Oracle Planning and Budgeting Cloud (PBCS), EPM Services
S&M Tech Solutions offers top-grade EPM & BI solutions as part of its primary solutions. We have expertise in offering comprehensive solutions for Oracle Hyperion products including PBCS, Hyperion, FDME, HFM and BI Services
Features
- Oracle Data Relationship Management (DRM)
- Oracle Planning and Budgeting Cloud (PBCS)
- Oracle Hyperion Profitability and Cost Management (HPCM)
- Financial Consolidation and Close Cloud (FCCS)
- Oracle Account Reconciliation Cloud (ARCS)
- Oracle Business Intelligence Enterprise Edition(OBIEE)
- Oracle Business Intelligence Applications (OBIA)
- Oracle E-Business Suite Applications (Oracle ERP)
- Oracle Fusion Applications (Oracle Fusion Cloud)
Benefits
- Cutting-edge, custom applications
- Strategic value
- Return on Investment
- Enterprise Data Platform
- One Holistic view of business
- KPI's
- Better Monitoring and Control
Pricing
£355 a unit a day
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
6 6 0 8 6 0 5 6 8 3 2 6 3 5 7
Contact
S&M TECHSOL LIMITED
Venkata Angaluri
Telephone: 020 3744 3337
Email: venkata@smtechsol.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- No Constraints
- System requirements
-
- Defined Requirements
- Business Cases
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- SLA's should be agreed before commencing the work
- User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
2 types of Support levels i.e. Standard Support and Premium Support
Costs Vary for both the services
For Premium Support a Technical Account Manager will be provided - Support available to third parties
- No
Onboarding and offboarding
- Getting started
- We provide onsite training, online training and user documentation.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- We will provide detailed documentation and run guide for the same
- End-of-contract process
- A closure report will be submitted to the client with our observations and possible enhancements and future supporting model etc...
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- No Differences
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- Standard API is available
- API documentation
- Yes
- API documentation formats
-
- HTML
- Other
- API sandbox or test environment
- No
- Customisation available
- No
Scaling
- Independence of resources
-
Autoscaling isn't an instant solution.The system must be designed to be horizontally scalable. Avoid making assumptions about instance affinity; do not design solutions that require that the code is always running in a specific instance of a process. Autoscaling could start additional instances of a service as the queue length grows.
Alternatively, we can implement a checkpoint mechanism that records state information about the task at regular intervals, and save this state in durable storage that can be accessed by any instance of the process running the task. Forecasting the demands for resources and planning is a good option.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Metrics of Monitoring are classified based on the type of service that collects data.
Google Cloud metrics, for Google Cloud services such as Compute Engine and BigQuery.
Kubernetes metrics, for Google Kubernetes Engine (GKE).
Istio metrics, for Istio on Google Kubernetes Engine.
Anthos metrics, for Anthos GKE deployed on-prem.
Metrics for Cloud Monitoring and Cloud Logging agents, Amazon Web Services, open-source, and third-party applications:
Agent metrics, for VM instances running the Monitoring and Logging agents.
AWS metrics, for Amazon Web Services such as Amazon Redshift and Amazon CloudFront.
Knative metrics, for Knative components.
External metrics, for open-source and third-party applications. - Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Data can be exported to CSV, JSON, and AVRO formats
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
- JSON
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
- Json
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Bonded fibre optic connections
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- Most of the cloud services we offer are available 99%
- Approach to resilience
- It’s available on request
- Outage reporting
- A public dashboard, alerts, API, Monitoring system
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- We use IP restrictions, on top of authentication.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
We work with Vendors like Oracle, AWS, Azure and Google. We have security governance policy in our organisation.
Open for getting certified from any Standards Oganisation, if it is customer's mandatory requirement - Information security policies and processes
- Information security policy is in place for the organization to ensure that all information technology users within the domain of the organization or its networks comply with rules and guidelines related to the security of the information stored digitally at any point in the network or within the organization's boundaries of authority.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Our Configuration management involves.
Identification of configurable items
Labeling of configurable items
Maintenance of configurable items
Configuration Verification and Audit
Defining Responsibilities – These responsibilities could include configuration maintenance, configuration security, access control, change control, reporting etc.
Our Change management involves.
