Connect
Connect is a management tool for Strategy, Portfolios/Programmes/Projects, Operations, Performance, Audits, GRC and other areas. It has and it integrates the functionality and data of the normally separate management tools in these domains, creating powerful, joined-up views of what matters, e.g. Value, Outputs, People, Systems, Suppliers, Organisation, Risks/Issues, Dependencies, Actions
Features
- Single application for Strategy, Change and Operations management
- Integrated MI/BI, visualising real time business performance
- Cascades strategy, links change/ operations/finance
- Manages people’s delivery vs Objectives and Key Results (OKRs)
- Next generation integrated, automated Portfolio, Programme and Project Management
- Integrated, automated RAID management linked to everything else
- Pushes actions at people and creates visibility of progress
- Internal and External dependency statuses and impacts automatically updated
- Manages audit/assurance findings and actions and governance effectiveness.
- Integrated Assurance and Audit Plans
Benefits
- Drive relentless focus on outcomes and actions that deliver them
- Make better, more timely decisions, based on accurate information
- Reduce business complexity and integrate the business
- Gain integrated visibility and control of Portfolios, Programmes and Projects
- Massively reduce PMO effort and cost
- Actively manage risks with automated updates to causes and impacts
- Actively manage RAID, with automated updates to status and impact
- Integrate Agile delivery teams with traditional PMOs
- Enhance governance effectiveness and compliance and drive pro-active management culture
- Stay on top of Strategy Execution, OKRs and performance
Pricing
£39,000 a licence a year
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 8 0 4 9 1 5 1 0 3 3 1 7 9 0
Contact
Experienced Management Consultants Limited
Duncan Hare
Telephone: +44 (0) 20 7084 5760
Email: enquiries@xmcs.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
-
Potential planned maintenance may be performed with at least a week’s notice which could potentially temporarily make the service unavailable for a short while (approximately 1-2 hours)
Any disruption will be limited to UK late night/early morning weekday hours and weekends. - System requirements
- Browser based so there are no specific system requirements
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 24 Hours
- User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- See Service Definition and Pricing documents
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We provide onsite training, on-line training and a separate instruction video for each function.
We also provide a spreadsheet with a list of user information to fill in. We use this to generate the required people records and also to set up the user accounts.
We also have various spreadsheets that can be used to import existing data into our system. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
They can extract the “Node” data that sits in the Graph Database (Neo4j) through an extract to CSV button at any time (not just at the End-of-Contract.
The data that does not sit in the graph database, such as attachments, sits in a Cosmo DB database and this will be provided to users on request at the end-of-contract. - End-of-contract process
- We provide 3 days of free support (included in the price) to help with End-of-Contract data transfer. Additional days can be purchased if required (see rate card)
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- Yes
- Description of customisation
- Users with certain authorisations can customise all of the features provided in the settings menu option. This includes the shape and size of the risk tables that other users will see etc
Scaling
- Independence of resources
- Through a combination of techniques including autoscaling of various backend services and splitting customers into their assigned partitions which do not utilise other partition resources. This way we can monitor and vertically scale based on how specific partitions are performing.
Analytics
- Service usage metrics
- Yes
- Metrics types
- TBD
- Reporting types
- Regular reports
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Through an export CSV button that exists for each data node type (each record type)
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- We provide no specific SLA's by default but may agree them with specific customers on a case by case basis
- Approach to resilience
- Quidita uses well known and established third party cloud service providers with inbuilt resilience.
- Outage reporting
- TBD
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- We limit roles that are able to access our resources on a need-to-know basis based.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
Our Chief Information Security Officer sits on our Board and our Executive Team, ensuring that security matters are represented at those levels.
We have a “Security by Design” approach, based on NIST principles. This ensures that security runs “like a golden thread” through functions relevant to our service such as:
• Identify (including scanning for threats, opportunities and legal and regulatory requirements)
• Risk Management
• Strategy (including product strategy)
• Enterprise Architecture (business and technology)
• Controlled Change
• Operational Management (including of the Services, reporting and governance)
• Financial Management (including reporting and governance)
• Compliance Management - Information security policies and processes
-
Our security policies cover.
