SSE Enterprise Energy Solutions

Global Tool (Diary management)

Platform is used to make parameter adjustments to your building assets, minimising control drift and reducing energy wastage.
Adjustments can be made to either standard time programs or exceptions, to multiple buildings and data points as a single command.
Can be used for bank holiday switching and non-standard switching requirement.

Features

  • Cloud managed application
  • Role based user access
  • Tagging engine
  • Multi-vendor capability
  • Remote building data interface
  • Job type scheduling engine
  • Job execution reports
  • Equipment and object based filter capability
  • Object setting or monitoring capability
  • Audit logs

Benefits

  • Application configuration accessible via the web
  • User access via roles and permissions
  • Data point normalisation done using tagging
  • Supports a large range of control systems
  • Can group thousands of objects across multiple sites
  • Scheduled events can be programmed for future switching requirements
  • Change management for large volumes of time switches and optimisers
  • Scheduling engine allows future changes to be run easily
  • Platform can make changes across many assets and buildings
  • Auditable record of switching events

Pricing

£500 a licence a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at energymanagementcentre@sse.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

9 2 0 7 4 0 2 4 9 0 3 7 0 4 5

Contact

SSE Enterprise Energy Solutions Alexander Park
Telephone: 0345 072 9529
Email: energymanagementcentre@sse.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
• Global Tool plant exercise routine
• Global tool compliance management
• Condor Alarm hosting and escalation
• Remote PPM – optimisation reports, software report and optimisation and energy report
Cloud deployment model
Private cloud
Service constraints
Constraints for the service are;

1. Requires a remote connection from the remote building to communicate with the global tool job engine.
2. A variety of communication options are supported, this would be considered at the contract discussion stage where we can offer our recommended communication medium that suits the clients needs.
3. Integration of the building assets. We use an IoT box and can integrate most communication protocols as standard e.g (Bacnet, Modbus, SNMP, KNX)

We also have in-house capability to write drivers for bespoke communication platforms.
System requirements
  • Installation IoT box for integration of the building assets
  • IoT box capable to reach the internet using https
  • Licence for global tool application

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Weekdays – within 1 hour
Weekends – within client agreed SLA
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
• We provide a self-serve option, clients have access to the Web GUI. With role profiles available for service configuration and switching configuration.
• We provide a managed service for the application, this covers all aspects of the operation of the application. Including site integration, application data point management, tagging datapoints, job filters, schedule jobs and managed reports from job results.
• See pricing document
• Named engineer, account manager and customer service managers are appointed to each contract
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Clients are provided with a welcome pack covering the scope of the service delivery that has been agreed between both parties.
The welcome pack will contain key account contacts who will be responsible for delivering the service

Where the self-service option is taken we will provide training on the following topics:

• How devices in the field communicate with the global tool engine
• How devices are added into the service application
• How objects are configured and why
• Configurations of jobs and data filters

This approach gives the client a full understanding of the application, it’s capabilities and ensures the deployment of the service meets our clients objectives.

There is also an help file for embedded in the application
Service documentation
Yes
Documentation formats
  • PDF
  • Other
Other documentation formats
Excel
End-of-contract data extraction
Clients can request an extract of their data at the end of the contract and would be chargeable.
End-of-contract process
At the end of the contract all of the clients’ devices calling in for new scheduled jobs to the central service will stop. All user access to the global tool web service will be revoked.

Using the service

Web browser interface
Yes
Supported browsers
  • Firefox
  • Chrome
Application to install
No
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
Web service GUI used for the configuration, scheduling and instructing of global tool jobs
User visibility is configured by an administrator on the web service using roles and permissions. A user can be given access to groups of buildings, single building and groups of software objects
Users can add interface devices, tag datapoints, create filters, set compliance standards and create jobs for diary management, plant exercise routines and compliance checks
Accessibility standards
None or don’t know
Description of accessibility
Web service GUI used for the configuration, scheduling and instructing of global tool jobs
User visibility is configured by an administrator on the web service using roles and permissions. A user can be given access to groups of buildings, single building and groups of software objects
Users can add interface devices, tag datapoints, create filters, set compliance standards and create jobs for diary management, plant exercise routines and compliance checks.
Accessibility testing
Web service GUI has been tested for all elements of the application
• User account access and log off
• User account timing out
• User account roles and permissions
• Adding/removing an interface
• Adding/removing new objects
• Creating new tags
• Adding tags (custom/site/equipment/object) to datapoints
• Adding/amending master values for time schedules and setpoints
• Bulk editor option for master value
• Creating/amending/removing job filters
• Creating/amending/scheduling/removing global tool jobs
• Adding/removing users
• Online help editor
API
No
Customisation available
No

