Applicant Tracking system - ATS365
ATS365 is a cloud based software solution that allows recruiters, employers and applicants to work in a more efficient and effective way to manage permanent recruitment process. Creating a hosted market place that stream-lines the recruitment process through technology, potentially providing reduction in recruitment costs and time to hire.
Features
- Simple dashboard approach
- Template use for standardisation
- Client website integration
- Talent pool functionality
- Candidate location matched to client location
- Management of internal re-deployment/ at risk pools
- Standardised candidate application
- System generated client invoicing
- Social media integration
Benefits
- Increase control over recruitment cost
- Potential reduction in time to hire
- Potential reduction in recruitment costs
- Process and policy enforcement
- Reduction in manager's time spent on recruitment
- MI to drive informed decision making
Pricing
£1,000 a licence a month
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
7 6 0 9 9 7 8 5 5 8 9 8 0 9 9
Contact
Retinue Solutions
Jonathan Graham
Telephone: 0845 521 9481
Email: j.graham@ngagerecruitment.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
-
Supported web browsers are
- Internet Explorer 9
- Internet Explorer 10+
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera.
Service functions on IE8 however this is not supported by ourselves. All maintenance is completed outside of working hours and the customer will be notified of this beforehand - System requirements
-
- If using IE must be 9 or above
- Pop-up blocker disabled
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Working hours Monday - Friday 8:45am - 5:30pm. On-call service offered outside of these times
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
As a standard Retinue Solutions provide customer technical support Monday - Friday 8:45am - 5:30pm and an on-call service outside of these times.
Retinue Solutions's expected support levels are
- First line: Client technical support
- Second line: Retinue Solutions technical support
E-mail response time: 1-6 business hours Calls: 10-15 seconds Setting updates: Immediate Notification of system downtime: Minimum 48 hours notice - Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Implementation project management is offered to the client, the involvement of Retinue Solutions in this is defined by the client's needs i.e. size of company, number of users etc. The training to support this is detailed in the service document however can be approached in 2 ways - Train the trainer service for client to train business themselves - Client wide training (face to face, webex and documentation options available)
- Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
-
- Word
- Excel
- End-of-contract data extraction
- Utilisation of "excel exports" allows us to quickly and easily provide clients with their own data e.g. client users, job information throughout life of contract, candidates used throughout life of contract etc. Any data that cannot be provided via the "excel export" functionality will be provided by Retinue Solutions in the client's desired format.
- End-of-contract process
- Retinue Solutions have a standard exit strategy that is managed through a stage of deliverables defining at which points in time information will be provided and the technology switched off. Timeline will depend on size of client and the amount of information required to be exported. Will also depend on number of third party users the client has expanded the technology to include and when the client no longer wishes to provide the service to them.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Site built on responsive web pages, scales to be used on mobiles.
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- API feed of job details that can be provided to a client to utilise job information for their own platforms.
- API documentation
- No
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- There are multiple features within the technology that can be "switched on/ off" depending on the activities/ business the client intends to put through the technology. In addition to this the site is customised to hold the customer's specific details relevant only to them. All drops downs and data configurable to client's requirements.
Scaling
- Independence of resources
- Our scalable architecture means that additional resources can be added in real time if usage peaks occur.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We review how and when user's access the system to feed into UI designs. These statistics can be provided to clients, however predominantly used to form opinion and changes on the system design.
- Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Technology is built predominantly on a number of "grid pages" that present the information in a table formation. These tables can have a search applied and all information be "exported to excel". This is achieved by simply pressing a button and opening the file. The information accessible will depend on the user's rights and profile within the system
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- Xls
- Xlsc
- Rtf
- Mht
- HTML
- Text
- Image
- CSV
- Data import formats
-
- CSV
- Other
- Other data import formats
- Xls
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Users are only charged for the usage they make of the system and therefore any instances of outage directly reduce client spend. This reduction would be pro-rated if a minimum charge was levied.
