ActiveManage Platform
The ActiveManage platform allows users and organisations to build powerful bespoke web applications using an intuitive web-based interface. Even with little or no programming experience, they have the ability to transform their business and its processes using the technologies provided by the platform.
Features
- Databases
- Authentication
- API
- Calendars
- WYSIWYG page builder
- E-mails/SMS (Sending and Receiving)
- Forms
- IDE
- Multi-tenancy
- Subscriptions
Benefits
- Replace legacy systems
- Improve business processes and efficiency
- Better security
- Build bespoke systems that work better than "off-shelf" solutions
Pricing
£149.99 an instance a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 7 0 2 0 2 9 7 2 7 5 4 5 2 5
Contact
ACTIVEMANAGE LTD.
David Hill
Telephone: +443300011300
Email: info@activemanage.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- No
- System requirements
- A modern web-browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We offer different levels of support package to allow customers to choose the right balance of response times, support hours and cost for their business. The support hours range from 9am - 5pm business days to 24/7/365.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Support is included with subscription cost.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Users can sign up to the platform and begin to start their application development journey with us. There is a comprehensive help and support section containing all the documentation and video guides covering every aspect of the platform. Users can also contact our support teams should they still require assistance.
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- Users can easily export their data using the export buttons found throughout the platform. Users can also contact our support teams should they require additional assistance.
- End-of-contract process
- There is no additional cost to end the subscription with ourselves. If you would like to end your subscription, simply log in to the platform, go to the My Account section and click Cancel Subscription.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- All elements of the platform benefit from responsive design, meaning that they work fluently on mobile or desktop.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- Yes
- What users can and can't do using the API
- The platform comes with an API engine that has ready-to-use functions to create/read/update/delete any data within your application. You can also build custom functions.
- API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- The main ethos of the platform is to provide you with complete customisation to build an entirely bespoke application.
Scaling
- Independence of resources
- Each client is provided a instance with a fixed number of CPUs, memory and network throughput. These resources are dedicated to that client meaning that they will receive the same level of performance regardless of the number of users in the same datacentre.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Number of databases, database size, file storage, number of users, number of administrators, CPU usage, memory usage.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- There is a dedicated export facility within the platform. Users can also use other features such as the API to extract their data.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- JSON
- XLSX
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- XLSX
- SQL
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- 99.9% uptime is guaranteed in the SLA but our aim is a minimum of 99.99%
- Approach to resilience
- We have load-balancers which allow the service to continue running smoothly should one of the servers develop a fault.
- Outage reporting
- There is a public dashboard, hosted separately to the infrastructure used by the main systems which report any outages/faults/planned downtime.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Other
- Other user authentication
- We also support FIDO hardware keys
- Access restrictions in management interfaces and support channels
- Access to management interfaces is 'locked-down' as much as possible and only accessible from a small number of IP addresses that only our organisation has access to. All logins from machines on these networks require 2-factor authentication using our restricted secure environment and all actions through the management interfaces are audited.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- CSA CCM version 3.0
- Information security policies and processes
- Our information security policy is enforced across the organisation and includes our policies and processes in relation to assets, risks, acceptable use, business continuity, change management, network security, backups, staff information governance training etc.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- The platform software is subject to vigorous testing prior to any new features being released. This includes user acceptance testing and automated unit testing. To ensure our highest-level of security requirements are met, we run internal security tests such as penetration tests and white-box hack test. Periodically we also use a CREST-approved security test company to provide us with external reassurance.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- We are subscribed to security notices from all the companies we use software from. Once we receive notification of any potential threat, we treat it with the highest priority and aim to deploy patches or software updates as fast as physically possible for us. We also gather information in the form of reports and advisories from sources such as the National Cyber Security Centre.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- The infrastructure we have developed provides monitoring services to detect possible breaches, identify security gaps, and secure the network before attacks happen. In the instance where we find a potential compromise that the infrastructure hasn't managed to resolve itself, this is treated with the highest priority.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Incidents can be logged by end-users, suppliers or our staff by e-mail or the support section on our website. These incidents are then categorised which notifies the appropriate staff members and escalates to director level depending on the severity. The relevant staff members will then investigate the incident to ascertain the root cause and provide a diagnosis. Once this has been completed, we will then work to provide a resolution to the incident along with any required actions to recover the affected areas to return to business as usual.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Covid-19 recoveryCovid-19 recovery
The ActiveManage organisation aims to support organisations and businesses recovering from the impacts of COVID-19. We are able to do this by providing an online platform to help businesses develop new ways of working which reduce business running costs, human errors and compliment remote working/social distancing practices.
We already have a strong relationship with several NHS organisations who use our platform to increase efficiency to reduce the effort required by health and care services to perform IT-related business functions.
Pricing
- Price
- £149.99 an instance a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Trial versions providing access too all features of the platform are available following a consultation with our sales team.