Skip to main content

Help us improve the Digital Marketplace - send your feedback

Ve3 Global Ltd

VE3 ServiceNow – ServiceNow Licencing Partner

VE3s Certified ServiceNow Professionals have the skills to advise you on your ServiceNow licencing requirements quickly and effectively to drive maximum value from your investment and accelerating your time to value through the power of our ecosystem in the solutions we create. We lead with an independent point of view.

Features

  • Platform as a Service
  • Customer and Industry Workflows
  • Solution Architecture and guidance on licence optimisation
  • ServiceNow Licences
  • Real-Time Reporting of licence usage
  • Ability to negotiate competitive discounts to published licence subscription price

Benefits

  • Licence Purchasing and delivery under one contract
  • Cost-Effective ServiceNow Licencing Service
  • Competitive pricing and discounts
  • Licence negotiation managed by Accenture
  • Annual renewal management

Pricing

£175 to £850 a unit

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at prime@ve3.global. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

8 5 3 5 7 1 3 2 7 1 4 0 8 9 9

Contact

Ve3 Global Ltd Nikhil Alex
Telephone: 02045520840
Email: prime@ve3.global

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
Yes, SLA Definitions
System requirements
  • Browser
  • Mobile

User support

Email or online ticketing support
Yes, at extra cost
Support response times
To some extent this depends upon the nature of the question and what it relates to, if you phone our technical support teams you will get an response there and then. The average wait time when phoning is 20 seconds before one of our technical support teams picks up the phone.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Customer Support uses the ServiceNow Incident Management application to manage issues and product defects based on incident priority.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide a variety of implementation and training options to suit all types of users and requirements. Further details are available on request.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
The process for the return of data follows: 1) ServiceNow exports the entire database in a MySQL format. 2) ServiceNow provides the customer a set of instructions on how to import the data on the customer's side. 3) The customer can FTP the files from ServiceNow to their site. Customers are permitted to store data hosted within ServiceNow for the duration of their service subscription with ServiceNow. Under this model, the customer can purge or retain data according to their own retention policy. ServiceNow retains customer data for up to 45 days from the end of a contract. Within the 45 days, the customer can request their data to be sent to them in a standard database export format. After 45 days, all data from the customer instances is removed from ServiceNow servers
End-of-contract process
ServiceNow has several options for an exit management plan. At least thirty (30) days prior to either the expiration of the Subscription Term (where the customer elects not to renew) or in connection with the termination by the customer of the Subscription Service in accordance with ServiceNow's General Terms and Conditions, the customer may purchase the following services: (i) one (1) extension of the Subscription Service for up to six (6) months ("Transition Subscription Service"); and (ii) Professional Services. The customer pays in advance for the Transition Subscription Service at the monthly subscription fee rate charged to the customer in the expiring Order Form plus an additional ten percent (10%). The customer pre-pays for any Professional Services ordered during the transition period plus verifiable travel and expenses. The parties sign a mutually agreed upon Order Form setting forth the fees and purchased Subscription Service and Professional Services prior to the commencement of any Transition Subscription Service or Professional Services. ServiceNow can provide customer data in its standard database export format.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
You can access your ServiceNow instance from a web browser on your desktop or mobile device or from the native mobile app. The mobile UI varies depending on your device, whether you are accessing your instance from the native app or from a mobile browser, and depending on the way your administrator configured the mobile UI for your company. Most of the functionality is available as per the desktop browser, but some of the graphics will be available.
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
O make the interface accessible to users with disabilities, ServiceNow includes features that support several specifications in the Web Content Accessibility Guidelines (WCAG) 2.0. ServiceNow® products are developed with the goal of adhering to the accessibility guidelines and principles which are set by the Section 508 Amendment to the Rehabilitation Act of 1973 and the Web Content Accessibility Guidelines (WCAG) 2.0 Level A.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
The assistive technologies JAWS, NVDA, and VoiceOver are used to test ServiceNow products. The Madrid Web Content Accessibility Guidelines (WCAG) 2.0 document describes accessibility features and limitations. Web Content Accessibility Guidelines (WCAG) 2.0. This page details the level of accessibility support for the Madrid release, according to the Web Content Accessibility Guidelines (WCAG) 2.0
API
Yes
What users can and can't do using the API
Nbound web services, such as the REST API, allow you to interact with ServiceNow instance data using web service requests. ServiceNow outbound REST functionality allows you to retrieve, create, update, or delete data on a web services server that supports the REST architecture. ServiceNow integrates with many third-party applications and data sources. A variety of techniques can be used, most notably Web Services, JDBC, LDAP, Excel, CSV, and Email, as well as any industry-standard technologies that use REST, SOAP or WSDL. With the correct permissions users can use these API's to bring data in and out of ServiceNow. Users who create these tend to be power users or Admin users.
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Users with the appropriate roles can configure various aspects of lists or forms. Configuration changes apply to all users.
With list configuration, you can add, remove, and reorder list columns. You can configure calculations to appear under columns. You can also hide controls and define access conditions by role for existing list controls. Users can also personalise lists which will not affect what other see.
Users can create their own reports and dashboards also with the correct permissions.
Forms can be configured as well, this includes the ability to configure a form to show or hide fields from a view. You can even create new fields on the table that is associated with the form, and put business rules, UI policies around them as well as define the data dictionary for the fields. With a runtime license you also have the ability to create new business applications in ServiceNow

