Skip to main content

Help us improve the Digital Marketplace - send your feedback

Talon

Zivio

Statement of work spend management platform for procurement teams, MSPs and BPOs.
Book a demo

Modern, intuitive, SaaS, packed with enterprise-class tools for delivering return on any spend or service contracted under a statement of work.

Features

  • Covers full source-to-pay process for services spend in one platform
  • Supplier onboarding via customised templates for all compliance requirements
  • Searchable supplier directory and supplier profiles/lists for curation
  • Digital RFP with customised requirement forms and project templates
  • Integrated contract management workflows covering MSA and SoW
  • Integrated e-signature and document management
  • End-to-end milestone process from creation to completion and authorisation
  • Real-time management of change requests/contract variations
  • Supplier performance management suite with real-time tracking on every project
  • AI powered scope of work generator

Benefits

  • Understand exactly what you're getting for your entire services spend
  • Track supplier performance (time, budget, scope, quality) against every project
  • Automated workflows make full source-to-pay process more efficient
  • Manage your entire services spend lifecycle in one place
  • Onboard suppliers faster with specific criteria and digital compliance processes
  • Post projects to suppliers in minutes using our simple workflows
  • Create, edit and e-sign SOW's, store contracts and track variations
  • Define milestones and change request process in real-time
  • Gain full visibility of project progress against milestones and invoices
  • Real-time reporting on all data with dashboards and automated updates

Pricing

£60,000 an instance

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@zivio.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

7 4 4 4 3 0 4 9 1 0 8 9 3 5 0

Contact

Talon Jonny Dunning
Telephone: 01273 713344
Email: info@zivio.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
None
System requirements
Internet connected browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
UK Business Hours.

Zivio’s standard response times for support requests are:

(a) critical: 1 Business Hour;

(b) serious: 4 Business Hours;

(c) moderate: 1 Business Day

(d) minor: 5 Business Days
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
No
Support levels
By standard all customers are assigned a dedicated technical account manager who has oversight of all incoming support requests and longer term development items.

We provide a single support level which includes phone and email support and look to carry out all support work on a remote basis. As a cloud native supplier on-site visits are not required for support purposes.
Support available to third parties
No

Onboarding and offboarding

Getting started
The SaSS product comes 'as-is' but we work with our clients before and during implementation to customise various parts of the software where needed. We can provide training and documentation in various forms to support adoption.
Service documentation
No
End-of-contract data extraction
Data can be extracted in to flat files and delivered to the customer using the transport mechanism of their choice. Our recommended approach is to send encrypted files via Secure FTP (SFTP).
End-of-contract process
A most recent back-up of Client Data will be transferred to the Client upon their request with data delivered within 30 days.

Once delivered all data will be permanently destroyed.

Client shall pay all reasonable expenses incurred by Zivio for returning or disposing of the data.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
There are no differences between the mobile and desktop versions of the product other than the interface being adapted to fit the screen it is being viewed on.
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
Users can create API Keys via the Administration section of the system that can then be used to access the public API Endpoints.

The API is provided as a REST API using JSON for data transfer with a set of endpoints for each business object within the system to allow manipulation of those objects within the system's business rules.

Integration with the Zapier service is also available as standard.
API documentation
Yes
API documentation formats
Open API (also known as Swagger)
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Branding, taxonomy, terminology, workflows, reporting, custom fields.

Any customisation needed can be discussed and costed for before implementation commences.

Scaling

Independence of resources
Zivio is deployed as a horizontally scalable application that includes auto-scaling to automatically increase the capacity of the system as usage increases.

Real time monitoring of all aspects of the system is provided to the Zivio operations team so they can proactively respond to capacity requirements.

Analytics

Service usage metrics
Yes
Metrics types
Number of user licenses
Number of projects
Number of milestones
Number of invoices
Total spend through system
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
Physical access control, complying with CSA CCM v3.0
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users can export their data in CSV or Excel format from system reports using an export button.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Zivio shall use reasonable endeavours to ensure that the uptime for the Services is at least 99.5% during each calendar month.
Approach to resilience
The Zivio system is running simultaneously across multiple separate data centers with multiple application containers running in each to ensure that failure in one location does not cause an outage of the service.

Further detail is available on request.
Outage reporting
A public status dashboard is available that includes the ability to subscribe to data outage alerts. Zivio account managers will also communicate directly with clients in line with our Incident Response Policy.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Changes to system functionality or user access can only be performed by nominated client users. Critical or high risk changes will be confirmed directly with nominated client user via telephone.
Access restriction testing frequency
Never
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
British Assessment Bureau
ISO/IEC 27001 accreditation date
13/12/2022
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Zivio are an ISO27001:2013 certified organisation and have a robust Information Security Management System (ISMS) in place. The ISMS includes a number of detailed policies that are referenced in our Employee Handbook and during our mandatory annual Information Security training sessions.

An external audit of our policies and processes is carried out annually and overseen by our Chief Technology Officer who sits on our board of directors. Internal Audits are carried out bi-annually to ensure we are continuously improving and monitoring are policies with results and actions reported in to our board of directors.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Changes to the system are tracked via our central Change Management Board and where related to a code change within our code repository via an Issue Tracker.

Each change undergoes a separate Security Review whereby changes are peer reviewed to determine whether they introduce any security concerns. We also maintain a Privacy By Design checklist to ensure Privacy concerns are built in to our development process.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Security Updates are received via e-mail on a weekly basis from SANS and cross referenced with system components.

Automated scans are carried out on Github on a regular basis and as part of every change request to identify any publicly disclosed vulnerabilities within the application code.

Application patches are included in regular development sprints are automatically prioritised to ensure timely remediation. Infrastructure patches are applied automatically on a regular basis by our hosting provider.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Access logs are stored in a third party log management tool and automatically scanned for potential compromise events. When identified internal teams are automatically alerted via email and respond in a timely manner in accordance with our Incident Response Policy
Incident management type
Supplier-defined controls
Incident management approach
As part of our ISO27001 compliant Information Security Management System (ISMS) we have defined an Incident Management policy that requires users to report incidents to the Information Security Manager directly or via the Client Relationship Manager if an external user.

The security manager is responsible for managing the incident and providing a written report to all affected parties.

This policy is available on request.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Covid-19 recovery
  • Equal opportunity

Covid-19 recovery

Giving SME suppliers more scope to interact with larger organisations helps Covid19 recovery in 2 ways:

a. Boost SMEs (99% of the UK’s businesses)
b. Increase supply chain resilience for companies by helping them broaden out and gain visibility on their supplier populations with a more diverse mix of size/type & background

Equal opportunity

Equal opportunity

Zivio encourages supplier diversity/inclusion - particularly when it comes to engaging SME suppliers.

The platform gives SME suppliers more scope to interact with larger organisations.

Pricing

Price
£60,000 an instance
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@zivio.com. Tell them what format you need. It will help if you say what assistive technology you use.