Enterprise Risk Management and Portfolio Analysis application (ERM)
riskHive Enterprise Risk Manager® is a secure private-cloud risk database that supports all your risk management needs and is fully configurable to meet the changing requirements of your risk management journey.
riskHive ERM supports the management of risk, opportunity, actions, controls, issues, dependencies, BIA, assumptions, benefits and modelling.
Features
- Simple but incredibly capable and powerful - novices to experts
- Highly configurable interface that you define rather than 'defines you'
- Provides aggregation presents your whole 'risk universe' in one place
- Interactive graphical interfaces like Bow-Ties and Heatmaps
- Monte Carlo Simulation and Analysis for Cost, Schedule and Combined
- Alignment with ISO 31000 and other industry standards
- Policy Groups based security with highly configurable access controls
- Highly scalable licencing model
- Integration with riskHive Agile GRC products (Governance & Compliance)
- Fast and simple drag-n-drop import of existing data
Benefits
- Implements collaborative risk management working environment
- Accessible on any device that supports browser internet access
- Saves hundreds or thousands of hours vs using traditional spreadsheets
- Generate consistent reports and outputs at a mouse-click
- Consolidation of projects into programmes and portfolios
- Instant search, filter and locate across entire portfolio
- Simplify identification of duplicates and commonality
- Consolidates data from multiple sources into Single Version of Truth
- Assists identification and recovery of unspent risk allocations
- Implementation can significantly reduce insurance premiums
Pricing
£2,859.98 to £14,634.19 an instance a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 8 8 1 3 0 6 1 4 7 0 9 3 0 7
Contact
riskHive Software Solutions Ltd
Sandu Hellings
Telephone: 01275545874
Email: sandu.hellings@riskhive.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- There will be planned maintenance arrangements but these will be pre-agreed with customer and are generally outside of normal working hours.
- System requirements
- Internet access to the cloud solution via a browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Usually within 15 minutes but 1 hour is our max target time to respond.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 A
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 A
- Web chat accessibility testing
- None - reply on using third-party applications that have WCAG compliance.
- Onsite support
- Yes, at extra cost
- Support levels
-
1) Standard Support: This is included in the basic fee. It provides application technical support by ticket-system, email, chat or telephone during UK business hours (0900-1730) 5 days a week guaranteed and on weekends. This support is covered by the SLAs in our contract and is valid whilst in-contract.
COST £ included.
2) Enhanced Customer Aftercare and Database Administration Support: This is available where the client does not have the confidence or the resources to administer and operate the system themselves.
COST: £5,750 pcm.
We provide both technical account manager and cloud/system support engineer. Both are directly available to the assigned client within normal UK business hours by ticket, email, chat or telephone. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We provide online or on-site training, quick-start videos on-demand, PowerPoint slides and bespoke courses.
System Administrator training is included within the initial system setup and configuration fee. - Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
-
- Word
- Video
- End-of-contract data extraction
- Data may be extracted to various formats (including XML and Excel) or archived at any time by an authorised system administrator. This is a system command and is very quick and simple to do. It is encouraged.
- End-of-contract process
- At the end of the contract the system is retained for three months such that it may be accessed by authorised users to extract data or information and to generate system archive files. After this time the system image is destroyed.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Dependent on screen size the view may be reduced slightly.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 A
- Description of service interface
- There is an automatable configurable JSON service interface to facilitate the controlled sharing of system information.
- Accessibility standards
- WCAG 2.1 A
- Accessibility testing
- None.
- API
- Yes
- What users can and can't do using the API
- The API is outbound only to JSON files which may be used to provide data to third-party systems such as PowerBI. All configuration and scheduling of outputs are done from within the application by the end user.
- API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Pretty much anything can be customised (configured by the customer) including data fields, views, reports, lists, colours, schema and structures to match the required client framework. The riskHive ERM solution is currently the most configurable solution of its type on the market.
Scaling
- Independence of resources
-
1) Each customer is on a single-tenant platform so unaffected by other clients.
2) We monitor performance and increase system resources as necessary dependent on user or system activity.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We provide live access to user metrics to authorised system users. This includes things like access (attempts and successful logins), activity type and duration.
- Reporting types
-
- API access
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Data can be exported by a user with appropriate privileges to various formats including XML, JSON, Excel, Office formats and PDF. This is quick and simple to do and is a primary system capability. Users can only export the data to which they have been granted access.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- Excel (Office formats)
- JSON
- XML
- Data import formats
-
- CSV
- Other
- Other data import formats
- Excel
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Uptime of 99.5% (excluding planned maintenance and upgrades).
