REVAULT
REVAULT is an archiving solution for legacy systems and data with a configurable user interface, supporting access control, retention and purging for legacy data.
Features
- Flexible replacement for legacy systems, internal- or cloud-hosted
- Web based front end, offering record-level access control
- Legacy data presented in a format familiar to end users
- Supports identification, management and disposal of historic records
- Provides access control to some or all data
- Can support multiple data sources with discrete access control
- Record access is fully auditable
- Data is fully exportable
Benefits
- Generates both infrastructure capacity and software licensing savings
- Generates both infrastructure capacity and software licensing savings
- Provides access to multiple legacy datasets in one place
- Provides the ability to add additional data sources in future
Pricing
£35,000.00 a licence
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 4 3 3 8 3 7 6 5 2 3 9 5 9 9
Contact
ICT Revolutions Ltd
Jonathan Goldie
Telephone: 07762 630363
Email: jon.goldie@ictrevolutions.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- REVAULT is designed to support the decommissioning of legacy data sources, and can be used for any system and data type. Solutions currently exist for Mosaic, PARIS, CareFirst, Frameworki, Abacus, SWIFT and all document storage formats, though other systems can also be accommodated.
- Cloud deployment model
- Private cloud
- Service constraints
- REVAUlT requires a Windows Server & SQL Server licenses
- System requirements
-
- MS Windows Server 2012 onwards, any version currently in support
- Virtual machine with SQL server database with Reporting services installed
- MS SQL Server 2016 onwards, any version currently in support
- Apache Tomcat version 10 & Java version 17 or later
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Normal support hours are between 9.00 am and 5.00 pm Monday to Friday on any day of a calendar year other than days which are bank holidays in England and Wales. Response time is based upon the severity of the incident, with a 2-hour target for critical issues, rising to 16 hours for minor issues.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
All customers are provided with the account manager and technical support engineer's details. The technical support engineer will be a person who is intimate with the product the customer is using and will attempt to provide resolve an incident within 2 hours of notification via the Service Desk.
Support for REVAULT is included in the annual licence charge.
All ICT Revolutions products contain an element of support and maintenance should something cease to work. Additional support can be purchased at the quoted day rates.
See the Service Definition for more information and the Pricing Document for details of support costs. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We offer a full installation guide and pre-requisites for each system. We can provide either onsite or eLearning training (at extra cost) and provide a full schema where possible. Our products come with implementation days which cover a full handover to the customer. End user testing forms a mandatory part of each and every implementation. As part of User Acceptance Testing, customer end users work through a series of workshops to familiarise and learn how to navigate the system. Where specific accessibility settings are desired, these are applied, and tested.
- Service documentation
- Yes
- Documentation formats
-
- ODF
- Other
- Other documentation formats
-
- ELearning videos in .MP4 format (with captions)
- SCORM-compliant eLearning content
- End-of-contract data extraction
- Data is always owned by the customer. Generally, Customer data does not leave their own site. For our products where we host customer data alongside the applications, and our application carries out processing of that data, we guarantee that the data is either deleted, or returned as CSV or similar files at the termination of the contract.
- End-of-contract process
- The service is withdrawn, in line with the Contract and the requirement of the customer, any data stored is destroyed or returned to the customer in CSV or similar format.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Windows
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- No
- Customisation available
- Yes
- Description of customisation
-
REVAULT can be customised in a number of ways:
Configuration - This is completed by ICT Revolutions alongside the customer, and includes the customisation of the legacy data sources with REVAULT, their navigation and look and feel. It also includes the configuration of the local retention policy.
System Settings - for example whether a request to view a record is required for all cases, no cases, or just those that are restricted; or to control the length of time that records can be viewed for. These changes can be made by end users with the relevant system administration abilities.
Data Admin - users with the relevant profile rights can flag or unflag records as 'restricted', and can choose to purge individual records, or to retain those that have been flagged for purging.
Scaling
- Independence of resources
- We work with customers to identify their predicted usage and define server specifications that will meet these. We work with customers to review the ongoing performance of our products and make changes to infrastructure where required. This process includes an estimate of high usage, based on similar implementations in comparable Authorities, to ensure that server resources are scaled appropriately.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We provide user access audit logs. Additional reports can be developed (at a cost).
- Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Data can be exported in the standard MS SQL Server formats including CSV, DOCX and PDF. This is achieved through the standard REVAULT user interface
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- TIFF
- XML
- Any attached files in their original format
- Data import formats
-
- CSV
- ODF
- Other
Data-in-transit protection
- Data protection between buyer and supplier networks
- IPsec or TLS VPN gateway
- Data protection within supplier network
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- We guarantee a 99% availability within normal operating hours, as agreed with each customer. If we fail to meet this standard we offer service credits
- Approach to resilience
- Details available on Request - The critical system components that are required to maintain availability and recover service in the event of outage have been identified. Critical system components are backed up across multiple, isolated locations Each location is engineered to operate independently with high reliability. Locations ns that automatically fail-over without interruption. Highly resilient systems, and therefore service availability, is a function of the system design.
