Ruby
Procleus helps establish a common process, language and ways of working. It features intelligent workflow tools including Capella to create breakthrough category strategies, and Ruby to enable guided negotiation planning. Plus plus digital learning, procurement toolkits and assessments. Procleus is modular and customizable, with optional third-party software integration.
Features
- Real time reporting
- Remote access
- Artificial Intelligence
- Document Output
- Streamed Video
- Online form entry
- Editable templates
- Extensive User Management
- Push Pull email communication
Benefits
- Just in Time learning
- Brand Personalisation
- Mobile first
- Configurable modules in ecosystem
- Guided Advanced strategy creations
- Strategic contributor to business sucess
- Streamline complex processes
- Collaboration
- Portable templates
Pricing
£150 to £1,800 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 0 2 1 8 0 3 4 6 4 0 8 6 8 6
Contact
Positive Purchasing Ltd
Business Development team
Telephone: 033 00 94 0000
Email: team@positivepurchasing.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- No
- System requirements
-
- Up to date - Web Browser
- Good internet bandwidth
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- As per contractual SLA
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- None
- Onsite support
- No
- Support levels
-
We provide SLA according to client requirement contract at no charge.
all online, phone and technical account management is included in the cost of the contract.
Clients will have a technical account manager available to them. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Online training and user documentation
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Based on agreed contract terms we extract date for client and send in appropriate formats
- End-of-contract process
- The contract covers onboarding, lifespan of use and offboarding, no additional costs are attributed to use unless further licences of functionalities wish to be included mid contract
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- UX and UI mobile first principles have been employed
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- Web Browser
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- We have worked closely with central government organisation during testing and we have also employed accessibility auditors.
- API
- Yes
- What users can and can't do using the API
- No external facing APIs but we can develop APIs for our clients as needed.
- API documentation
- No
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Look and feel (UX, UI), they can also customise branding across the site and customised workflow processes.
Mix and Match product requirements
Add links to own content and other third party providers
Scaling
- Independence of resources
- Individual instances on wall gardened Virtual Machine instances on scalable Azure cloud
Analytics
- Service usage metrics
- Yes
- Metrics types
- Full and extensive individual usage and tracked training completion
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
Direct download by PDF and CSV.
At organisation client level we provide the data export as a CSV file. - Data export formats
-
- CSV
- ODF
- Data import formats
-
- CSV
- ODF
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
SLAs are agreed at contract but we do have a SLA document we share with clients to agree (this can be provided on request). If we do not meet the SLAs we have the below remedies:
• Service Availability credit - For every 0.5% below the required 98% Service Availability requirement based on the definition in contract
• Data Backups - for every missed data backup. - Approach to resilience
- Available on request. Using well established cloud data centres that serve governments.
- Outage reporting
- Email Alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
-
A range of approaches can be used:
Unique username and password
Rights permissioning
Restrict IP access point - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- British Assessment Bureau
- ISO/IEC 27001 accreditation date
- 26/05/2023
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- Qualys
- PCI DSS accreditation date
- 05/03/2024
- What the PCI DSS doesn’t cover
- N/A
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Full set of ISO 27001 policies and processes - proof of documentation available upon request.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
ISO27001 aligned software development review and testing procedure.
ISO9001 Change request procedure - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
ISO27001 procedures
Threat, risk information comes from Microsoft and a variety of online forums. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
ISO27001 procedure
Documents available upon request - Incident management type
- Supplier-defined controls
- Incident management approach
-
ISO27001 incident management approach followed.
Documentation available upon request
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
A Member of staff is dedicated to baselining our CO2e to set targets for 2023 Net Zero ambition.Tackling economic inequality
We employ locally and source local suppliers wherever possible and work collaboratively with our suppliers to help create resilience within the local community.
We have also worked closely with local chamber of commerce.Equal opportunity
We ensure that our hiring process is fair for all, taking into consideration all specific needs an individual has and we ensure our office is accessible.
We have utilising the apprenticeship scheme and we are looking at supporting locally by using T Levels.Wellbeing
Regular staff wellbeing survey that is reported at management level.
staff events throughout the year that range from breakfast with the team to large parties with all associates and suppliers invited and outdoor activities and simple day to day benefits such as tea, coffee, celebration of milestones for staff such as birthdays,
Pricing
- Price
- £150 to £1,800 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Full access on a time limited 2 week period