Strategic Outline Case (SOC) Procurement Simulation

Decision support tool which assesses costs and consequences of potential decisions. Clients can explore different choices, evaluate results and run optimisations to identify optimal outcomes.

Underpinned by genetic algorithm-based software users can test 1,000s of scenarios and see the consequences of their decisions immediately, before an investment decision is made.


  • Optimisation using genetic algorithms
  • Choices and consequences evaluation
  • Force or portfolio builder
  • Financial analysis
  • Contractual consequence of decisions analysis
  • Portfolio Balance of Investment
  • VfM analysis of inserting new technologies into a wider system
  • Multi Criteria Decision Analysis
  • Programme Value for Money Analysis
  • Learning and Development Tool


  • See consequences of portfolio decisions immediately, without months of analysis
  • Optimise portfolios based on configurable constraints (eg budget limits)
  • Can compare possible portfolios against defined scenarios
  • Can test hypothesis for future portfolio mixes
  • Can identify impact on capabilities of different investment choices
  • Identify Economic, Social and Governance consequences of different investment choices
  • Generates balance of investment models to support annual budget planning
  • Provides optimum Value for Money programme plan for complex portfolios
  • Used to create consensus on policy issues from multiple stakeholders
  • Provides an interactive, inclusive, multi-dimensional way of learning


£800 a unit a day

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at rf@Hawkrose.com. Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 13

Service ID

4 8 3 4 7 8 1 4 5 8 4 2 1 5 1


HAWKROSE Robert Fern
Telephone: 07966153588
Email: rf@Hawkrose.com

Service scope

Software add-on or extension
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
System requirements
1. There are no specific system requirements

User support

Email or online ticketing support
Email or online ticketing
Support response times
Hawkrose can provide Email based support or support through a dedicated ticketing system.

Support models are tailored to customers’ requirements and based on agreed SLA’s. Response times and support coverage is agreed and documented in a managed service agreement and tailored to the requirements of each customer and system deployment.
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
Support models are tailored to customers’ requirements and based on agreed SLA’s. Response times and support coverage is agreed and documented in a managed service agreement and tailored to the requirements of each customer and system deployment.

The Hawkrose standard approach is to offer three levels of support:
• Bronze – UK Office hours support with email-based fault notification
• Silver – Extended hours (07:00 – 22:00) 7 days per week with email-based fault notification and trouble ticketing system
• Gold – 24/7 support 7 days per week with email and phone-based fault notification and trouble ticketing system

Bespoke support packages can be agreed based on a Service Level Agreement with time to respond targets if required.

All customers are allocated a technical account manager to act as a point of escalation if required.
Support available to third parties

Onboarding and offboarding

Getting started
The SOC Procurement Simulation can be delivered as a hosted managed service or deployed into a customers’ hosting environment. If deployed into a customer hosted environment a deployment guide is provided and training given to support system upgrades.

User guides are provided as standard, and training can be purchased as an additional service. This can be online or onsite, depending on customer requirements. Hawkrose also offer continuous user support packages where Hawkrose consultants can act as expert users.
Service documentation
Documentation formats
End-of-contract data extraction
The standard approach to data extraction is through the CSV export function within the tool.

Normally clients retain ownership of their data and can export it, and request data is wiped from the system at the end of a contract. This would normally be agreed upfront and forms part of the overall data security agreement.
End-of-contract process
End of contract terms can be agreed on a case-by-case basis and would normally be covered by the terms of a support and maintenance contract.

Any bespoke end of contract requirements would be charged for on a standard time and materials basis.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Designed for use on mobile devices
Service interface
User support accessibility
Description of service interface
Users' interaction with the SOC Procurement Simulation is through the browser
Accessibility standards
WCAG 2.1 A
Accessibility testing
Details available on request.
Customisation available
Description of customisation
The SOC Procurement Simulation is designed to be highly customisable and configurable. Customisable elements include:
• Assets
• Reference data
• Data structure
• Page flow
• Optimisation constraints
• Scenarios, scenario scoring
• Scenario linkages and nested scenarios

The platform is designed to be reconfigured and customised for each decision, transformation programme analysis or investment evaluation.