Scaling

Independence of resources
ServiceNow’s data-centers/Cloud-based infrastructure are designed to be highly available. Servers/network devices have redundant components and multiple network paths to avoid single points of failure.
Customer application instances are supported by multi-homed network configuration with multiple connections to the Internet. Production application servers are load balanced within each data center. Production database servers are replicated in near-real-time to a peer data-center within the same geographic region.
ServiceNow employs a range of detective controls to monitor/prevent potential DDoSattacks from impacting the private Cloud environment.
Through ServiceNow’s unique, multi-instance architecture, Advanced High Availability meets and exceeds stringent requirements surrounding data sovereignty, availability/performance.

Analytics

Service usage metrics
Yes
Metrics types
System Usage modules track usage for ServiceNow applications and ServiceNow Store apps.
Usage analytics processes collect data on all instances and updates reports in Usage Overview and ServiceNow Store Usage Overview modules. Application usage data is collected when applications are opened, and counts on tables, collected once a day. Data is collected on:
-Number of active users in the system
-Hardware CIs discovered (for instances that use Discovery)
-Number of Cloud management service catalog items available to users in instances that use Cloud Management
-All users with the admin role can view Usage Overview and ServiceNow Store Usage Overview reports
Reporting types
Real-time dashboards

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Other
Other data at rest protection approach
ServiceNow provides two types of encryption for data at rest upon customer request.
•Column encryption of customer added fields and attachments: Provides data encryption using AES128/256 or 3DES symmetric key encryption. The customer provides keys for encryption. Data stored in these fields cannot be searched or reported on.
More details available on request
•Full disk encryption:Provided via self-encrypting hard drives with AES256 bit encryption. This capability is only available through purchase of dedicated ServiceNow hardware at additional cost. This delivers “at-rest” protection only and focuses solely on preventing data exposure through the loss/theft of hard disks holding customer data
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
ErviceNow offers administrators/users to export data:
-Form export:Export records from user interface. Choose export format (PDF/XML) directly.
-List export:Export records from user interface. Choose export format (CSV/Excel/PDF/ XML) directly.
-Scheduled export with reports:Automatically export multiple records from a table on a set schedule. Create a scheduled job to regularly export data as a report.
-Direct URL access:Export records from tables using a ServiceNow processor (CSV, Excel, PDF, or XML). Specify table form/list you want to export.
-Web services/SOAP: Export records when an external client makes web-services request. Create external application/process to automate data retrieval from an instance via web services/SOAP.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
Via REST / SOAP
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
Via REST / SOAP

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
Other
Other protection within supplier network
ServiceNow’s private cloud is a highly standardised environment from the identically configured cages in the data centers through to the consistent logical infrastructure. This private cloud is home to just ServiceNow, limiting the private cloud’s footprint to only those technologies required to support this service. This allows for highly restricted networking rule sets regarding ingress and egress requirements and facilitates the ability for hardened systems, only allowing for the small number of necessary services, protocols and ports to be enabled.

