REVAULT, RETAIN, REVIEW
ICT Revolutions are social care case management implementation experts, delivering education, finance and social care case management system implementation and review services. Including pre-procurement, procurement, programme leadership, part or full implementation, data discovery and migration, performance management, intelligence and reporting, system configuration, end user training and post-implementation support.
Features
- REVAULT Flexible replacement for legacy systems, internal, or cloud-hosted
- REVAULT Web based front end, offering record-level access control
- REVAULT Legacy data presented in format familiar to end users
- RETAIN Flexible eLearning covering basics and core processes
- RETAIN Fully bespoke courses for local processes available
- RETAIN Can be hosted or delivered within the customer's LMS
- REVIEW Suite of dashboards providing key information cases & workers
- REVIEW Additional data layer providing shortcuts to key performance indicators
- REVIEW Configurable to meet local practice fully editable by customer
- REVIEW Real-time reporting for service and team performance
Benefits
- REVAULT Ceases reliance on legacy licences and infrastructure costs
- REVAULT Allows purging of data in line with retention policy
- REVAULT Provides access to multiple legacy sources in one place
- RETAIN Allow new starters to begin work on day one
- RETAIN Ensures competency, consistency & familiarity with systems
- RETAIN Reduce in-person training requirements and improve delivery efficiency
- REVIEW Allows self-delivey of key reports by operational staff
- REVIEW Provides a shortcut to delivering a full reporting suite
- REVIEW Utilises industry-standard reporting tools
Pricing
£350 to £900 a unit a day
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
6 6 2 9 6 6 6 9 2 2 1 8 3 1 3
Contact
ICT Revolutions Ltd
Jonathan Goldie
Telephone: 07762 630363
Email: jon.goldie@ictrevolutions.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Liquiglogic, Servelec Mosaic, PARIS, Carefirst, Frameworki, Abacus, ContrOCC, All document storage formats
- Cloud deployment model
- Private cloud
- Service constraints
-
RETAIN - No
REVAULT - Yes there are pre-requisites.
REVIEW - Yes there are pre-reqsites. - System requirements
-
- REVAULT SQL Server 2012 SQL Server 2014 SQL Server 2016
- REVAULT Apache tomcat version 9 & Java version 8 later
- RETAIN SCORM-compliant Learning Management System if hosted
- REVIEW SQL Server 2012 SQL Server 2014 SQL Server 2016
- REVIEW PowerBI Pro
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We operate a customer facing ticketing system which is monitored during weekdays from 07:00 - 19:00. Within these hours we will respond to questions or to incidents within 30 minutes.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
All customers are provided with the account manager and technical support engineer's details. The technical support engineer will be a person who is intimate with the product the customer is using and will attempt to resolve an incident within 2 hours of notification via the Service Desk. All product customers receive the same level of basic support, however we also have different tiers of support available depending on the product:
Tier 1 - Helpdesk support for incident management
Tier 2 – As Tier 1 plus ongoing support and maintenance including application and database platform upgrades
Tier 3 – As Tier2 plus ongoing application upgrades to receive new functionality.
For those customers on Tier 1 support, ICT Revolutions can upgrade the application or database, or install a later version of a product, at our standard day rate. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We offer a full installation guide and pre-requisites for each system. We can provide either onsite or eLearning training (at extra cost) and provide a full schema where possible. Our products come with implementation days which cover a full handover to the customer. End user testing forms a mandatory part of each and every implementation. As part of User Acceptance Testing, customer end users work through a series of workshops to familiarise and learn how to navigate the systems. Where specific accessability settings are desired, these are applied, and tested.
- Service documentation
- Yes
- Documentation formats
-
- ODF
- End-of-contract data extraction
- Data is always owned by the customer. Generally, Customer data does not leave their own site. For our products where we host customer data alongside the applications, and/or our application carries out processing of that data, we guarantee that the data is either deleted, or returned as CSV or similar files at the termination of the contract.
- End-of-contract process
- The service is withdrawn, in line with the Contract and the requirement of the customer, any data stored is destroyed or returned to the customer in CSV or similar format.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
REVAULT - This application is designed for desktop use only.
RETAIN - Where hosted by ICT Revolutions, all content is available via mobile devices. Where customer-hosted, this will be dependent on your LMS
REVIEW - Consumption of dashboard content is supported via the PowerBI Android/iOS app
See the Service Definition for more information. - Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- Yes
- Description of customisation
-
REVAULT
Access can be configured depending on business area or authorisation, a variety of levels of access control can be chosen from, and information can be presented in any format.
RETAIN
Video content and format can be customised. We offer bespoke courses, and they can be hosted by us or exported. We also offer quizzes which can be fully bespoke and monitoring of usage.
REVIEW
Dashboards can be configured locally to show only the customer requested information. Reports can be created and modified by the customer, or we will help them develop what they need. The colour and appearance can also be amended.