New data can be configured through the UI or uploaded via CSV.


Independence of resources
The SOC Procurement Simulation is typically deployed as a separate instance per customer on dedicated infrastructure to avoid any performance impacts.

Within a single instance, the system can be auto-scaled during periods of high usage to ensure that the application is available to all users within the agreed SLAs. Optimisation runs are queued to ensure optimum performance however a priority system can be implemented if required.


Service usage metrics
Metrics types
Service metrics can be provided on a wide range of parameters. These include:
• Service level metrics such as, system up time, CPU usage and run time of optimisations
• User level actions such as, new user added, data extracted, or optimisations run
• Usage level data such as, log in and log out time stamps

Additional metrics can be configured, captured and reported on based on customer requirements.

N.B. Some monitoring systems may be blocked by customer firewalls if the system is hosted on a private cloud network.
Reporting types
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
The standard data export process can be triggered by a user with the correct permissions through UI. The standard export format is CSV however other export processes and formats can be developed based on customer requirements.
Data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Availability targets are agreed with customers at the start of a project and documented in a service level agreement, or managed service agreement.

Penalty charges are typically paid in service credits if explicit availability targets have been agreed and missed. Planned maintenance and outages caused by a customer’s own cloud hosting environment are excluded from any availability calculation.
Approach to resilience
Dependent on customer requirement and available on request.
Outage reporting
Any outages are reported to the customer through email alerts triggered by system monitoring software. Depending on the agreed service level, outages may also be tracked in the dedicated ticketing system.

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
The SOC Procurement Simulation uses Role-Based Access Control so that each user only has access to parts of the system to which they have been given permission by the system admin.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Cyber essentials
Cyber essentials plus
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
Details available on request
Information security policies and processes
Details available on request

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Configuration management is automated, allowing system changes to be tracked and rolled-back if required.

Hawkrose works to a structured change management process. Changes are requested by a customer and documented by Hawkrose consultants or developers. Any requested change is estimated and any system impacts identified. The change request must be signed off by the customer lead and Hawkrose technical project manager in order to be initiated. Documentation is stored on the Hawkrose file system and forms part of the permanent system record.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Details available on request
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Potential compromises are detected through system monitoring. Response times depend on the SLA level chosen by the customer.
Incident management type
Supplier-defined controls
Incident management approach
Our incident management approach follows the ITIL seven step approach for handling incidents:
1. Incident identification. This is either through system monitoring or a customer reporting via telephone or email.
2. Incident logging. The issue is logged and classified but the service desk.
3. Incident investigation and diagnosis. First line support will attempt to resolve the issue.
4. Incident assignment or escalation. This is if first line support is unable to resolve.
5. Incident resolution. A report is sent to the user describing the issue and its resolution.
6. Incident closure
7. User satisfaction survey (if necessary)

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks

Social Value

Fighting climate change

Fighting climate change

The tool visualises the multiple consequences of policymaking and investment decisions in seconds – allowing the cause/effect decision loop to be tested multiple times before a decision is made. It also allows participants to ‘walk a mile in the shoes’ of the individual with the challenging problem – ensuring all stakeholders have similar pre-briefing (via the game) before the policy debate occurs. This methodology has already been put into place as the tool has been used by the Royal Navy to assess the Carbon Emission consequences of their strategic choices (whether that be new zero carbon ships, or ships with different fuel types). The tool has been used successfully to underpin the Navy’s 2050 Climate Change and Sustainability strategy and will likely be used to support the RAF’s and the Army’s Carbon Net Zero strategy.


£800 a unit a day
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at rf@Hawkrose.com. Tell them what format you need. It will help if you say what assistive technology you use.