XER LIMITED

XER Schedule Toolkit

The XER Schedule Toolkit is a collaborative cloud software application that compliments the project planning process. It predominantly interacts with Oracle’s Primavera P6 software but can also work with schedules developed in other applications, such as Asta Powerproject and Microsoft’s Project.

Features

  • Project Planning Schedule Collaboration
  • Oracle Primavera P6 XER XML MPP Schedule Reader
  • Schedule Analysis & Quality Metrics
  • Project Progress Capture & Reporting
  • Project Schedule Comparison & Trend Reporting
  • Earned Value Analysis Metrics & Reporting
  • Share Access to Project Schedules With Entire Project Team
  • Calender Working Time and Shift Pattern Visibility

Benefits

  • Helps Drive Successful Project Delivery
  • Promotes Awareness of Individual Rsponsibility Within the Project Schedule
  • Saves Time analysing Project Schedules
  • Helps to Track & Analyse Project Performance over Time
  • Saves Money Compared to Oracle Primavera P6 LIcence
  • Can Be Accessed From Any Device, Anywhere in the World.

Pricing

£249.00 a licence a year

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at support@xertoolkit.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

5 8 7 2 3 3 2 2 0 6 1 0 2 9 2

Contact

XER LIMITED Chris Grosvenor
Telephone: 07974622297
Email: support@xertoolkit.com

Service scope

Software add-on or extension
Yes
What software services is the service an extension to
Oracle Primavera P6
Microsoft Project
Asta Powerproject
Cloud deployment model
Private cloud
Service constraints
In the case where the application is hosted by the customer, the application requires an MySQL database.
System requirements
Web browser with internet access

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 12 hours Monday to Friday (UK).
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
No
Support levels
Full product technical support is included within the cost of licence sales.
For enterprise-wide licences purchased, we provide a number of live online training sessions as defined within the cost proposal.
All support requests are communicated via email.
The maximum response time for all support request is 12 hours during Monday to Friday (UK).
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We have a variety of starter-videos on our Youtube channel https://www.youtube.com/channel/UCDd8a65c9qOrpj9CW-XOMDw/videos
We also provide online demonstration and training.
A free no-obligation trial is also available directly through our website.
Service documentation
No
End-of-contract data extraction
By request
End-of-contract process
At the end of a contract, if the renewal option is not taken up, all customer-generated data is deleted from the account and access to the application will sease immediately.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
No
Service interface
No
User support accessibility
None or don’t know
API
No
Customisation available
Yes
Description of customisation
Our enterprise system can be configured in a number of ways by the end user. This includes the ability to provide specific users with differing levels of access to the application's functions.
All users can customise schedule views and dashboard reports.

Scaling

Independence of resources
We provide an enterprise solution that is hosted on a customer dedicated server.

Analytics

Service usage metrics
Yes
Metrics types
Our enterprise version of the software can provide metrics for application-usage based on individual user's total time used.
We can also develop specific application-usage reports (at additional cost) as required by customers.
Network/ hardware usage reports can also be provided by request.
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Other
Other data at rest protection approach
We use AWS infrastructure to host our application.
We encrypt data stored in our database or elsewhere at rest using the AWS KMS service
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
There are a variety of export reports available throughout the application. Export options are available for Microsoft Excel and PDF.
Data export formats
Other
Other data export formats
  • Microsoft Excel
  • PDF
Data import formats
Other
Other data import formats
  • Oracle Primavera P6 XER File
  • Oracle Primavera P6 XML File
  • Asta Power Project XER File
  • Microsoft Project MPP File

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
During the Term of the agreement under which XER Limited has agreed to provide XER Schedule Toolkit to Customer, the Covered Service will provide a Monthly Uptime Percentage to Customer of at least 99% (the "Service Level Objective" or "SLO").

If XER Limited does not meet the SLO, and if Customer meets its obligations under this SLA, Customer will be eligible to receive Financial Credits:

Percentage of monthly bill for the respective Covered Service that does not meet SLO that will be credited to future monthly bills of Customer

< 99% = 10%
< 95% = 25%
Approach to resilience
Available on request
Outage reporting
Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • Username or password
  • Other
Other user authentication
Our enterprise system can be configured to work with customer's Single Sign On, using Open ID Connect.
Access restrictions in management interfaces and support channels
XER Limited provides user access control to XER Limited services and specific resources. Other controls include time, originating IP address, SSL use.
Access restriction testing frequency
At least once a year
Management access authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for
Less than 1 month

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
Yes
Who accredited the PCI DSS certification
Barclaycard
PCI DSS accreditation date
26/12/2021
What the PCI DSS doesn’t cover
N/A
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
While not certified at present, we follow an ISO27001 approach to security governance with detailed policies identifying responsible personnel within the organisation, their access control levels and risk assessments associated with any security activities
Information security policies and processes
XER Limited implements formal, documented policies and procedures that provide guidance for operations and information security within the organisation. Policies address purpose, scope, roles, responsibilities and management commitment. Employees maintain policies in a centralised and accessible location. XER Limited is responsible for familiarizing employees with the XER Limited security policies. XER Limited has established information security functions that are aligned with defined structure, reporting lines, and responsibilities. Leadership involvement provides clear direction and visible support for security initiatives. Policies are approved by XER Limited leadership at least annually or following a significant change to the XER Limited environment

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Changes to XER Limited services and features follow secure software development practices, including security risk reviews prior to launch. Developer access to production environments is via explicit access system requests, subject to owner review and authorisation. Teams set bespoke change management standards per service, underpinned by standard XER Limited guidelines. All production environment changes are reviewed, tested and approved. Exceptions to change management processes are documented and escalated to XER Limited management.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We actively monitor threats and vulnerabilities to the service via a number of mechanisms. We also keep apprised of any relevant security updates which must be applied whilst keeping customer disruption to an absolute minimum.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
The cloud platform provider we use has well defined processes and safeguards in place. In the event of a potential threat we carry out a risk assessment, and deploy the necessary resources to start to resolve the threat. This response can be immediate, and all patches would be tested and released as a matter of utmost priority.
Incident management type
Supplier-defined controls
Incident management approach
Our support and operations teams have a knowledge base of processes for common (or previously encountered, uncommon) events and is continually updated. Clients can report incidents to us via any of our contact streams, we offer customised solutions based on our clients requirements. Incidents are logged in our support help desk and client users are kept updated automatically.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Fighting climate change

Fighting climate change

N/A
Covid-19 recovery

Covid-19 recovery

N/A
Tackling economic inequality

Tackling economic inequality

N/A
Equal opportunity

Equal opportunity

N/A
Wellbeing

Wellbeing

N/A

Pricing

Price
£249.00 a licence a year
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
A free, unrestricted 7 day trial is available via our website
Link to free trial
Www.xertoolkit.com

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at support@xertoolkit.com. Tell them what format you need. It will help if you say what assistive technology you use.