- Outage reporting
- Email Alerts to named customer representative(s)
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- REVAULT uses different security profiles to access management functions. Users with administrative access only can access these functions. Database access is dependent on customers own end-user access controls for SQL Server.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
-
Cyber Essentials accredited.
Working towards ISO 27001 - Information security policies and processes
-
We are Cyber Essentials accredited for our internal information management policies and incident management processes. When working with customer data, we operate a policy where it never leaves their infrastructure, and we are signatories to their security, data protection and data management policies, including incident management, on the basis that we must meet the requirements of their PSN certification.
Our own internal policies governing information security include:
- Access Control Policy
- Acceptable Use Policy
- Communication Policy
- Data Security & Confidentiality Policy
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Initial customer configuration is identified via a workshop, and tested and confirmed at each round of User Acceptance Testing. At each application release, new functionality and configuration options are communicated to each customer to enable them to make decisions to suit their business processes. Configuration options are visible to admin users via the application.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- ICT Revolutions identify work with customers to identify and resolve any vulnerabilities affecting our products. Where any vulnerabilities are identified, they are assessed and triaged for resolution. ICT Revolutions develop and test our applications to work with new releases of application and database server technologies, and work with customers to move to these were appropriate.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
ICT Revolutions has instituted a set of business processes, with support technology, to monitor and audit how our own and our customer's ICT systems are used and to assure user accountability. Protective Monitoring activities are limited to those associated with security controls: Inspecting firewall logs, investigating operating system security alerts and monitoring.
Protective Monitoring includes obtaining server and systems log information and securing for a set period ICT logs in order to provide an audit trail of security relevant events of interest.
We are Cyber Security complaint and certificated, and are in the process of registering our ISO 27001 standards. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
We identify incidents and record them in our Incident Management Log, through automated monitoring systems or by a user contacting us.
Incident reporting and communication begin simultaneously so that as an incident is identified, we communicate clearly to the customer that a disruption is taking place and investigation is in progress.
Impact assessments guide the description of priority and severity - these are used to determine the level of support.
Diagnosis helps to isolate specific effects from the root causes and identify the synergy between the incident, changes to the technical environment and documented issues.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
ICT Revolutions is committed to achieving net zero by 2050 as per government aims.
In order to reduce our emissions year on year, we have introduced the following for office working:
- Ensure LED Lighting is used in the office.
- Motion sensors are in place throughout the office to ensure all lighting in unused rooms turns off automatically.
- Employees are encouraged to work from home and to only travel to customer sites when absolutely necessary. This has and will reduce CO2e released as a result of unnecessary travel.
- We have decommissioned our photocopier to decrease our paper usage.
As said above we fully support remote working for all staff. As part of this initiative, we have adapted work processes to enable fully home-based working, and provide the necessary equipment to enable staff to continue their work to the high standards that we achieve.
We are in the process of decommissioning our office so that commuting to the office will no longer be necessary. The office decommissioning process will be completed by the end of Q1 2024.
Within our contracts we specify when staff will travel and for what purposes: we have made significant progress in reducing business travel. Where attendance on site is necessary we strongly encourage staff to use trains when feasible (e.g. when not carrying heavy equipment) Staff currently produce very low levels of carbon emissions associated with their roles, given the prevalence of homeworking and the encouragement to use public transport for any unavoidable customer visits, this is something we will continue to work on to enable us to achieve our aims of becoming Carbon Net Zero by 2050. We also produce an annual Carbon Reduction Plan to support these aims.Covid-19 recovery
Since the Covid-19 pandemic, ICT Revolutions has embraced remote working, ensuring that all staff are fully equipped and enabled to carry out their duties from home. This has also been welcomed by customers. We provide comprehensive technical and HR support for remote working, including multiple screens, ergonomic chairs, and accessibility aids where appropriate.
While Covid-19 restrictions were in place, full social distancing was carried out, with strict adherence to the guidance issued at the time. On those occasions where staff members needed or preferred to work from the office they were provided with screens to isolate them from neighbours, one-way routes in and out of the office were defined and office staffing was kept to a minimum. Staff mostly worked from home throughout lockdown periods. With the forthcoming office decommissioning, staff will be free to work remotely from any secure location.
We have supported one staff member experiencing long-term health issues due to Covid-19. This has been managed under our standard approach to staff wellbeing; we have worked in partnership with the individual to redesign aspects of his role to accommodate his specific needs and have built in processes to enable the individual to deal effectively with their health issues.
We have a regular ‘social keeping in touch’ via virtual offices, to offset the effects of remote working. This started during the pandemic and is continuing. This involves weekly meetings with an open agenda to enable colleagues to maintain social contacts despite working from home.
