Global Tool (Diary management)
Platform is used to make parameter adjustments to your building assets, minimising control drift and reducing energy wastage.
Adjustments can be made to either standard time programs or exceptions, to multiple buildings and data points as a single command.
Can be used for bank holiday switching and non-standard switching requirement.
Features
- Cloud managed application
- Role based user access
- Tagging engine
- Multi-vendor capability
- Remote building data interface
- Job type scheduling engine
- Job execution reports
- Equipment and object based filter capability
- Object setting or monitoring capability
- Audit logs
Benefits
- Application configuration accessible via the web
- User access via roles and permissions
- Data point normalisation done using tagging
- Supports a large range of control systems
- Can group thousands of objects across multiple sites
- Scheduled events can be programmed for future switching requirements
- Change management for large volumes of time switches and optimisers
- Scheduling engine allows future changes to be run easily
- Platform can make changes across many assets and buildings
- Auditable record of switching events
Pricing
£500 a licence a year
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
9 2 0 7 4 0 2 4 9 0 3 7 0 4 5
Contact
SSE Enterprise Energy Solutions
Alexander Park
Telephone: 0345 072 9529
Email: energymanagementcentre@sse.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
-
• Global Tool plant exercise routine
• Global tool compliance management
• Condor Alarm hosting and escalation
• Remote PPM – optimisation reports, software report and optimisation and energy report - Cloud deployment model
- Private cloud
- Service constraints
-
Constraints for the service are;
1. Requires a remote connection from the remote building to communicate with the global tool job engine.
2. A variety of communication options are supported, this would be considered at the contract discussion stage where we can offer our recommended communication medium that suits the clients needs.
3. Integration of the building assets. We use an IoT box and can integrate most communication protocols as standard e.g (Bacnet, Modbus, SNMP, KNX)
We also have in-house capability to write drivers for bespoke communication platforms. - System requirements
-
- Installation IoT box for integration of the building assets
- IoT box capable to reach the internet using https
- Licence for global tool application
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
-
Weekdays – within 1 hour
Weekends – within client agreed SLA - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
• We provide a self-serve option, clients have access to the Web GUI. With role profiles available for service configuration and switching configuration.
• We provide a managed service for the application, this covers all aspects of the operation of the application. Including site integration, application data point management, tagging datapoints, job filters, schedule jobs and managed reports from job results.
• See pricing document
• Named engineer, account manager and customer service managers are appointed to each contract - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Clients are provided with a welcome pack covering the scope of the service delivery that has been agreed between both parties.
The welcome pack will contain key account contacts who will be responsible for delivering the service
Where the self-service option is taken we will provide training on the following topics:
• How devices in the field communicate with the global tool engine
• How devices are added into the service application
• How objects are configured and why
• Configurations of jobs and data filters
This approach gives the client a full understanding of the application, it’s capabilities and ensures the deployment of the service meets our clients objectives.
There is also an help file for embedded in the application - Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
- Excel
- End-of-contract data extraction
- Clients can request an extract of their data at the end of the contract and would be chargeable.
- End-of-contract process
- At the end of the contract all of the clients’ devices calling in for new scheduled jobs to the central service will stop. All user access to the global tool web service will be revoked.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Firefox
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
-
Web service GUI used for the configuration, scheduling and instructing of global tool jobs
User visibility is configured by an administrator on the web service using roles and permissions. A user can be given access to groups of buildings, single building and groups of software objects
Users can add interface devices, tag datapoints, create filters, set compliance standards and create jobs for diary management, plant exercise routines and compliance checks - Accessibility standards
- None or don’t know
- Description of accessibility
-
Web service GUI used for the configuration, scheduling and instructing of global tool jobs
User visibility is configured by an administrator on the web service using roles and permissions. A user can be given access to groups of buildings, single building and groups of software objects
Users can add interface devices, tag datapoints, create filters, set compliance standards and create jobs for diary management, plant exercise routines and compliance checks. - Accessibility testing
-
Web service GUI has been tested for all elements of the application
• User account access and log off
• User account timing out
• User account roles and permissions
• Adding/removing an interface
• Adding/removing new objects
• Creating new tags
• Adding tags (custom/site/equipment/object) to datapoints
• Adding/amending master values for time schedules and setpoints
• Bulk editor option for master value
• Creating/amending/removing job filters
• Creating/amending/scheduling/removing global tool jobs
• Adding/removing users
• Online help editor - API
- No
- Customisation available
- No
Scaling
- Independence of resources
- We continually monitor the performance of our system taking steps to improve by adding additional resource or making improvements
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Number of parameters written to
Number of successful writes
Number of failed writes
Successful data points technical designation
Unsuccessful data points technical designation - Reporting types
- Regular reports
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
- Other
- Other data at rest protection approach
-
Physical access is controlled via data centre standards, only senior IT admin have access to physical infrastructure SSE employ a robust starters and leavers policy.