Scaling

Independence of resources
We continually monitor the performance of our system taking steps to improve by adding additional resource or making improvements

Analytics

Service usage metrics
Yes
Metrics types
Number of parameters written to
Number of successful writes
Number of failed writes
Successful data points technical designation
Unsuccessful data points technical designation
Reporting types
Regular reports

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
Less than once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Other
Other data at rest protection approach
Physical access is controlled via data centre standards, only senior IT admin have access to physical infrastructure SSE employ a robust starters and leavers policy.
Data is spanned across multiple drives/sans for performance and security. Daily incremental backs ups and weekly full back ups are taken and written to disc. All backup data is encrypted, discs are stored in a secure fire safe off site
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users data can be exported on request
Data export formats
CSV
Data import formats
Other
Other data import formats
N/A

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
The global tool web service application is available 24/7 365 days per year. We monitor the critical services for the platform and provide uptime analysis for the customer.
Approach to resilience
Our data centre has redundant hardware at all levels (Servers, Networking, Storage) and our ISP provides multiple internet carriers (Further details available on request).
Outage reporting
The integration box is monitored and sends heartbeat into the critical alarm management system.

On the lack of a receipt from the heartbeat routine an email is then sent to a dedicated recipient informing them of the outage

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Platform interface controls are by domain controller user accounts, SSL use and inactivity time out function
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
No audit information available
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
QMS
ISO/IEC 27001 accreditation date
30/07/2019
What the ISO/IEC 27001 doesn’t cover
All aspects of the service are covered by ISO27001. This includes the infrastructure deployment and the processes on the management of the services utilised.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
ISO27001 (ISMS)

All SSE staff must adhere to a number of security policies that ensure the company operates in a safe and secure manner.
Employees are encouraged to
Be Aware – being vigilant at all times in different places and situations.
Take Care – knowing what you must do with SSE information to keep It secure
Staying Secure – actions our employees can take which will keep them and SSE cyber secure

Employees are reminded of personal responsibilities, taking positive cyber steps and working securely whilst on the move

Additionally employees are sent out mandatory training modules on information security to remind of their responsibilities and to ensure they understand what is expected of them.

The business also has a 30 minute reporting rule, in the event of a security incident employees should report the incident and would invoke an investigation.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Feature requests are considered by the business for approval. Once approved, feature requests are passed to the product owner who’ll assess the request and feedback the time lines for the change.
System security is also checked to ensure no vulnerabilities have been added. Once this has been completed and signed off, the new features are enabled for the system engineers to carry out their own testing.
Once the change has been completed, user acceptance tests are carried out on the new feature in a test environment. Once completed and signed off the new feature is released to the production server
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
For our windows based systems automatic updates are enabled by default.
Security patches are applied to internet facing systems as soon as we receive them.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Our internal and external systems are constantly probed to let us know if there are any changes or exposed network ports
Incident management type
Supplier-defined controls
Incident management approach
Any security incident would result in an investigation onto the cause and effect of the incident, following the investigation a lessons learned session would be held. SSE has a 30 minute rule for reporting security incidents.

As soon as an incident is discovered the IT and system experts will be informed and act appropriately depending on the risk to both the business and our clients

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
Yes
Connected networks
  • NHS Network (N3)
  • Health and Social Care Network (HSCN)

Social Value

Fighting climate change

Fighting climate change

Key to any environmental management system improvement program and greenhouse emission reduction program is the accuracy and analysis of baseline and trending data. However, traditionally, getting this data has been challenging. There are many variables, such as sourcing internal and external data, data gathered in silos, and departments wanting data to be split in different ways for their operational needs. As a result, this has led to time-consuming data rework and the reporting of different net-zero and environmental performance numbers to regulators, suppliers, and stakeholders. This can be resolved by our product offerings.
This platform allows numerous departments, teams and/or individuals to access and integrate a multitude of environmental and greenhouse gas data sets and sources, such as street lighting energy usage, building gas and electricity usage, and environmental conditions. It helps to break down the traditional silos challenging many businesses, provides an essential insight that spans business directorates and operational silos, and imports/ exports real-time data sets to provide knowledgeable insight.
Most importantly, export data sets can be set up so everyone will have the same central real-time reporting data to analyse and work from. It will also show if carbon-reducing intervention is delivering the expected outcomes, and tracks net-zero progress against company targets over time.

Pricing

Price
£500 a licence a year
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at energymanagementcentre@sse.com. Tell them what format you need. It will help if you say what assistive technology you use.