Staff are encouraged to test for Covid-19 if they experience symptoms and to isolate in the event of a positive test result. As with any illness, the company supports the health and wellbeing of staff and would expect the staff member to follow medical guidance and ensure that they are well before resuming duties.Tackling economic inequality
ICT Revolutions proudly upholds its commitment as an Equal Opportunities Employer, dedicated to recruiting individuals based on their potential to contribute to the company's objectives. To promote inclusivity and tackle economic inequality, we offer free employment coaching to those facing barriers to employment, made possible through our partnership with Wildflower Fire Coaching. A particular success story of our training partnership involves a colleague with learning difficulties who, after participating in our traineeship program, transitioned to full-time employment in local government. The package provided encompassed coaching for work readiness, career planning, and comprehensive technical skills development.
Recognising the importance of continuous growth, we invest in training for our staff, focusing on key areas such as Project Management, Health & Safety, and Cyber Security Training. This approach ensures that the skills and qualifications acquired align closely with each individual's role and responsibilities. Examples of training include certified Microsoft training in Power BI and SQL, certified Oracle training, accredited 'practical migration' training (a leading data migration methodology), and Health & Safety training for our dedicated H&S officer, via Peninsula Training.
We actively engage in upskilling customer staff through knowledge transfer during collaborative projects. This not only enhances their proficiency but also opens avenues for career development in the Information Technology sector. Our commitment to knowledge sharing extends to organising both internal and external awaydays and 'lessons learned' sessions, fostering a culture of shared learning. We have developed an extensive suite of E-learning resources tailored to support our customers utilisation of industry-leading software applications.
Ensuring access to support and training is available for all, we collaborate with voluntary sector agencies. We recently worked with Age Concern, supporting their work on carers’ assessments by conducting training on technical skills in the use of case management systems.Equal opportunity
ICT Revolutions is an equal opportunities employer, offering tailored support for individuals to succeed. Our policy ensures an effective and comfortable work environment, providing necessary aids based on individual needs.
Given the individualised nature of people’s needs, each case is dealt with differently. For example:
(i) One staff member has a health condition which means she is unable to drive. This is accommodated through public transport and colleagues driving her to events.
(ii) We supported a trainee analyst with a learning disability. We provided training, support, coaching and mentoring to help him to gain employment with a local authority.
(iii) One staff member has a visual impairment accommodated through a combination of accessibility software and specialist screens
We also provide support to customer personnel with additional needs, examples include a customer with a severe visual impairment where we shaped our service delivery extensively, including tailored support to adapt to his accessibility software.
We address individual needs by discussing specific requirements or challenges with each employee. These considerations are integrated into their contracts, and our processes are adapted for effective accommodation. Equal pay is provided based on skills and roles, ensuring fair opportunities for training and career advancement across the company.
ICT Revolutions is a Tier 2 Home Office registered visa authority, which gives us access to identity data and work history to ensure that a person is who they say they are.
(ii)there is no evidence that they originated other than from their stated country of origin and they are free to work in UK.
ICT Revolutions is committed to addressing the issue of modern slavery. We have established comprehensive processes to guarantee that every team member engaged in any contract, including those employed through supply chain partners, undergoes thorough verification of identity and eligibility to work in the UK.Wellbeing
Staff’s Mental Health and Wellbeing is paramount at ICT Revolutions. We provide a Mental Health helpline service through our HR partner Peninsula. This provides mental health support around the clock. ICTR fully supports the 6 standards of the Mind Mental Health At Work commitment and is a signatory to this commitment. We believe that the professional, comprehensive, Mental Health support that our staff receive via Peninsula is effective at supporting our staff’s Mental Health and Wellbeing, although we of course, continue to review our mental health support annually to ensure we are providing the best possible service to our workforce.
Staff are supported through away-days, social-days which take place one a month. We have a reasonable working hours policy and conduct regular 1:1 sessions with supervisors & managers to discuss any matters of concern. We do have an open-door policy in which an employee is encouraged to discuss any issues they have work related or otherwise with a senior member of staff when they arise. We also offer a Cycle to Work scheme for all employees to increase physical wellbeing among the team.
Since 2020 we have provided most of our services remotely, enabling our staff and customer personnel to work from home and to minimise work-related travel and therefore the stress that comes with commuting.
Our implementation methodology prioritises user well-being through a range of user engagement strategies. We actively seek input from all stakeholders, promoting inclusivity through focus groups and practitioner engagement activities. Ensuring all voices are heard including those with any concerns. These sessions ensure open access for customer personnel. Weekly user engagement activities and carefully planned focus groups, spanning 1-2 weeks based on project complexity, embody our commitment to holistic well-being, creating a collaborative and enriching experience for all involved.
Pricing
- Price
- £35,000.00 a licence
- Discount for educational organisations
- No
- Free trial available
- No