Identification of change
Impact analysis of change
Documentation of Change (Request)
Presentation of Change Request (CR) to Change Control Board (CCB)
Decision on CR by CCB
Communication of decision to Stakeholders
Implementation of Approved CR
In addition to the above activities, identification of CCB members and defining authority of CCB is also done as part of the change management. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We assess potential threats to our service through continuous monitoring and by receiving instant notifications for required patches. Notifications come immediately from trusted vendors only. Once we receive a notification, we will begin the process of deploying a patch as soon as possible. This will often require testing from the offset, to ensure that no levels of customisation are broken. All patches are communicated with the Client, from first notification, straight through to deployment.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We perform a comprehensive range of testing methods on all of our development work, prior to deployment. This is conducted by our in-house Quality Assurance specialist, and serves to immediately detect compromises and vulnerabilities. Once identified, we may conduct additional testing after deployment, to specifically ascertain if the issue applies to our work. If it does, we will take action to patch this as soon as possible. If it doesn’t, we will assess the severity and choose an appropriate action, after discussion with the client. We respond to all incidents within client-approved service levels.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Incidents are reported to line management via task management system as per our Integrated Management System processes, as well as by email and/or in person. Reporting would carry on up to CEO/Managing Director level where deemed appropriate. Account managers will inform affected clients where applicable through similar means – email, phone call and/or in person.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
Activities that:
- Deliver additional environmental benefits in the performance of the contract including working towards net zero greenhouse gas emissions.
- Influence staff, suppliers, customers and communities through the delivery of the contract to support environmental protection and improvement. - Covid-19 recovery
-
Covid-19 recovery
At SMTECH we are committed to help local communities to manage and recover from the impact of COVID-19 by
- Create employment, re-training and other return to work opportunities for those left unemployed by COVID-19, particularly new opportunities in high growth sectors.
- Support people and communities to manage and recover from the impacts of COVID-19, including those worst affected or who are shielding.
- Support organisations and businesses to manage and recover from the impacts of COVID-19, including where new ways of working are needed to deliver services.
- Support the physical and mental health of people affected by COVID-19, including reducing the demand on health and care services.
- Improve workplace conditions that support the COVID-19 recovery effort including effective social distancing, remote working, and sustainable travel solutions. - Tackling economic inequality
-
Tackling economic inequality
At SMTECH we are committed to the below statements to tackle economic inequalities
-Create employment opportunities particularly for those who face barriers to employment and/or who are located in deprived areas.
- Create employment and training opportunities, particularly for people in industries with known skills shortages or in high growth sectors.
- Support educational attainment relevant to the contract, including training schemes that address skills gaps and result in recognised qualifications.
- Influence staff, suppliers, customers and communities through the delivery of the contract to support employment and skills opportunities in high growth sectors.
-Create a diverse supply chain to deliver the contract including new businesses and entrepreneurs, start-ups, SMEs, VCSEs and mutuals.
- Support innovation and disruptive technologies throughout the supply chain to deliver lower cost and/or higher quality goods and services.
- Support the development of scalable and future-proofed new methods to modernise delivery and increase productivity - Equal opportunity
-
Equal opportunity
At SMTECH we provide equal opportunities to everyone without any discrimination on any grounds, we are committed to below principles.
- Increase the representation of disabled people in the contract workforce.
- Support disabled people in developing new skills relevant to the contract, including through training schemes that result in recognised qualifications.
- Influence staff, suppliers, customers and communities through the delivery of the contract to support disabled people.
- Identify and tackle inequality in employment, skills and pay in the contract workforce.
- Support in-work progression to help people, including those from disadvantaged or minority groups, to move into higher paid work by developing new skills relevant to the contract.
- Identify and manage the risks of modern slavery in the delivery of the contract, including in the supply chain. - Wellbeing
-
Wellbeing
At SMTECH we take at most care to ensure to improve health and wellbeing to our employees, suppliers, customers and third parties.
Which includes the activities below
- Actions to support the health and wellbeing, including physical and mental health, in the contract workforce.
- Influence staff, suppliers, customers and communities through the delivery of the contract to support health and wellbeing, including physical and mental health.
-Collaboration with users and communities in the codesign and delivery of the contract to support strong integrated communities.
- Influence staff, suppliers, customers and communities through the delivery of the contract to support strong, integrated communities.
Pricing
- Price
- £355 a unit a day
- Discount for educational organisations
- Yes
- Free trial available
- No