- Approach to resilience
- Retinue Solutions has implemented a Business Continuity Management System (BCMS) based on the BS25999 standards. As part of this BCMS Retinue Solutions maintains a disaster recovery plan to cater for total site loss of a production data centre with the objective of performing service recovery at a secondary production data centre within the Retinue Solutions secure service network that is prepared for the purpose. The technology is hosted using a server virtualisation approach based upon VMware vSphere. vSphere allows a flexible and rapid approach to service provision but also supports high availability of services, protecting against server hardware failure. In order to maintain good visibility of service levels, i-resource monitors infrastructure and service condition using the Nimsoft monitoring solution supplemented by proprietary service monitoring components provided with infrastructure components, for example the Compellent SAN.
- Outage reporting
- System outages are reported immediately to the Software Product Manager who will communicate to the Client Executive sponsor or a nominated contact within the client. Immediate response will be to notify users or the system outage, the next step is to diagnose the problem. If the system outage is anticipated to be longer than 20 minutes then a time estimation is made and the Software Product manager will inform client of expected length of time. When system is resumed again nominated point of contact is informed and a full diagnostic report of cause is provided within 6 working hours.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- User cannot access software unless profile is created by an Administrator in the system. User is then provided with a unique username (e-mail address) and password to access the system. When logging in technology will use Captcha technology to authenticate user. All actions completed by that user when logged in is time and date stamped for audit trail.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 27/03/2020
- What the ISO/IEC 27001 doesn’t cover
- The certification covers nGAGE IT services. It does not cover our IT service desk level 1 and 2 which is outsourced to Optimising IT who are themselves ISO 27001 certified
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Retinue Solutions use Dell Sonicwall Firewalls and these are hosted in separate data centres. Each data centre provides perimeter protection against DDOS (denial of service) attacks and diverse routing to external connections as well as perimeter protection for publically available sites.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
When Retinue Solutions conduct functionality development this goes through the life span of
- understand customer requirements
- design of possible solution
- apply use cases to design
- confirm and sign off by client
- develop functionality
- Retinue testing cycle (including security/ data impact)
- Client testing cycle
- Client sign off
- Implement
- Post implementation analysis.
All functionality development is tracked through the project management tool JIRA as are all issues during testing phase. Release note completed and sent to all clients following implementation - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Retinue Solutions subscribe to a number of industry threat alert systems and use these to provide day to day information on current threat levels, active vulnerabilities and patch requirements. Our primary detection products are Sophos, McAffee, MalwareBytes and Mimecast.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Monitoring system alerts from McAfee, Sophos, Mimecast, Kaspersky and Mimecast. Immediate response, monitored by our helpdesk. Alerts to operational and IT management.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Incidents reported by user to the client technical support. If they cannot resolve then escalated to Retinue Solutions technical support team. This is raised through our helpdesk portal and a ticket number assigned to each issue. When raising ticket must define if impact is to individual user, group of users, system wide etc. and issue is applied priority status. Dependant on severity of issue will define course of action i.e. time in which it is addressed, communication to whole client or individual user. All fixes always reported within release notes.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Tackling economic inequality
-
Tackling economic inequality
Increase Supply Chain Resilience and Capacity:
In addition to candidates applying directly to jobs and talent pooling, candidates made available to the user is expanded by allowing outsourcing directly to recruitment agencies. An unlimited number of suppliers can be added to the supply chain for each category of staff required by the client, allowing a robust and expansive supply chain to be built to cover all client needs. They are easily managed and can be moved up and down the tiering structure as and when required by the user. Automatic outsourcing to the supply chain enables agencies to begin working on jobs and sourcing candidates quickly and efficiently. The hiring manager can see all candidates from all agencies that have been submitted to them in one place to enable fairness across the supply chain when the hiring managed is selecting a candidate to hire.
Pricing
- Price
- £1,000 a licence a month
- Discount for educational organisations
- No
- Free trial available
- No