• General information security – our over-arching security appetite and posture
• Personnel – how personnel security is expected to contribute to the security of information
• Physical – how physical security is expected to contribute to the security of information
• Access – how users are granted access to applications and data
• Authentication and passwords
• Attack response – how we prepare and respond to malware, phishing, viruses, ransomware and other attacks
• Cloud security policy – How we address security around the cloud-based technologies we use
• Incident response – how we respond to an out-of-normal situation that affects security
• Patching – our process for installing and managing patches
Adherence to these policies is ensured through our NIST based "secure by design" framework which identifies the elements of our services and our business where each aspect impacts security and builds in training, culture, reporting and governance and other controls at each of these.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
We have robust integrated Change, Configuration and Release Control process, in which components of the service are version controlled, Changes are reviewed for their impact on the service and (through review by our security governance processes) on security and releasing is only permitted when clear criteria have been met.
A record of code changes is maintained in a code repository. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Our codebase is monitored by automated services to detect vulnerabilities based on up to date threat intelligence and notify our SOC.
The established third party cloud providers on whom we rely detect vulnerabilities and execute patches to industry standards.
We assess the criticality of the vulnerability and respond promptly on case by case basis. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
We adopt our own mechanisms for identifying, preventing and alerting of potential compromises.
Incidents are responded to promptly on the basis of risk. - Incident management type
- Supplier-defined controls
- Incident management approach
-
We have set of pre-defined processes for common event types.
Users may report incidents through email
Our SOC assesses incidents for severity and they are acted on in accordance with our incident management policy.
Where incidents involve risks relevant to the user we report to them via email.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
At XMCS, we work in an environmentally responsible manner and are continuously looking to find new ways to reduce our carbon footprint and other environmental impacts. Our CEO has masters degree in environmental management and we are committed to:
1. Conducting our operations in compliance with environmental regulations.
2. Integrating environmental considerations and objectives into all our business decisions.
3. Behaving at all times in an environmentally friendly manner.
4. Encouraging awareness among our suppliers, partners, clients and people, of all opportunities to improve environmental protection.
5. Separating and recycling as many materials as is practicable.
6. Working with our clients to think about how their businesses affect the environment and throughout our business, will provide professional advice that is consistent with this aim.
7. Using energy/natural resources in minimal amounts.
8. Encouraging the use of travel options that have a minimal impact on the environment.
This policy is reflected in:
1. Our internal culture, as reinforced through our corporate value statements.
2. Our performance management framework.
3. Our terms of employment.
4. Our supply chain assurance processes and supplier contracts.
As a result we, for example:
1. Decline to work with suppliers who do not share our values in this respect and whose processes do not meet our low carbon standards
2. Actively avoid working for clients who we believe do not work in an environmentally responsible manner
3. Choose low carbon modes of travel
4. Keep our offices at a lower than usual temperatureCovid-19 recovery
XMCS is a small supplier, so has limited scope to make a difference to the Covid-19 recovery. Nevertheless, we look to ensure that, where possible, our supply chain decisions (in terms both of the sub-contractors who help us to deliver our services, and the investments we make in equipment and infrastructure) favour areas of the country most badly affected by Covid.Tackling economic inequality
XMCS is a small supplier, so has limited scope to make a difference to Economic inequality recovery. Nevertheless, we look to ensure that, where possible, our supply chain decisions (in terms both of the partners who help us to deliver our services, and the investments we make in equipment and infrastructure) favour areas of the country or of the world most in need of levelling-up.Equal opportunity
XMCS is an equal opportunities employer and we extend this to our sub-contractors. As such, we operate meritocratically, choosing the right person for each role and making no distinctions between people based on sex, disability, colour, perceived race (“race” being a social construct), sexuality, gender reassignment or any other attribute about which individuals have no choice.
That said, we are alert to the fact that other parts of society do, unfortunately, make such distinctions and treat individuals based on the attributes of a perceived group; and this has led to some individuals being disadvantaged. Where this appears to have been the case, or may have been, we look to make allowances through our meritocratic process by taking account of the additional achievement which the individual may have demonstrated in having to deal with such challenges.Wellbeing
We care passionately about the wellbeing of our people and we extend this to our sub-contractors. We believe that individual wellbeing is fundamental to the wellbeing and cohesion of society and also, of course, to the sustainable delivery of any service. As a result, we are constantly alert to wellbeing issues and take proactive steps to elicit from people their true state of wellbeing and to address any issues which arise. We put wellbeing before profit and have often foregone profit in order to provide individuals with time/space to recover their sense of wellbeing.
We are a prompt payer of sub-contractors and frequently pay small sub-contractors on request and well ahead of any payment due to them, if that helps to alleviate a personal challenge they have told us about.
We have developed our own “wellbeing by design” operating model to ensure that we understand and optimise those aspects of our business that impact people’s wellbeing.
Pricing
- Price
- £39,000 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- No