Data is spanned across multiple drives/sans for performance and security. Daily incremental backs ups and weekly full back ups are taken and written to disc. All backup data is encrypted, discs are stored in a secure fire safe off site - Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Users data can be exported on request
- Data export formats
- CSV
- Data import formats
- Other
- Other data import formats
- N/A
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- The global tool web service application is available 24/7 365 days per year. We monitor the critical services for the platform and provide uptime analysis for the customer.
- Approach to resilience
- Our data centre has redundant hardware at all levels (Servers, Networking, Storage) and our ISP provides multiple internet carriers (Further details available on request).
- Outage reporting
-
The integration box is monitored and sends heartbeat into the critical alarm management system.
On the lack of a receipt from the heartbeat routine an email is then sent to a dedicated recipient informing them of the outage
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Platform interface controls are by domain controller user accounts, SSL use and inactivity time out function
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- QMS
- ISO/IEC 27001 accreditation date
- 30/07/2019
- What the ISO/IEC 27001 doesn’t cover
- All aspects of the service are covered by ISO27001. This includes the infrastructure deployment and the processes on the management of the services utilised.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
ISO27001 (ISMS)
All SSE staff must adhere to a number of security policies that ensure the company operates in a safe and secure manner.
Employees are encouraged to
Be Aware – being vigilant at all times in different places and situations.
Take Care – knowing what you must do with SSE information to keep It secure
Staying Secure – actions our employees can take which will keep them and SSE cyber secure
Employees are reminded of personal responsibilities, taking positive cyber steps and working securely whilst on the move
Additionally employees are sent out mandatory training modules on information security to remind of their responsibilities and to ensure they understand what is expected of them.
The business also has a 30 minute reporting rule, in the event of a security incident employees should report the incident and would invoke an investigation.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Feature requests are considered by the business for approval. Once approved, feature requests are passed to the product owner who’ll assess the request and feedback the time lines for the change.
System security is also checked to ensure no vulnerabilities have been added. Once this has been completed and signed off, the new features are enabled for the system engineers to carry out their own testing.
Once the change has been completed, user acceptance tests are carried out on the new feature in a test environment. Once completed and signed off the new feature is released to the production server - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
For our windows based systems automatic updates are enabled by default.
Security patches are applied to internet facing systems as soon as we receive them. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Our internal and external systems are constantly probed to let us know if there are any changes or exposed network ports
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Any security incident would result in an investigation onto the cause and effect of the incident, following the investigation a lessons learned session would be held. SSE has a 30 minute rule for reporting security incidents.
As soon as an incident is discovered the IT and system experts will be informed and act appropriately depending on the risk to both the business and our clients
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- NHS Network (N3)
- Health and Social Care Network (HSCN)
Social Value
- Fighting climate change
-
Fighting climate change
Key to any environmental management system improvement program and greenhouse emission reduction program is the accuracy and analysis of baseline and trending data. However, traditionally, getting this data has been challenging. There are many variables, such as sourcing internal and external data, data gathered in silos, and departments wanting data to be split in different ways for their operational needs. As a result, this has led to time-consuming data rework and the reporting of different net-zero and environmental performance numbers to regulators, suppliers, and stakeholders. This can be resolved by our product offerings.
This platform allows numerous departments, teams and/or individuals to access and integrate a multitude of environmental and greenhouse gas data sets and sources, such as street lighting energy usage, building gas and electricity usage, and environmental conditions. It helps to break down the traditional silos challenging many businesses, provides an essential insight that spans business directorates and operational silos, and imports/ exports real-time data sets to provide knowledgeable insight.
Most importantly, export data sets can be set up so everyone will have the same central real-time reporting data to analyse and work from. It will also show if carbon-reducing intervention is delivering the expected outcomes, and tracks net-zero progress against company targets over time.
Pricing
- Price
- £500 a licence a year
- Discount for educational organisations
- No
- Free trial available
- No