Availability and resilience

Guaranteed availability
ServiceNow provides 99.8% availability (calculated monthly) for production instances. This design includes redundancy and fault tolerance of the entire ServiceNow application and platform stack, including electrical, cooling, network, security, and server infrastructure. Over the last 3 years (2014-2016), we have averaged 99.995% availability and have not fallen below 99.8% (contract SLA) in any quarter. In 2016 we averaged 99.996% and did not fall below 99.8% in any quarter.
Approach to resilience
ServiceNow’s data centers are arranged in pairs. All customer production data is stored in both data centers and kept in sync using asynchronous database replication. Both data centers are active at all times, each with the ability to support the combined production load of the pair. A production instance from one customer may be operating out of one data center in the pair and a production instance of another customer from the other.
More details available on request
ServiceNow maintains continuous, asynchronous replication from the database in the current primary data center (read-write) to the secondary data center (read-only). To transfer a customer instance from a primary data center to a secondary, ServiceNow designates the secondary to be the primary and the primary to be the secondary if it still exists.
ServiceNow’s data centers and cloud-based infrastructure have been designed to be highly available. All servers and network devices have redundant components and multiple diverse network paths to avoid single points of failure.
Outage reporting
ServiceNow have a customer portal where all requests, changes and incidents can be logged. Customers also now have complete transparency into the real availability of their production and non-production instances. Users can view the impact severity of issues and even drill into incident records to view details for problems. It is this level of transparency that further sets ServiceNow apart.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
By User Access control lists and Groups and user roles
All ServiceNow staff are placed into Groups and have a user role, these groups and roles have access rights attached to them. Any personal that try to access an interface will have their group membership and user role checked and if they do not belong to the user role and group that is required to access that particular interface then access will be denied.
Access restriction testing frequency
At least every 6 months
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Staunchly Management and system service limited
ISO/IEC 27001 accreditation date
06/01/2024
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
  • ISO 9000-1
  • ISO 20000-1
  • ISO 14000-1
  • ISO 22301

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
ISO 27001
SSAE 16 SOC 1 Type 1
SSAE 16 SOC 1 Type 2
SSAE 16 SOC 2 Type 1
FISMA
FedRAMP
FDA Quality Management System
Safe Harbor
More details available on request

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
ServiceNow has a formally documented change management process that uses an internal ServiceNow instance to track change requests and approvals. All changes to production environments must go through the change management process. Change requests must include the change procedure, risk, and back out plans. Change requests are reviewed and approved by the Change Advisory Board (CAB). All assets are tagged and tracked though the ServiceNow CMDB.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
ServiceNow's Infrastructure stack is customised at each layer to specifically support the only application residing in the ServiceNow private cloud. With each published patch, ServiceNow follows a risk-based approach to determine if the patch is to be deployed. Once it is determined that a patch needs to be deployed, the process then follows the Change Management process to identify the assets, the risk and potential impact to the environment, the testing process as well as the timeline for deployment. ServiceNow leverages the Advanced High Availability architecture to transfer customers' production instances to the other data center when performing maintenance.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
ServiceNow has an implementation of Sourefire for IDS and Splunk for SIEM. The IDS system monitors inbound traffic in the DMZ. Splunk does log collection on network devices, IDS and servers used to support customer information. These systems are monitored with both proactive alerting and regular log files reviews. Events are responded to within 24 hours
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
ServiceNow has a formal documented Security Incident Response policy, process and workflow which aligns with NIST 800-61. ServiceNow Incident Response process includes event discovery, triage, escalation, notification (including customer notification) remediation, and post-mortem review.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Our G-Cloud service provision is deeply committed to fighting climate change, recognizing the urgent need for collective action to address environmental challenges. Here's how our services deliver against this social value theme:

Environmental Sustainability in Operations:

We prioritize running efficient operations to reduce emissions and minimize environmental impacts. This includes implementing energy-efficient practices, optimizing resource usage, and adopting renewable energy sources wherever possible within our data centers and infrastructure.