Scaling
- Independence of resources
- We work with customers to identify their predicted usage and define server specifications that will meet these. We work with customers to review the ongoing performance of our products and make changes to infrastructure where required.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
REVAULT
We provide user access audit logs.
RETAIN
If hosted by ICT Revolutions, we provide usage and user details for all viewers of courses
See the Service Definition for more information. - Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
REVAULT
Data can be exported in the standard PowerBI formats including CSV, DOCX and PDF
RETAIN
If hosted by ICT Revolutions, we will provide SCORM-compliant MP4 and SRT files on request. Where hosted by the customer, this is dependent on their LMS and local policies.
REVIEW
Data can be exported in the standard PowerBI formats including CSV and PDF - Data export formats
- CSV
- Data import formats
-
- CSV
- Other
- Other data import formats
- REVIEW data in all formats supported by MSSQL and PowerBI
Data-in-transit protection
- Data protection between buyer and supplier networks
- IPsec or TLS VPN gateway
- Data protection within supplier network
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- We guarantee a 99% availablilty within normal operating hours, as agreed with each customer. If we fail to meet this standard we offer service credits
- Approach to resilience
- Details available on Request - The critical system components that are required to maintain availability and recover service in the event of outage have been identified. Critical system components are backed up across multiple, isolated locations. Each location is engineered to operate independently with high reliability. Locations that automatically fail-over without interruption. Highly resilient systems, and therefore service availability, is a function of the system design.
- Outage reporting
- Email Alerts to named customer representative(s)
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Limited access network (for example PSN)
- Username or password
- Access restrictions in management interfaces and support channels
-
REVAULT - uses different security profiles to access management functions. Users with administrative access only can access these functions. Database access is dependent on customers own end-user access controls for SQL Server.
RETAIN - There is no management interface presented to customers when hosted by ICT Revolutions, customers self-hosting will use their own Learning Management System's controls.
REVIEW - content uses the customers own end-user account controls for PowerBI and SSRS access. - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Limited access network (for example PSN)
- Username or password
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- ICO Tier 1
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- CCS Mandated, Cyber Essentials, robust internal processes - i.e. around e-mail useage, NDAs and confidentiality agreements, only 2 admin accounts, GDPR
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Na
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Na
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
ICT Revolutions has instituted a set of business processes, with essential support technology that are in place to monitor and audit how our own and our customer's ICT systems are used and assure user accountability. Protective Monitoring activities are limited to those associated with security controls: Inspecting firewall logs, investigating operating system security alerts and monitoring. Protective Monitoring includes obtaining server and systems log information and securing for a set period ICT logs in order to provide an audit trail of security relevant events of interest.
We are Cyber Security complaint and certified. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Incident detection and recording - Identifying an incident and recording the event in our Incident Management Log. This may be done through automated monitoring systems or by user contact.
Reporting and communication begin simulations so that incident is identified, we communicate clearly to customer that a disruption is taking place and investigation is in progress.
Classification and initial support Impact assessments guide the description of priority and severity.
Investigation and analysis - Diagnosis helps to isolate specific effects from the root causes and identify the synergy between the incident and changes to the technical environment or reported and documented issues.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Wellbeing
-
Wellbeing
ICT Revolutions is committed to supporting social value policies. We aim to assist local councils to maximise social, economic, and environmental wellbeing of local communities in accordance with The Public Services (Social Value) Act 2012, The Procurement Reform (Scotland) Act 2014 and The Wellbeing of Future Generations (Wales) act 2015. As part of our contracts, we are committed to:
• Creating employment opportunities within the Local Authority.
• Providing our employees with new skills for the future for their ongoing learning and development.
• Offering employment opportunities to those who serve or have served in our armed forces.
• Provide work opportunities for small, micro-sized businesses and minority owned businesses.
• Procuring goods and services locally where possible.
• Carrying our volunteering activities that deliver benefits to local communities.
• Working with education and training providers, industry bodies and charities to offer curriculum support and work experience opportunities.
• Using resources efficiently to reduce waste and maximise value.
• Reducing air, noise, vibration, and nuisance pollution within local communities to improve health.
This ethos is extended to our work with customers, where we strive to ensure that we always deliver a project leaving the customers’ own staff suitably trained and experienced in the use of their new systems, and in a position to successfully manage them without any further external input. This process naturally engages with the customers’ staff, discovers and fosters the skills of talented and keen individuals, and leaves the customer with a home-grown talent pool of capable system users, and a feeling of ownership of their products.
ICT Revolutions renew their Social Value Policy on an annual basis.
Pricing
- Price
- £350 to £900 a unit a day
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
-
RETAIN
Customers interested in RETAIN can be granted access to a range of content for a limited period of time.
REVAULT & REVIEW
Due to the nature of these products we can’t provide a customer-specific trial, however we are able to offer in-depth demonstrations.