XER Schedule Toolkit
The XER Schedule Toolkit is a collaborative cloud software application that compliments the project planning process. It predominantly interacts with Oracle’s Primavera P6 software but can also work with schedules developed in other applications, such as Asta Powerproject and Microsoft’s Project.
Features
- Project Planning Schedule Collaboration
- Oracle Primavera P6 XER XML MPP Schedule Reader
- Schedule Analysis & Quality Metrics
- Project Progress Capture & Reporting
- Project Schedule Comparison & Trend Reporting
- Earned Value Analysis Metrics & Reporting
- Share Access to Project Schedules With Entire Project Team
- Calender Working Time and Shift Pattern Visibility
Benefits
- Helps Drive Successful Project Delivery
- Promotes Awareness of Individual Rsponsibility Within the Project Schedule
- Saves Time analysing Project Schedules
- Helps to Track & Analyse Project Performance over Time
- Saves Money Compared to Oracle Primavera P6 LIcence
- Can Be Accessed From Any Device, Anywhere in the World.
Pricing
£249.00 a licence a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
5 8 7 2 3 3 2 2 0 6 1 0 2 9 2
Contact
XER LIMITED
Chris Grosvenor
Telephone: 07974622297
Email: support@xertoolkit.com
Service scope
- Software add-on or extension
- Yes
- What software services is the service an extension to
-
Oracle Primavera P6
Microsoft Project
Asta Powerproject - Cloud deployment model
- Private cloud
- Service constraints
- In the case where the application is hosted by the customer, the application requires an MySQL database.
- System requirements
- Web browser with internet access
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 12 hours Monday to Friday (UK).
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- No
- Support levels
-
Full product technical support is included within the cost of licence sales.
For enterprise-wide licences purchased, we provide a number of live online training sessions as defined within the cost proposal.
All support requests are communicated via email.
The maximum response time for all support request is 12 hours during Monday to Friday (UK). - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We have a variety of starter-videos on our Youtube channel https://www.youtube.com/channel/UCDd8a65c9qOrpj9CW-XOMDw/videos
We also provide online demonstration and training.
A free no-obligation trial is also available directly through our website. - Service documentation
- No
- End-of-contract data extraction
- By request
- End-of-contract process
- At the end of a contract, if the renewal option is not taken up, all customer-generated data is deleted from the account and access to the application will sease immediately.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- Yes
- Description of customisation
-
Our enterprise system can be configured in a number of ways by the end user. This includes the ability to provide specific users with differing levels of access to the application's functions.
All users can customise schedule views and dashboard reports.
Scaling
- Independence of resources
- We provide an enterprise solution that is hosted on a customer dedicated server.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Our enterprise version of the software can provide metrics for application-usage based on individual user's total time used.
We can also develop specific application-usage reports (at additional cost) as required by customers.
Network/ hardware usage reports can also be provided by request. - Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Other
- Other data at rest protection approach
-
We use AWS infrastructure to host our application.
We encrypt data stored in our database or elsewhere at rest using the AWS KMS service - Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- There are a variety of export reports available throughout the application. Export options are available for Microsoft Excel and PDF.
- Data export formats
- Other
- Other data export formats
-
- Microsoft Excel
- Data import formats
- Other
- Other data import formats
-
- Oracle Primavera P6 XER File
- Oracle Primavera P6 XML File
- Asta Power Project XER File
- Microsoft Project MPP File
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
-
During the Term of the agreement under which XER Limited has agreed to provide XER Schedule Toolkit to Customer, the Covered Service will provide a Monthly Uptime Percentage to Customer of at least 99% (the "Service Level Objective" or "SLO").
If XER Limited does not meet the SLO, and if Customer meets its obligations under this SLA, Customer will be eligible to receive Financial Credits:
Percentage of monthly bill for the respective Covered Service that does not meet SLO that will be credited to future monthly bills of Customer
< 99% = 10%
< 95% = 25% - Approach to resilience
- Available on request
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Username or password
- Other
- Other user authentication
- Our enterprise system can be configured to work with customer's Single Sign On, using Open ID Connect.
- Access restrictions in management interfaces and support channels
- XER Limited provides user access control to XER Limited services and specific resources. Other controls include time, originating IP address, SSL use.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- Less than 1 month
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- Barclaycard
- PCI DSS accreditation date
- 26/12/2021
- What the PCI DSS doesn’t cover
- N/A
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- While not certified at present, we follow an ISO27001 approach to security governance with detailed policies identifying responsible personnel within the organisation, their access control levels and risk assessments associated with any security activities
- Information security policies and processes
- XER Limited implements formal, documented policies and procedures that provide guidance for operations and information security within the organisation. Policies address purpose, scope, roles, responsibilities and management commitment. Employees maintain policies in a centralised and accessible location. XER Limited is responsible for familiarizing employees with the XER Limited security policies. XER Limited has established information security functions that are aligned with defined structure, reporting lines, and responsibilities. Leadership involvement provides clear direction and visible support for security initiatives. Policies are approved by XER Limited leadership at least annually or following a significant change to the XER Limited environment
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Changes to XER Limited services and features follow secure software development practices, including security risk reviews prior to launch. Developer access to production environments is via explicit access system requests, subject to owner review and authorisation. Teams set bespoke change management standards per service, underpinned by standard XER Limited guidelines. All production environment changes are reviewed, tested and approved. Exceptions to change management processes are documented and escalated to XER Limited management.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We actively monitor threats and vulnerabilities to the service via a number of mechanisms. We also keep apprised of any relevant security updates which must be applied whilst keeping customer disruption to an absolute minimum.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- The cloud platform provider we use has well defined processes and safeguards in place. In the event of a potential threat we carry out a risk assessment, and deploy the necessary resources to start to resolve the threat. This response can be immediate, and all patches would be tested and released as a matter of utmost priority.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Our support and operations teams have a knowledge base of processes for common (or previously encountered, uncommon) events and is continually updated. Clients can report incidents to us via any of our contact streams, we offer customised solutions based on our clients requirements. Incidents are logged in our support help desk and client users are kept updated automatically.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
N/A - Covid-19 recovery
-
Covid-19 recovery
N/A - Tackling economic inequality
-
Tackling economic inequality
N/A - Equal opportunity
-
Equal opportunity
N/A - Wellbeing
-
Wellbeing
N/A
Pricing
- Price
- £249.00 a licence a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- A free, unrestricted 7 day trial is available via our website
- Link to free trial
- Www.xertoolkit.com