Promoting Sustainable Practices:

VE3 actively engages with our suppliers and clients to promote sustainable business practices. Through our services, we advocate for the adoption of environmentally friendly technologies, responsible sourcing, and waste reduction strategies, thereby reducing carbon footprints across the supply chain.

Responsible by Design Framework:

Our G-Cloud services adhere to a 'Responsible by Design' framework, ensuring that environmental considerations are integrated into the development and deployment of digital solutions. By prioritizing environmental protection and minimizing negative impacts, we strive to deliver sustainable outcomes for our clients.

Training and Education:

VE3 invests in training and education programs focused on environmental sustainability. Through initiatives like the Sustainability Quotient (SQ) training, we equip our teams with the knowledge and skills to adopt climate-smart behaviors and implement environmentally conscious practices in their work.

Community Engagement:

We actively engage with communities to support environmental objectives and promote climate action. By partnering with local organizations and stakeholders, we contribute to initiatives aimed at addressing climate change, such as tree planting programs, clean energy projects, and environmental education campaigns.

Covid-19 recovery

Our G-Cloud service provision plays a crucial role in supporting the COVID-19 recovery effort by facilitating resilience, adaptation, and innovation in the face of unprecedented challenges. Here's how our services contribute to the recovery process:

Remote Work Enablement:

VE3's digital solutions empower organizations to transition to remote work seamlessly. By providing secure and reliable cloud-based infrastructure, collaboration tools, and remote access solutions, we enable businesses to maintain productivity while ensuring the safety and well-being of their employees.

Business Continuity Planning:

We assist organizations in developing and implementing robust business continuity plans to mitigate disruptions caused by the pandemic. Our services include data backup and recovery solutions, disaster recovery planning, and resilience testing to ensure operational continuity in the face of unforeseen events.

Digital Transformation Acceleration:

VE3 accelerates digital transformation initiatives to help organizations adapt to the new normal. By modernizing legacy systems, implementing cloud-based technologies, and digitizing processes, we enable businesses to optimize efficiency, improve agility, and remain competitive in a rapidly evolving landscape.

Healthcare Support Solutions:

We provide specialized healthcare support solutions to assist frontline workers and healthcare organizations in responding to the COVID-19 crisis. This includes telemedicine platforms, patient management systems, and data analytics tools to enhance patient care, streamline operations, and support decision-making processes.

Economic Stimulus through Innovation:

VE3 fosters innovation and entrepreneurship to stimulate economic recovery in the aftermath of the pandemic. Through our G-Cloud services, we support startups, small businesses, and enterprises in developing and deploying innovative solutions that address emerging challenges, create new opportunities, and drive economic growth.

Tackling economic inequality

We recognize the importance of tackling economic inequality and are committed to leveraging our G-Cloud service provision to address this pressing social issue. Here's how our services contribute to tackling economic inequality:

Access to Affordable Technology:

We strive to make cutting-edge technology accessible and affordable to all, regardless of economic status. By offering scalable and cost-effective cloud-based solutions, we enable organizations, including small and medium-sized enterprises (SMEs) and underserved communities, to access the tools and resources they need to compete in the digital economy.

Skills Development and Training:

VE3 invests in skills development and training programs to empower individuals with the knowledge and expertise needed to thrive in the digital age. Through initiatives like online courses, certifications, and workshops, we equip people from diverse backgrounds with the skills required for high-demand roles in technology and innovation, thereby enhancing their employability and economic prospects.

Support for Minority-Owned Businesses:

We actively support minority-owned businesses and entrepreneurs by providing access to mentorship, networking opportunities, and resources to help them grow and succeed. Through initiatives like supplier diversity programs and partnerships with minority business organizations, we promote inclusion and diversity in the technology sector and contribute to creating more equitable economic opportunities.

