user groups, and online communities, our software fosters a sense of belonging and collective empowerment, enabling users to support each other and share their experiences.
Overall, our software's commitment to equal opportunity is reflected in its inclusive design, accessible features, affordability, privacy measures, and community engagement efforts, all of which work together to create a digital environment where everyone has an equal chance to thrive.Wellbeing
1. Productivity and Time Management: Our software helps users organise their tasks, manage their time effectively, and maintain a healthy work-life balance, it can reduce stress, increase productivity, and improve overall wellbeing by promoting efficiency and reducing feelings of overwhelm and burnout.
2. Accessibility and Inclusivity: Our software is designed with accessibility features that accommodate users with disabilities or diverse needs, it can promote inclusion and equal access to technology, enhancing the wellbeing of marginalised or underserved populations.
3. Education and Learning: Our software provides educational content, skill-building exercises, which contribute to users' personal and professional development, enhance their sense of fulfilment and competence, and improve their overall satisfaction and wellbeing.
4. Community Building: Our software facilitates social connections, group activities, and collaboration among users with shared interests or goals, it can foster a sense of belonging, connection, and social support, which are essential for mental and emotional wellbeing.
Pricing
- Price
- £115 to £210 a user a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- The free trial version includes access to essential features for 30 days, allowing users to experience the software's functionality firsthand. Advanced features are not included.