Actual measured uptime across systems averaged 99.89% in 2021.
Users are refunded pro-rata based on the percentage of on-availability over the period e.g. 10% additional downtime over SLA (88.5%) would trigger a 10% refund for that period. - Approach to resilience
- This and other security and architecture information is available upon request. The system is designed from the ground-up to be inherently secure, resilient and scalable.
- Outage reporting
-
1) a public dashboard - 1 minute monitor with automated alert function (requires a login to be assigned to the customer in order to access service)
2) email alerts
3) telephone alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- The system has a user (admin) configurable data access model to control which groups or individual users have access to which information. Access may be restricted in both breadth and depth within the data cube. It is possible to restrict and segregate data in supply chain and client third-party collaborators. Support resource must be UK security cleared to gain access to full systems. Lower-level (IT support) does not have access to client data.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users receive audit information on a regular basis
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Lloyd's Register Quality Assurance Limited
- ISO/IEC 27001 accreditation date
- 8/5/2021
- What the ISO/IEC 27001 doesn’t cover
- All delivery and data hosting is covered. Development is not covered as there is no client data involved in development activities and non of the client hosting platforms are used in development.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- Yes
- CSA STAR accreditation date
- 10/28/2016
- CSA STAR certification level
- Level 1: CSA STAR Self-Assessment
- What the CSA STAR doesn’t cover
- Development - there are no third-parties involved.
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- Safer Payments
- PCI DSS accreditation date
- 28/6/2021
- What the PCI DSS doesn’t cover
- N/a
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- CAIQ accreditation
- DART
- CYDR
- JOSCAR
- Picasso
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- ISO/IEC 27001
- Information security policies and processes
-
1) Data Protection Policy
2) Information Security Policy
3) Business Continuity Management Policy
4) CAIQ
The Managing Director is responsible for:
• Reviewing, endorsing, and achieving the policy’s aims.
• Ensuring ongoing compliance to this policy and is the responsible person for Data Protection.
riskHive employees are responsible for:
• Carrying out their work in line with policies and associated procedures.
• Identifying any breaches of policies and reporting them to the appointed Data Protection Officer.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- CAIQ: All features and major changes are subject to technical review before implementation, including assessment of security impact. All changes are tested prior to release and tracked in source control. As part of ongoing architectural stability and security evaluation, which takes place at both ad-hoc and at milestone releases, libraries and features are evaluated for new and changed capabilities, including threats, and activities are added to the development plan to manage these. New and updated features are assessed for impact on existing deployments and either offer progressive enhancement (supporting both old and new functionality) or automated migration.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- CAIQ: Potential vulnerabilities are identified by regular pentesting, ad-hoc external security evaluation, and ongoing awareness of threat reports for technologies in use. Potential vulnerabilities are logged to our vulnerability record and then formally assessed for impact. Depending on the assessed impact, mitigation actions are taken and included either in a security hotfix, released as soon as possible, or as part of the next version, released approximately quarterly. Mitigation actions and post-mitigation impact are added to the vulnerability record.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Security events, including new application sessions, authentication successes and failures, potential session abuses, and more along with pertinent security details (e.g. IP address, browser details, activity, route, etc) are automatically logged and visible to application administrators. Threats are highlighted in the log for easy identification. Security events are reviewed ad-hoc and recent events are reviewed as part of regular system maintenance. Reports of potential issues are evaluated against the application log and cross-referenced with the logs captured by the operating system (e.g. from IIS) to assess impact and then managed as part of our formal data & system protection process.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
CAIQ: We have a formal Incident Management Procedure which describes how events are identified, logged, validated, assigned, managed through to closure, and reported. This also covers lessons-learned.
We use a formal ticket system to manage responses to incidents.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- Public Services Network (PSN)
- Police National Network (PNN)
- Joint Academic Network (JANET)
- Health and Social Care Network (HSCN)
- Other
- Other public sector networks
- RLI
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
riskHive ERM is the only risk tool to feature impact scoring and analysis for multiple ESG aspects such as Carbon types, power, emissions, effluent, etc. This facilitates the modelling, simulation and analysis of, for instance, cost vs carbon scenario analysis for the project, programme or the whole organisation in line with current Cabinet Office and MPA guidelines and direction of travel.
Pricing
- Price
- £2,859.98 to £14,634.19 an instance a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Full working version time limited to 30 days on request .