Rembrace
Procurement Activity Manager
PAM is a Workplan, Project Management and Savings Tracking Service for managing and reporting on Cost Improvement Programmes (CIPs)
Features
- Real-time Savings Tracking
- Interactive Data Analytics
- Web User Interface
- Management Reporting Suite
- Real-time Data Collection
- Project Document Storage
- Secure Multi User Access
Benefits
- Manage CIP Delivery
- Collaborate with multiple organisations on a single platform
- Report cost savings right down to requisition point
- Reduce time/cost of collating, validating and reporting your CIP
- Identify project issues in order to mitigate
- Provide governance and assurance
- Review CIP position in real-time
Pricing
£500 to £3,500 a licence a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at support@rembrace.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
8 4 5 3 7 3 7 6 5 5 0 5 9 6 3
Contact
Rembrace
Ashley Waterman
Telephone: +44 20 3289 2432
Email: support@rembrace.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
-
Real-time Actual Savings Tracking requires an interface with Purchasing
(PO) or Finance (AP) systems. - System requirements
- Web browser e.g. Microsoft Edge or Google Chrome
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Support dependent on Severity Level as set out in SLA.
Urgent queries responded to within 24 hours. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Level 0: Application Support; Includes Hot Fixes and access to all Version Upgrades.
Level 1: 8 hours of developer time for Development, Configuration and
Application Support; Includes Hot Fixes and access to all Version Upgrades.
Level 2: 16 hours of developer time for Development, Configuration and Application Support; Includes Hot Fixes and access to all Version Upgrades.
Level 3: 24 hours of developer time for Development, Configuration and Application Support; Includes Hot Fixes and access to all Version Upgrades. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
We have a standard implementation plan which is used as the basis for all of
our implementations. This can be tailored according to customer
requirements. Initial system training is provided as part of the system
implementation process. Additional training is available either remotely or
onsite as required. The system also includes detailed user documentation
which describes the steps required for setting up and managing projects. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- All data is exported in an agreed CSV file format.
- End-of-contract process
-
The service is licensed per client site and the pricing includes full access to the web platform for a specified number of users as well as a specified number of report licenses.
Additional client sites, user licenses and report licenses will be charged separately as per the contract terms.
At the end of the contract, unless otherwise requested, all customer data is exported in a csv file format and securely returned to the customer for review. We then await confirmation to remove all the customer related data from our server and provide further confirmation once this has been successfully completed.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- Yes
- Description of customisation
-
The service can be customised to include bespoke data items in order to
meet specific customer requirements. This can be completed with support from the providers development team as part of the SaaS agreement.
Scaling
- Independence of resources
- Each organisation license includes a dedicated server. Therefore increased demand from other organisations has no impact on service level. Database services are dynamically scalable to handle an increase in data or system usage.
Analytics
- Service usage metrics
- Yes
- Metrics types
- User login statistics and data access requests to the SQL server database.
- Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
-
Users can export their data from the self-service reporting platform.
Users can also request data exports to be run by the system support team. - Data export formats
-
- CSV
- Other
- Other data export formats
-
- XLS
- XLSX
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- XLS
- XLSX
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
In order to enable the client to do business effectively, the supplier
guarantees that the service will be available for a certain percentage of time:
Guaranteed Uptime 99% Uptime is measured using automated systems,
over each calendar month. It is calculated to the nearest minute, based on the number of minutes in the given month (for instance, a 31-day month
contains 44,640 minutes). If uptime for any item drops below the relevant threshold, a penalty will be applied in the form of a credit for the client. This means the following month’s fee payable by the client will be reduced on a sliding scale. The level of penalty will be calculated depending on the
number of hours for which the service was unavailable, minus the downtime permitted by the SLA: Penalty per hour is 3% of total monthly fee. - Approach to resilience
-
All data is replicated a minimum of three times across multiple hardware
racks to ensure durability and high availability. Data can also be backed up
to a second geographic location. So even in the case of a complete regional
outage or a regional disaster in which the primary location is not recoverable, the data is still durable. - Outage reporting
- Outages are reported via email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Access is controlled across applications using Microsoft built in security
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- CSA CCM version 3.0
- Information security policies and processes
-
Security policies and processes are documented with a named security
officer. We follow a clean desk policy with all documentation stored in locked units. Information is classified according to an appropriate level of
confidentiality, integrity and availability. Staff are trained to handle
documentation according to the information classification. Policy breaches are to be reported and dealt with accordingly. Information policies are reviewed and updated on a regular basis.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
All change requests are managed through a single system with a
standardised change control form. All changes are assessed on their merit and whether they introduce any risk to the integrity or security of the system. Any changes must be approved by a Change Control Board. Changes are then managed through a process tracking log with a named accountable person. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We use Microsoft Azure's integrated vulnerability assessment. Each of our virtual machines on Azure, have this assessment solution installed. Once deployed, the Qualys agent will start reporting vulnerability data to the Qualys management platform, which in turn provides vulnerability and health monitoring data back to Security Center. Users can quickly identify vulnerable VMs from the Security Center dashboard. We use MS Azure Update Management for patch alerts to ensure patches are deployed immediately.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
From Azure Monitor we can now get at-a-glance reporting on the health and
performance of all our cloud resources, from virtual machines to applications to individual lines of codes in the applications. Policies and processes are in place to appropriately manage and respond to incidents detected by Azure Monitor. - Incident management type
- Supplier-defined controls
- Incident management approach
-
All incidents are logged on a central database and all actions and findings
are stored against the incident number. These are then emailed to the
person/persons responsible for managing the incident. We follow the
Incident Model: This includes a sequence of steps and responsibilities;
Timescales for resolution; Escalation procedures; Evidence preservation;
Reporting is done on a regular basis from the central database and provided at Management Meetings for review/learning.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
Recruitment process committed to providing equal opportunity in the workforce.
Pricing
- Price
- £500 to £3,500 a licence a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Service can be accessed and used with standard functionality for a period of 3 months. This does not include any bespoke configuration or interfaces which are required for tracking actual savings in real-time.
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at support@rembrace.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.