Skip to main content

Help us improve the Digital Marketplace - send your feedback

Rembrace

Procurement Activity Manager

PAM is a Workplan, Project Management and Savings Tracking Service for managing and reporting on Cost Improvement Programmes (CIPs)

Features

  • Real-time Savings Tracking
  • Interactive Data Analytics
  • Web User Interface
  • Management Reporting Suite
  • Real-time Data Collection
  • Project Document Storage
  • Secure Multi User Access

Benefits

  • Manage CIP Delivery
  • Collaborate with multiple organisations on a single platform
  • Report cost savings right down to requisition point
  • Reduce time/cost of collating, validating and reporting your CIP
  • Identify project issues in order to mitigate
  • Provide governance and assurance
  • Review CIP position in real-time

Pricing

£500 to £3,500 a licence a month

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at support@rembrace.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

8 4 5 3 7 3 7 6 5 5 0 5 9 6 3

Contact

Rembrace Ashley Waterman
Telephone: +44 20 3289 2432
Email: support@rembrace.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
Real-time Actual Savings Tracking requires an interface with Purchasing
(PO) or Finance (AP) systems.
System requirements
Web browser e.g. Microsoft Edge or Google Chrome

User support

Email or online ticketing support
Email or online ticketing
Support response times
Support dependent on Severity Level as set out in SLA.
Urgent queries responded to within 24 hours.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Level 0: Application Support; Includes Hot Fixes and access to all Version Upgrades.
Level 1: 8 hours of developer time for Development, Configuration and
Application Support; Includes Hot Fixes and access to all Version Upgrades.
Level 2: 16 hours of developer time for Development, Configuration and Application Support; Includes Hot Fixes and access to all Version Upgrades.
Level 3: 24 hours of developer time for Development, Configuration and Application Support; Includes Hot Fixes and access to all Version Upgrades.
Support available to third parties
No

Onboarding and offboarding

Getting started
We have a standard implementation plan which is used as the basis for all of
our implementations. This can be tailored according to customer
requirements. Initial system training is provided as part of the system
implementation process. Additional training is available either remotely or
onsite as required. The system also includes detailed user documentation
which describes the steps required for setting up and managing projects.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
All data is exported in an agreed CSV file format.
End-of-contract process
The service is licensed per client site and the pricing includes full access to the web platform for a specified number of users as well as a specified number of report licenses.
Additional client sites, user licenses and report licenses will be charged separately as per the contract terms.

At the end of the contract, unless otherwise requested, all customer data is exported in a csv file format and securely returned to the customer for review. We then await confirmation to remove all the customer related data from our server and provide further confirmation once this has been successfully completed.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
No
Service interface
No
User support accessibility
None or don’t know
API
No
Customisation available
Yes
Description of customisation
The service can be customised to include bespoke data items in order to
meet specific customer requirements. This can be completed with support from the providers development team as part of the SaaS agreement.

Scaling

Independence of resources
Each organisation license includes a dedicated server. Therefore increased demand from other organisations has no impact on service level. Database services are dynamically scalable to handle an increase in data or system usage.

Analytics

Service usage metrics
Yes
Metrics types
User login statistics and data access requests to the SQL server database.
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Users can export their data from the self-service reporting platform.
Users can also request data exports to be run by the system support team.
Data export formats
  • CSV
  • Other
Other data export formats
  • XLS
  • XLSX
Data import formats
  • CSV
  • Other
Other data import formats
  • XLS
  • XLSX

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
In order to enable the client to do business effectively, the supplier
guarantees that the service will be available for a certain percentage of time:
Guaranteed Uptime 99% Uptime is measured using automated systems,
over each calendar month. It is calculated to the nearest minute, based on the number of minutes in the given month (for instance, a 31-day month
contains 44,640 minutes). If uptime for any item drops below the relevant threshold, a penalty will be applied in the form of a credit for the client. This means the following month’s fee payable by the client will be reduced on a sliding scale. The level of penalty will be calculated depending on the
number of hours for which the service was unavailable, minus the downtime permitted by the SLA: Penalty per hour is 3% of total monthly fee.
Approach to resilience
All data is replicated a minimum of three times across multiple hardware
racks to ensure durability and high availability. Data can also be backed up
to a second geographic location. So even in the case of a complete regional
outage or a regional disaster in which the primary location is not recoverable, the data is still durable.
Outage reporting
Outages are reported via email alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Access is controlled across applications using Microsoft built in security
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
CSA CCM version 3.0
Information security policies and processes
Security policies and processes are documented with a named security
officer. We follow a clean desk policy with all documentation stored in locked units. Information is classified according to an appropriate level of
confidentiality, integrity and availability. Staff are trained to handle
documentation according to the information classification. Policy breaches are to be reported and dealt with accordingly. Information policies are reviewed and updated on a regular basis.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All change requests are managed through a single system with a
standardised change control form. All changes are assessed on their merit and whether they introduce any risk to the integrity or security of the system. Any changes must be approved by a Change Control Board. Changes are then managed through a process tracking log with a named accountable person.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We use Microsoft Azure's integrated vulnerability assessment. Each of our virtual machines on Azure, have this assessment solution installed. Once deployed, the Qualys agent will start reporting vulnerability data to the Qualys management platform, which in turn provides vulnerability and health monitoring data back to Security Center. Users can quickly identify vulnerable VMs from the Security Center dashboard. We use MS Azure Update Management for patch alerts to ensure patches are deployed immediately.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
From Azure Monitor we can now get at-a-glance reporting on the health and
performance of all our cloud resources, from virtual machines to applications to individual lines of codes in the applications. Policies and processes are in place to appropriately manage and respond to incidents detected by Azure Monitor.
Incident management type
Supplier-defined controls
Incident management approach
All incidents are logged on a central database and all actions and findings
are stored against the incident number. These are then emailed to the
person/persons responsible for managing the incident. We follow the
Incident Model: This includes a sequence of steps and responsibilities;
Timescales for resolution; Escalation procedures; Evidence preservation;
Reporting is done on a regular basis from the central database and provided at Management Meetings for review/learning.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Equal opportunity

Equal opportunity

Recruitment process committed to providing equal opportunity in the workforce.

Pricing

Price
£500 to £3,500 a licence a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Service can be accessed and used with standard functionality for a period of 3 months. This does not include any bespoke configuration or interfaces which are required for tracking actual savings in real-time.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at support@rembrace.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.