Strategic Outline Case (SOC) Procurement Simulation
Decision support tool which assesses costs and consequences of potential decisions. Clients can explore different choices, evaluate results and run optimisations to identify optimal outcomes.
Underpinned by genetic algorithm-based software users can test 1,000s of scenarios and see the consequences of their decisions immediately, before an investment decision is made.
Features
- Optimisation using genetic algorithms
- Choices and consequences evaluation
- Force or portfolio builder
- Financial analysis
- Contractual consequence of decisions analysis
- Portfolio Balance of Investment
- VfM analysis of inserting new technologies into a wider system
- Multi Criteria Decision Analysis
- Programme Value for Money Analysis
- Learning and Development Tool
Benefits
- See consequences of portfolio decisions immediately, without months of analysis
- Optimise portfolios based on configurable constraints (eg budget limits)
- Can compare possible portfolios against defined scenarios
- Can test hypothesis for future portfolio mixes
- Can identify impact on capabilities of different investment choices
- Identify Economic, Social and Governance consequences of different investment choices
- Generates balance of investment models to support annual budget planning
- Provides optimum Value for Money programme plan for complex portfolios
- Used to create consensus on policy issues from multiple stakeholders
- Provides an interactive, inclusive, multi-dimensional way of learning
Pricing
£800 a unit a day
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
4 8 3 4 7 8 1 4 5 8 4 2 1 5 1
Contact
HAWKROSE
Robert Fern
Telephone: 07966153588
Email: rf@Hawkrose.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- No
- System requirements
- 1. There are no specific system requirements
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Hawkrose can provide Email based support or support through a dedicated ticketing system.
Support models are tailored to customers’ requirements and based on agreed SLA’s. Response times and support coverage is agreed and documented in a managed service agreement and tailored to the requirements of each customer and system deployment. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Support models are tailored to customers’ requirements and based on agreed SLA’s. Response times and support coverage is agreed and documented in a managed service agreement and tailored to the requirements of each customer and system deployment.
The Hawkrose standard approach is to offer three levels of support:
• Bronze – UK Office hours support with email-based fault notification
• Silver – Extended hours (07:00 – 22:00) 7 days per week with email-based fault notification and trouble ticketing system
• Gold – 24/7 support 7 days per week with email and phone-based fault notification and trouble ticketing system
Bespoke support packages can be agreed based on a Service Level Agreement with time to respond targets if required.
All customers are allocated a technical account manager to act as a point of escalation if required. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
The SOC Procurement Simulation can be delivered as a hosted managed service or deployed into a customers’ hosting environment. If deployed into a customer hosted environment a deployment guide is provided and training given to support system upgrades.
User guides are provided as standard, and training can be purchased as an additional service. This can be online or onsite, depending on customer requirements. Hawkrose also offer continuous user support packages where Hawkrose consultants can act as expert users. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
The standard approach to data extraction is through the CSV export function within the tool.
Normally clients retain ownership of their data and can export it, and request data is wiped from the system at the end of a contract. This would normally be agreed upfront and forms part of the overall data security agreement. - End-of-contract process
-
End of contract terms can be agreed on a case-by-case basis and would normally be covered by the terms of a support and maintenance contract.
Any bespoke end of contract requirements would be charged for on a standard time and materials basis.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AAA
- Description of service interface
- Users' interaction with the SOC Procurement Simulation is through the browser
- Accessibility standards
- WCAG 2.1 A
- Accessibility testing
- Details available on request.
- API
- No
- Customisation available
- Yes
- Description of customisation
-
The SOC Procurement Simulation is designed to be highly customisable and configurable. Customisable elements include:
• Assets
• Reference data
• Data structure
• Page flow
• Optimisation constraints
• Scenarios, scenario scoring
• Scenario linkages and nested scenarios
The platform is designed to be reconfigured and customised for each decision, transformation programme analysis or investment evaluation.
New data can be configured through the UI or uploaded via CSV.
Scaling
- Independence of resources
-
The SOC Procurement Simulation is typically deployed as a separate instance per customer on dedicated infrastructure to avoid any performance impacts.
Within a single instance, the system can be auto-scaled during periods of high usage to ensure that the application is available to all users within the agreed SLAs. Optimisation runs are queued to ensure optimum performance however a priority system can be implemented if required.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Service metrics can be provided on a wide range of parameters. These include:
• Service level metrics such as, system up time, CPU usage and run time of optimisations
• User level actions such as, new user added, data extracted, or optimisations run
• Usage level data such as, log in and log out time stamps
Additional metrics can be configured, captured and reported on based on customer requirements.
N.B. Some monitoring systems may be blocked by customer firewalls if the system is hosted on a private cloud network. - Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- No
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- The standard data export process can be triggered by a user with the correct permissions through UI. The standard export format is CSV however other export processes and formats can be developed based on customer requirements.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Availability targets are agreed with customers at the start of a project and documented in a service level agreement, or managed service agreement.
Penalty charges are typically paid in service credits if explicit availability targets have been agreed and missed. Planned maintenance and outages caused by a customer’s own cloud hosting environment are excluded from any availability calculation. - Approach to resilience
- Dependent on customer requirement and available on request.
- Outage reporting
- Any outages are reported to the customer through email alerts triggered by system monitoring software. Depending on the agreed service level, outages may also be tracked in the dedicated ticketing system.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- The SOC Procurement Simulation uses Role-Based Access Control so that each user only has access to parts of the system to which they have been given permission by the system admin.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Details available on request
- Information security policies and processes
- Details available on request
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Configuration management is automated, allowing system changes to be tracked and rolled-back if required.
Hawkrose works to a structured change management process. Changes are requested by a customer and documented by Hawkrose consultants or developers. Any requested change is estimated and any system impacts identified. The change request must be signed off by the customer lead and Hawkrose technical project manager in order to be initiated. Documentation is stored on the Hawkrose file system and forms part of the permanent system record. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Details available on request
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Potential compromises are detected through system monitoring. Response times depend on the SLA level chosen by the customer.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Our incident management approach follows the ITIL seven step approach for handling incidents:
1. Incident identification. This is either through system monitoring or a customer reporting via telephone or email.
2. Incident logging. The issue is logged and classified but the service desk.
3. Incident investigation and diagnosis. First line support will attempt to resolve the issue.
4. Incident assignment or escalation. This is if first line support is unable to resolve.
5. Incident resolution. A report is sent to the user describing the issue and its resolution.
6. Incident closure
7. User satisfaction survey (if necessary)
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
The tool visualises the multiple consequences of policymaking and investment decisions in seconds – allowing the cause/effect decision loop to be tested multiple times before a decision is made. It also allows participants to ‘walk a mile in the shoes’ of the individual with the challenging problem – ensuring all stakeholders have similar pre-briefing (via the game) before the policy debate occurs. This methodology has already been put into place as the tool has been used by the Royal Navy to assess the Carbon Emission consequences of their strategic choices (whether that be new zero carbon ships, or ships with different fuel types). The tool has been used successfully to underpin the Navy’s 2050 Climate Change and Sustainability strategy and will likely be used to support the RAF’s and the Army’s Carbon Net Zero strategy.
Pricing
- Price
- £800 a unit a day
- Discount for educational organisations
- No
- Free trial available
- No