Zivio
Statement of work spend management platform for procurement teams, MSPs and BPOs.
Book a demo
Modern, intuitive, SaaS, packed with enterprise-class tools for delivering return on any spend or service contracted under a statement of work.
Features
- Covers full source-to-pay process for services spend in one platform
- Supplier onboarding via customised templates for all compliance requirements
- Searchable supplier directory and supplier profiles/lists for curation
- Digital RFP with customised requirement forms and project templates
- Integrated contract management workflows covering MSA and SoW
- Integrated e-signature and document management
- End-to-end milestone process from creation to completion and authorisation
- Real-time management of change requests/contract variations
- Supplier performance management suite with real-time tracking on every project
- AI powered scope of work generator
Benefits
- Understand exactly what you're getting for your entire services spend
- Track supplier performance (time, budget, scope, quality) against every project
- Automated workflows make full source-to-pay process more efficient
- Manage your entire services spend lifecycle in one place
- Onboard suppliers faster with specific criteria and digital compliance processes
- Post projects to suppliers in minutes using our simple workflows
- Create, edit and e-sign SOW's, store contracts and track variations
- Define milestones and change request process in real-time
- Gain full visibility of project progress against milestones and invoices
- Real-time reporting on all data with dashboards and automated updates
Pricing
£60,000 an instance
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 4 4 4 3 0 4 9 1 0 8 9 3 5 0
Contact
Talon
Jonny Dunning
Telephone: 01273 713344
Email: info@zivio.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- None
- System requirements
- Internet connected browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
UK Business Hours.
Zivio’s standard response times for support requests are:
(a) critical: 1 Business Hour;
(b) serious: 4 Business Hours;
(c) moderate: 1 Business Day
(d) minor: 5 Business Days - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- No
- Support levels
-
By standard all customers are assigned a dedicated technical account manager who has oversight of all incoming support requests and longer term development items.
We provide a single support level which includes phone and email support and look to carry out all support work on a remote basis. As a cloud native supplier on-site visits are not required for support purposes. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
- The SaSS product comes 'as-is' but we work with our clients before and during implementation to customise various parts of the software where needed. We can provide training and documentation in various forms to support adoption.
- Service documentation
- No
- End-of-contract data extraction
- Data can be extracted in to flat files and delivered to the customer using the transport mechanism of their choice. Our recommended approach is to send encrypted files via Secure FTP (SFTP).
- End-of-contract process
-
A most recent back-up of Client Data will be transferred to the Client upon their request with data delivered within 30 days.
Once delivered all data will be permanently destroyed.
Client shall pay all reasonable expenses incurred by Zivio for returning or disposing of the data.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- There are no differences between the mobile and desktop versions of the product other than the interface being adapted to fit the screen it is being viewed on.
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
-
Users can create API Keys via the Administration section of the system that can then be used to access the public API Endpoints.
The API is provided as a REST API using JSON for data transfer with a set of endpoints for each business object within the system to allow manipulation of those objects within the system's business rules.
Integration with the Zapier service is also available as standard. - API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Branding, taxonomy, terminology, workflows, reporting, custom fields.
Any customisation needed can be discussed and costed for before implementation commences.
Scaling
- Independence of resources
-
Zivio is deployed as a horizontally scalable application that includes auto-scaling to automatically increase the capacity of the system as usage increases.
Real time monitoring of all aspects of the system is provided to the Zivio operations team so they can proactively respond to capacity requirements.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Number of user licenses
Number of projects
Number of milestones
Number of invoices
Total spend through system - Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Users can export their data in CSV or Excel format from system reports using an export button.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Zivio shall use reasonable endeavours to ensure that the uptime for the Services is at least 99.5% during each calendar month.
- Approach to resilience
-
The Zivio system is running simultaneously across multiple separate data centers with multiple application containers running in each to ensure that failure in one location does not cause an outage of the service.
Further detail is available on request. - Outage reporting
- A public status dashboard is available that includes the ability to subscribe to data outage alerts. Zivio account managers will also communicate directly with clients in line with our Incident Response Policy.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Changes to system functionality or user access can only be performed by nominated client users. Critical or high risk changes will be confirmed directly with nominated client user via telephone.
- Access restriction testing frequency
- Never
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- British Assessment Bureau
- ISO/IEC 27001 accreditation date
- 13/12/2022
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Zivio are an ISO27001:2013 certified organisation and have a robust Information Security Management System (ISMS) in place. The ISMS includes a number of detailed policies that are referenced in our Employee Handbook and during our mandatory annual Information Security training sessions.
An external audit of our policies and processes is carried out annually and overseen by our Chief Technology Officer who sits on our board of directors. Internal Audits are carried out bi-annually to ensure we are continuously improving and monitoring are policies with results and actions reported in to our board of directors.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Changes to the system are tracked via our central Change Management Board and where related to a code change within our code repository via an Issue Tracker.
Each change undergoes a separate Security Review whereby changes are peer reviewed to determine whether they introduce any security concerns. We also maintain a Privacy By Design checklist to ensure Privacy concerns are built in to our development process. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Security Updates are received via e-mail on a weekly basis from SANS and cross referenced with system components.
Automated scans are carried out on Github on a regular basis and as part of every change request to identify any publicly disclosed vulnerabilities within the application code.
Application patches are included in regular development sprints are automatically prioritised to ensure timely remediation. Infrastructure patches are applied automatically on a regular basis by our hosting provider. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Access logs are stored in a third party log management tool and automatically scanned for potential compromise events. When identified internal teams are automatically alerted via email and respond in a timely manner in accordance with our Incident Response Policy
- Incident management type
- Supplier-defined controls
- Incident management approach
-
As part of our ISO27001 compliant Information Security Management System (ISMS) we have defined an Incident Management policy that requires users to report incidents to the Information Security Manager directly or via the Client Relationship Manager if an external user.
The security manager is responsible for managing the incident and providing a written report to all affected parties.
This policy is available on request.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Covid-19 recovery
- Equal opportunity
Covid-19 recovery
Giving SME suppliers more scope to interact with larger organisations helps Covid19 recovery in 2 ways:
a. Boost SMEs (99% of the UK’s businesses)
b. Increase supply chain resilience for companies by helping them broaden out and gain visibility on their supplier populations with a more diverse mix of size/type & backgroundEqual opportunity
Equal opportunity
Zivio encourages supplier diversity/inclusion - particularly when it comes to engaging SME suppliers.
The platform gives SME suppliers more scope to interact with larger organisations.
Pricing
- Price
- £60,000 an instance
- Discount for educational organisations
- No
- Free trial available
- No