Digital Inclusion Initiatives:

VE3 is committed to promoting digital inclusion and bridging the digital divide by ensuring that everyone has access to essential digital services and technologies. We collaborate with governments, nonprofits, and community organizations to implement initiatives such as digital literacy programs, affordable internet access schemes, and community technology centers, thereby empowering underserved populations and promoting economic equity.

Fair and Transparent Procurement Practices:

We adhere to fair and transparent procurement practices to create opportunities for businesses of all sizes and backgrounds to participate in government contracts and procurement processes.

Equal opportunity

We recognize the importance of tackling economic inequality and are committed to leveraging our G-Cloud service provision to address this pressing social issue. Here's how our services contribute to tackling economic inequality:

Access to Affordable Technology:

We strive to make cutting-edge technology accessible and affordable to all, regardless of economic status. By offering scalable and cost-effective cloud-based solutions, we enable organizations, including small and medium-sized enterprises (SMEs) and underserved communities, to access the tools and resources they need to compete in the digital economy.

Skills Development and Training:

VE3 invests in skills development and training programs to empower individuals with the knowledge and expertise needed to thrive in the digital age. Through initiatives like online courses, certifications, and workshops, we equip people from diverse backgrounds with the skills required for high-demand roles in technology and innovation, thereby enhancing their employability and economic prospects.

Support for Minority-Owned Businesses:

We actively support minority-owned businesses and entrepreneurs by providing access to mentorship, networking opportunities, and resources to help them grow and succeed. Through initiatives like supplier diversity programs and partnerships with minority business organizations, we promote inclusion and diversity in the technology sector and contribute to creating more equitable economic opportunities.

Digital Inclusion Initiatives:

VE3 is committed to promoting digital inclusion and bridging the digital divide by ensuring that everyone has access to essential digital services and technologies. We collaborate with governments, nonprofits, and community organizations to implement initiatives such as digital literacy programs, affordable internet access schemes, and community technology centers, thereby empowering underserved populations and promoting economic equity.

Fair and Transparent Procurement Practices:

We adhere to fair and transparent procurement practices to create opportunities for businesses of all sizes and backgrounds to participate in government contracts and procurement processes.

Wellbeing

Environmental Sustainability: We are committed to environmental sustainability as a core component of wellbeing. By prioritizing eco-friendly practices, resource conservation, and carbon reduction efforts in our operations and services, we contribute to creating a healthier and more sustainable environment. We prioritize the wellbeing of individuals and communities in all aspects of our G-Cloud service provision.

User-Centric Design: VE3 designs our G-Cloud services with a user-centric approach, prioritizing usability, accessibility, and intuitive design. By focusing on the needs and preferences of users, we create digital experiences that enhance overall wellbeing by reducing frustration, stress, and cognitive load.

Health and Safety Protocols: We implement robust health and safety protocols to protect the wellbeing of employees, clients, and partners. This includes adherence to strict security standards, data privacy regulations, and compliance with industry best practices to ensure the safety and integrity of our digital infrastructure and services. Promotion of Work-Life

Balance: VE3 recognizes the importance of work-life balance in maintaining overall wellbeing. Through our G-Cloud services, we enable remote work, flexible scheduling, and collaboration tools that empower individuals to achieve a healthy balance between their professional and personal lives, leading to greater job satisfaction and wellbeing.

Mental Health Support: We prioritize mental health support for our employees and clients by offering resources, programs, and initiatives aimed at promoting mental wellbeing. This includes access to counseling services, mindfulness training, stress management workshops, and employee assistance programs designed to support individuals in times of need. Community

Engagement and Social Impact: VE3 actively engages with communities to address social determinants of health and promote holistic wellbeing. Through partnerships, philanthropic initiatives, and volunteer efforts, we support local organizations and projects focused on improving access to healthcare, education, housing, and other essential services that contribute to overall community wellbeing.

Pricing

Price
£175 to £850 a unit
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at prime@ve3.global. Tell them what format you need. It will help if you say what assistive technology you use.