Skip to main content

Help us improve the Digital Marketplace - send your feedback

ACTIVEMANAGE LTD.

ActiveManage Platform

The ActiveManage platform allows users and organisations to build powerful bespoke web applications using an intuitive web-based interface. Even with little or no programming experience, they have the ability to transform their business and its processes using the technologies provided by the platform.

Features

  • Databases
  • Authentication
  • API
  • Calendars
  • WYSIWYG page builder
  • E-mails/SMS (Sending and Receiving)
  • Forms
  • IDE
  • Multi-tenancy
  • Subscriptions

Benefits

  • Replace legacy systems
  • Improve business processes and efficiency
  • Better security
  • Build bespoke systems that work better than "off-shelf" solutions

Pricing

£149.99 an instance a month

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@activemanage.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

5 7 0 2 0 2 9 7 2 7 5 4 5 2 5

Contact

ACTIVEMANAGE LTD. David Hill
Telephone: +443300011300
Email: info@activemanage.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
No
System requirements
A modern web-browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
We offer different levels of support package to allow customers to choose the right balance of response times, support hours and cost for their business. The support hours range from 9am - 5pm business days to 24/7/365.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Support is included with subscription cost.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Users can sign up to the platform and begin to start their application development journey with us. There is a comprehensive help and support section containing all the documentation and video guides covering every aspect of the platform. Users can also contact our support teams should they still require assistance.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
Users can easily export their data using the export buttons found throughout the platform. Users can also contact our support teams should they require additional assistance.
End-of-contract process
There is no additional cost to end the subscription with ourselves. If you would like to end your subscription, simply log in to the platform, go to the My Account section and click Cancel Subscription.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
All elements of the platform benefit from responsive design, meaning that they work fluently on mobile or desktop.
Service interface
No
User support accessibility
WCAG 2.1 AA or EN 301 549
API
Yes
What users can and can't do using the API
The platform comes with an API engine that has ready-to-use functions to create/read/update/delete any data within your application. You can also build custom functions.
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
The main ethos of the platform is to provide you with complete customisation to build an entirely bespoke application.

Scaling

Independence of resources
Each client is provided a instance with a fixed number of CPUs, memory and network throughput. These resources are dedicated to that client meaning that they will receive the same level of performance regardless of the number of users in the same datacentre.

Analytics

Service usage metrics
Yes
Metrics types
Number of databases, database size, file storage, number of users, number of administrators, CPU usage, memory usage.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
There is a dedicated export facility within the platform. Users can also use other features such as the API to extract their data.
Data export formats
  • CSV
  • Other
Other data export formats
  • JSON
  • XLSX
Data import formats
  • CSV
  • Other
Other data import formats
  • XLSX
  • SQL

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
99.9% uptime is guaranteed in the SLA but our aim is a minimum of 99.99%
Approach to resilience
We have load-balancers which allow the service to continue running smoothly should one of the servers develop a fault.
Outage reporting
There is a public dashboard, hosted separately to the infrastructure used by the main systems which report any outages/faults/planned downtime.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Other user authentication
We also support FIDO hardware keys
Access restrictions in management interfaces and support channels
Access to management interfaces is 'locked-down' as much as possible and only accessible from a small number of IP addresses that only our organisation has access to. All logins from machines on these networks require 2-factor authentication using our restricted secure environment and all actions through the management interfaces are audited.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
CSA CCM version 3.0
Information security policies and processes
Our information security policy is enforced across the organisation and includes our policies and processes in relation to assets, risks, acceptable use, business continuity, change management, network security, backups, staff information governance training etc.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
The platform software is subject to vigorous testing prior to any new features being released. This includes user acceptance testing and automated unit testing. To ensure our highest-level of security requirements are met, we run internal security tests such as penetration tests and white-box hack test. Periodically we also use a CREST-approved security test company to provide us with external reassurance.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
We are subscribed to security notices from all the companies we use software from. Once we receive notification of any potential threat, we treat it with the highest priority and aim to deploy patches or software updates as fast as physically possible for us. We also gather information in the form of reports and advisories from sources such as the National Cyber Security Centre.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
The infrastructure we have developed provides monitoring services to detect possible breaches, identify security gaps, and secure the network before attacks happen. In the instance where we find a potential compromise that the infrastructure hasn't managed to resolve itself, this is treated with the highest priority.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Incidents can be logged by end-users, suppliers or our staff by e-mail or the support section on our website. These incidents are then categorised which notifies the appropriate staff members and escalates to director level depending on the severity. The relevant staff members will then investigate the incident to ascertain the root cause and provide a diagnosis. Once this has been completed, we will then work to provide a resolution to the incident along with any required actions to recover the affected areas to return to business as usual.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Covid-19 recovery

Covid-19 recovery

The ActiveManage organisation aims to support organisations and businesses recovering from the impacts of COVID-19. We are able to do this by providing an online platform to help businesses develop new ways of working which reduce business running costs, human errors and compliment remote working/social distancing practices.
We already have a strong relationship with several NHS organisations who use our platform to increase efficiency to reduce the effort required by health and care services to perform IT-related business functions.

Pricing

Price
£149.99 an instance a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Trial versions providing access too all features of the platform are available following a consultation with our sales team.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@activemanage.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.